Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
Analysis ID:1543086
MD5:8bc8dfa75b6b62a90785f46221075ed3
SHA1:f55a2670f6b5945aab4033a66bc035ce0cf10e8d
SHA256:9db830145716b1d60d3472934f02b289838d8bbef2fd9f50def9f6af6886529c
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality for read data from the clipboard
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe (PID: 4280 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe" MD5: 8BC8DFA75B6B62A90785F46221075ED3)
    • cmd.exe (PID: 6640 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 1892 cmdline: sc stop mongoose MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • sc.exe (PID: 4140 cmdline: sc stop mongoose MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • PING.EXE (PID: 4764 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • sc.exe (PID: 5840 cmdline: sc delete mongoose echo 3:27:02.65 MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • PING.EXE (PID: 3128 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • sc.exe (PID: 5068 cmdline: sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • PING.EXE (PID: 6532 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • sc.exe (PID: 320 cmdline: sc start mongoose MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • PING.EXE (PID: 1020 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • mongoose-2.11.exe (PID: 6556 cmdline: c:\Mongoose\mongoose-2.11.exe -- MD5: A494D4D9AC522F13A3FA5E1C2C0CB467)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto , CommandLine: sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6640, ParentProcessName: cmd.exe, ProcessCommandLine: sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto , ProcessId: 5068, ProcessName: sc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.9% probability
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_00410B5F CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_00410B5F
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile created: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\readme.txt.txtJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040501B SetLastError,malloc,GetFileAttributesW,wcscat,FindFirstFileW,free,12_2_0040501B
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Jump to behavior

Networking

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004114C1 recv,WSAGetLastError,12_2_004114C1
Source: mongoose-2.11.exe0.0.dr, mongoose.conf.0.dr, mongoose.conf0.0.drString found in binary or memory: http://code.google.com/p/mongoose/wiki/MongooseManual
Source: readme.txt.txt.0.drString found in binary or memory: http://localhost/clientaccesspolicy.xml
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00404EE8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404EE8
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004019DB __p___argv,OpenSCManagerA,GetModuleFileNameA,strncat,strncat,strncat,CreateServiceA,ChangeServiceConfig2A,OpenServiceA,DeleteService,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_004019DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030FA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_004061280_2_00406128
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_004046F90_2_004046F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_004068FF0_2_004068FF
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040D44D12_2_0040D44D
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0041245612_2_00412456
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040E87B12_2_0040E87B
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0041182912_2_00411829
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004164F612_2_004164F6
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0041308412_2_00413084
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040D94312_2_0040D943
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040E90312_2_0040E903
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040EDEE12_2_0040EDEE
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040E66612_2_0040E666
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040260912_2_00402609
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004116D712_2_004116D7
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040DE8912_2_0040DE89
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0041234912_2_00412349
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004133C512_2_004133C5
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal52.troj.evad.winEXE@24/12@0/1
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_00401B0A GetLastError,FormatMessageA,MessageBoxA,12_2_00401B0A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_004041FC GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004041FC
Source: C:\Mongoose\mongoose-2.11.exeCode function: __p___argv,OpenSCManagerA,GetModuleFileNameA,strncat,strncat,strncat,CreateServiceA,ChangeServiceConfig2A,OpenServiceA,DeleteService,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_004019DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004011DD __p___argv,__p___argv,CreatePopupMenu,AppendMenuA,AppendMenuA,AppendMenuA,_snprintf,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,GetCursorPos,SetForegroundWindow,TrackPopupMenu,PostMessageA,DestroyMenu,Shell_NotifyIconA,PostQuitMessage,__p___argv,__p___argv,strcmp,StartServiceCtrlDispatcherA,exit,__p___argv,__p___argc,DefWindowProcA,12_2_004011DD
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004011DD __p___argv,__p___argv,CreatePopupMenu,AppendMenuA,AppendMenuA,AppendMenuA,_snprintf,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,GetCursorPos,SetForegroundWindow,TrackPopupMenu,PostMessageA,DestroyMenu,Shell_NotifyIconA,PostQuitMessage,__p___argv,__p___argv,strcmp,StartServiceCtrlDispatcherA,exit,__p___argv,__p___argc,DefWindowProcA,12_2_004011DD
Source: C:\Mongoose\mongoose-2.11.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile created: C:\Users\user\AppData\Local\Temp\nss8F7C.tmpJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: mongoose-2.11.exeString found in binary or memory: --help
Source: mongoose-2.11.exeString found in binary or memory: --help
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongoose
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongoose
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete mongoose echo 3:27:02.65
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start mongoose
Source: unknownProcess created: C:\Mongoose\mongoose-2.11.exe c:\Mongoose\mongoose-2.11.exe --
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongooseJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongooseJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete mongoose echo 3:27:02.65Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start mongooseJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Mongoose\mongoose-2.11.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Mongoose\mongoose-2.11.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_00416A00 push eax; ret 12_2_00416A2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile created: C:\Mongoose\mongoose-2.11.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile created: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose-2.11.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeFile created: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\readme.txt.txtJump to behavior
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004011DD __p___argv,__p___argv,CreatePopupMenu,AppendMenuA,AppendMenuA,AppendMenuA,_snprintf,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,GetCursorPos,SetForegroundWindow,TrackPopupMenu,PostMessageA,DestroyMenu,Shell_NotifyIconA,PostQuitMessage,__p___argv,__p___argv,strcmp,StartServiceCtrlDispatcherA,exit,__p___argv,__p___argc,DefWindowProcA,12_2_004011DD
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongoose
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exeWindow / User API: threadDelayed 9680Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_12-8211
Source: C:\Mongoose\mongoose-2.11.exeAPI coverage: 8.4 %
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128Thread sleep count: 256 > 30Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128Thread sleep time: -256000s >= -30000sJump to behavior
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128Thread sleep count: 9680 > 30Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128Thread sleep time: -9680000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Mongoose\mongoose-2.11.exeLast function: Thread delayed
Source: C:\Mongoose\mongoose-2.11.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_0040501B SetLastError,malloc,GetFileAttributesW,wcscat,FindFirstFileW,free,12_2_0040501B
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Jump to behavior
Source: mongoose-2.11.exe, 0000000C.00000002.4519330539.000000000074A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeAPI call chain: ExitProcess graph end nodegraph_0-2908
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongooseJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc stop mongooseJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete mongoose echo 3:27:02.65Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start mongooseJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exeCode function: 0_2_00405A2E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405A2E
Source: C:\Mongoose\mongoose-2.11.exeCode function: 12_2_004034CD socket,bind,listen,calloc,closesocket,GetLastError,strerror,closesocket,GetLastError,strerror,12_2_004034CD
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Command and Scripting Interpreter
15
Windows Service
15
Windows Service
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts13
Service Execution
1
Scripting
11
Process Injection
11
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Clipboard Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Obfuscated Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Network Configuration Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1543086 Sample: SecuriteInfo.com.Trojan.Mul... Startdate: 27/10/2024 Architecture: WINDOWS Score: 52 30 AI detected suspicious sample 2->30 7 SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe 20 2->7         started        10 mongoose-2.11.exe 2->10         started        process3 file4 24 C:\Users\user\AppData\...\mongoose-2.11.exe, PE32 7->24 dropped 26 C:\Mongoose\mongoose-2.11.exe, PE32 7->26 dropped 12 cmd.exe 2 7->12         started        process5 signatures6 32 Uses ping.exe to sleep 12->32 34 Uses ping.exe to check the status of other devices and networks 12->34 15 PING.EXE 1 12->15         started        18 conhost.exe 12->18         started        20 sc.exe 1 12->20         started        22 7 other processes 12->22 process7 dnsIp8 28 127.0.0.1 unknown unknown 15->28

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe5%ReversingLabs
SourceDetectionScannerLabelLink
C:\Mongoose\mongoose-2.11.exe4%ReversingLabs
C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose-2.11.exe4%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrorSecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exefalse
  • URL Reputation: safe
unknown
http://localhost/clientaccesspolicy.xmlreadme.txt.txt.0.drfalse
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exefalse
    • URL Reputation: safe
    unknown
    http://code.google.com/p/mongoose/wiki/MongooseManualmongoose-2.11.exe0.0.dr, mongoose.conf.0.dr, mongoose.conf0.0.drfalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      IP
      127.0.0.1
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1543086
      Start date and time:2024-10-27 08:26:05 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 55s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:16
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      Detection:MAL
      Classification:mal52.troj.evad.winEXE@24/12@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 37
      • Number of non-executed functions: 116
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      TimeTypeDescription
      03:27:44API Interceptor13017404x Sleep call for process: mongoose-2.11.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):599
      Entropy (8bit):4.723069750790691
      Encrypted:false
      SSDEEP:12:MMHdVuafexgdGzu/4WWEytAytZhA4Wvyt5fHebzXdEpLvzX8as7:JdVuvFuBWh1Zhugcv7
      MD5:E21B4D0F290636E1BCEA13E87CB15BA1
      SHA1:836E33BE6493DCA62C685B2B124DA68A5DA660A5
      SHA-256:833D5E8CB7792AC371CB71468AD4E9E55BFBB1CC6DE1322EDD899390FD594EE2
      SHA-512:5DBFB66F81D43CF87B6C3895978E8E765569B040DA91F3092025677C9C82787BD4DD8BF363AFBCA06BDCE2D0AC97DF86F519102824382354250403C97E869182
      Malicious:false
      Preview:.<?xml version="1.0" encoding="utf-8"?>..<access-policy>.. <cross-domain-access>.. <policy>.. <allow-from http-methods="*"> -->.. <allow-from http-request-headers="*">.. <domain uri="http://*.c-pos.co.uk" />.. <domain uri="http://*.cysrln03-dev-andyr-vm" />.. <domain uri="http://*.cysrln02-dev-vm" /> -->.. <domain uri="http://*" /> -->.. <domain uri="*" />.. </allow-from>.. <grant-to>.. <socket-resource port="4502" protocol="tcp" />.. </grant-to>.. </policy>.. </cross-domain-access>..</access-policy>..
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):6.481986535863945
      Encrypted:false
      SSDEEP:1536:I1+uJsNBVhYzmR58pFXP38kdfNfYo2T6+oOfObH/II7JuvhlTSoSICS4ASSoCj++:NvQmR52yq32TiNgI7kvHlAa6/b49
      MD5:A494D4D9AC522F13A3FA5E1C2C0CB467
      SHA1:B35891685317A524557E30C24366AFF761220D6B
      SHA-256:320446AD4E82DABBEAB0536194BDCF81796EB5341CE87EC00F46949BFF11E7B9
      SHA-512:B01B37D16FDE6445403156D110FCA080C08894187C7FA84F0C6AE026C0EAC541CCC20AB36783789F68E6D2A3662D0CCBB8AE88E36F1ACA361F4E6984B64B8A7E
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 4%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........tz.j.).j.).j.).v.).j.)4v.).j.)_u.).j.).u.).j.).j.).j.).l.).j.)_u.).j.)Rich.j.)........PE..L.....L.................`........../j.......p....@.........................................................................D........................................................................................p...............................text...V\.......`.................. ..`.rdata...E...p...P...p..............@..@.data....8.......0..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):858
      Entropy (8bit):4.853420547501007
      Encrypted:false
      SSDEEP:12:VuRU+s0ZNA2PwN1cm7vG8VpJDozTzXrfAvcmAzp+On3lhnfjXrf6Xp5osvUGZKJ1:MUCNoj5v/0HkEP3l9P6HosMGAp3L
      MD5:2B2AE0570C8420AD5545E1D48BBB6B97
      SHA1:B1522B301ABBDB06CD86AE50C2375CB041B211C8
      SHA-256:2A5A85847F7B116345980BCF902110F567356BC0EB589ADE5DFA2FACD06DA53A
      SHA-512:C7E996EFD7BF6B929EF0954E95B8DE892E8698F451F92A6AB0523520CC0EE83B99DB445D7F367D738B07BBAAC7F80BC569645956DDEEAB1F7166885AA7AFE8D2
      Malicious:false
      Preview:# Mongoose web server configuration file...# Lines starting with '#' and empty lines are ignored...# For detailed description of every option, visit..# http://code.google.com/p/mongoose/wiki/MongooseManual....# cgi_extensions .cgi,.pl,.php..# cgi_environment <value>..# put_delete_passwords_file <value>..# cgi_interpreter <value>..# protect_uri <value>..# authentication_domain mydomain.com..# ssi_extensions .shtml,.shtm..access_log_file access_log.txt..# ssl_chain_file <value>..# enable_directory_listing yes..# error_log_file <value>..# global_passwords_file <value>..# index_files index.html,index.htm,index.cgi..# enable_keep_alive no..# access_control_list <value>..# max_request_size 16384..# extra_mime_types <value>..listening_ports 127.0.0.1:80..document_root c:\mongoose\html..# ssl_certificate <value>..# num_threads 10..# run_as_user <value>..
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):835
      Entropy (8bit):4.605011740436264
      Encrypted:false
      SSDEEP:24:fK+DsVG+DsVG+DsVbJegV0HvGZLa/qOVxk/:fDs5s5sRJd0H0LcVxY
      MD5:4C572ABD722A1CF4D68A3DB1B23B1FB1
      SHA1:0BAFF175C4E1E6AEA90D937053543649101099CE
      SHA-256:F2229D686B705A7531DFDA2EF1E2D7731EC195D5DED729F4BED42E3F53E8BDE4
      SHA-512:B8AC0B064F36EBB37119ABAF4E89E48C3F1D1E5D0A6B7BFC5AC722FA1EC6BD8FFD984F674FCE2BEC55860790172A5CE26937E51397C446225D9B7B4F5EF62792
      Malicious:false
      Preview: .. ..------------- ..Time of Install: 27/10/2024 3:26:58.33 ..------------- .. .. ..[SC] OpenService FAILED 1060:....The specified service does not exist as an installed service..... ..[SC] OpenService FAILED 1060:....The specified service does not exist as an installed service..... ..[SC] OpenService FAILED 1060:....The specified service does not exist as an installed service..... ..[SC] CreateService SUCCESS.. ....SERVICE_NAME: mongoose .. TYPE : 10 WIN32_OWN_PROCESS .. STATE : 4 RUNNING .. (STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN).. WIN32_EXIT_CODE : 0 (0x0).. SERVICE_EXIT_CODE : 0 (0x0).. CHECKPOINT : 0x0.. WAIT_HINT : 0x0.. PID : 6556.. FLAGS : .. ..
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:DOS batch file, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):826
      Entropy (8bit):4.6792883413336614
      Encrypted:false
      SSDEEP:12:7ejoj3jtYMmgSj3jojoc8joc8joLqFIejoLqFs84SAUqMjoLqFAjoLqFl:7OM1J6VPO10WE
      MD5:3F59744A13416C2C271CDA7BB056BE67
      SHA1:348772DDFF387DCB8FAE8D72A08D98D0675A9825
      SHA-256:771039EB3C68794543C9B8A197A0BC8381DF9B3C037EEDAA3A3AA7F44AA9980E
      SHA-512:6530F6CA35CA0F6ED81538227C6DC110BFF38B5EF792F09C7F0972F74585B3C51B73D7DAD896FF5660F934DEC97B315FE3FA56E6C2AF2E37EC8AD3C68E9D944C
      Malicious:false
      Preview:@echo off..cls....@echo off..echo. >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt..echo ------------- >>C:\Mongoose_log.txt..echo Time of Install: %Date% %time% >>C:\Mongoose_log.txt..echo ------------- >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt....sc stop mongoose >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt....sc stop mongoose >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt....ping -n 5 127.0.0.1 >nul....sc delete mongoose echo %time% >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt....ping -n 5 127.0.0.1 >nul....sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt....ping -n 5 127.0.0.1 >nul....sc start mongoose >>C:\Mongoose_log.txt..echo. >>C:\Mongoose_log.txt....ping -n 5 127.0.0.1 >nul
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):6.481986535863945
      Encrypted:false
      SSDEEP:1536:I1+uJsNBVhYzmR58pFXP38kdfNfYo2T6+oOfObH/II7JuvhlTSoSICS4ASSoCj++:NvQmR52yq32TiNgI7kvHlAa6/b49
      MD5:A494D4D9AC522F13A3FA5E1C2C0CB467
      SHA1:B35891685317A524557E30C24366AFF761220D6B
      SHA-256:320446AD4E82DABBEAB0536194BDCF81796EB5341CE87EC00F46949BFF11E7B9
      SHA-512:B01B37D16FDE6445403156D110FCA080C08894187C7FA84F0C6AE026C0EAC541CCC20AB36783789F68E6D2A3662D0CCBB8AE88E36F1ACA361F4E6984B64B8A7E
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 4%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........tz.j.).j.).j.).v.).j.)4v.).j.)_u.).j.).u.).j.).j.).j.).l.).j.)_u.).j.)Rich.j.)........PE..L.....L.................`........../j.......p....@.........................................................................D........................................................................................p...............................text...V\.......`.................. ..`.rdata...E...p...P...p..............@..@.data....8.......0..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):858
      Entropy (8bit):4.853420547501007
      Encrypted:false
      SSDEEP:12:VuRU+s0ZNA2PwN1cm7vG8VpJDozTzXrfAvcmAzp+On3lhnfjXrf6Xp5osvUGZKJ1:MUCNoj5v/0HkEP3l9P6HosMGAp3L
      MD5:2B2AE0570C8420AD5545E1D48BBB6B97
      SHA1:B1522B301ABBDB06CD86AE50C2375CB041B211C8
      SHA-256:2A5A85847F7B116345980BCF902110F567356BC0EB589ADE5DFA2FACD06DA53A
      SHA-512:C7E996EFD7BF6B929EF0954E95B8DE892E8698F451F92A6AB0523520CC0EE83B99DB445D7F367D738B07BBAAC7F80BC569645956DDEEAB1F7166885AA7AFE8D2
      Malicious:false
      Preview:# Mongoose web server configuration file...# Lines starting with '#' and empty lines are ignored...# For detailed description of every option, visit..# http://code.google.com/p/mongoose/wiki/MongooseManual....# cgi_extensions .cgi,.pl,.php..# cgi_environment <value>..# put_delete_passwords_file <value>..# cgi_interpreter <value>..# protect_uri <value>..# authentication_domain mydomain.com..# ssi_extensions .shtml,.shtm..access_log_file access_log.txt..# ssl_chain_file <value>..# enable_directory_listing yes..# error_log_file <value>..# global_passwords_file <value>..# index_files index.html,index.htm,index.cgi..# enable_keep_alive no..# access_control_list <value>..# max_request_size 16384..# extra_mime_types <value>..listening_ports 127.0.0.1:80..document_root c:\mongoose\html..# ssl_certificate <value>..# num_threads 10..# run_as_user <value>..
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):248
      Entropy (8bit):4.5610289004086155
      Encrypted:false
      SSDEEP:6:C/DJr2ApUik7TXN/ItPLFKWqVgTdEJ7CiG/ocw5jAkOBFpuzn:C/9nmik7TCtPQ97VGQcCAlgz
      MD5:A60C691A345715B616C28D020775236F
      SHA1:91932D83EC23BF133826025108FB51D23C1AE38D
      SHA-256:BE7829E5AD893F6DB48969E6B1E969C0E118EDCBEA485A2770BD30F09FF997F7
      SHA-512:28E747FA0C76E25AE6A6A02713B047AC271ABF148CCA5744901404952377923D61C12D34B20E681EFE7A9EED406382672BB5D542F23A0DCCC0EA4C4514CEE459
      Malicious:false
      Preview:1) after install of cnp sw (ensure opos print option and port set to 4502)..2) Copy this dir to c:\..3) run mongoose.exe + install as service..4) test http://localhost/clientaccesspolicy.xml loads....JB --- opos needs to be installed with a printer
      Process:C:\Windows\SysWOW64\PING.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):478
      Entropy (8bit):4.9404427828211634
      Encrypted:false
      SSDEEP:12:PKMRJpTeTeTeTeT0s+sEAFSkIrxMVlmJHaVzvv:/2fAokItULVDv
      MD5:1D785D889CA617298A68D26DFEF974C4
      SHA1:1CC36474033E2767B059019B12782CE558F1EA34
      SHA-256:FE52FE8317F9F07F4AB830F6E3B1F1013BE4AA2A82DD5C86AA805648FC053230
      SHA-512:EF34C2479BE5BA45B41584887354DE53EA15EC53EA74D57042FF57EB8A609B93DAC9A55297300C29320CE14966FB7704C9952BDC7C6E2DDD0DCA929884091CF3
      Malicious:false
      Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.674253821777677
      TrID:
      • Win32 Executable (generic) a (10002005/4) 92.16%
      • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      File size:103'398 bytes
      MD5:8bc8dfa75b6b62a90785f46221075ed3
      SHA1:f55a2670f6b5945aab4033a66bc035ce0cf10e8d
      SHA256:9db830145716b1d60d3472934f02b289838d8bbef2fd9f50def9f6af6886529c
      SHA512:d7d7d60607ed444a3344e19228b7f4efea9b1a12743b78ff9ddf658faf7c4e8e5ad8e32f1e2fa305381a76f84ab9572d42126981a10b29dd6eb87956921aece2
      SSDEEP:1536:EpgpHzb9dZVX9fHMvG0D3XJkcPfkFtxRMXfDGSwv5A8bvEOsBsPsGe/ehY5Td:ygXdZt9P6D3XJkcXkFKKWrZB0s7p
      TLSH:98A3F123F9C1CDF3D9C616351EB7DB7CDBF2D2A602552A1F97142FB62951046CE1A082
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^.........
      Icon Hash:3d2e0f95332b3399
      Entrypoint:0x4030fa
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:TERMINAL_SERVER_AWARE
      Time Stamp:0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:7fa974366048f9c551ef45714595665e
      Instruction
      sub esp, 00000180h
      push ebx
      push ebp
      push esi
      xor ebx, ebx
      push edi
      mov dword ptr [esp+18h], ebx
      mov dword ptr [esp+10h], 00409160h
      xor esi, esi
      mov byte ptr [esp+14h], 00000020h
      call dword ptr [00407030h]
      push 00008001h
      call dword ptr [004070B0h]
      push ebx
      call dword ptr [0040727Ch]
      push 00000008h
      mov dword ptr [0042EC18h], eax
      call 00007F605882AEA6h
      mov dword ptr [0042EB64h], eax
      push ebx
      lea eax, dword ptr [esp+34h]
      push 00000160h
      push eax
      push ebx
      push 00428F98h
      call dword ptr [00407158h]
      push 00409154h
      push 0042E360h
      call 00007F605882AB59h
      call dword ptr [004070ACh]
      mov edi, 00434000h
      push eax
      push edi
      call 00007F605882AB47h
      push ebx
      call dword ptr [0040710Ch]
      cmp byte ptr [00434000h], 00000022h
      mov dword ptr [0042EB60h], eax
      mov eax, edi
      jne 00007F60588282BCh
      mov byte ptr [esp+14h], 00000022h
      mov eax, 00434001h
      push dword ptr [esp+14h]
      push eax
      call 00007F605882A63Ah
      push eax
      call dword ptr [0040721Ch]
      mov dword ptr [esp+1Ch], eax
      jmp 00007F6058828315h
      cmp cl, 00000020h
      jne 00007F60588282B8h
      inc eax
      cmp byte ptr [eax], 00000020h
      je 00007F60588282ACh
      cmp byte ptr [eax], 00000022h
      mov byte ptr [eax+eax+00h], 00000000h
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x6c8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x5c4c0x5e00856b32eb77dfd6fb67f21d6543272da5False0.6697140957446809data6.440105549497952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x70000x129c0x1400dc77f8a1e6985a4361c55642680ddb4fFalse0.43359375data5.046835307909969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x90000x25c580x4007922d4ce117d7d5b3ac2cffe4b0b5e4fFalse0.5849609375data4.801003752715384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .ndata0x2f0000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x370000x6c80x800d00928665e5bfdca7840eaef91429e30False0.345703125data2.917343976333205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x371480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
      RT_DIALOG0x374300x100dataEnglishUnited States0.5234375
      RT_DIALOG0x375300x11cdataEnglishUnited States0.6056338028169014
      RT_DIALOG0x376500x60dataEnglishUnited States0.7291666666666666
      RT_GROUP_ICON0x376b00x14dataEnglishUnited States1.2
      DLLImport
      KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
      USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
      GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
      SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
      ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
      ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
      VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:03:26:57
      Start date:27/10/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"
      Imagebase:0x400000
      File size:103'398 bytes
      MD5 hash:8BC8DFA75B6B62A90785F46221075ED3
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:03:26:58
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:03:26:58
      Start date:27/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:03:26:58
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\sc.exe
      Wow64 process (32bit):true
      Commandline:sc stop mongoose
      Imagebase:0x180000
      File size:61'440 bytes
      MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:5
      Start time:03:26:58
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\sc.exe
      Wow64 process (32bit):true
      Commandline:sc stop mongoose
      Imagebase:0x180000
      File size:61'440 bytes
      MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:6
      Start time:03:26:58
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\PING.EXE
      Wow64 process (32bit):true
      Commandline:ping -n 5 127.0.0.1
      Imagebase:0x2a0000
      File size:18'944 bytes
      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:03:27:02
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\sc.exe
      Wow64 process (32bit):true
      Commandline:sc delete mongoose echo 3:27:02.65
      Imagebase:0x180000
      File size:61'440 bytes
      MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:8
      Start time:03:27:02
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\PING.EXE
      Wow64 process (32bit):true
      Commandline:ping -n 5 127.0.0.1
      Imagebase:0x2a0000
      File size:18'944 bytes
      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:03:27:06
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\sc.exe
      Wow64 process (32bit):true
      Commandline:sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto
      Imagebase:0x180000
      File size:61'440 bytes
      MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:10
      Start time:03:27:06
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\PING.EXE
      Wow64 process (32bit):true
      Commandline:ping -n 5 127.0.0.1
      Imagebase:0x2a0000
      File size:18'944 bytes
      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:11
      Start time:03:27:11
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\sc.exe
      Wow64 process (32bit):true
      Commandline:sc start mongoose
      Imagebase:0x180000
      File size:61'440 bytes
      MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:12
      Start time:03:27:11
      Start date:27/10/2024
      Path:C:\Mongoose\mongoose-2.11.exe
      Wow64 process (32bit):true
      Commandline:c:\Mongoose\mongoose-2.11.exe --
      Imagebase:0x400000
      File size:131'072 bytes
      MD5 hash:A494D4D9AC522F13A3FA5E1C2C0CB467
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Antivirus matches:
      • Detection: 4%, ReversingLabs
      Reputation:low
      Has exited:false

      Target ID:13
      Start time:03:27:11
      Start date:27/10/2024
      Path:C:\Windows\SysWOW64\PING.EXE
      Wow64 process (32bit):true
      Commandline:ping -n 5 127.0.0.1
      Imagebase:0x2a0000
      File size:18'944 bytes
      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:19%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:22.7%
        Total number of Nodes:1212
        Total number of Limit Nodes:22
        execution_graph 2617 401dc1 2629 4029f6 2617->2629 2620 4029f6 18 API calls 2621 401dd0 2620->2621 2622 4029f6 18 API calls 2621->2622 2623 401dd9 2622->2623 2624 4029f6 18 API calls 2623->2624 2625 401de2 2624->2625 2635 401423 2625->2635 2628 401e16 2630 402a02 2629->2630 2638 405a2e 2630->2638 2633 401dc7 2633->2620 2678 404daa 2635->2678 2649 405a3b 2638->2649 2639 405c55 2640 402a23 2639->2640 2673 405a0c lstrcpynA 2639->2673 2640->2633 2657 405c6e 2640->2657 2642 405ad3 GetVersion 2655 405ae0 2642->2655 2643 405c2c lstrlenA 2643->2649 2646 405a2e 10 API calls 2646->2643 2648 405b4b GetSystemDirectoryA 2648->2655 2649->2639 2649->2642 2649->2643 2649->2646 2651 405c6e 5 API calls 2649->2651 2671 40596a wsprintfA 2649->2671 2672 405a0c lstrcpynA 2649->2672 2650 405b5e GetWindowsDirectoryA 2650->2655 2651->2649 2652 405a2e 10 API calls 2652->2655 2653 405bd5 lstrcatA 2653->2649 2654 405b92 SHGetSpecialFolderLocation 2654->2655 2656 405baa SHGetPathFromIDListA CoTaskMemFree 2654->2656 2655->2648 2655->2649 2655->2650 2655->2652 2655->2653 2655->2654 2666 4058f3 RegOpenKeyExA 2655->2666 2656->2655 2663 405c7a 2657->2663 2658 405ce6 CharPrevA 2661 405ce2 2658->2661 2659 405cd7 CharNextA 2659->2661 2659->2663 2661->2658 2662 405d01 2661->2662 2662->2633 2663->2659 2663->2661 2664 405cc5 CharNextA 2663->2664 2665 405cd2 CharNextA 2663->2665 2674 40552a 2663->2674 2664->2663 2665->2659 2667 405964 2666->2667 2668 405926 RegQueryValueExA 2666->2668 2667->2655 2669 405947 RegCloseKey 2668->2669 2669->2667 2671->2649 2672->2649 2673->2640 2675 405530 2674->2675 2676 405543 2675->2676 2677 405536 CharNextA 2675->2677 2676->2663 2677->2675 2679 404dc5 2678->2679 2688 401431 ShellExecuteA 2678->2688 2680 404de2 lstrlenA 2679->2680 2681 405a2e 18 API calls 2679->2681 2682 404df0 lstrlenA 2680->2682 2683 404e0b 2680->2683 2681->2680 2684 404e02 lstrcatA 2682->2684 2682->2688 2685 404e11 SetWindowTextA 2683->2685 2686 404e1e 2683->2686 2684->2683 2685->2686 2687 404e24 SendMessageA SendMessageA SendMessageA 2686->2687 2686->2688 2687->2688 2688->2628 3267 401cc1 GetDlgItem GetClientRect 3268 4029f6 18 API calls 3267->3268 3269 401cf1 LoadImageA SendMessageA 3268->3269 3270 40288b 3269->3270 3271 401d0f DeleteObject 3269->3271 3271->3270 3272 401645 3273 4029f6 18 API calls 3272->3273 3274 40164c 3273->3274 3275 4029f6 18 API calls 3274->3275 3276 401655 3275->3276 3277 4029f6 18 API calls 3276->3277 3278 40165e MoveFileA 3277->3278 3279 401671 3278->3279 3280 40166a 3278->3280 3281 405d07 2 API calls 3279->3281 3284 402169 3279->3284 3282 401423 25 API calls 3280->3282 3283 401680 3281->3283 3282->3284 3283->3284 3285 40575a 38 API calls 3283->3285 3285->3280 3286 401ec5 3287 4029f6 18 API calls 3286->3287 3288 401ecc GetFileVersionInfoSizeA 3287->3288 3289 401eef GlobalAlloc 3288->3289 3296 401f45 3288->3296 3290 401f03 GetFileVersionInfoA 3289->3290 3289->3296 3291 401f14 VerQueryValueA 3290->3291 3290->3296 3292 401f2d 3291->3292 3291->3296 3297 40596a wsprintfA 3292->3297 3294 401f39 3298 40596a wsprintfA 3294->3298 3297->3294 3298->3296 3299 4014ca 3300 404daa 25 API calls 3299->3300 3301 4014d1 3300->3301 3302 4025cc 3303 4025d3 3302->3303 3305 402838 3302->3305 3310 4029d9 3303->3310 3306 4025de 3307 4025e5 SetFilePointer 3306->3307 3307->3305 3308 4025f5 3307->3308 3313 40596a wsprintfA 3308->3313 3311 405a2e 18 API calls 3310->3311 3312 4029ed 3311->3312 3312->3306 3313->3305 3314 401f51 3315 401f63 3314->3315 3316 402012 3314->3316 3317 4029f6 18 API calls 3315->3317 3319 401423 25 API calls 3316->3319 3318 401f6a 3317->3318 3320 4029f6 18 API calls 3318->3320 3324 402169 3319->3324 3321 401f73 3320->3321 3322 401f88 LoadLibraryExA 3321->3322 3323 401f7b GetModuleHandleA 3321->3323 3322->3316 3325 401f98 GetProcAddress 3322->3325 3323->3322 3323->3325 3326 401fe5 3325->3326 3327 401fa8 3325->3327 3328 404daa 25 API calls 3326->3328 3329 401423 25 API calls 3327->3329 3330 401fb8 3327->3330 3328->3330 3329->3330 3330->3324 3331 402006 FreeLibrary 3330->3331 3331->3324 3332 403ed2 lstrcpynA lstrlenA 3333 4014d6 3334 4029d9 18 API calls 3333->3334 3335 4014dc Sleep 3334->3335 3337 40288b 3335->3337 3343 4018d8 3344 40190f 3343->3344 3345 4029f6 18 API calls 3344->3345 3346 401914 3345->3346 3347 405331 68 API calls 3346->3347 3348 40191d 3347->3348 3349 4018db 3350 4029f6 18 API calls 3349->3350 3351 4018e2 3350->3351 3352 4052cd MessageBoxIndirectA 3351->3352 3353 4018eb 3352->3353 3354 401ae5 3355 4029f6 18 API calls 3354->3355 3356 401aec 3355->3356 3357 4029d9 18 API calls 3356->3357 3358 401af5 wsprintfA 3357->3358 3359 40288b 3358->3359 3360 402866 SendMessageA 3361 402880 InvalidateRect 3360->3361 3362 40288b 3360->3362 3361->3362 3363 4019e6 3364 4029f6 18 API calls 3363->3364 3365 4019ef ExpandEnvironmentStringsA 3364->3365 3366 401a03 3365->3366 3368 401a16 3365->3368 3367 401a08 lstrcmpA 3366->3367 3366->3368 3367->3368 3369 402267 3370 4029f6 18 API calls 3369->3370 3371 402275 3370->3371 3372 4029f6 18 API calls 3371->3372 3373 40227e 3372->3373 3374 4029f6 18 API calls 3373->3374 3375 402288 GetPrivateProfileStringA 3374->3375 2793 404ee8 2794 405094 2793->2794 2795 404f09 GetDlgItem GetDlgItem GetDlgItem 2793->2795 2796 4050c5 2794->2796 2797 40509d GetDlgItem CreateThread CloseHandle 2794->2797 2839 403df3 SendMessageA 2795->2839 2799 4050f0 2796->2799 2801 405112 2796->2801 2802 4050dc ShowWindow ShowWindow 2796->2802 2797->2796 2862 404e7c OleInitialize 2797->2862 2803 40514e 2799->2803 2806 405101 2799->2806 2807 405127 ShowWindow 2799->2807 2800 404f7a 2804 404f81 GetClientRect GetSystemMetrics SendMessageA SendMessageA 2800->2804 2848 403e25 2801->2848 2844 403df3 SendMessageA 2802->2844 2803->2801 2811 405159 SendMessageA 2803->2811 2809 404ff0 2804->2809 2810 404fd4 SendMessageA SendMessageA 2804->2810 2845 403d97 2806->2845 2814 405147 2807->2814 2815 405139 2807->2815 2817 405003 2809->2817 2818 404ff5 SendMessageA 2809->2818 2810->2809 2813 405120 2811->2813 2819 405172 CreatePopupMenu 2811->2819 2816 403d97 SendMessageA 2814->2816 2820 404daa 25 API calls 2815->2820 2816->2803 2840 403dbe 2817->2840 2818->2817 2821 405a2e 18 API calls 2819->2821 2820->2814 2823 405182 AppendMenuA 2821->2823 2825 405195 GetWindowRect 2823->2825 2826 4051a8 2823->2826 2824 405013 2827 405050 GetDlgItem SendMessageA 2824->2827 2828 40501c ShowWindow 2824->2828 2829 4051b1 TrackPopupMenu 2825->2829 2826->2829 2827->2813 2832 405077 SendMessageA SendMessageA 2827->2832 2830 405032 ShowWindow 2828->2830 2831 40503f 2828->2831 2829->2813 2833 4051cf 2829->2833 2830->2831 2843 403df3 SendMessageA 2831->2843 2832->2813 2834 4051eb SendMessageA 2833->2834 2834->2834 2836 405208 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2834->2836 2837 40522a SendMessageA 2836->2837 2837->2837 2838 40524b GlobalUnlock SetClipboardData CloseClipboard 2837->2838 2838->2813 2839->2800 2841 405a2e 18 API calls 2840->2841 2842 403dc9 SetDlgItemTextA 2841->2842 2842->2824 2843->2827 2844->2799 2846 403da4 SendMessageA 2845->2846 2847 403d9e 2845->2847 2846->2801 2847->2846 2849 403e3d GetWindowLongA 2848->2849 2859 403ec6 2848->2859 2850 403e4e 2849->2850 2849->2859 2851 403e60 2850->2851 2852 403e5d GetSysColor 2850->2852 2853 403e70 SetBkMode 2851->2853 2854 403e66 SetTextColor 2851->2854 2852->2851 2855 403e88 GetSysColor 2853->2855 2856 403e8e 2853->2856 2854->2853 2855->2856 2857 403e95 SetBkColor 2856->2857 2858 403e9f 2856->2858 2857->2858 2858->2859 2860 403eb2 DeleteObject 2858->2860 2861 403eb9 CreateBrushIndirect 2858->2861 2859->2813 2860->2861 2861->2859 2869 403e0a 2862->2869 2864 404e9f 2868 404ec6 2864->2868 2872 401389 2864->2872 2865 403e0a SendMessageA 2866 404ed8 CoUninitialize 2865->2866 2868->2865 2870 403e22 2869->2870 2871 403e13 SendMessageA 2869->2871 2870->2864 2871->2870 2874 401390 2872->2874 2873 4013fe 2873->2864 2874->2873 2875 4013cb MulDiv SendMessageA 2874->2875 2875->2874 3143 4038eb 3144 403903 3143->3144 3145 403a3e 3143->3145 3144->3145 3146 40390f 3144->3146 3147 403a8f 3145->3147 3148 403a4f GetDlgItem GetDlgItem 3145->3148 3149 40391a SetWindowPos 3146->3149 3150 40392d 3146->3150 3152 403ae9 3147->3152 3160 401389 2 API calls 3147->3160 3151 403dbe 19 API calls 3148->3151 3149->3150 3154 403932 ShowWindow 3150->3154 3155 40394a 3150->3155 3156 403a79 SetClassLongA 3151->3156 3153 403e0a SendMessageA 3152->3153 3205 403a39 3152->3205 3203 403afb 3153->3203 3154->3155 3157 403952 DestroyWindow 3155->3157 3158 40396c 3155->3158 3159 40140b 2 API calls 3156->3159 3164 403d47 3157->3164 3161 403971 SetWindowLongA 3158->3161 3162 403982 3158->3162 3159->3147 3163 403ac1 3160->3163 3161->3205 3167 403a2b 3162->3167 3168 40398e GetDlgItem 3162->3168 3163->3152 3169 403ac5 SendMessageA 3163->3169 3171 403d78 ShowWindow 3164->3171 3164->3205 3165 40140b 2 API calls 3165->3203 3166 403d49 DestroyWindow KiUserCallbackDispatcher 3166->3164 3170 403e25 8 API calls 3167->3170 3172 4039a1 SendMessageA IsWindowEnabled 3168->3172 3173 4039be 3168->3173 3169->3205 3170->3205 3171->3205 3172->3173 3172->3205 3175 4039cb 3173->3175 3176 403a12 SendMessageA 3173->3176 3177 4039de 3173->3177 3185 4039c3 3173->3185 3174 405a2e 18 API calls 3174->3203 3175->3176 3175->3185 3176->3167 3179 4039e6 3177->3179 3180 4039fb 3177->3180 3178 403d97 SendMessageA 3181 4039f9 3178->3181 3182 40140b 2 API calls 3179->3182 3183 40140b 2 API calls 3180->3183 3181->3167 3182->3185 3186 403a02 3183->3186 3184 403dbe 19 API calls 3184->3203 3185->3178 3186->3167 3186->3185 3187 403dbe 19 API calls 3188 403b76 GetDlgItem 3187->3188 3189 403b93 ShowWindow KiUserCallbackDispatcher 3188->3189 3190 403b8b 3188->3190 3213 403de0 KiUserCallbackDispatcher 3189->3213 3190->3189 3192 403bbd EnableWindow 3195 403bd1 3192->3195 3193 403bd6 GetSystemMenu EnableMenuItem SendMessageA 3194 403c06 SendMessageA 3193->3194 3193->3195 3194->3195 3195->3193 3214 403df3 SendMessageA 3195->3214 3215 405a0c lstrcpynA 3195->3215 3198 403c34 lstrlenA 3199 405a2e 18 API calls 3198->3199 3200 403c45 SetWindowTextA 3199->3200 3201 401389 2 API calls 3200->3201 3201->3203 3202 403c89 DestroyWindow 3202->3164 3204 403ca3 CreateDialogParamA 3202->3204 3203->3165 3203->3166 3203->3174 3203->3184 3203->3187 3203->3202 3203->3205 3204->3164 3206 403cd6 3204->3206 3207 403dbe 19 API calls 3206->3207 3208 403ce1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3207->3208 3209 401389 2 API calls 3208->3209 3210 403d27 3209->3210 3210->3205 3211 403d2f ShowWindow 3210->3211 3212 403e0a SendMessageA 3211->3212 3212->3164 3213->3192 3214->3195 3215->3198 3376 401c6d 3377 4029d9 18 API calls 3376->3377 3378 401c73 IsWindow 3377->3378 3379 4019d6 3378->3379 3380 4014f0 SetForegroundWindow 3381 40288b 3380->3381 3382 402172 3383 4029f6 18 API calls 3382->3383 3384 402178 3383->3384 3385 4029f6 18 API calls 3384->3385 3386 402181 3385->3386 3387 4029f6 18 API calls 3386->3387 3388 40218a 3387->3388 3389 405d07 2 API calls 3388->3389 3390 402193 3389->3390 3391 4021a4 lstrlenA lstrlenA 3390->3391 3395 402197 3390->3395 3393 404daa 25 API calls 3391->3393 3392 404daa 25 API calls 3396 40219f 3392->3396 3394 4021e0 SHFileOperationA 3393->3394 3394->3395 3394->3396 3395->3392 3395->3396 3397 4021f4 3398 4021fb 3397->3398 3400 40220e 3397->3400 3399 405a2e 18 API calls 3398->3399 3401 402208 3399->3401 3402 4052cd MessageBoxIndirectA 3401->3402 3402->3400 3403 4046f9 GetDlgItem GetDlgItem 3404 40474d 7 API calls 3403->3404 3416 40496a 3403->3416 3405 4047f3 DeleteObject 3404->3405 3406 4047e6 SendMessageA 3404->3406 3407 4047fe 3405->3407 3406->3405 3409 404835 3407->3409 3410 405a2e 18 API calls 3407->3410 3408 404a54 3412 404b03 3408->3412 3418 40495d 3408->3418 3423 404aad SendMessageA 3408->3423 3411 403dbe 19 API calls 3409->3411 3413 404817 SendMessageA SendMessageA 3410->3413 3417 404849 3411->3417 3414 404b18 3412->3414 3415 404b0c SendMessageA 3412->3415 3413->3407 3425 404b31 3414->3425 3426 404b2a ImageList_Destroy 3414->3426 3433 404b41 3414->3433 3415->3414 3416->3408 3437 4049de 3416->3437 3456 404679 SendMessageA 3416->3456 3422 403dbe 19 API calls 3417->3422 3419 403e25 8 API calls 3418->3419 3424 404cf3 3419->3424 3420 404a46 SendMessageA 3420->3408 3438 404857 3422->3438 3423->3418 3428 404ac2 SendMessageA 3423->3428 3429 404b3a GlobalFree 3425->3429 3425->3433 3426->3425 3427 404ca7 3427->3418 3434 404cb9 ShowWindow GetDlgItem ShowWindow 3427->3434 3431 404ad5 3428->3431 3429->3433 3430 40492b GetWindowLongA SetWindowLongA 3432 404944 3430->3432 3440 404ae6 SendMessageA 3431->3440 3435 404962 3432->3435 3436 40494a ShowWindow 3432->3436 3433->3427 3439 40140b 2 API calls 3433->3439 3450 404b73 3433->3450 3434->3418 3455 403df3 SendMessageA 3435->3455 3454 403df3 SendMessageA 3436->3454 3437->3408 3437->3420 3438->3430 3441 404925 3438->3441 3444 4048a6 SendMessageA 3438->3444 3445 4048e2 SendMessageA 3438->3445 3446 4048f3 SendMessageA 3438->3446 3439->3450 3440->3412 3441->3430 3441->3432 3444->3438 3445->3438 3446->3438 3447 404c7d InvalidateRect 3447->3427 3448 404c93 3447->3448 3461 404597 3448->3461 3449 404ba1 SendMessageA 3451 404bb7 3449->3451 3450->3449 3450->3451 3451->3447 3453 404c2b SendMessageA SendMessageA 3451->3453 3453->3451 3454->3418 3455->3416 3457 4046d8 SendMessageA 3456->3457 3458 40469c GetMessagePos ScreenToClient SendMessageA 3456->3458 3460 4046d0 3457->3460 3459 4046d5 3458->3459 3458->3460 3459->3457 3460->3437 3462 4045b1 3461->3462 3463 405a2e 18 API calls 3462->3463 3464 4045e6 3463->3464 3465 405a2e 18 API calls 3464->3465 3466 4045f1 3465->3466 3467 405a2e 18 API calls 3466->3467 3468 404622 lstrlenA wsprintfA SetDlgItemTextA 3467->3468 3468->3427 2876 4030fa #17 SetErrorMode OleInitialize 2946 405d2e GetModuleHandleA 2876->2946 2880 403168 GetCommandLineA 2951 405a0c lstrcpynA 2880->2951 2882 40317a GetModuleHandleA 2883 403191 2882->2883 2884 40552a CharNextA 2883->2884 2885 4031a5 CharNextA 2884->2885 2890 4031b2 2885->2890 2886 40321b 2887 40322e GetTempPathA 2886->2887 2952 4030c6 2887->2952 2889 403244 2891 403268 DeleteFileA 2889->2891 2892 403248 GetWindowsDirectoryA lstrcatA 2889->2892 2890->2886 2893 40552a CharNextA 2890->2893 2897 40321d 2890->2897 2960 402c22 GetTickCount GetModuleFileNameA 2891->2960 2894 4030c6 11 API calls 2892->2894 2893->2890 2896 403264 2894->2896 2896->2891 2900 4032e6 ExitProcess CoUninitialize 2896->2900 3042 405a0c lstrcpynA 2897->3042 2898 403279 2898->2900 2901 4032d2 2898->2901 2907 40552a CharNextA 2898->2907 2902 4033e0 2900->2902 2903 4032fb 2900->2903 2988 403555 2901->2988 2905 403463 ExitProcess 2902->2905 2909 405d2e 3 API calls 2902->2909 2904 4052cd MessageBoxIndirectA 2903->2904 2908 403309 ExitProcess 2904->2908 2912 403290 2907->2912 2913 4033ef 2909->2913 2910 4032e2 2910->2900 2915 403311 lstrcatA lstrcmpiA 2912->2915 2916 4032ad 2912->2916 2914 405d2e 3 API calls 2913->2914 2917 4033f8 2914->2917 2915->2900 2918 40332d CreateDirectoryA SetCurrentDirectoryA 2915->2918 3043 4055e0 2916->3043 2920 405d2e 3 API calls 2917->2920 2922 403344 2918->2922 2923 40334f 2918->2923 2921 403401 2920->2921 2925 40344f ExitWindowsEx 2921->2925 2930 40340f GetCurrentProcess 2921->2930 3060 405a0c lstrcpynA 2922->3060 3061 405a0c lstrcpynA 2923->3061 2925->2905 2929 40345c 2925->2929 3091 40140b 2929->3091 2935 40341f 2930->2935 2931 4032c7 3059 405a0c lstrcpynA 2931->3059 2934 405a2e 18 API calls 2936 40337f DeleteFileA 2934->2936 2935->2925 2937 40338c CopyFileA 2936->2937 2943 40335d 2936->2943 2937->2943 2938 4033d4 2939 40575a 38 API calls 2938->2939 2941 4033db 2939->2941 2941->2900 2942 405a2e 18 API calls 2942->2943 2943->2934 2943->2938 2943->2942 2945 4033c0 CloseHandle 2943->2945 3062 40575a 2943->3062 3088 40526c CreateProcessA 2943->3088 2945->2943 2947 405d55 GetProcAddress 2946->2947 2948 405d4a LoadLibraryA 2946->2948 2949 40313d SHGetFileInfoA 2947->2949 2948->2947 2948->2949 2950 405a0c lstrcpynA 2949->2950 2950->2880 2951->2882 2953 405c6e 5 API calls 2952->2953 2954 4030d2 2953->2954 2955 4030dc 2954->2955 2956 4054ff 3 API calls 2954->2956 2955->2889 2957 4030e4 CreateDirectoryA 2956->2957 3094 405712 2957->3094 3098 4056e3 GetFileAttributesA CreateFileA 2960->3098 2962 402c62 2983 402c72 2962->2983 3099 405a0c lstrcpynA 2962->3099 2964 402c88 3100 405546 lstrlenA 2964->3100 2968 402c99 GetFileSize 2969 402d95 2968->2969 2981 402cb0 2968->2981 3105 402bbe 2969->3105 2971 402d9e 2973 402dce GlobalAlloc 2971->2973 2971->2983 3116 4030af SetFilePointer 2971->3116 2972 40307d ReadFile 2972->2981 3117 4030af SetFilePointer 2973->3117 2975 402e01 2979 402bbe 6 API calls 2975->2979 2977 402db7 2980 40307d ReadFile 2977->2980 2978 402de9 2982 402e5b 33 API calls 2978->2982 2979->2983 2984 402dc2 2980->2984 2981->2969 2981->2972 2981->2975 2981->2983 2985 402bbe 6 API calls 2981->2985 2986 402df5 2982->2986 2983->2898 2984->2973 2984->2983 2985->2981 2986->2983 2986->2986 2987 402e32 SetFilePointer 2986->2987 2987->2983 2989 405d2e 3 API calls 2988->2989 2990 403569 2989->2990 2991 403581 2990->2991 2992 40356f 2990->2992 2993 4058f3 3 API calls 2991->2993 3131 40596a wsprintfA 2992->3131 2994 4035a2 2993->2994 2996 4035c0 lstrcatA 2994->2996 2998 4058f3 3 API calls 2994->2998 2997 40357f 2996->2997 3122 40381e 2997->3122 2998->2996 3001 4055e0 18 API calls 3002 4035f2 3001->3002 3003 40367b 3002->3003 3005 4058f3 3 API calls 3002->3005 3004 4055e0 18 API calls 3003->3004 3006 403681 3004->3006 3007 40361e 3005->3007 3008 403691 LoadImageA 3006->3008 3009 405a2e 18 API calls 3006->3009 3007->3003 3012 40363a lstrlenA 3007->3012 3016 40552a CharNextA 3007->3016 3010 403745 3008->3010 3011 4036bc RegisterClassA 3008->3011 3009->3008 3015 40140b 2 API calls 3010->3015 3013 40374f 3011->3013 3014 4036f8 SystemParametersInfoA CreateWindowExA 3011->3014 3017 403648 lstrcmpiA 3012->3017 3018 40366e 3012->3018 3013->2910 3014->3010 3019 40374b 3015->3019 3021 403638 3016->3021 3017->3018 3022 403658 GetFileAttributesA 3017->3022 3020 4054ff 3 API calls 3018->3020 3019->3013 3023 40381e 19 API calls 3019->3023 3024 403674 3020->3024 3021->3012 3025 403664 3022->3025 3026 40375c 3023->3026 3132 405a0c lstrcpynA 3024->3132 3025->3018 3028 405546 2 API calls 3025->3028 3029 403768 ShowWindow LoadLibraryA 3026->3029 3030 4037eb 3026->3030 3028->3018 3031 403787 LoadLibraryA 3029->3031 3032 40378e GetClassInfoA 3029->3032 3033 404e7c 5 API calls 3030->3033 3031->3032 3034 4037a2 GetClassInfoA RegisterClassA 3032->3034 3035 4037b8 DialogBoxParamA 3032->3035 3036 4037f1 3033->3036 3034->3035 3037 40140b 2 API calls 3035->3037 3038 40380d 3036->3038 3040 4037f5 3036->3040 3037->3013 3039 40140b 2 API calls 3038->3039 3039->3013 3040->3013 3041 40140b 2 API calls 3040->3041 3041->3013 3042->2887 3134 405a0c lstrcpynA 3043->3134 3045 4055f1 3046 405593 4 API calls 3045->3046 3047 4055f7 3046->3047 3048 4032b8 3047->3048 3049 405c6e 5 API calls 3047->3049 3048->2900 3058 405a0c lstrcpynA 3048->3058 3050 405607 3049->3050 3050->3048 3056 40561a 3050->3056 3051 405632 lstrlenA 3052 40563d 3051->3052 3051->3056 3054 4054ff 3 API calls 3052->3054 3053 405d07 2 API calls 3053->3056 3055 405642 GetFileAttributesA 3054->3055 3055->3048 3056->3048 3056->3051 3056->3053 3057 405546 2 API calls 3056->3057 3057->3051 3058->2931 3059->2901 3060->2923 3061->2943 3063 405d2e 3 API calls 3062->3063 3064 405765 3063->3064 3065 4057c2 GetShortPathNameA 3064->3065 3068 4058b7 3064->3068 3135 4056e3 GetFileAttributesA CreateFileA 3064->3135 3067 4057d7 3065->3067 3065->3068 3067->3068 3070 4057df wsprintfA 3067->3070 3068->2943 3069 4057a6 CloseHandle GetShortPathNameA 3069->3068 3071 4057ba 3069->3071 3072 405a2e 18 API calls 3070->3072 3071->3065 3071->3068 3073 405807 3072->3073 3136 4056e3 GetFileAttributesA CreateFileA 3073->3136 3075 405814 3075->3068 3076 405823 GetFileSize GlobalAlloc 3075->3076 3077 4058b0 CloseHandle 3076->3077 3078 405841 ReadFile 3076->3078 3077->3068 3078->3077 3079 405855 3078->3079 3079->3077 3137 405658 lstrlenA 3079->3137 3082 4058c4 3085 405658 4 API calls 3082->3085 3083 40586a 3142 405a0c lstrcpynA 3083->3142 3086 405878 3085->3086 3087 40588b SetFilePointer WriteFile GlobalFree 3086->3087 3087->3077 3089 4052a7 3088->3089 3090 40529b CloseHandle 3088->3090 3089->2943 3090->3089 3092 401389 2 API calls 3091->3092 3093 401420 3092->3093 3093->2905 3095 40571d GetTickCount GetTempFileNameA 3094->3095 3096 405749 3095->3096 3097 4030f8 3095->3097 3096->3095 3096->3097 3097->2889 3098->2962 3099->2964 3101 405553 3100->3101 3102 402c8e 3101->3102 3103 405558 CharPrevA 3101->3103 3104 405a0c lstrcpynA 3102->3104 3103->3101 3103->3102 3104->2968 3106 402bc7 3105->3106 3107 402bdf 3105->3107 3108 402bd0 DestroyWindow 3106->3108 3109 402bd7 3106->3109 3110 402be7 3107->3110 3111 402bef GetTickCount 3107->3111 3108->3109 3109->2971 3118 405d67 3110->3118 3113 402c20 3111->3113 3114 402bfd CreateDialogParamA ShowWindow 3111->3114 3113->2971 3114->3113 3116->2977 3117->2978 3119 405d84 PeekMessageA 3118->3119 3120 402bed 3119->3120 3121 405d7a DispatchMessageA 3119->3121 3120->2971 3121->3119 3123 403832 3122->3123 3133 40596a wsprintfA 3123->3133 3125 4038a3 3126 405a2e 18 API calls 3125->3126 3127 4038af SetWindowTextA 3126->3127 3128 4035d0 3127->3128 3129 4038cb 3127->3129 3128->3001 3129->3128 3130 405a2e 18 API calls 3129->3130 3130->3129 3131->2997 3132->3003 3133->3125 3134->3045 3135->3069 3136->3075 3138 40568e lstrlenA 3137->3138 3139 405698 3138->3139 3140 40566c lstrcmpiA 3138->3140 3139->3082 3139->3083 3140->3139 3141 405685 CharNextA 3140->3141 3141->3138 3142->3086 3469 404cfa 3470 404d08 3469->3470 3471 404d1f 3469->3471 3472 404d0e 3470->3472 3487 404d88 3470->3487 3473 404d2d IsWindowVisible 3471->3473 3479 404d44 3471->3479 3474 403e0a SendMessageA 3472->3474 3476 404d3a 3473->3476 3473->3487 3477 404d18 3474->3477 3475 404d8e CallWindowProcA 3475->3477 3478 404679 5 API calls 3476->3478 3478->3479 3479->3475 3488 405a0c lstrcpynA 3479->3488 3481 404d73 3489 40596a wsprintfA 3481->3489 3483 404d7a 3484 40140b 2 API calls 3483->3484 3485 404d81 3484->3485 3490 405a0c lstrcpynA 3485->3490 3487->3475 3488->3481 3489->3483 3490->3487 3491 4016fa 3492 4029f6 18 API calls 3491->3492 3493 401701 SearchPathA 3492->3493 3494 40171c 3493->3494 3216 40347b 3217 403493 3216->3217 3218 403485 CloseHandle 3216->3218 3223 4034c0 3217->3223 3218->3217 3224 4034ce 3223->3224 3225 4034d3 FreeLibrary GlobalFree 3224->3225 3226 403498 3224->3226 3225->3225 3225->3226 3227 405331 3226->3227 3228 4055e0 18 API calls 3227->3228 3229 405345 3228->3229 3230 405365 3229->3230 3231 40534e DeleteFileA 3229->3231 3233 40549a 3230->3233 3265 405a0c lstrcpynA 3230->3265 3232 4034a4 3231->3232 3233->3232 3238 405d07 2 API calls 3233->3238 3235 40538f 3236 4053a0 3235->3236 3237 405393 lstrcatA 3235->3237 3240 405546 2 API calls 3236->3240 3239 4053a6 3237->3239 3242 4054bf 3238->3242 3241 4053b4 lstrcatA 3239->3241 3243 4053bf lstrlenA FindFirstFileA 3239->3243 3240->3239 3241->3243 3242->3232 3244 4054ff 3 API calls 3242->3244 3243->3233 3257 4053e3 3243->3257 3246 4054c9 3244->3246 3245 40552a CharNextA 3245->3257 3247 4056c4 2 API calls 3246->3247 3248 4054cf RemoveDirectoryA 3247->3248 3249 4054f1 3248->3249 3250 4054da 3248->3250 3251 404daa 25 API calls 3249->3251 3250->3232 3255 404daa 25 API calls 3250->3255 3251->3232 3252 405479 FindNextFileA 3254 405491 FindClose 3252->3254 3252->3257 3254->3233 3256 4054e8 3255->3256 3258 40575a 38 API calls 3256->3258 3257->3245 3257->3252 3259 4056c4 2 API calls 3257->3259 3260 405331 59 API calls 3257->3260 3262 404daa 25 API calls 3257->3262 3263 404daa 25 API calls 3257->3263 3264 40575a 38 API calls 3257->3264 3266 405a0c lstrcpynA 3257->3266 3258->3232 3261 405446 DeleteFileA 3259->3261 3260->3257 3261->3257 3262->3252 3263->3257 3264->3257 3265->3235 3266->3257 3495 4025fb 3496 402602 3495->3496 3497 40288b 3495->3497 3498 402608 FindClose 3496->3498 3498->3497 3499 40267c 3500 4029f6 18 API calls 3499->3500 3502 40268a 3500->3502 3501 4026a0 3504 4056c4 2 API calls 3501->3504 3502->3501 3503 4029f6 18 API calls 3502->3503 3503->3501 3505 4026a6 3504->3505 3525 4056e3 GetFileAttributesA CreateFileA 3505->3525 3507 4026b3 3508 40275c 3507->3508 3509 4026bf GlobalAlloc 3507->3509 3512 402764 DeleteFileA 3508->3512 3513 402777 3508->3513 3510 402753 CloseHandle 3509->3510 3511 4026d8 3509->3511 3510->3508 3526 4030af SetFilePointer 3511->3526 3512->3513 3515 4026de 3516 40307d ReadFile 3515->3516 3517 4026e7 GlobalAlloc 3516->3517 3518 4026f7 3517->3518 3519 40272b WriteFile GlobalFree 3517->3519 3520 402e5b 33 API calls 3518->3520 3521 402e5b 33 API calls 3519->3521 3524 402704 3520->3524 3522 402750 3521->3522 3522->3510 3523 402722 GlobalFree 3523->3519 3524->3523 3525->3507 3526->3515 3527 4041fc 3528 40423a 3527->3528 3529 40422d 3527->3529 3531 404243 GetDlgItem 3528->3531 3536 4042a6 3528->3536 3588 4052b1 GetDlgItemTextA 3529->3588 3533 404257 3531->3533 3532 404234 3535 405c6e 5 API calls 3532->3535 3538 40426b SetWindowTextA 3533->3538 3544 405593 4 API calls 3533->3544 3534 40438a 3539 404516 3534->3539 3590 4052b1 GetDlgItemTextA 3534->3590 3535->3528 3536->3534 3536->3539 3540 405a2e 18 API calls 3536->3540 3542 403dbe 19 API calls 3538->3542 3543 403e25 8 API calls 3539->3543 3545 40431c SHBrowseForFolderA 3540->3545 3541 4043b6 3546 4055e0 18 API calls 3541->3546 3547 404289 3542->3547 3548 40452a 3543->3548 3549 404261 3544->3549 3545->3534 3550 404334 CoTaskMemFree 3545->3550 3551 4043bc 3546->3551 3552 403dbe 19 API calls 3547->3552 3549->3538 3555 4054ff 3 API calls 3549->3555 3553 4054ff 3 API calls 3550->3553 3591 405a0c lstrcpynA 3551->3591 3554 404297 3552->3554 3556 404341 3553->3556 3589 403df3 SendMessageA 3554->3589 3555->3538 3559 404378 SetDlgItemTextA 3556->3559 3564 405a2e 18 API calls 3556->3564 3559->3534 3560 40429f 3562 405d2e 3 API calls 3560->3562 3561 4043d3 3563 405d2e 3 API calls 3561->3563 3562->3536 3571 4043db 3563->3571 3565 404360 lstrcmpiA 3564->3565 3565->3559 3568 404371 lstrcatA 3565->3568 3566 404415 3592 405a0c lstrcpynA 3566->3592 3568->3559 3569 40441e 3570 405593 4 API calls 3569->3570 3572 404424 GetDiskFreeSpaceA 3570->3572 3571->3566 3574 405546 2 API calls 3571->3574 3576 404468 3571->3576 3575 404446 MulDiv 3572->3575 3572->3576 3574->3571 3575->3576 3577 4044c5 3576->3577 3578 404597 21 API calls 3576->3578 3579 4044e8 3577->3579 3581 40140b 2 API calls 3577->3581 3580 4044b7 3578->3580 3593 403de0 KiUserCallbackDispatcher 3579->3593 3583 4044c7 SetDlgItemTextA 3580->3583 3584 4044bc 3580->3584 3581->3579 3583->3577 3586 404597 21 API calls 3584->3586 3585 404504 3585->3539 3594 404191 3585->3594 3586->3577 3588->3532 3589->3560 3590->3541 3591->3561 3592->3569 3593->3585 3595 4041a4 SendMessageA 3594->3595 3596 40419f 3594->3596 3595->3539 3596->3595 3597 4014fe 3598 401506 3597->3598 3600 401519 3597->3600 3599 4029d9 18 API calls 3598->3599 3599->3600 3601 401000 3602 401037 BeginPaint GetClientRect 3601->3602 3603 40100c DefWindowProcA 3601->3603 3605 4010f3 3602->3605 3606 401179 3603->3606 3607 401073 CreateBrushIndirect FillRect DeleteObject 3605->3607 3608 4010fc 3605->3608 3607->3605 3609 401102 CreateFontIndirectA 3608->3609 3610 401167 EndPaint 3608->3610 3609->3610 3611 401112 6 API calls 3609->3611 3610->3606 3611->3610 3612 402303 3613 402309 3612->3613 3614 4029f6 18 API calls 3613->3614 3615 40231b 3614->3615 3616 4029f6 18 API calls 3615->3616 3617 402325 RegCreateKeyExA 3616->3617 3618 40288b 3617->3618 3619 40234f 3617->3619 3620 402367 3619->3620 3621 4029f6 18 API calls 3619->3621 3622 402373 3620->3622 3625 4029d9 18 API calls 3620->3625 3624 402360 lstrlenA 3621->3624 3623 40238e RegSetValueExA 3622->3623 3626 402e5b 33 API calls 3622->3626 3627 4023a4 RegCloseKey 3623->3627 3624->3620 3625->3622 3626->3623 3627->3618 3629 402803 3630 4029d9 18 API calls 3629->3630 3631 402809 3630->3631 3632 40283a 3631->3632 3633 40265c 3631->3633 3635 402817 3631->3635 3632->3633 3634 405a2e 18 API calls 3632->3634 3634->3633 3635->3633 3637 40596a wsprintfA 3635->3637 3637->3633 3638 403f06 3640 403f1c 3638->3640 3644 404029 3638->3644 3639 404098 3642 4040a2 GetDlgItem 3639->3642 3643 40416c 3639->3643 3641 403dbe 19 API calls 3640->3641 3645 403f72 3641->3645 3646 4040b8 3642->3646 3647 40412a 3642->3647 3649 403e25 8 API calls 3643->3649 3644->3639 3644->3643 3650 40406d GetDlgItem SendMessageA 3644->3650 3648 403dbe 19 API calls 3645->3648 3646->3647 3653 4040de 6 API calls 3646->3653 3647->3643 3654 40413c 3647->3654 3651 403f7f CheckDlgButton 3648->3651 3652 404167 3649->3652 3669 403de0 KiUserCallbackDispatcher 3650->3669 3667 403de0 KiUserCallbackDispatcher 3651->3667 3653->3647 3658 404142 SendMessageA 3654->3658 3659 404153 3654->3659 3656 404093 3660 404191 SendMessageA 3656->3660 3658->3659 3659->3652 3662 404159 SendMessageA 3659->3662 3660->3639 3661 403f9d GetDlgItem 3668 403df3 SendMessageA 3661->3668 3662->3652 3664 403fb3 SendMessageA 3665 403fd1 GetSysColor 3664->3665 3666 403fda SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3664->3666 3665->3666 3666->3652 3667->3661 3668->3664 3669->3656 3670 401b06 3671 401b13 3670->3671 3672 401b57 3670->3672 3673 4021fb 3671->3673 3680 401b2a 3671->3680 3674 401b80 GlobalAlloc 3672->3674 3675 401b5b 3672->3675 3677 405a2e 18 API calls 3673->3677 3676 405a2e 18 API calls 3674->3676 3683 401b9b 3675->3683 3691 405a0c lstrcpynA 3675->3691 3676->3683 3679 402208 3677->3679 3684 4052cd MessageBoxIndirectA 3679->3684 3689 405a0c lstrcpynA 3680->3689 3681 401b6d GlobalFree 3681->3683 3684->3683 3685 401b39 3690 405a0c lstrcpynA 3685->3690 3687 401b48 3692 405a0c lstrcpynA 3687->3692 3689->3685 3690->3687 3691->3681 3692->3683 3693 402506 3694 4029d9 18 API calls 3693->3694 3697 402510 3694->3697 3695 402586 3696 402544 ReadFile 3696->3695 3696->3697 3697->3695 3697->3696 3698 402588 3697->3698 3700 402598 3697->3700 3702 40596a wsprintfA 3698->3702 3700->3695 3701 4025ae SetFilePointer 3700->3701 3701->3695 3702->3695 3703 401c8a 3704 4029d9 18 API calls 3703->3704 3705 401c91 3704->3705 3706 4029d9 18 API calls 3705->3706 3707 401c99 GetDlgItem 3706->3707 3708 4024b8 3707->3708 3715 403513 3716 40351e 3715->3716 3717 403522 3716->3717 3718 403525 GlobalAlloc 3716->3718 3718->3717 3719 402615 3720 402618 3719->3720 3724 402630 3719->3724 3721 402625 FindNextFileA 3720->3721 3722 40266f 3721->3722 3721->3724 3725 405a0c lstrcpynA 3722->3725 3725->3724 3726 401595 3727 4029f6 18 API calls 3726->3727 3728 40159c SetFileAttributesA 3727->3728 3729 4015ae 3728->3729 3730 401d95 3731 4029d9 18 API calls 3730->3731 3732 401d9b 3731->3732 3733 4029d9 18 API calls 3732->3733 3734 401da4 3733->3734 3735 401db6 EnableWindow 3734->3735 3736 401dab ShowWindow 3734->3736 3737 40288b 3735->3737 3736->3737 3738 401e95 3739 4029f6 18 API calls 3738->3739 3740 401e9c 3739->3740 3741 405d07 2 API calls 3740->3741 3742 401ea2 3741->3742 3744 401eb4 3742->3744 3745 40596a wsprintfA 3742->3745 3745->3744 3746 401696 3747 4029f6 18 API calls 3746->3747 3748 40169c GetFullPathNameA 3747->3748 3751 4016b3 3748->3751 3755 4016d4 3748->3755 3749 4016e8 GetShortPathNameA 3750 40288b 3749->3750 3752 405d07 2 API calls 3751->3752 3751->3755 3753 4016c4 3752->3753 3753->3755 3756 405a0c lstrcpynA 3753->3756 3755->3749 3755->3750 3756->3755 3757 401d1b GetDC GetDeviceCaps 3758 4029d9 18 API calls 3757->3758 3759 401d37 MulDiv 3758->3759 3760 4029d9 18 API calls 3759->3760 3761 401d4c 3760->3761 3762 405a2e 18 API calls 3761->3762 3763 401d85 CreateFontIndirectA 3762->3763 3764 4024b8 3763->3764 3765 401e1b 3766 4029f6 18 API calls 3765->3766 3767 401e21 3766->3767 3768 404daa 25 API calls 3767->3768 3769 401e2b 3768->3769 3770 40526c 2 API calls 3769->3770 3771 401e31 3770->3771 3772 40265c 3771->3772 3773 401e87 CloseHandle 3771->3773 3774 401e50 WaitForSingleObject 3771->3774 3776 405d67 2 API calls 3771->3776 3773->3772 3774->3771 3775 401e5e GetExitCodeProcess 3774->3775 3777 401e70 3775->3777 3778 401e79 3775->3778 3776->3774 3780 40596a wsprintfA 3777->3780 3778->3773 3780->3778 3781 40249c 3782 4029f6 18 API calls 3781->3782 3783 4024a3 3782->3783 3786 4056e3 GetFileAttributesA CreateFileA 3783->3786 3785 4024af 3786->3785 3787 402020 3788 4029f6 18 API calls 3787->3788 3789 402027 3788->3789 3790 4029f6 18 API calls 3789->3790 3791 402031 3790->3791 3792 4029f6 18 API calls 3791->3792 3793 40203a 3792->3793 3794 4029f6 18 API calls 3793->3794 3795 402044 3794->3795 3796 4029f6 18 API calls 3795->3796 3798 40204e 3796->3798 3797 402062 CoCreateInstance 3802 402081 3797->3802 3803 402137 3797->3803 3798->3797 3799 4029f6 18 API calls 3798->3799 3799->3797 3800 401423 25 API calls 3801 402169 3800->3801 3802->3803 3804 402116 MultiByteToWideChar 3802->3804 3803->3800 3803->3801 3804->3803 3805 401721 3806 4029f6 18 API calls 3805->3806 3807 401728 3806->3807 3808 405712 2 API calls 3807->3808 3809 40172f 3808->3809 3809->3809 3810 401922 3811 4029f6 18 API calls 3810->3811 3812 401929 lstrlenA 3811->3812 3813 4024b8 3812->3813 3814 402223 3815 40222b 3814->3815 3817 402231 3814->3817 3816 4029f6 18 API calls 3815->3816 3816->3817 3818 4029f6 18 API calls 3817->3818 3820 402241 3817->3820 3818->3820 3819 40224f 3822 4029f6 18 API calls 3819->3822 3820->3819 3821 4029f6 18 API calls 3820->3821 3821->3819 3823 402258 WritePrivateProfileStringA 3822->3823 3824 401ca5 3825 4029d9 18 API calls 3824->3825 3826 401cb5 SetWindowLongA 3825->3826 3827 40288b 3826->3827 3828 401a26 3829 4029d9 18 API calls 3828->3829 3830 401a2c 3829->3830 3831 4029d9 18 API calls 3830->3831 3832 4019d6 3831->3832 3833 402427 3843 402b00 3833->3843 3835 402431 3836 4029d9 18 API calls 3835->3836 3837 40243a 3836->3837 3838 40265c 3837->3838 3839 402451 RegEnumKeyA 3837->3839 3840 40245d RegEnumValueA 3837->3840 3841 402476 RegCloseKey 3839->3841 3840->3838 3840->3841 3841->3838 3844 4029f6 18 API calls 3843->3844 3845 402b19 3844->3845 3846 402b27 RegOpenKeyExA 3845->3846 3846->3835 3847 4022a7 3848 4022d7 3847->3848 3849 4022ac 3847->3849 3851 4029f6 18 API calls 3848->3851 3850 402b00 19 API calls 3849->3850 3852 4022b3 3850->3852 3854 4022de 3851->3854 3853 4029f6 18 API calls 3852->3853 3857 4022f4 3852->3857 3855 4022c4 RegDeleteValueA RegCloseKey 3853->3855 3858 402a36 RegOpenKeyExA 3854->3858 3855->3857 3859 402aad 3858->3859 3862 402a61 3858->3862 3859->3857 3860 402a87 RegEnumKeyA 3861 402a99 RegCloseKey 3860->3861 3860->3862 3864 405d2e 3 API calls 3861->3864 3862->3860 3862->3861 3863 402abe RegCloseKey 3862->3863 3865 402a36 3 API calls 3862->3865 3863->3859 3866 402aa9 3864->3866 3865->3862 3866->3859 3867 402ad9 RegDeleteKeyA 3866->3867 3867->3859 3868 401bad 3869 4029d9 18 API calls 3868->3869 3870 401bb4 3869->3870 3871 4029d9 18 API calls 3870->3871 3872 401bbe 3871->3872 3873 4029f6 18 API calls 3872->3873 3874 401bce 3872->3874 3873->3874 3875 4029f6 18 API calls 3874->3875 3879 401bde 3874->3879 3875->3879 3876 401be9 3880 4029d9 18 API calls 3876->3880 3877 401c2d 3878 4029f6 18 API calls 3877->3878 3882 401c32 3878->3882 3879->3876 3879->3877 3881 401bee 3880->3881 3883 4029d9 18 API calls 3881->3883 3884 4029f6 18 API calls 3882->3884 3885 401bf7 3883->3885 3886 401c3b FindWindowExA 3884->3886 3887 401c1d SendMessageA 3885->3887 3888 401bff SendMessageTimeoutA 3885->3888 3889 401c59 3886->3889 3887->3889 3888->3889 3890 4023af 3891 402b00 19 API calls 3890->3891 3892 4023b9 3891->3892 3893 4029f6 18 API calls 3892->3893 3894 4023c2 3893->3894 3895 4023cc RegQueryValueExA 3894->3895 3896 40265c 3894->3896 3897 4023ec 3895->3897 3900 4023f2 RegCloseKey 3895->3900 3897->3900 3901 40596a wsprintfA 3897->3901 3900->3896 3901->3900 3902 404531 3903 404541 3902->3903 3904 40455d 3902->3904 3913 4052b1 GetDlgItemTextA 3903->3913 3906 404590 3904->3906 3907 404563 SHGetPathFromIDListA 3904->3907 3909 404573 3907->3909 3912 40457a SendMessageA 3907->3912 3908 40454e SendMessageA 3908->3904 3911 40140b 2 API calls 3909->3911 3911->3912 3912->3906 3913->3908 2689 4015b3 2690 4029f6 18 API calls 2689->2690 2691 4015ba 2690->2691 2707 405593 CharNextA CharNextA 2691->2707 2693 40160a 2695 40162d 2693->2695 2696 40160f 2693->2696 2694 40552a CharNextA 2697 4015d0 CreateDirectoryA 2694->2697 2701 401423 25 API calls 2695->2701 2698 401423 25 API calls 2696->2698 2699 4015e5 GetLastError 2697->2699 2703 4015c2 2697->2703 2700 401616 2698->2700 2702 4015f2 GetFileAttributesA 2699->2702 2699->2703 2713 405a0c lstrcpynA 2700->2713 2705 402169 2701->2705 2702->2703 2703->2693 2703->2694 2706 401621 SetCurrentDirectoryA 2706->2705 2708 4055ad 2707->2708 2712 4055b9 2707->2712 2709 4055b4 CharNextA 2708->2709 2708->2712 2710 4055d6 2709->2710 2710->2703 2711 40552a CharNextA 2711->2712 2712->2710 2712->2711 2713->2706 2714 401734 2715 4029f6 18 API calls 2714->2715 2716 40173b 2715->2716 2717 401761 2716->2717 2718 401759 2716->2718 2776 405a0c lstrcpynA 2717->2776 2775 405a0c lstrcpynA 2718->2775 2721 40175f 2725 405c6e 5 API calls 2721->2725 2722 40176c 2777 4054ff lstrlenA CharPrevA 2722->2777 2736 40177e 2725->2736 2726 401789 2730 401795 CompareFileTime 2726->2730 2726->2736 2780 405d07 FindFirstFileA 2726->2780 2783 4056c4 GetFileAttributesA 2726->2783 2730->2726 2731 401859 2732 404daa 25 API calls 2731->2732 2735 401863 2732->2735 2733 404daa 25 API calls 2740 401845 2733->2740 2734 405a0c lstrcpynA 2734->2736 2754 402e5b 2735->2754 2736->2726 2736->2731 2736->2734 2741 405a2e 18 API calls 2736->2741 2752 401830 2736->2752 2753 4056e3 GetFileAttributesA CreateFileA 2736->2753 2786 4052cd 2736->2786 2739 40188a SetFileTime 2742 40189c CloseHandle 2739->2742 2741->2736 2742->2740 2743 4018ad 2742->2743 2744 4018b2 2743->2744 2745 4018c5 2743->2745 2747 405a2e 18 API calls 2744->2747 2746 405a2e 18 API calls 2745->2746 2748 4018cd 2746->2748 2750 4018ba lstrcatA 2747->2750 2751 4052cd MessageBoxIndirectA 2748->2751 2750->2748 2751->2740 2752->2733 2752->2740 2753->2736 2755 402e71 2754->2755 2756 402e9f 2755->2756 2792 4030af SetFilePointer 2755->2792 2790 40307d ReadFile 2756->2790 2760 401876 2760->2739 2760->2742 2761 403011 2763 403015 2761->2763 2764 40302d 2761->2764 2762 402ebc GetTickCount 2762->2760 2767 402f0b 2762->2767 2766 40307d ReadFile 2763->2766 2764->2760 2768 40307d ReadFile 2764->2768 2769 403048 WriteFile 2764->2769 2765 40307d ReadFile 2765->2767 2766->2760 2767->2760 2767->2765 2771 402f61 GetTickCount 2767->2771 2772 402f86 MulDiv wsprintfA 2767->2772 2774 402fc4 WriteFile 2767->2774 2768->2764 2769->2760 2770 40305d 2769->2770 2770->2760 2770->2764 2771->2767 2773 404daa 25 API calls 2772->2773 2773->2767 2774->2760 2774->2767 2775->2721 2776->2722 2778 401772 lstrcatA 2777->2778 2779 405519 lstrcatA 2777->2779 2778->2721 2779->2778 2781 405d28 2780->2781 2782 405d1d FindClose 2780->2782 2781->2726 2782->2781 2784 4056e0 2783->2784 2785 4056d3 SetFileAttributesA 2783->2785 2784->2736 2785->2784 2787 4052e2 2786->2787 2788 4052f6 MessageBoxIndirectA 2787->2788 2789 40532e 2787->2789 2788->2789 2789->2736 2791 402eaa 2790->2791 2791->2760 2791->2761 2791->2762 2792->2756 3914 401634 3915 4029f6 18 API calls 3914->3915 3916 40163a 3915->3916 3917 405d07 2 API calls 3916->3917 3918 401640 3917->3918 3919 401934 3920 4029d9 18 API calls 3919->3920 3921 40193b 3920->3921 3922 4029d9 18 API calls 3921->3922 3923 401945 3922->3923 3924 4029f6 18 API calls 3923->3924 3925 40194e 3924->3925 3926 401961 lstrlenA 3925->3926 3927 40199c 3925->3927 3928 40196b 3926->3928 3928->3927 3932 405a0c lstrcpynA 3928->3932 3930 401985 3930->3927 3931 401992 lstrlenA 3930->3931 3931->3927 3932->3930 3933 4041b5 3934 4041c5 3933->3934 3935 4041eb 3933->3935 3936 403dbe 19 API calls 3934->3936 3937 403e25 8 API calls 3935->3937 3938 4041d2 SetDlgItemTextA 3936->3938 3939 4041f7 3937->3939 3938->3935 3940 4019b5 3941 4029f6 18 API calls 3940->3941 3942 4019bc 3941->3942 3943 4029f6 18 API calls 3942->3943 3944 4019c5 3943->3944 3945 4019cc lstrcmpiA 3944->3945 3946 4019de lstrcmpA 3944->3946 3947 4019d2 3945->3947 3946->3947 3948 4014b7 3949 4014bd 3948->3949 3950 401389 2 API calls 3949->3950 3951 4014c5 3950->3951 3952 402b3b 3953 402b63 3952->3953 3954 402b4a SetTimer 3952->3954 3955 402bb8 3953->3955 3956 402b7d MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3953->3956 3954->3953 3956->3955 3957 40263e 3958 4029f6 18 API calls 3957->3958 3959 402645 FindFirstFileA 3958->3959 3960 402668 3959->3960 3964 402658 3959->3964 3961 40266f 3960->3961 3965 40596a wsprintfA 3960->3965 3966 405a0c lstrcpynA 3961->3966 3965->3961 3966->3964 3967 4024be 3968 4024c3 3967->3968 3969 4024d4 3967->3969 3970 4029d9 18 API calls 3968->3970 3971 4029f6 18 API calls 3969->3971 3973 4024ca 3970->3973 3972 4024db lstrlenA 3971->3972 3972->3973 3974 4024fa WriteFile 3973->3974 3975 40265c 3973->3975 3974->3975

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 4030fa-40318f #17 SetErrorMode OleInitialize call 405d2e SHGetFileInfoA call 405a0c GetCommandLineA call 405a0c GetModuleHandleA 7 403191-403196 0->7 8 40319b-4031b0 call 40552a CharNextA 0->8 7->8 11 403215-403219 8->11 12 4031b2-4031b5 11->12 13 40321b 11->13 15 4031b7-4031bb 12->15 16 4031bd-4031c5 12->16 14 40322e-403246 GetTempPathA call 4030c6 13->14 25 403268-40327f DeleteFileA call 402c22 14->25 26 403248-403266 GetWindowsDirectoryA lstrcatA call 4030c6 14->26 15->15 15->16 17 4031c7-4031c8 16->17 18 4031cd-4031d0 16->18 17->18 20 4031d2-4031d6 18->20 21 403205-403212 call 40552a 18->21 23 4031e6-4031ec 20->23 24 4031d8-4031e1 20->24 21->11 38 403214 21->38 30 4031fc-403203 23->30 31 4031ee-4031f7 23->31 24->23 28 4031e3 24->28 40 4032e6-4032f5 ExitProcess CoUninitialize 25->40 41 403281-403287 25->41 26->25 26->40 28->23 30->21 36 40321d-403229 call 405a0c 30->36 31->30 35 4031f9 31->35 35->30 36->14 38->11 44 4033e0-4033e6 40->44 45 4032fb-40330b call 4052cd ExitProcess 40->45 42 4032d6-4032dd call 403555 41->42 43 403289-403292 call 40552a 41->43 53 4032e2 42->53 58 40329d-40329f 43->58 47 403463-40346b 44->47 48 4033e8-403405 call 405d2e * 3 44->48 54 403471-403475 ExitProcess 47->54 55 40346d 47->55 73 403407-403409 48->73 74 40344f-40345a ExitWindowsEx 48->74 53->40 55->54 59 4032a1-4032ab 58->59 60 403294-40329a 58->60 63 403311-40332b lstrcatA lstrcmpiA 59->63 64 4032ad-4032ba call 4055e0 59->64 60->59 62 40329c 60->62 62->58 63->40 66 40332d-403342 CreateDirectoryA SetCurrentDirectoryA 63->66 64->40 76 4032bc-4032d2 call 405a0c * 2 64->76 70 403344-40334a call 405a0c 66->70 71 40334f-403369 call 405a0c 66->71 70->71 84 40336e-40338a call 405a2e DeleteFileA 71->84 73->74 78 40340b-40340d 73->78 74->47 81 40345c-40345e call 40140b 74->81 76->42 78->74 82 40340f-403421 GetCurrentProcess 78->82 81->47 82->74 91 403423-403445 82->91 92 4033cb-4033d2 84->92 93 40338c-40339c CopyFileA 84->93 91->74 92->84 94 4033d4-4033db call 40575a 92->94 93->92 95 40339e-4033be call 40575a call 405a2e call 40526c 93->95 94->40 95->92 105 4033c0-4033c7 CloseHandle 95->105 105->92
        APIs
        • #17.COMCTL32 ref: 00403119
        • SetErrorMode.KERNEL32(00008001), ref: 00403124
        • OleInitialize.OLE32(00000000), ref: 0040312B
          • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
          • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D4B
          • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
        • SHGetFileInfoA.SHELL32(00428F98,00000000,?,00000160,00000000,00000008), ref: 00403153
          • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,Name Setup,NSIS Error), ref: 00405A19
        • GetCommandLineA.KERNEL32(Name Setup,NSIS Error), ref: 00403168
        • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 0040317B
        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000020), ref: 004031A6
        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403239
        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040324E
        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040325A
        • DeleteFileA.KERNEL32(1033), ref: 0040326D
        • ExitProcess.KERNEL32(00000000), ref: 004032E6
        • CoUninitialize.COMBASE(00000000), ref: 004032EB
        • ExitProcess.KERNEL32 ref: 0040330B
        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000,00000000), ref: 00403317
        • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 00403323
        • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040332F
        • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403336
        • DeleteFileA.KERNEL32(00428B98,00428B98,?,0042F000,?), ref: 00403380
        • CopyFileA.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,00428B98,00000001), ref: 00403394
        • CloseHandle.KERNEL32(00000000,00428B98,00428B98,?,00428B98,00000000), ref: 004033C1
        • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403416
        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403452
        • ExitProcess.KERNEL32 ref: 00403475
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: ExitFileProcess$DirectoryHandle$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
        • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe$Error launching installer$NCRC$NSIS Error$Name Setup$SeShutdownPrivilege$\Temp$~nsu.tmp
        • API String ID: 553446912-1820525569
        • Opcode ID: b54f9db6f0d8b9b5cada0f3be399c619291e87e839e1cbb66da7d28003e7be7a
        • Instruction ID: 1e9e478c3a9e7f3573a82b9cae4fcf3dc9ecc54075f91e84b1854e8c20532e3f
        • Opcode Fuzzy Hash: b54f9db6f0d8b9b5cada0f3be399c619291e87e839e1cbb66da7d28003e7be7a
        • Instruction Fuzzy Hash: 4191D130A08344AFE7216F61AD4AB6B7E9CEB0530AF04057FF541B61D2C77C99058B6E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 106 404ee8-404f03 107 405094-40509b 106->107 108 404f09-404fd2 GetDlgItem * 3 call 403df3 call 40464c GetClientRect GetSystemMetrics SendMessageA * 2 106->108 109 4050c5-4050d2 107->109 110 40509d-4050bf GetDlgItem CreateThread CloseHandle 107->110 126 404ff0-404ff3 108->126 127 404fd4-404fee SendMessageA * 2 108->127 112 4050f0-4050f7 109->112 113 4050d4-4050da 109->113 110->109 118 4050f9-4050ff 112->118 119 40514e-405152 112->119 116 405112-40511b call 403e25 113->116 117 4050dc-4050eb ShowWindow * 2 call 403df3 113->117 130 405120-405124 116->130 117->112 123 405101-40510d call 403d97 118->123 124 405127-405137 ShowWindow 118->124 119->116 121 405154-405157 119->121 121->116 128 405159-40516c SendMessageA 121->128 123->116 131 405147-405149 call 403d97 124->131 132 405139-405142 call 404daa 124->132 134 405003-40501a call 403dbe 126->134 135 404ff5-405001 SendMessageA 126->135 127->126 136 405172-405193 CreatePopupMenu call 405a2e AppendMenuA 128->136 137 405265-405267 128->137 131->119 132->131 145 405050-405071 GetDlgItem SendMessageA 134->145 146 40501c-405030 ShowWindow 134->146 135->134 143 405195-4051a6 GetWindowRect 136->143 144 4051a8-4051ae 136->144 137->130 147 4051b1-4051c9 TrackPopupMenu 143->147 144->147 145->137 150 405077-40508f SendMessageA * 2 145->150 148 405032-40503d ShowWindow 146->148 149 40503f 146->149 147->137 151 4051cf-4051e6 147->151 152 405045-40504b call 403df3 148->152 149->152 150->137 153 4051eb-405206 SendMessageA 151->153 152->145 153->153 155 405208-405228 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 153->155 156 40522a-405249 SendMessageA 155->156 156->156 157 40524b-40525f GlobalUnlock SetClipboardData CloseClipboard 156->157 157->137
        APIs
        • GetDlgItem.USER32(?,00000403), ref: 00404F47
        • GetDlgItem.USER32(?,000003EE), ref: 00404F56
        • GetClientRect.USER32(?,?), ref: 00404F93
        • GetSystemMetrics.USER32(00000015), ref: 00404F9B
        • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00404FBC
        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00404FCD
        • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 00404FE0
        • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00404FEE
        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405001
        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405023
        • ShowWindow.USER32(?,00000008), ref: 00405037
        • GetDlgItem.USER32(?,000003EC), ref: 00405058
        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405068
        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405081
        • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 0040508D
        • GetDlgItem.USER32(?,000003F8), ref: 00404F65
          • Part of subcall function 00403DF3: SendMessageA.USER32(00000028,?,00000001,00403C24), ref: 00403E01
        • GetDlgItem.USER32(?,000003EC), ref: 004050AA
        • CreateThread.KERNEL32(00000000,00000000,Function_00004E7C,00000000), ref: 004050B8
        • CloseHandle.KERNEL32(00000000), ref: 004050BF
        • ShowWindow.USER32(00000000), ref: 004050E3
        • ShowWindow.USER32(0001042A,00000008), ref: 004050E8
        • ShowWindow.USER32(00000008), ref: 0040512F
        • SendMessageA.USER32(0001042A,00001004,00000000,00000000), ref: 00405161
        • CreatePopupMenu.USER32 ref: 00405172
        • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405187
        • GetWindowRect.USER32(0001042A,?), ref: 0040519A
        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004051BE
        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004051F9
        • OpenClipboard.USER32(00000000), ref: 00405209
        • EmptyClipboard.USER32 ref: 0040520F
        • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405218
        • GlobalLock.KERNEL32(00000000), ref: 00405222
        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405236
        • GlobalUnlock.KERNEL32(00000000), ref: 0040524E
        • SetClipboardData.USER32(00000001,00000000), ref: 00405259
        • CloseClipboard.USER32 ref: 0040525F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
        • String ID: {
        • API String ID: 590372296-366298937
        • Opcode ID: 502b3e781240547b4f79c84f5df072659d73b9fdff3a6a82af1c7000a0e1b831
        • Instruction ID: ecf959edf644124ae9a18d4fa2a520563b4821934e06b5e1f2851b0e4fc8d151
        • Opcode Fuzzy Hash: 502b3e781240547b4f79c84f5df072659d73b9fdff3a6a82af1c7000a0e1b831
        • Instruction Fuzzy Hash: FBA14870900208BFEB219FA1DD89AAE7F79FB08355F40407AFA05AA2A0C7755E41DF59

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 583 405d2e-405d48 GetModuleHandleA 584 405d55-405d5c GetProcAddress 583->584 585 405d4a-405d53 LoadLibraryA 583->585 586 405d62-405d64 584->586 585->584 585->586
        APIs
        • GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
        • LoadLibraryA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D4B
        • GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: AddressHandleLibraryLoadModuleProc
        • String ID:
        • API String ID: 310444273-0
        • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
        • Instruction ID: 58781945b1ebe0d6425232f008294b0fb1b641fb0524d4e5e5734917004db801
        • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
        • Instruction Fuzzy Hash: 8CE08C36A04510BBD3215B30AE08A6B73ACEEC9B41304897EF615F6251D734AC11DBBA

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 158 4038eb-4038fd 159 403903-403909 158->159 160 403a3e-403a4d 158->160 159->160 161 40390f-403918 159->161 162 403a9c-403ab1 160->162 163 403a4f-403a97 GetDlgItem * 2 call 403dbe SetClassLongA call 40140b 160->163 164 40391a-403927 SetWindowPos 161->164 165 40392d-403930 161->165 167 403af1-403af6 call 403e0a 162->167 168 403ab3-403ab6 162->168 163->162 164->165 170 403932-403944 ShowWindow 165->170 171 40394a-403950 165->171 176 403afb-403b16 167->176 173 403ab8-403ac3 call 401389 168->173 174 403ae9-403aeb 168->174 170->171 177 403952-403967 DestroyWindow 171->177 178 40396c-40396f 171->178 173->174 195 403ac5-403ae4 SendMessageA 173->195 174->167 175 403d8b 174->175 183 403d8d-403d94 175->183 181 403b18-403b1a call 40140b 176->181 182 403b1f-403b25 176->182 184 403d68-403d6e 177->184 186 403971-40397d SetWindowLongA 178->186 187 403982-403988 178->187 181->182 191 403d49-403d62 DestroyWindow KiUserCallbackDispatcher 182->191 192 403b2b-403b36 182->192 184->175 189 403d70-403d76 184->189 186->183 193 403a2b-403a39 call 403e25 187->193 194 40398e-40399f GetDlgItem 187->194 189->175 197 403d78-403d81 ShowWindow 189->197 191->184 192->191 198 403b3c-403b89 call 405a2e call 403dbe * 3 GetDlgItem 192->198 193->183 199 4039a1-4039b8 SendMessageA IsWindowEnabled 194->199 200 4039be-4039c1 194->200 195->183 197->175 228 403b93-403bcf ShowWindow KiUserCallbackDispatcher call 403de0 EnableWindow 198->228 229 403b8b-403b90 198->229 199->175 199->200 203 4039c3-4039c4 200->203 204 4039c6-4039c9 200->204 208 4039f4-4039f9 call 403d97 203->208 205 4039d7-4039dc 204->205 206 4039cb-4039d1 204->206 209 403a12-403a25 SendMessageA 205->209 211 4039de-4039e4 205->211 206->209 210 4039d3-4039d5 206->210 208->193 209->193 210->208 214 4039e6-4039ec call 40140b 211->214 215 4039fb-403a04 call 40140b 211->215 224 4039f2 214->224 215->193 225 403a06-403a10 215->225 224->208 225->224 232 403bd1-403bd2 228->232 233 403bd4 228->233 229->228 234 403bd6-403c04 GetSystemMenu EnableMenuItem SendMessageA 232->234 233->234 235 403c06-403c17 SendMessageA 234->235 236 403c19 234->236 237 403c1f-403c58 call 403df3 call 405a0c lstrlenA call 405a2e SetWindowTextA call 401389 235->237 236->237 237->176 246 403c5e-403c60 237->246 246->176 247 403c66-403c6a 246->247 248 403c89-403c9d DestroyWindow 247->248 249 403c6c-403c72 247->249 248->184 251 403ca3-403cd0 CreateDialogParamA 248->251 249->175 250 403c78-403c7e 249->250 250->176 252 403c84 250->252 251->184 253 403cd6-403d2d call 403dbe GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 251->253 252->175 253->175 258 403d2f-403d42 ShowWindow call 403e0a 253->258 260 403d47 258->260 260->184
        APIs
        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403927
        • ShowWindow.USER32(?), ref: 00403944
        • DestroyWindow.USER32 ref: 00403958
        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403974
        • GetDlgItem.USER32(?,?), ref: 00403995
        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 004039A9
        • IsWindowEnabled.USER32(00000000), ref: 004039B0
        • GetDlgItem.USER32(?,00000001), ref: 00403A5E
        • GetDlgItem.USER32(?,00000002), ref: 00403A68
        • SetClassLongA.USER32(?,000000F2,?), ref: 00403A82
        • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403AD3
        • GetDlgItem.USER32(?,00000003), ref: 00403B79
        • ShowWindow.USER32(00000000,?), ref: 00403B9A
        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403BAC
        • EnableWindow.USER32(?,?), ref: 00403BC7
        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403BDD
        • EnableMenuItem.USER32(00000000), ref: 00403BE4
        • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403BFC
        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403C0F
        • lstrlenA.KERNEL32(00429FE0,?,00429FE0,Name Setup), ref: 00403C38
        • SetWindowTextA.USER32(?,00429FE0), ref: 00403C47
        • ShowWindow.USER32(?,0000000A), ref: 00403D7B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
        • String ID: Name Setup
        • API String ID: 3282139019-2681444277
        • Opcode ID: 0b6e4c35b8dcfffa61f252a23bc82b09b6935cd656e84c2cc0fc3574caf64574
        • Instruction ID: 552f9e5d3371f53337095c5be2d86efa37a563823f2766eb5c4291c6ef6876bd
        • Opcode Fuzzy Hash: 0b6e4c35b8dcfffa61f252a23bc82b09b6935cd656e84c2cc0fc3574caf64574
        • Instruction Fuzzy Hash: B8C1B171604204AFD721AF62ED85E2B7F6CEB44706F40053EF941B51E1C779A942DB2E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 261 403555-40356d call 405d2e 264 403581-4035a8 call 4058f3 261->264 265 40356f-40357f call 40596a 261->265 270 4035c0-4035c6 lstrcatA 264->270 271 4035aa-4035bb call 4058f3 264->271 274 4035cb-4035f4 call 40381e call 4055e0 265->274 270->274 271->270 279 4035fa-4035ff 274->279 280 40367b-403683 call 4055e0 274->280 279->280 281 403601-403625 call 4058f3 279->281 286 403691-4036b6 LoadImageA 280->286 287 403685-40368c call 405a2e 280->287 281->280 288 403627-403629 281->288 290 403745-40374d call 40140b 286->290 291 4036bc-4036f2 RegisterClassA 286->291 287->286 292 40363a-403646 lstrlenA 288->292 293 40362b-403638 call 40552a 288->293 305 403757-403762 call 40381e 290->305 306 40374f-403752 290->306 294 403814 291->294 295 4036f8-403740 SystemParametersInfoA CreateWindowExA 291->295 299 403648-403656 lstrcmpiA 292->299 300 40366e-403676 call 4054ff call 405a0c 292->300 293->292 297 403816-40381d 294->297 295->290 299->300 304 403658-403662 GetFileAttributesA 299->304 300->280 309 403664-403666 304->309 310 403668-403669 call 405546 304->310 314 403768-403785 ShowWindow LoadLibraryA 305->314 315 4037eb-4037ec call 404e7c 305->315 306->297 309->300 309->310 310->300 316 403787-40378c LoadLibraryA 314->316 317 40378e-4037a0 GetClassInfoA 314->317 321 4037f1-4037f3 315->321 316->317 319 4037a2-4037b2 GetClassInfoA RegisterClassA 317->319 320 4037b8-4037db DialogBoxParamA call 40140b 317->320 319->320 326 4037e0-4037e9 call 4034a5 320->326 323 4037f5-4037fb 321->323 324 40380d-40380f call 40140b 321->324 323->306 327 403801-403808 call 40140b 323->327 324->294 326->297 327->306
        APIs
          • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
          • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D4B
          • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
        • lstrcatA.KERNEL32(1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004035C6
        • lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,00434400,1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"), ref: 0040363B
        • lstrcmpiA.KERNEL32(?,.exe), ref: 0040364E
        • GetFileAttributesA.KERNEL32(: Completed), ref: 00403659
        • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00434400), ref: 004036A2
          • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
        • RegisterClassA.USER32 ref: 004036E9
        • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 00403701
        • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040373A
        • ShowWindow.USER32(00000005,00000000), ref: 00403770
        • LoadLibraryA.KERNEL32(RichEd20), ref: 00403781
        • LoadLibraryA.KERNEL32(RichEd32), ref: 0040378C
        • GetClassInfoA.USER32(00000000,RichEdit20A,0042E300), ref: 0040379C
        • GetClassInfoA.USER32(00000000,RichEdit,0042E300), ref: 004037A9
        • RegisterClassA.USER32(0042E300), ref: 004037B2
        • DialogBoxParamA.USER32(?,00000000,004038EB,00000000), ref: 004037D1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
        • String ID: <K$"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
        • API String ID: 914957316-1531363995
        • Opcode ID: 3a2c45f0d62c5ae26582f53126e34280adb3cccee4e3bf9508370ae987846fa1
        • Instruction ID: af9374935d7a54fd1dce6881c110e57d7cc589bc1fe1380e1b33b637fa7f222c
        • Opcode Fuzzy Hash: 3a2c45f0d62c5ae26582f53126e34280adb3cccee4e3bf9508370ae987846fa1
        • Instruction Fuzzy Hash: E161C571604204BAD220AF669D85F273EACE744759F40447FF941B22E1D779AD028B3E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 332 402c22-402c70 GetTickCount GetModuleFileNameA call 4056e3 335 402c72-402c77 332->335 336 402c7c-402caa call 405a0c call 405546 call 405a0c GetFileSize 332->336 337 402e54-402e58 335->337 344 402cb0 336->344 345 402d97-402da5 call 402bbe 336->345 346 402cb5-402ccc 344->346 351 402da7-402daa 345->351 352 402dfa-402dff 345->352 348 402cd0-402cd2 call 40307d 346->348 349 402cce 346->349 356 402cd7-402cd9 348->356 349->348 354 402dac-402dbd call 4030af call 40307d 351->354 355 402dce-402df8 GlobalAlloc call 4030af call 402e5b 351->355 352->337 372 402dc2-402dc4 354->372 355->352 383 402e0b-402e1c 355->383 358 402e01-402e09 call 402bbe 356->358 359 402cdf-402ce6 356->359 358->352 362 402d62-402d66 359->362 363 402ce8-402cfc call 4056a4 359->363 367 402d70-402d76 362->367 368 402d68-402d6f call 402bbe 362->368 363->367 381 402cfe-402d05 363->381 374 402d85-402d8f 367->374 375 402d78-402d82 call 405d9a 367->375 368->367 372->352 378 402dc6-402dcc 372->378 374->346 382 402d95 374->382 375->374 378->352 378->355 381->367 387 402d07-402d0e 381->387 382->345 384 402e24-402e29 383->384 385 402e1e 383->385 388 402e2a-402e30 384->388 385->384 387->367 389 402d10-402d17 387->389 388->388 390 402e32-402e4d SetFilePointer call 4056a4 388->390 389->367 391 402d19-402d20 389->391 394 402e52 390->394 391->367 393 402d22-402d42 391->393 393->352 395 402d48-402d4c 393->395 394->337 396 402d54-402d5c 395->396 397 402d4e-402d52 395->397 396->367 398 402d5e-402d60 396->398 397->382 397->396 398->367
        APIs
        • GetTickCount.KERNEL32 ref: 00402C33
        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,00000400), ref: 00402C4F
          • Part of subcall function 004056E3: GetFileAttributesA.KERNEL32(00000003,00402C62,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,80000000,00000003), ref: 004056E7
          • Part of subcall function 004056E3: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
        • GetFileSize.KERNEL32(00000000,00000000,SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,80000000,00000003), ref: 00402C9B
        Strings
        • Inst, xrefs: 00402D07
        • Null, xrefs: 00402D19
        • soft, xrefs: 00402D10
        • SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe, xrefs: 00402C8F
        • C:\Users\user\Desktop, xrefs: 00402C7D, 00402C82, 00402C88
        • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C22
        • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe", xrefs: 00402C2C
        • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe, xrefs: 00402C39, 00402C48, 00402C5C, 00402C7C
        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402DFA
        • Error launching installer, xrefs: 00402C72
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: File$AttributesCountCreateModuleNameSizeTick
        • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe$soft
        • API String ID: 4283519449-697607320
        • Opcode ID: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
        • Instruction ID: 5cdc40c0d59b83eec34e45f83230a383a342561faf5f4e8ee161a7b3089b1b43
        • Opcode Fuzzy Hash: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
        • Instruction Fuzzy Hash: 40512371A00214ABDB20DF61DE89B9E7BA8EF04329F10413BF905B62D1D7BC9D418B9D

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 399 402e5b-402e6f 400 402e71 399->400 401 402e78-402e81 399->401 400->401 402 402e83 401->402 403 402e8a-402e8f 401->403 402->403 404 402e91-402e9a call 4030af 403->404 405 402e9f-402eac call 40307d 403->405 404->405 409 402eb2-402eb6 405->409 410 403028 405->410 412 403011-403013 409->412 413 402ebc-402f05 GetTickCount 409->413 411 40302a-40302b 410->411 414 403076-40307a 411->414 415 403015-403018 412->415 416 403068-40306c 412->416 417 403073 413->417 418 402f0b-402f13 413->418 421 40301a 415->421 422 40301d-403026 call 40307d 415->422 419 40302d-403033 416->419 420 40306e 416->420 417->414 423 402f15 418->423 424 402f18-402f26 call 40307d 418->424 426 403035 419->426 427 403038-403046 call 40307d 419->427 420->417 421->422 422->410 434 403070 422->434 423->424 424->410 432 402f2c-402f35 424->432 426->427 427->410 436 403048-40305b WriteFile 427->436 435 402f3b-402f5b call 405e08 432->435 434->417 442 402f61-402f74 GetTickCount 435->442 443 403009-40300b 435->443 438 40300d-40300f 436->438 439 40305d-403060 436->439 438->411 439->438 441 403062-403065 439->441 441->416 444 402f76-402f7e 442->444 445 402fb9-402fbd 442->445 443->411 446 402f80-402f84 444->446 447 402f86-402fb1 MulDiv wsprintfA call 404daa 444->447 448 402ffe-403001 445->448 449 402fbf-402fc2 445->449 446->445 446->447 456 402fb6 447->456 448->418 450 403007 448->450 452 402fe4-402fef 449->452 453 402fc4-402fd8 WriteFile 449->453 450->417 455 402ff2-402ff6 452->455 453->438 454 402fda-402fdd 453->454 454->438 457 402fdf-402fe2 454->457 455->435 458 402ffc 455->458 456->445 457->455 458->417
        APIs
        • GetTickCount.KERNEL32 ref: 00402EC2
        • GetTickCount.KERNEL32 ref: 00402F69
        • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F92
        • wsprintfA.USER32 ref: 00402FA2
        • WriteFile.KERNEL32(00000000,00000000,00418EC2,7FFFFFFF,00000000), ref: 00402FD0
        Strings
        • KLA, xrefs: 00402F2F, 00402F41
        • @echo offcls@echo offecho. >>C:\Mongoose_log.txtecho. >>C:\Mongoose_log.txtecho ------------- >>C:\Mongoose_log.txtecho Time of Install: %Date% %time% >>C:\Mongoose_log.txtecho ------------- >>C:\Mongoose_log.txtecho. >>C:\Mongoose_log.txte, xrefs: 00402EDC
        • ... %d%%, xrefs: 00402F9C
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CountTick$FileWritewsprintf
        • String ID: ... %d%%$@echo offcls@echo offecho. >>C:\Mongoose_log.txtecho. >>C:\Mongoose_log.txtecho ------------- >>C:\Mongoose_log.txtecho Time of Install: %Date% %time% >>C:\Mongoose_log.txtecho ------------- >>C:\Mongoose_log.txtecho. >>C:\Mongoose_log.txte$KLA
        • API String ID: 4209647438-361745389
        • Opcode ID: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
        • Instruction ID: 0d39cdfb2b20f01ea0ef459ff81ac6f09524c508dd7874cbed1e127a204ff5ac
        • Opcode Fuzzy Hash: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
        • Instruction Fuzzy Hash: 3D618D7190121AEBDF10CF65DA44A9E7BB8EF04366F10413BF800B72D4D7789A51DBAA

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 459 401734-401757 call 4029f6 call 40556c 464 401761-401773 call 405a0c call 4054ff lstrcatA 459->464 465 401759-40175f call 405a0c 459->465 470 401778-40177e call 405c6e 464->470 465->470 475 401783-401787 470->475 476 401789-401793 call 405d07 475->476 477 4017ba-4017bd 475->477 484 4017a5-4017b7 476->484 485 401795-4017a3 CompareFileTime 476->485 479 4017c5-4017e1 call 4056e3 477->479 480 4017bf-4017c0 call 4056c4 477->480 487 4017e3-4017e6 479->487 488 401859-401882 call 404daa call 402e5b 479->488 480->479 484->477 485->484 489 4017e8-40182a call 405a0c * 2 call 405a2e call 405a0c call 4052cd 487->489 490 40183b-401845 call 404daa 487->490 502 401884-401888 488->502 503 40188a-401896 SetFileTime 488->503 489->475 523 401830-401831 489->523 500 40184e-401854 490->500 504 402894 500->504 502->503 506 40189c-4018a7 CloseHandle 502->506 503->506 507 402896-40289a 504->507 509 40288b-40288e 506->509 510 4018ad-4018b0 506->510 509->504 512 4018b2-4018c3 call 405a2e lstrcatA 510->512 513 4018c5-4018c8 call 405a2e 510->513 517 4018cd-402213 call 4052cd 512->517 513->517 517->507 526 40265c-402663 517->526 523->500 525 401833-401834 523->525 525->490 526->509
        APIs
        • lstrcatA.KERNEL32(00000000,00000000,open,C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose,00000000,00000000,00000031), ref: 00401773
        • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose,00000000,00000000,00000031), ref: 0040179D
          • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,Name Setup,NSIS Error), ref: 00405A19
          • Part of subcall function 00404DAA: lstrlenA.KERNEL32(Completed,00000000,00418EC2,759223A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
          • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,Completed,00000000,00418EC2,759223A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
          • Part of subcall function 00404DAA: lstrcatA.KERNEL32(Completed,00402FB6,00402FB6,Completed,00000000,00418EC2,759223A0), ref: 00404E06
          • Part of subcall function 00404DAA: SetWindowTextA.USER32(Completed,Completed), ref: 00404E18
          • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
          • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
          • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
        • String ID: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose$open$open C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat
        • API String ID: 1941528284-1143220767
        • Opcode ID: f324c85fc2f324614552c21af61c380c89f90457e6ef3776ce2ffda22f3967b2
        • Instruction ID: 2412d90e5cc6ef50ac46e2462e63b4f26081636668b1d4f665875a47291bc265
        • Opcode Fuzzy Hash: f324c85fc2f324614552c21af61c380c89f90457e6ef3776ce2ffda22f3967b2
        • Instruction Fuzzy Hash: 4341D831A10515BACF10BBB5DD86DAF3A69EF41328B24433BF511F11E2D67C4A418E6D

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 527 404daa-404dbf 528 404e75-404e79 527->528 529 404dc5-404dd7 527->529 530 404de2-404dee lstrlenA 529->530 531 404dd9-404ddd call 405a2e 529->531 533 404df0-404e00 lstrlenA 530->533 534 404e0b-404e0f 530->534 531->530 533->528 535 404e02-404e06 lstrcatA 533->535 536 404e11-404e18 SetWindowTextA 534->536 537 404e1e-404e22 534->537 535->534 536->537 538 404e24-404e66 SendMessageA * 3 537->538 539 404e68-404e6a 537->539 538->539 539->528 540 404e6c-404e6f 539->540 540->528
        APIs
        • lstrlenA.KERNEL32(Completed,00000000,00418EC2,759223A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
        • lstrlenA.KERNEL32(00402FB6,Completed,00000000,00418EC2,759223A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
        • lstrcatA.KERNEL32(Completed,00402FB6,00402FB6,Completed,00000000,00418EC2,759223A0), ref: 00404E06
        • SetWindowTextA.USER32(Completed,Completed), ref: 00404E18
        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
        • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$lstrlen$TextWindowlstrcat
        • String ID: Completed
        • API String ID: 2531174081-3087654605
        • Opcode ID: 50dbff66748b602f0133f4c5fc9f36e40697bbb7724bf87a113127d5fb299ab7
        • Instruction ID: 64f14355eea1465708e63b557f2fc924fecf56a011f776fb8de10cf69f9f2b8c
        • Opcode Fuzzy Hash: 50dbff66748b602f0133f4c5fc9f36e40697bbb7724bf87a113127d5fb299ab7
        • Instruction Fuzzy Hash: F7216071A00118BBDB119FA9DD85ADEBFA9FF44354F14807AF904B6290C7398E418F98

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 541 4015b3-4015c6 call 4029f6 call 405593 546 4015c8-4015e3 call 40552a CreateDirectoryA 541->546 547 40160a-40160d 541->547 554 401600-401608 546->554 555 4015e5-4015f0 GetLastError 546->555 549 40162d-402169 call 401423 547->549 550 40160f-401628 call 401423 call 405a0c SetCurrentDirectoryA 547->550 562 40288b-40289a 549->562 550->562 554->546 554->547 559 4015f2-4015fb GetFileAttributesA 555->559 560 4015fd 555->560 559->554 559->560 560->554
        APIs
          • Part of subcall function 00405593: CharNextA.USER32(ES@,?,0042B3E8,00000000,004055F7,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 004055A1
          • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055A6
          • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055B5
        • CreateDirectoryA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
        • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
        • GetFileAttributesA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
        • SetCurrentDirectoryA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose,00000000,00000000,000000F0), ref: 00401622
        Strings
        • C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose, xrefs: 00401617
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
        • String ID: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose
        • API String ID: 3751793516-1638439677
        • Opcode ID: 360e2cbe79de91032a44b72a5c5ff191f5bd6e6521d3b477c7bacda235078696
        • Instruction ID: bf1eb0eabc3c1df6ff2fb323ed3efcd7168262dea338722757ad05095e7f5395
        • Opcode Fuzzy Hash: 360e2cbe79de91032a44b72a5c5ff191f5bd6e6521d3b477c7bacda235078696
        • Instruction Fuzzy Hash: AB012631908180AFDB217F756D449BF6BB0EA56365728073FF492B22E2C23C4D42962E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 566 405712-40571c 567 40571d-405747 GetTickCount GetTempFileNameA 566->567 568 405756-405758 567->568 569 405749-40574b 567->569 571 405750-405753 568->571 569->567 570 40574d 569->570 570->571
        APIs
        • GetTickCount.KERNEL32 ref: 00405725
        • GetTempFileNameA.KERNEL32(?,0061736E,00000000,?), ref: 0040573F
        Strings
        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405712, 00405715
        • nsa, xrefs: 0040571E
        • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe", xrefs: 00405719
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CountFileNameTempTick
        • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"$C:\Users\user\AppData\Local\Temp\$nsa
        • API String ID: 1716503409-4117334575
        • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
        • Instruction ID: 857343acb9398127b83b67a88284cb3acf20d602f6beb627bdaaa73bf87bc8f8
        • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
        • Instruction Fuzzy Hash: 19F0A736348204BAE7105E55DC04B9B7F99DFD1750F14C027F9449B1C0D6F099589BA9

        Control-flow Graph

        APIs
          • Part of subcall function 00405C6E: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
          • Part of subcall function 00405C6E: CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
          • Part of subcall function 00405C6E: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
          • Part of subcall function 00405C6E: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
        • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 004030E7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Char$Next$CreateDirectoryPrev
        • String ID: 1033$C:\Users\user\AppData\Local\Temp\
        • API String ID: 4115351271-2030658151
        • Opcode ID: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
        • Instruction ID: 7f1b43601f0a10077d0081c2ba5ec5825ac71a1bded9547d22d949ebda8a6a9f
        • Opcode Fuzzy Hash: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
        • Instruction Fuzzy Hash: B6D0922150AD3031D651322A3E06BCF154D8F4636AF65807BF944B608A4A6C2A825AEE

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 587 401dc1-401e10 call 4029f6 * 4 call 401423 ShellExecuteA 598 401e16-402663 587->598 599 40288b-40289a 587->599 598->599
        APIs
        • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose,?), ref: 00401E07
        Strings
        • C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose, xrefs: 00401DF2
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: ExecuteShell
        • String ID: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose
        • API String ID: 587946157-1638439677
        • Opcode ID: 3dc99a1e9f4d2a7ff469985d076f4f0b18b0b581c00dd406e6359dc7570937ce
        • Instruction ID: 1d9e37e4724715ff8eb4cd61c52570f4e17590a8471f76494d0d603f05069ab9
        • Opcode Fuzzy Hash: 3dc99a1e9f4d2a7ff469985d076f4f0b18b0b581c00dd406e6359dc7570937ce
        • Instruction Fuzzy Hash: C3F04C73B04301AACB50AFB19D4AE5E3BA8AB41398F200637F510F70C1D9FC8801B318

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 603 401389-40138e 604 4013fa-4013fc 603->604 605 401390-4013a0 604->605 606 4013fe 604->606 605->606 608 4013a2-4013ad call 401434 605->608 607 401400-401401 606->607 611 401404-401409 608->611 612 4013af-4013b7 call 40136d 608->612 611->607 615 4013b9-4013bb 612->615 616 4013bd-4013c2 612->616 617 4013c4-4013c9 615->617 616->617 617->604 618 4013cb-4013f4 MulDiv SendMessageA 617->618 618->604
        APIs
        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend
        • String ID:
        • API String ID: 3850602802-0
        • Opcode ID: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
        • Instruction ID: 8223ec958efd2c964e321ebce6dca8e406ed2778dd364e0d2667d4e2a9ef0db3
        • Opcode Fuzzy Hash: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
        • Instruction Fuzzy Hash: FE01F4317242109BE7299B799D04B6A36D8E710325F14453FF955F72F1D678DC028B4D

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 619 404e7c-404ea1 OleInitialize call 403e0a 622 404ea3 619->622 623 404ece-404ee5 call 403e0a CoUninitialize 619->623 624 404ea6-404eab 622->624 626 404ebc-404ec4 624->626 627 404ead-404eba call 401389 624->627 626->624 630 404ec6 626->630 627->626 632 404ec8 627->632 630->623 632->623
        APIs
        • OleInitialize.OLE32(00000000), ref: 00404E8C
          • Part of subcall function 00403E0A: SendMessageA.USER32(00010424,00000000,00000000,00000000), ref: 00403E1C
        • CoUninitialize.COMBASE(00000404,00000000), ref: 00404ED8
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: InitializeMessageSendUninitialize
        • String ID:
        • API String ID: 2896919175-0
        • Opcode ID: 40dbed6342c342f19cf155c60ec5393d5941e5f8c4ce0c4d617a2ddd15e81d86
        • Instruction ID: 553340d25051964c1d9f2091c6121c40533f6be98ef284e5afc8434be7077bea
        • Opcode Fuzzy Hash: 40dbed6342c342f19cf155c60ec5393d5941e5f8c4ce0c4d617a2ddd15e81d86
        • Instruction Fuzzy Hash: 33F096B3A0820086E71197A6DD01B567BA4BBD4312F55403AFF45622E1D775584286DD
        APIs
        • GetFileAttributesA.KERNEL32(00000003,00402C62,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,80000000,00000003), ref: 004056E7
        • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: File$AttributesCreate
        • String ID:
        • API String ID: 415043291-0
        • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
        • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
        • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
        • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
        APIs
        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,000000FF,?,00402EAA,000000FF,00000004,00000000,00000000,00000000), ref: 00403094
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileRead
        • String ID:
        • API String ID: 2738559852-0
        • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
        • Instruction ID: 43e3c0ed55451ca58d66c179b0d5cd373ba627774d09ad719adf1b780fd88a5d
        • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
        • Instruction Fuzzy Hash: F0E08631101119BBCF105E61AC00A9B3F9CEB05362F00C032FA04E5190D538DA14DBA5
        APIs
        • SendMessageA.USER32(00010424,00000000,00000000,00000000), ref: 00403E1C
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend
        • String ID:
        • API String ID: 3850602802-0
        • Opcode ID: c5061dae57279ed18d5e0219b0993123e9bb10419d0af8d34ddcf4ee1c6729a0
        • Instruction ID: 4a69275ab6afdcc9dd23c2635c3fa87663c4bda3d9f509ac91b66b343a6ea2c2
        • Opcode Fuzzy Hash: c5061dae57279ed18d5e0219b0993123e9bb10419d0af8d34ddcf4ee1c6729a0
        • Instruction Fuzzy Hash: 0FC04C717443016AEA20DB51DE45F0777589754B01F548465B604A50D0C674E410D65D
        APIs
        • SendMessageA.USER32(00000028,?,00000001,00403C24), ref: 00403E01
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend
        • String ID:
        • API String ID: 3850602802-0
        • Opcode ID: acb417c3046c5230bf261fb3a85c5b045a6b8022903fbd0a553d80ffe77ce434
        • Instruction ID: d5eec3387bf9f2af87c3deac1be3c081a68759b5cbc5052c90a1cd046c0f3978
        • Opcode Fuzzy Hash: acb417c3046c5230bf261fb3a85c5b045a6b8022903fbd0a553d80ffe77ce434
        • Instruction Fuzzy Hash: BCB01275BC4201FBEE219B01DE09F457E62E764701F008074B305240F0C6B210A1DF0D
        APIs
        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00402DE9,000081E4), ref: 004030BD
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: FilePointer
        • String ID:
        • API String ID: 973152223-0
        • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
        • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
        • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
        • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
        APIs
        • KiUserCallbackDispatcher.NTDLL(?,00403BBD), ref: 00403DEA
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CallbackDispatcherUser
        • String ID:
        • API String ID: 2492992576-0
        • Opcode ID: e3f2ba33d58efc8432ae633466a552196efcc3252a2fe2007ece747084bac9c6
        • Instruction ID: 5393fb3fd4ec66336373a3cea7bd514d8462fd9d014250aae94180e38f4c2131
        • Opcode Fuzzy Hash: e3f2ba33d58efc8432ae633466a552196efcc3252a2fe2007ece747084bac9c6
        • Instruction Fuzzy Hash: AFA002755051009BCA515B50DF048457A61A754701B458475F1459017487315861EB6A
        APIs
        • CloseHandle.KERNEL32(FFFFFFFF,004032EB,00000000), ref: 00403486
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CloseHandle
        • String ID:
        • API String ID: 2962429428-0
        • Opcode ID: 31f78a86cd46fd7a0018bd77bfa4d4c204eb943dc09def5fdfba012cb08fa724
        • Instruction ID: dd629d7ffa80b2531d7668e5a1a305395e4adc4893f6b58610a8e469f8d50dee
        • Opcode Fuzzy Hash: 31f78a86cd46fd7a0018bd77bfa4d4c204eb943dc09def5fdfba012cb08fa724
        • Instruction Fuzzy Hash: F8C01230504600E6D2246F759E0A6093A18574173AB904336B179B50F1C77C5901453E
        APIs
        • GetDlgItem.USER32(?,000003F9), ref: 00404710
        • GetDlgItem.USER32(?,00000408), ref: 0040471D
        • GlobalAlloc.KERNEL32(00000040,00000002), ref: 00404769
        • LoadBitmapA.USER32(0000006E), ref: 0040477C
        • SetWindowLongA.USER32(?,000000FC,00404CFA), ref: 00404796
        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004047AA
        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 004047BE
        • SendMessageA.USER32(?,00001109,00000002), ref: 004047D3
        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004047DF
        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004047F1
        • DeleteObject.GDI32(?), ref: 004047F6
        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404821
        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 0040482D
        • SendMessageA.USER32(?,00001100,00000000,?), ref: 004048C2
        • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004048ED
        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404901
        • GetWindowLongA.USER32(?,000000F0), ref: 00404930
        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040493E
        • ShowWindow.USER32(?,00000005), ref: 0040494F
        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404A52
        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404AB7
        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404ACC
        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404AF0
        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404B16
        • ImageList_Destroy.COMCTL32(00000000), ref: 00404B2B
        • GlobalFree.KERNEL32(00000000), ref: 00404B3B
        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404BAB
        • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404C54
        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404C63
        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404C83
        • ShowWindow.USER32(?,00000000), ref: 00404CD1
        • GetDlgItem.USER32(?,000003FE), ref: 00404CDC
        • ShowWindow.USER32(00000000), ref: 00404CE3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
        • String ID: $M$N$e?K
        • API String ID: 1638840714-2675625110
        • Opcode ID: 9006264d80cea567de8ea85ae76f5f4e6db86d56f38ece968a838e3dcd762fad
        • Instruction ID: 30a51c26aaa2b30bd696497e7e47c5adc9155ce2862f65cc436e234c57937e2f
        • Opcode Fuzzy Hash: 9006264d80cea567de8ea85ae76f5f4e6db86d56f38ece968a838e3dcd762fad
        • Instruction Fuzzy Hash: D402AFB0A00208AFDB20DF55DD45AAE7BB5FB84314F10817AF611BA2E1D7799E42CF58
        APIs
        • GetVersion.KERNEL32(00000000,Completed,00000000,00404DE2,Completed,00000000), ref: 00405AD6
        • GetSystemDirectoryA.KERNEL32(: Completed,00000400), ref: 00405B51
        • GetWindowsDirectoryA.KERNEL32(: Completed,00000400), ref: 00405B64
        • SHGetSpecialFolderLocation.SHELL32(?,00418EC2), ref: 00405BA0
        • SHGetPathFromIDListA.SHELL32(00418EC2,: Completed), ref: 00405BAE
        • CoTaskMemFree.OLE32(00418EC2), ref: 00405BB9
        • lstrcatA.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00405BDB
        • lstrlenA.KERNEL32(: Completed,00000000,Completed,00000000,00404DE2,Completed,00000000), ref: 00405C2D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
        • String ID: <K$: Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$e?K
        • API String ID: 900638850-1680338167
        • Opcode ID: 836fece74e7b83efcc8e6abf991d18e4324180e390ed0b8ba3fefc28c16e2b61
        • Instruction ID: e3937826694aa96a66c9679703be47664347117baa65301e61951ea2719d1281
        • Opcode Fuzzy Hash: 836fece74e7b83efcc8e6abf991d18e4324180e390ed0b8ba3fefc28c16e2b61
        • Instruction Fuzzy Hash: DB51F331A04B05AAEF219B689C84BBF3BB4DB15314F54423BE912B62D0D27C6D42DF4E
        APIs
        • GetDlgItem.USER32(?,000003FB), ref: 00404248
        • SetWindowTextA.USER32(?,?), ref: 00404275
        • SHBrowseForFolderA.SHELL32(?,004293B0,?), ref: 0040432A
        • CoTaskMemFree.OLE32(00000000), ref: 00404335
        • lstrcmpiA.KERNEL32(: Completed,00429FE0), ref: 00404367
        • lstrcatA.KERNEL32(?,: Completed), ref: 00404373
        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404383
          • Part of subcall function 004052B1: GetDlgItemTextA.USER32(?,?,00000400,004043B6), ref: 004052C4
          • Part of subcall function 00405C6E: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
          • Part of subcall function 00405C6E: CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
          • Part of subcall function 00405C6E: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
          • Part of subcall function 00405C6E: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
        • GetDiskFreeSpaceA.KERNEL32(00428FA8,?,?,0000040F,?,00428FA8,00428FA8,?,00000000,00428FA8,?,?,000003FB,?), ref: 0040443C
        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404457
        • SetDlgItemTextA.USER32(00000000,00000400,00428F98), ref: 004044D0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
        • String ID: : Completed$A$e?K
        • API String ID: 2246997448-3218851189
        • Opcode ID: 6ab1eb65d489d7f474ee6da6f1ce318879e7bc5207f6923fd53d8865a327c9bb
        • Instruction ID: 52dfe11e264a0fce323933678d720eed1997f61c196974170264a293bd140da1
        • Opcode Fuzzy Hash: 6ab1eb65d489d7f474ee6da6f1ce318879e7bc5207f6923fd53d8865a327c9bb
        • Instruction Fuzzy Hash: 19915FB1A00219ABDF11AFA1CC85AAF7BB8EF84315F10407BFA00B6291D77C99418F59
        APIs
        • DeleteFileA.KERNEL32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 0040534F
        • lstrcatA.KERNEL32(0042AFE8,\*.*,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 00405399
        • lstrcatA.KERNEL32(?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 004053BA
        • lstrlenA.KERNEL32(?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 004053C0
        • FindFirstFileA.KERNEL32(0042AFE8,?,?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 004053D1
        • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 00405483
        • FindClose.KERNEL32(?), ref: 00405494
        Strings
        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405331
        • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe", xrefs: 0040533B
        • \*.*, xrefs: 00405393
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
        • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
        • API String ID: 2035342205-3962766423
        • Opcode ID: fb5f0b97fd6045d75f3de5e206462d23269cef9c6319140f549f9214963cb2b4
        • Instruction ID: 46a167c19d0f92bb62e791f7a1b0a3e0954e7dde2177130d433e16ae92940f3d
        • Opcode Fuzzy Hash: fb5f0b97fd6045d75f3de5e206462d23269cef9c6319140f549f9214963cb2b4
        • Instruction Fuzzy Hash: 84510130904A5476DB21AB218C85BFF3A68DF4231AF14813BF941752D2C77C49C2DE5E
        APIs
        • CoCreateInstance.OLE32(00407490,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409378,00000400,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
        Strings
        • C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose, xrefs: 004020AB
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: ByteCharCreateInstanceMultiWide
        • String ID: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose
        • API String ID: 123533781-1638439677
        • Opcode ID: e2440bd97a0de28c640c01a9d5d42cc8b810f7137a49c2ac781f9d5420d32ae4
        • Instruction ID: ee874f8c2dec57c4877f78095a0f9dac743c80c93ea62094aeb2a8065092a27c
        • Opcode Fuzzy Hash: e2440bd97a0de28c640c01a9d5d42cc8b810f7137a49c2ac781f9d5420d32ae4
        • Instruction Fuzzy Hash: 07417D75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
        APIs
        • FindFirstFileA.KERNEL32(?,0042C030,0042B3E8,00405623,0042B3E8,0042B3E8,00000000,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 00405D12
        • FindClose.KERNEL32(00000000), ref: 00405D1E
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Find$CloseFileFirst
        • String ID:
        • API String ID: 2295610775-0
        • Opcode ID: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
        • Instruction ID: 6bc8dc8487d68019062fb65c0caa7a5850599756ae9c65598668cc32d68c0862
        • Opcode Fuzzy Hash: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
        • Instruction Fuzzy Hash: C5D0123195D5309BD31017797C0C85B7A58DF293317108A33F025F22E0D3749C519AED
        APIs
        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileFindFirst
        • String ID:
        • API String ID: 1974802433-0
        • Opcode ID: 91dde0ba118db7d7ebc8a8be9eaa396cb067559f4d74f26d235d81ef142ed7f1
        • Instruction ID: c4edc1118dc91e0c9440d01bfde8b8f2caf312925950fbc99ec99334c7621aa2
        • Opcode Fuzzy Hash: 91dde0ba118db7d7ebc8a8be9eaa396cb067559f4d74f26d235d81ef142ed7f1
        • Instruction Fuzzy Hash: E3F0E572648101DFD700EBB49D49AEEB768DF51328FA007BBF502F20C1C2B84945DB2A
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
        • Instruction ID: 671146196c1174ec618cbc22bbed2adbdbe1d7b4d249fb8fe9215707769dedfe
        • Opcode Fuzzy Hash: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
        • Instruction Fuzzy Hash: 3FE16971901B09DFDB24CF58C880BAABBF5EB44305F15852EE897A72D1D378AA51CF44
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
        • Instruction ID: ce73a9d55fc041a401e528a6b0bed7c2fc314d3430b7e91baefc2d4226deaab1
        • Opcode Fuzzy Hash: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
        • Instruction Fuzzy Hash: 51C13A71A002698BDF14CF68C4905EEB7B2FF99314F26827AD856B7380D7346952CF94
        APIs
        • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403F91
        • GetDlgItem.USER32(00000000,000003E8), ref: 00403FA5
        • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00403FC3
        • GetSysColor.USER32(?), ref: 00403FD4
        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00403FE3
        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00403FF2
        • lstrlenA.KERNEL32(?), ref: 00403FFC
        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040400A
        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404019
        • GetDlgItem.USER32(?,0000040A), ref: 0040407C
        • SendMessageA.USER32(00000000), ref: 0040407F
        • GetDlgItem.USER32(?,000003E8), ref: 004040AA
        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004040EA
        • LoadCursorA.USER32(00000000,00007F02), ref: 004040F9
        • SetCursor.USER32(00000000), ref: 00404102
        • ShellExecuteA.SHELL32(0000070B,open,0042DB00,00000000,00000000,00000001), ref: 00404115
        • LoadCursorA.USER32(00000000,00007F00), ref: 00404122
        • SetCursor.USER32(00000000), ref: 00404125
        • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404151
        • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404165
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
        • String ID: <K$: Completed$N$e?K$open
        • API String ID: 3615053054-227913076
        • Opcode ID: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
        • Instruction ID: 0605a8af88f24b8a239437e517aaa265f180be2417519ff34b25117700073a86
        • Opcode Fuzzy Hash: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
        • Instruction Fuzzy Hash: D161C1B1A40209BBEB109F60DD45F6A3B69FF54715F108036FB01BA2D1C7B8A991CF98
        APIs
        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
        • BeginPaint.USER32(?,?), ref: 00401047
        • GetClientRect.USER32(?,?), ref: 0040105B
        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
        • DeleteObject.GDI32(?), ref: 004010ED
        • CreateFontIndirectA.GDI32(?), ref: 00401105
        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
        • SetTextColor.GDI32(00000000,?), ref: 00401130
        • SelectObject.GDI32(00000000,?), ref: 00401140
        • DrawTextA.USER32(00000000,Name Setup,000000FF,00000010,00000820), ref: 00401156
        • SelectObject.GDI32(00000000,00000000), ref: 00401160
        • DeleteObject.GDI32(?), ref: 00401165
        • EndPaint.USER32(?,?), ref: 0040116E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
        • String ID: F$Name Setup
        • API String ID: 941294808-4002928617
        • Opcode ID: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
        • Instruction ID: 226a36137513f208ef2a020474f107b038e547e09bed9ebbc09fe29577f91b00
        • Opcode Fuzzy Hash: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
        • Instruction Fuzzy Hash: C0419B71804249AFCF058FA5CD459BFBFB9FF44314F00812AF952AA1A0C738AA51DFA5
        APIs
          • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
          • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D4B
          • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,004054EF,?,00000000,000000F1,?), ref: 004057A7
        • GetShortPathNameA.KERNEL32(?,0042C170,00000400), ref: 004057B0
        • GetShortPathNameA.KERNEL32(00000000,0042BBE8,00000400), ref: 004057CD
        • wsprintfA.USER32 ref: 004057EB
        • GetFileSize.KERNEL32(00000000,00000000,0042BBE8,C0000000,00000004,0042BBE8,?,?,?,00000000,000000F1,?), ref: 00405826
        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 00405835
        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 0040584B
        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0042B7E8,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405891
        • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004058A3
        • GlobalFree.KERNEL32(00000000), ref: 004058AA
        • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 004058B1
          • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
          • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
        • String ID: %s=%s$[Rename]
        • API String ID: 3772915668-1727408572
        • Opcode ID: 6cb39701302fa091149022549eefa5da3c0be633e3a468fc33eaceea222ec053
        • Instruction ID: 426fb2abaf3c2c6495405564ff4e517f65c757b77f6bed08917e1be6c8ffeb7f
        • Opcode Fuzzy Hash: 6cb39701302fa091149022549eefa5da3c0be633e3a468fc33eaceea222ec053
        • Instruction Fuzzy Hash: 6341FF32606B15ABE3206B619C49F6B3A5CDF80705F004436FD05F62C2E678E8118EBD
        APIs
        • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
        • CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
        • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
        • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
        Strings
        • *?|<>/":, xrefs: 00405CB6
        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C6F, 00405CAA
        • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe", xrefs: 00405C74
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Char$Next$Prev
        • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
        • API String ID: 589700163-2769233796
        • Opcode ID: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
        • Instruction ID: 3b67653c5ee308ebbdbeafcda2e7905df7fa5ba98b11233f7c0ae47683edab57
        • Opcode Fuzzy Hash: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
        • Instruction Fuzzy Hash: 0811905180CB912EFB3206245D44BB7BF89CB567A0F58447BE9C5B22C2CA7C5C429A6D
        APIs
        • GetWindowLongA.USER32(?,000000EB), ref: 00403E42
        • GetSysColor.USER32(00000000), ref: 00403E5E
        • SetTextColor.GDI32(?,00000000), ref: 00403E6A
        • SetBkMode.GDI32(?,?), ref: 00403E76
        • GetSysColor.USER32(?), ref: 00403E89
        • SetBkColor.GDI32(?,?), ref: 00403E99
        • DeleteObject.GDI32(?), ref: 00403EB3
        • CreateBrushIndirect.GDI32(?), ref: 00403EBD
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
        • String ID:
        • API String ID: 2320649405-0
        • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
        • Instruction ID: df06335cf3b4afc37a3544ae2d30c5d34a8579c70edf0d6bae8496df32602c64
        • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
        • Instruction Fuzzy Hash: DC219671904709ABCB219F78DD08B4B7FF8AF00715F048A29F855E22E0D338E904CB95
        APIs
        • GlobalAlloc.KERNEL32(00000040,00008200,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
        • GlobalFree.KERNEL32(?), ref: 00402725
        • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
        • GlobalFree.KERNEL32(00000000), ref: 0040273E
        • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
        • String ID:
        • API String ID: 3294113728-0
        • Opcode ID: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
        • Instruction ID: 62f2159171fbc9033078dd1539b67ba065abfcd1800d5973976be9d0b9eda31e
        • Opcode Fuzzy Hash: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
        • Instruction Fuzzy Hash: DE319F71C00128BBDF216FA5CD89EAE7E78EF04364F10422AF524772E0C7795D419BA9
        APIs
        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404694
        • GetMessagePos.USER32 ref: 0040469C
        • ScreenToClient.USER32(?,?), ref: 004046B6
        • SendMessageA.USER32(?,00001111,00000000,?), ref: 004046C8
        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004046EE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Message$Send$ClientScreen
        • String ID: f
        • API String ID: 41195575-1993550816
        • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
        • Instruction ID: b5388fb2048f9adb4f66bcd81e9da03b2d8faafec29f08353259a6dacb87349b
        • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
        • Instruction Fuzzy Hash: 0E014071D00219BADB00DB94DC45BEEBBB8AB59711F10016ABA11B61C0D7B865418BA5
        APIs
        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
        • MulDiv.KERNEL32(000193E2,00000064,000193E6), ref: 00402B81
        • wsprintfA.USER32 ref: 00402B91
        • SetWindowTextA.USER32(?,?), ref: 00402BA1
        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
        Strings
        • verifying installer: %d%%, xrefs: 00402B8B
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Text$ItemTimerWindowwsprintf
        • String ID: verifying installer: %d%%
        • API String ID: 1451636040-82062127
        • Opcode ID: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
        • Instruction ID: 3d98ddf4d84b742d5460afe4edfb6d9be597fa80bf04213b3bc288f28cb5f5da
        • Opcode Fuzzy Hash: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
        • Instruction Fuzzy Hash: 82014470A40209ABDB209F60DD09FAE3779BB04345F008039FA06A92D1D7B8AA558F99
        APIs
        • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
          • Part of subcall function 00404DAA: lstrlenA.KERNEL32(Completed,00000000,00418EC2,759223A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
          • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,Completed,00000000,00418EC2,759223A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
          • Part of subcall function 00404DAA: lstrcatA.KERNEL32(Completed,00402FB6,00402FB6,Completed,00000000,00418EC2,759223A0), ref: 00404E06
          • Part of subcall function 00404DAA: SetWindowTextA.USER32(Completed,Completed), ref: 00404E18
          • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
          • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
          • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
        • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
        • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
        • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
        • String ID: B
        • API String ID: 2987980305-3806887055
        • Opcode ID: 6d46612d3a10ff1fde0679903579df7a40cee65c269d183f8d6d4642c898af7f
        • Instruction ID: bf94c0598684f4a2e8798aed6ecd64900ad0f6fcd097f114c8a1beddd358b100
        • Opcode Fuzzy Hash: 6d46612d3a10ff1fde0679903579df7a40cee65c269d183f8d6d4642c898af7f
        • Instruction Fuzzy Hash: 5121EE72D04216EBCF107FA5CE49A6E75B06F45358F20433BF511B62E1C77C4941A65E
        APIs
        • SetWindowTextA.USER32(00000000,Name Setup), ref: 004038B6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: TextWindow
        • String ID: 1033$C:\Users\user\AppData\Local\Temp\$Name Setup$e?K
        • API String ID: 530164218-1873200483
        • Opcode ID: 48b09981901e30c4345b6e5c0cee300cf490ae76efe8ca9e2f713c31fa19992d
        • Instruction ID: f58d08b88b77c55e92e539ad5181c9965f6bbcffbd0d008a8b371c472e4a47a6
        • Opcode Fuzzy Hash: 48b09981901e30c4345b6e5c0cee300cf490ae76efe8ca9e2f713c31fa19992d
        • Instruction Fuzzy Hash: 9311D176B001009BC734EF56DC809737BADEB8471636881BFEC02A7390D639A8038A98
        APIs
        • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A57
        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
        • RegCloseKey.ADVAPI32(?), ref: 00402A9C
        • RegCloseKey.ADVAPI32(?), ref: 00402AC1
        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Close$DeleteEnumOpen
        • String ID:
        • API String ID: 1912718029-0
        • Opcode ID: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
        • Instruction ID: 324dab2b24170647655e9dcbeda369d8ff673eed47d89bab0de13a8960c84090
        • Opcode Fuzzy Hash: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
        • Instruction Fuzzy Hash: 4F115675A00008FFEF31AF91DE49DAB7B6DEB40384B104436FA05B10A0DBB59E51AE69
        APIs
        • GetDlgItem.USER32(?), ref: 00401CC5
        • GetClientRect.USER32(00000000,?), ref: 00401CD2
        • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
        • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
        • DeleteObject.GDI32(00000000), ref: 00401D10
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
        • String ID:
        • API String ID: 1849352358-0
        • Opcode ID: 945e42f754af583b5ec13e30839ce2662c59fcb97218ebcfb2175b3756829da0
        • Instruction ID: f89edaf4e673e5a696cf4c500be88082f9c29b5fdabb6c66a10e118bddb835aa
        • Opcode Fuzzy Hash: 945e42f754af583b5ec13e30839ce2662c59fcb97218ebcfb2175b3756829da0
        • Instruction Fuzzy Hash: 71F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F6190C678AD018B69
        APIs
        • lstrlenA.KERNEL32(00429FE0,00429FE0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004044B7,000000DF,0000040F,00000400,00000000), ref: 00404625
        • wsprintfA.USER32 ref: 0040462D
        • SetDlgItemTextA.USER32(?,00429FE0), ref: 00404640
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: ItemTextlstrlenwsprintf
        • String ID: %u.%u%s%s
        • API String ID: 3540041739-3551169577
        • Opcode ID: 308c210494ba65c8d6c58fead7846ea59173cd15c70e93c8128561061e7c40a4
        • Instruction ID: a73c68329ee831a229c644748369bffc84c82a565a353c3d841dc2820e0c3950
        • Opcode Fuzzy Hash: 308c210494ba65c8d6c58fead7846ea59173cd15c70e93c8128561061e7c40a4
        • Instruction Fuzzy Hash: 9911D0737001243BDB10A66D9C46EEF329ADBC6334F14023BFA25F61D1E9388C5286E8
        APIs
        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: MessageSend$Timeout
        • String ID: !
        • API String ID: 1777923405-2657877971
        • Opcode ID: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
        • Instruction ID: e870f9960eb541ab862ab70d99fa676f0883abea00e9f1964bf1c40a5587cb5b
        • Opcode Fuzzy Hash: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
        • Instruction Fuzzy Hash: 3B21C4B1A44209BFEF01AFB4CE4AAAE7B75EF40344F14053EF602B60D1D6B84980E718
        APIs
        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042BFE8,Error launching installer), ref: 00405291
        • CloseHandle.KERNEL32(?), ref: 0040529E
        Strings
        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040526C
        • Error launching installer, xrefs: 0040527F
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CloseCreateHandleProcess
        • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
        • API String ID: 3712363035-7751565
        • Opcode ID: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
        • Instruction ID: 9c205d3d1494e9e4afb0e3639077779a104ecf70f113e6d393e41fe649cd8d97
        • Opcode Fuzzy Hash: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
        • Instruction Fuzzy Hash: FBE0ECB4A04209ABEB00EF64ED09D7B7BBCEB00304B408522A911E2290D778E410CEB9
        APIs
        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405505
        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 0040550E
        • lstrcatA.KERNEL32(?,00409010), ref: 0040551F
        Strings
        • C:\Users\user\AppData\Local\Temp\, xrefs: 004054FF
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CharPrevlstrcatlstrlen
        • String ID: C:\Users\user\AppData\Local\Temp\
        • API String ID: 2659869361-823278215
        • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
        • Instruction ID: dfec000a3f5bf2671270dd29e8f8c50a5f72ee918dd093ba8f25731816a648b4
        • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
        • Instruction Fuzzy Hash: FCD0A972705A307ED2022A19AC06F8F2A88CF17301B044822F100B62D2C23C9E418FFE
        APIs
        • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402341
        • lstrlenA.KERNEL32(0040A380,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402361
        • RegSetValueExA.ADVAPI32(?,?,?,?,0040A380,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040239A
        • RegCloseKey.ADVAPI32(?,?,?,0040A380,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CloseCreateValuelstrlen
        • String ID:
        • API String ID: 1356686001-0
        • Opcode ID: 81d27fc1e3ab509f11f0648c0d675ea1f801cb77e08bc1b8ef6c2a36b769e97e
        • Instruction ID: 74c2b7e5efa1a9b7d251dd878628ee018497e02546d33d1ea7114f4406d6c15c
        • Opcode Fuzzy Hash: 81d27fc1e3ab509f11f0648c0d675ea1f801cb77e08bc1b8ef6c2a36b769e97e
        • Instruction Fuzzy Hash: 721160B1E00209BFEB10AFA5DE89EAF767CFB40398F10453AF901B71D0D6B85D019669
        APIs
        • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
        • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
        • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
          • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
        • String ID:
        • API String ID: 1404258612-0
        • Opcode ID: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
        • Instruction ID: ac83c8b0d38e5b491d5bd27050ffdb4091974a4b49ad9b19d675067d3fb65d11
        • Opcode Fuzzy Hash: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
        • Instruction Fuzzy Hash: 201148B2900108BFDB01EFA5D981DAEBBB9EF04344B24807AF505F61E1D7389A54DB28
        APIs
        • CharNextA.USER32(ES@,?,0042B3E8,00000000,004055F7,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000), ref: 004055A1
        • CharNextA.USER32(00000000), ref: 004055A6
        • CharNextA.USER32(00000000), ref: 004055B5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CharNext
        • String ID: ES@
        • API String ID: 3213498283-1851447614
        • Opcode ID: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
        • Instruction ID: f60ec20427defc95a9886ae099bd540e39d30c8fbbaad3333d1940da6ed1a81e
        • Opcode Fuzzy Hash: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
        • Instruction Fuzzy Hash: F8F0A7A2D44B25B6E73222A84C44B6B6BADDB55711F244437E200B61D597B84C828FBA
        APIs
        • GetDC.USER32(?), ref: 00401D22
        • GetDeviceCaps.GDI32(00000000), ref: 00401D29
        • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
        • CreateFontIndirectA.GDI32(0040AF84), ref: 00401D8A
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CapsCreateDeviceFontIndirect
        • String ID:
        • API String ID: 3272661963-0
        • Opcode ID: bbbcfc34ac2d637fe9c3dcd2aae23fbeb0c3268bdde6826654245cc777324362
        • Instruction ID: 580b179190550232f88f4ba5e52f5296c98f8c4b0afe68c870f47754878f2485
        • Opcode Fuzzy Hash: bbbcfc34ac2d637fe9c3dcd2aae23fbeb0c3268bdde6826654245cc777324362
        • Instruction Fuzzy Hash: 68F044F1A45342AEE702A7B0AE4B7993B649725309F100436F545BA1E2C5BC00149B7F
        APIs
        • DestroyWindow.USER32(00000000,00000000,00402D9E,00000001), ref: 00402BD1
        • GetTickCount.KERNEL32 ref: 00402BEF
        • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C0C
        • ShowWindow.USER32(00000000,00000005), ref: 00402C1A
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Window$CountCreateDestroyDialogParamShowTick
        • String ID:
        • API String ID: 2102729457-0
        • Opcode ID: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
        • Instruction ID: df45f881ccb5ca36463c1a09230da8cf23750fca8468dec1cd15007da7f5e5e8
        • Opcode Fuzzy Hash: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
        • Instruction Fuzzy Hash: 22F0F430A09120EBC6716F95FD4C99B7F64E704B157504437F001B55F5D67878829B9D
        APIs
        • IsWindowVisible.USER32(?), ref: 00404D30
        • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404D9E
          • Part of subcall function 00403E0A: SendMessageA.USER32(00010424,00000000,00000000,00000000), ref: 00403E1C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Window$CallMessageProcSendVisible
        • String ID:
        • API String ID: 3748168415-3916222277
        • Opcode ID: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
        • Instruction ID: b16bf2df46199d4e0f4b20eb531931f7d117dfa55111be6f57691eac5a9fa7e0
        • Opcode Fuzzy Hash: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
        • Instruction Fuzzy Hash: 25114F71600218BBDB219F52DC41AAB3B69AF84365F00813FFA04B91E1C37D8D51CFA9
        APIs
        • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
        • WriteFile.KERNEL32(00000000,?,open C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat,00000000,?,?,00000000,00000011), ref: 004024FB
        Strings
        • open C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat, xrefs: 004024CA, 004024EF
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileWritelstrlen
        • String ID: open C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat
        • API String ID: 427699356-1009940584
        • Opcode ID: 01a20a6393f6cf1e01e81d8ef9af866549bd590d312b5bd55c7394e971cc1238
        • Instruction ID: 266b505f4b4a70e0031bd9b61304a7f29979de1156be46298b6644775383f0d6
        • Opcode Fuzzy Hash: 01a20a6393f6cf1e01e81d8ef9af866549bd590d312b5bd55c7394e971cc1238
        • Instruction Fuzzy Hash: 70F0B4B2B04201AFDB00EBA19E49AAF36589B40348F14443BB142F50C2D6BC4941AB6D
        APIs
        • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe",00000000,00000000,00403498,004032EB,00000000), ref: 004034DA
        • GlobalFree.KERNEL32(00000000), ref: 004034E1
        Strings
        • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe", xrefs: 004034D2
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: Free$GlobalLibrary
        • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"
        • API String ID: 1100898210-4288195720
        • Opcode ID: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
        • Instruction ID: a7ab284cabc648ba81e11ba063b903b3b671d5f7e61a69f5101281db245b6d62
        • Opcode Fuzzy Hash: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
        • Instruction Fuzzy Hash: E1E08C329110209BD6221F05AE0575A7B6D6B44B32F02802AE9407B2A087746C424BDD
        APIs
        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,80000000,00000003), ref: 0040554C
        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe,80000000,00000003), ref: 0040555A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: CharPrevlstrlen
        • String ID: C:\Users\user\Desktop
        • API String ID: 2709904686-1246513382
        • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
        • Instruction ID: fca702df0190f5d4796b13fce4c8f5ccfdab60c3fa8ed772e71c257c4247ae30
        • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
        • Instruction Fuzzy Hash: 39D0A772508EB07EE70366149C00B9F7A88CF13340F094462E040A61D4C27C4D418FFD
        APIs
        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405678
        • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 00405686
        • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
        Memory Dump Source
        • Source File: 00000000.00000002.2064108994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2064095141.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064122993.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064136165.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2064185192.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: lstrlen$CharNextlstrcmpi
        • String ID:
        • API String ID: 190613189-0
        • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
        • Instruction ID: fee4d645b7b415a6dc1afaac75e8b1817c7eae67fc86a6e8a33b60f3285d70db
        • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
        • Instruction Fuzzy Hash: 05F0A736309D519AC2125B295C04A6F6A98EF91314B58097AF444F2140E33A9C119BBF

        Execution Graph

        Execution Coverage:2.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:3.3%
        Total number of Nodes:1815
        Total number of Limit Nodes:15
        execution_graph 6911 401000 RegisterServiceCtrlHandlerA SetServiceStatus 6912 401044 6911->6912 6913 40105a 6912->6913 6914 40104d Sleep 6912->6914 6917 403218 6913->6917 6914->6912 6916 401065 SetServiceStatus 6918 403223 Sleep 6917->6918 6918->6918 6919 403230 6918->6919 6922 403240 6919->6922 6921 403236 WSACleanup 6921->6916 6923 403254 6922->6923 6924 40325a free 6923->6924 6925 403264 6923->6925 6924->6923 6926 403271 6925->6926 6930 407227 6925->6930 6928 40327a free 6926->6928 6929 40327e free 6926->6929 6928->6929 6929->6921 6931 407237 6930->6931 6932 40722e 6930->6932 6931->6926 6934 408839 6932->6934 6935 408850 6934->6935 6936 40884c free 6934->6936 6937 408857 free 6935->6937 6938 40885b 6935->6938 6936->6935 6937->6938 6939 408861 free 6938->6939 6940 408865 6938->6940 6939->6940 6945 40d173 6940->6945 6943 408877 free 6944 40887b 6943->6944 6944->6931 6946 408873 6945->6946 6949 40d17c 6945->6949 6946->6943 6946->6944 6947 40d18e free 6947->6949 6948 40d198 free 6948->6949 6949->6946 6949->6947 6949->6948 6950 40d1a0 free 6949->6950 6950->6949 8721 4114c1 recv 8722 4114dc WSAGetLastError 8721->8722 8723 4114e8 8721->8723 8722->8723 8724 408620 8725 40865d 8724->8725 8736 410883 8725->8736 8727 4086ab 8756 410987 8727->8756 8730 410987 3 API calls 8731 4086f3 8730->8731 8732 410987 3 API calls 8731->8732 8733 408705 8732->8733 8768 410a26 8733->8768 8737 4108a1 8736->8737 8738 4108a9 memcpy 8737->8738 8739 4108b8 8737->8739 8740 410908 memset 8738->8740 8741 4108c2 8739->8741 8742 4108d7 8739->8742 8744 410924 8740->8744 8743 40ed8d memcpy 8741->8743 8745 4108f0 8742->8745 8746 4108db 8742->8746 8747 4108cc 8743->8747 8744->8727 8744->8744 8745->8740 8798 416443 8745->8798 8748 40f673 memcpy 8746->8748 8750 40f58d 5 API calls 8747->8750 8751 4108e5 8748->8751 8753 4108d3 8750->8753 8754 4107a2 5 API calls 8751->8754 8753->8740 8754->8753 8757 410997 8756->8757 8758 41099d 8756->8758 8814 4109dc 8757->8814 8760 4109b5 8758->8760 8761 4109a7 8758->8761 8763 4109b9 8760->8763 8765 4109c7 8760->8765 8762 40ed8d memcpy 8761->8762 8766 4086bd memcpy 8762->8766 8764 40f673 memcpy 8763->8764 8764->8766 8765->8766 8767 416443 memcpy 8765->8767 8766->8730 8767->8766 8769 410a35 8768->8769 8770 410a3b 8768->8770 8771 4109dc 3 API calls 8769->8771 8772 410a45 8770->8772 8773 410a76 8770->8773 8771->8770 8776 40f58d 5 API calls 8772->8776 8774 410aab 8773->8774 8775 410a7a 8773->8775 8781 41688f 5 API calls 8774->8781 8794 408714 8774->8794 8777 4107a2 5 API calls 8775->8777 8778 410a52 8776->8778 8779 410a87 8777->8779 8780 40ed8d memcpy 8778->8780 8782 40f673 memcpy 8779->8782 8783 410a61 8780->8783 8784 410abc 8781->8784 8785 410a96 8782->8785 8786 40ed8d memcpy 8783->8786 8787 416443 memcpy 8784->8787 8789 40f673 memcpy 8785->8789 8790 410a6a 8786->8790 8788 410acb 8787->8788 8791 416443 memcpy 8788->8791 8792 410a9f 8789->8792 8793 40f58d 5 API calls 8790->8793 8795 410ad4 8791->8795 8796 4107a2 5 API calls 8792->8796 8793->8794 8797 41688f 5 API calls 8795->8797 8796->8794 8797->8794 8799 4108fe 8798->8799 8801 416454 8798->8801 8802 41688f 8799->8802 8800 416462 memcpy 8800->8801 8801->8799 8801->8800 8803 4168ac 8802->8803 8804 4168e5 memset 8803->8804 8805 4168bc memset 8803->8805 8812 4164b0 8804->8812 8808 4168dc 8805->8808 8807 416914 memcpy memcpy 8809 416938 8807->8809 8808->8804 8810 416955 memcpy 8809->8810 8811 416969 8810->8811 8811->8753 8813 4164b9 8812->8813 8813->8807 8815 4109f9 8814->8815 8816 4109eb 8814->8816 8818 4109fd 8815->8818 8821 410a0b 8815->8821 8817 40ed8d memcpy 8816->8817 8820 4109f7 8817->8820 8819 40f673 memcpy 8818->8819 8819->8820 8820->8758 8821->8820 8822 416443 memcpy 8821->8822 8822->8820 8823 416b81 _exit 8824 416b8e _ftol 8823->8824 8825 415063 8826 415095 8825->8826 8827 41507d 8825->8827 8830 41375e realloc 8826->8830 8831 4150a4 8826->8831 8827->8826 8828 415084 8827->8828 8834 414ecf 8828->8834 8830->8831 8833 415090 8831->8833 8840 414842 8831->8840 8835 414edc 8834->8835 8836 41375e realloc 8835->8836 8838 414ef8 8835->8838 8836->8838 8837 415059 8837->8833 8838->8837 8839 414842 realloc 8838->8839 8839->8837 8841 41485f 8840->8841 8843 414866 8840->8843 8842 41375e realloc 8841->8842 8842->8843 8843->8833 8844 401082 8845 40108b SetServiceStatus 8844->8845 8847 4151a3 8848 4151be 8847->8848 8851 4151c5 8847->8851 8849 41375e realloc 8848->8849 8849->8851 8850 41525f 8851->8850 8852 414842 realloc 8851->8852 8852->8851 8853 409ac3 8854 409b01 8853->8854 8855 409b50 8854->8855 8856 409bea 8854->8856 8857 40ed8d memcpy 8855->8857 8858 40f673 memcpy 8856->8858 8859 409b64 8857->8859 8860 409c04 8858->8860 8861 40ed8d memcpy 8859->8861 8862 40f673 memcpy 8860->8862 8863 409b75 8861->8863 8864 409c18 8862->8864 8865 40ed8d memcpy 8863->8865 8866 40f673 memcpy 8864->8866 8867 409b84 8865->8867 8868 409c2a 8866->8868 8869 40ed8d memcpy 8867->8869 8870 40f673 memcpy 8868->8870 8871 409b93 8869->8871 8872 409c3c 8870->8872 8873 40ed8d memcpy 8871->8873 8874 40f673 memcpy 8872->8874 8876 409ba2 8873->8876 8875 409c4e 8874->8875 8877 4107a2 5 API calls 8875->8877 8878 40f58d 5 API calls 8876->8878 8879 409c5e 8877->8879 8880 409baf 8878->8880 8881 40f673 memcpy 8879->8881 8882 40ed8d memcpy 8880->8882 8883 409c6c 8881->8883 8884 409bba 8882->8884 8885 40f673 memcpy 8883->8885 8886 40ed8d memcpy 8884->8886 8887 409c80 8885->8887 8888 409bcb 8886->8888 8890 40f673 memcpy 8887->8890 8889 40ed8d memcpy 8888->8889 8891 409bd9 8889->8891 8892 409c91 8890->8892 8893 40f58d 5 API calls 8891->8893 8894 4107a2 5 API calls 8892->8894 8895 409be5 8893->8895 8894->8895 8896 415268 8897 4135cd malloc 8896->8897 8900 415277 8897->8900 8898 4152ed 8900->8898 8901 4152e4 8900->8901 8905 414842 realloc 8900->8905 8906 4137d2 8900->8906 8918 41539c 8900->8918 8922 41476a 8900->8922 8902 4135fb free 8901->8902 8902->8898 8905->8900 8907 4137e0 8906->8907 8908 413802 8906->8908 8910 413703 realloc 8907->8910 8909 4135cd malloc 8908->8909 8911 41380b 8909->8911 8916 4137eb 8910->8916 8912 413826 8911->8912 8911->8916 8926 4139a7 8911->8926 8914 413703 realloc 8912->8914 8917 41382a 8912->8917 8914->8917 8915 4135fb free 8915->8916 8916->8900 8917->8915 8917->8917 8919 4153b1 8918->8919 8920 4153b8 8918->8920 8921 41375e realloc 8919->8921 8920->8900 8921->8920 8923 414781 8922->8923 8924 41375e realloc 8923->8924 8925 4147a9 8923->8925 8924->8925 8925->8900 8927 4139bf 8926->8927 8932 4139b3 8926->8932 8928 4139d6 8927->8928 8929 4139cb 8927->8929 8931 413703 realloc 8928->8931 8930 413703 realloc 8929->8930 8930->8932 8931->8932 8932->8912 8933 4039ad 8934 4039b2 GetCurrentThreadId 8933->8934 8698 416a2f __set_app_type __p__fmode __p__commode 8699 416a9e 8698->8699 8700 416ab2 8699->8700 8701 416aa6 __setusermatherr 8699->8701 8710 416c2c _controlfp 8700->8710 8701->8700 8703 416ab7 _initterm __getmainargs _initterm 8704 416b0b GetStartupInfoA 8703->8704 8706 416b3f GetModuleHandleA 8704->8706 8711 4010b2 8706->8711 8710->8703 8717 4011c1 8711->8717 8713 4010c0 9 API calls 8714 401197 GetMessageA 8713->8714 8715 4011ba exit _XcptFilter 8714->8715 8716 40119d TranslateMessage DispatchMessageA 8714->8716 8716->8714 8720 401bd3 8717->8720 8719 4011c6 _snprintf 8719->8713 8720->8719 8935 415fb0 8957 4136e6 8935->8957 8937 4160b6 8938 415fca 8938->8937 8939 415fe8 8938->8939 8940 415ffa 8938->8940 8962 4154d1 8939->8962 8969 416194 8940->8969 8943 4160ad 8944 4135fb free 8943->8944 8944->8937 8945 415ff8 8945->8943 8946 4139a7 realloc 8945->8946 8947 41602d 8946->8947 8947->8943 8978 4159f1 8947->8978 8951 416055 8951->8943 8952 413b5c realloc 8951->8952 8956 41608d 8951->8956 8953 41607c 8952->8953 8953->8943 8993 414715 8953->8993 8954 414842 realloc 8954->8956 8956->8943 8956->8954 8958 4135cd malloc 8957->8958 8959 4136ef 8958->8959 8960 413700 8959->8960 8961 413703 realloc 8959->8961 8960->8938 8961->8960 8963 415513 8962->8963 8964 4154f7 8962->8964 8965 4159f1 3 API calls 8963->8965 8964->8963 8966 415504 8964->8966 8967 415511 8965->8967 8999 415773 8966->8999 8967->8945 8970 4161d1 8969->8970 8971 4161b2 8969->8971 9007 4155ca malloc 8970->9007 8971->8970 8973 4161bf 8971->8973 9003 4162c6 8973->9003 8974 4161cc 8974->8945 8976 4161db 8976->8974 8977 4135fb free 8976->8977 8977->8974 8979 415a0b 8978->8979 8980 415a2c 8978->8980 8979->8980 8982 415a1c 8979->8982 8981 4155ca malloc 8980->8981 8985 415a36 8981->8985 8984 415773 realloc 8982->8984 8983 415a27 8983->8943 8987 414908 8983->8987 8984->8983 8985->8983 8986 4135fb free 8985->8986 8986->8983 8988 41491c 8987->8988 8991 41492c 8987->8991 8989 41476a realloc 8988->8989 8990 41492a 8989->8990 8990->8951 8992 414842 realloc 8991->8992 8992->8990 8994 41473e 8993->8994 8995 41472e 8993->8995 8998 414842 realloc 8994->8998 8996 41476a realloc 8995->8996 8997 41473c 8996->8997 8997->8956 8998->8997 9000 415789 8999->9000 9002 415790 8999->9002 9001 41375e realloc 9000->9001 9001->9002 9002->8967 9002->9002 9004 4162e3 9003->9004 9006 4162ea 9003->9006 9005 41375e realloc 9004->9005 9005->9006 9006->8974 9008 4155eb 9007->9008 9008->8976 9009 40d415 9010 40d45a 9009->9010 9011 40d46c memcpy 9009->9011 9010->9011 9012 40d464 9010->9012 9014 40d490 9011->9014 9013 40d926 memcpy 9013->9012 9014->9013 9015 411514 send 9016 411530 WSAGetLastError 9015->9016 9019 411553 9015->9019 9017 41153e WSAGetLastError 9016->9017 9016->9019 9018 411547 WSAGetLastError 9017->9018 9017->9019 9018->9019 9020 411557 WSAGetLastError 9018->9020 9020->9019 9021 411567 WSAGetLastError 9020->9021 9021->9019 9022 405317 9023 405328 9022->9023 9024 405358 strcmp 9023->9024 9025 40533d 9023->9025 9024->9025 6951 4011dd __p___argv 6952 401206 6951->6952 6953 40137f __p___argv 6951->6953 6954 401211 6952->6954 6955 401333 6952->6955 6956 401388 __p___argv strcmp 6953->6956 6957 4013bd __p___argv __p___argc 6953->6957 6959 4013ce DefWindowProcA 6954->6959 6968 40123f CreatePopupMenu AppendMenuA AppendMenuA 6954->6968 6961 40133c 6955->6961 6962 40135e 6955->6962 6956->6957 6960 4013a0 6956->6960 6958 4013e6 673 API calls 6957->6958 6958->6959 6977 4013e6 6960->6977 6965 401341 6961->6965 6966 401357 6961->6966 6963 403218 12 API calls 6962->6963 6969 401369 Shell_NotifyIconA PostQuitMessage 6963->6969 6965->6959 6971 40134f 6965->6971 7010 401919 fopen 6966->7010 6998 4019db OpenSCManagerA 6968->6998 6969->6959 6974 4019db 14 API calls 6971->6974 6972 401355 6972->6959 6974->6972 6975 40126f 12 API calls 6975->6959 6978 4013f9 6977->6978 6979 40142f 6977->6979 6978->6979 6987 401412 6978->6987 6988 40140d 6978->6988 6980 401460 6979->6980 6981 401435 strcmp 6979->6981 7019 401646 6980->7019 6982 401448 strcmp 6981->6982 6983 40145b 6981->6983 6982->6980 6982->6983 6985 40156d 32 API calls 6983->6985 6985->6980 7108 401528 6987->7108 7080 40156d 6988->7080 6994 4014bc 6995 4013ab StartServiceCtrlDispatcherA exit 6994->6995 7115 4014e5 _vsnprintf MessageBoxA exit 6994->7115 6995->6957 6996 4014aa free 6996->6994 6996->6996 6999 401a29 6998->6999 7009 401a1c 6998->7009 7000 401aa9 6999->7000 7001 401a2f GetModuleFileNameA strncat strncat CreateServiceA 6999->7001 7004 401adb OpenServiceA 7000->7004 7005 401aaf OpenServiceA 7000->7005 7003 401a9a ChangeServiceConfig2A 7001->7003 7001->7009 7007 401af3 CloseServiceHandle CloseServiceHandle 7003->7007 7006 401a24 7004->7006 7004->7007 7008 401acb DeleteService 7005->7008 7005->7009 7006->7007 7007->6975 7008->7007 7008->7009 8694 401b0a GetLastError FormatMessageA MessageBoxA 7009->8694 7011 401945 fopen 7010->7011 7012 40193b fclose 7010->7012 7013 4019ab _snprintf WinExec 7011->7013 7014 401955 fprintf 7011->7014 7012->7013 7013->6972 7017 40196b 7014->7017 7015 4019a2 fclose 7015->7013 7017->7015 7018 401989 fprintf 7017->7018 8695 401b58 7017->8695 7018->7015 7018->7017 7020 40166c 7019->7020 7021 40168d strrchr 7019->7021 7020->7021 7022 401671 _snprintf 7020->7022 7021->7022 7023 4016a4 _snprintf 7021->7023 7025 4016ca fopen 7022->7025 7023->7025 7026 4016e0 7025->7026 7033 401704 7025->7033 7027 401711 fprintf fgets 7026->7027 7028 4016ea _errno strerror 7026->7028 7026->7033 7039 401741 7027->7039 7129 4014e5 _vsnprintf MessageBoxA exit 7028->7129 7029 40146e signal signal 7042 403289 WSAStartup calloc 7029->7042 7031 4017c8 7031->7029 7034 4017dc 7031->7034 7038 401801 11 API calls 7031->7038 7032 4017bb fclose 7032->7031 7033->7027 7033->7031 7036 40156d 32 API calls 7034->7036 7035 4017a9 fgets 7035->7039 7036->7031 7037 40175a sscanf 7037->7039 7038->7031 7039->7032 7039->7035 7039->7037 7116 401801 strcmp 7039->7116 7130 4014e5 _vsnprintf MessageBoxA exit 7039->7130 7047 4032c1 7042->7047 7043 403350 7143 4039b8 7043->7143 7048 403320 7047->7048 7056 4032f4 7047->7056 7173 401b7e 7047->7173 7178 403408 strlen 7047->7178 7048->7043 7052 403408 2 API calls 7048->7052 7049 403311 7051 403240 10 API calls 7049->7051 7054 401494 7051->7054 7052->7048 7053 403360 7053->7049 7147 4034cd 7053->7147 7054->6994 7054->6996 7181 401e9e _vsnprintf 7056->7181 7063 403378 7172 403448 CreateMutexA 7063->7172 7065 403384 7228 403467 CreateEventA CreateEventA 7065->7228 7068 403467 2 API calls 7069 40339b 7068->7069 7070 403467 2 API calls 7069->7070 7071 4033a8 7070->7071 7230 40349d CreateThread 7071->7230 7074 403401 7074->7054 7075 40349d 476 API calls 7078 4033c6 7075->7078 7076 4033d6 GetLastError 7076->7078 7077 4033f6 atoi 7077->7074 7077->7078 7078->7075 7078->7076 7078->7077 7079 401e9e 15 API calls 7078->7079 7079->7078 8653 401bd3 7080->8653 7082 401573 6 API calls 7084 4015e2 7082->7084 7083 40161a fprintf fprintf exit 7086 401646 7083->7086 7084->7083 7085 4015f7 fprintf 7084->7085 7085->7084 7088 401619 7085->7088 7087 40168d strrchr 7086->7087 7089 401671 _snprintf 7086->7089 7087->7089 7090 4016a4 _snprintf 7087->7090 7088->7083 7092 4016ca fopen 7089->7092 7090->7092 7093 4016e0 7092->7093 7094 401704 7092->7094 7093->7094 7095 401711 fprintf fgets 7093->7095 7096 4016ea _errno strerror 7093->7096 7094->7095 7100 4017c8 7094->7100 7105 401741 7095->7105 8654 4014e5 _vsnprintf MessageBoxA exit 7096->8654 7097 4017fa 7097->6987 7099 4017bb fclose 7099->7100 7100->7097 7102 40156d 11 API calls 7100->7102 7104 401801 11 API calls 7100->7104 7101 4017a9 fgets 7101->7105 7102->7100 7103 40175a sscanf 7103->7105 7104->7100 7105->7099 7105->7101 7105->7103 7107 401801 11 API calls 7105->7107 8655 4014e5 _vsnprintf MessageBoxA exit 7105->8655 7107->7101 7109 403289 605 API calls 7108->7109 7110 40154c 7109->7110 8656 402f6b 7110->8656 7113 403218 12 API calls 7114 401423 exit 7113->7114 7114->6979 7117 401817 strcmp 7116->7117 7118 40182a 7116->7118 7117->7118 7119 401832 7117->7119 7131 401883 strchr 7118->7131 7121 40184b 7119->7121 7125 401849 7119->7125 7138 4018ed strlen malloc 7121->7138 7124 4018ed 3 API calls 7127 40185e 7124->7127 7126 40187d 7125->7126 7141 4014e5 _vsnprintf MessageBoxA exit 7125->7141 7126->7035 7127->7125 7132 4018a2 7131->7132 7133 4018c3 _stat 7131->7133 7132->7133 7135 4018ab strncpy 7132->7135 7134 4018d4 7133->7134 7136 4018e5 7134->7136 7142 4014e5 _vsnprintf MessageBoxA exit 7134->7142 7135->7133 7136->7119 7139 401853 7138->7139 7140 401907 strcpy 7138->7140 7139->7124 7140->7139 7144 4039c8 7143->7144 7145 403356 7143->7145 7233 4039e1 7144->7233 7145->7049 7190 4037f3 7145->7190 7152 4034e3 7147->7152 7149 40363f 7151 40336a 7149->7151 7261 4036e2 7149->7261 7151->7049 7169 403a6c 7151->7169 7152->7149 7154 4035d3 7152->7154 7155 403523 socket 7152->7155 7156 4035fb 7152->7156 7248 40365f 7152->7248 7255 40370d memset sscanf 7152->7255 7159 401e9e 15 API calls 7154->7159 7157 403585 closesocket GetLastError strerror 7155->7157 7158 403536 bind 7155->7158 7164 401e9e 15 API calls 7156->7164 7161 40356b 7157->7161 7158->7157 7160 40354a listen 7158->7160 7168 4035f6 7159->7168 7160->7157 7162 403557 calloc 7160->7162 7161->7152 7163 401e9e 15 API calls 7161->7163 7162->7161 7165 403610 closesocket GetLastError strerror 7162->7165 7163->7161 7164->7168 7166 403636 7165->7166 7167 401e9e 15 API calls 7166->7167 7167->7168 7168->7149 7265 403a8c 7169->7265 7172->7065 7174 401bc1 7173->7174 7175 401b8a 7173->7175 7174->7047 7175->7174 7176 401b91 strcmp 7175->7176 7176->7174 7177 401ba2 strcmp 7176->7177 7177->7174 7177->7175 7280 40341f malloc 7178->7280 7180 40341c 7180->7047 7182 401ed9 7181->7182 7183 401f74 7182->7183 7282 401f9f 7182->7282 7183->7049 7185 401efd 7185->7183 7186 401f03 time inet_ntoa fprintf 7185->7186 7187 401f44 fprintf fputc 7186->7187 7188 401f35 fprintf 7186->7188 7187->7183 7189 401f6c fclose 7187->7189 7188->7187 7189->7183 7191 40380d 7190->7191 7222 40387b 7190->7222 7285 407b82 7191->7285 7193 403812 7288 40873c malloc 7193->7288 7195 40381c 7290 407204 malloc 7195->7290 7197 403822 7198 403885 7197->7198 7199 403828 7197->7199 7297 407b30 7198->7297 7292 403946 7199->7292 7201 40382d 7206 401e9e 15 API calls 7201->7206 7204 4038a0 7207 403946 2 API calls 7204->7207 7205 4038c2 7300 407b4c 7205->7300 7210 40383f 7206->7210 7214 4038a5 7207->7214 7216 403847 malloc 7210->7216 7211 4038d8 7211->7210 7303 407b68 7211->7303 7212 4038cf 7213 403946 2 API calls 7212->7213 7213->7214 7219 401e9e 15 API calls 7214->7219 7218 40385f 7216->7218 7225 403900 7216->7225 7221 403946 2 API calls 7218->7221 7219->7222 7220 4038f3 7223 403946 2 API calls 7220->7223 7224 403864 7221->7224 7222->7053 7223->7214 7227 401e9e 15 API calls 7224->7227 7225->7222 7306 403448 CreateMutexA 7225->7306 7227->7222 7229 40338e 7228->7229 7229->7068 7231 4033b4 atoi 7230->7231 7232 4034ba CloseHandle 7230->7232 7697 403c80 atoi calloc 7230->7697 7711 406f4a 7230->7711 7231->7074 7231->7078 7232->7231 7237 401feb 7233->7237 7235 403a02 GetFileAttributesExW 7236 403a19 __aulldiv 7235->7236 7236->7145 7238 402008 7237->7238 7244 4020d6 7238->7244 7241 402067 fprintf 7242 40208c MultiByteToWideChar 7241->7242 7242->7235 7243 402028 7243->7241 7243->7242 7245 4020df 7244->7245 7246 402014 strlen 7244->7246 7245->7246 7247 40210a strlen memmove 7245->7247 7246->7243 7247->7245 7249 4036c3 7248->7249 7250 40366a 7248->7250 7249->7152 7250->7249 7251 40366f strchr 7250->7251 7252 403686 7251->7252 7253 40368e strlen 7251->7253 7252->7249 7254 4036a9 memchr 7252->7254 7253->7252 7254->7249 7256 403755 htonl strchr 7255->7256 7257 40376d sscanf 7255->7257 7259 4037ea 7256->7259 7260 4037ac htons 7256->7260 7257->7256 7257->7259 7259->7152 7260->7259 7262 403708 7261->7262 7263 4036ee 7261->7263 7262->7151 7264 4036ef closesocket free 7263->7264 7264->7262 7264->7264 7266 403aa7 memcpy 7265->7266 7271 403374 7265->7271 7267 40365f 3 API calls 7266->7267 7277 403acf 7267->7277 7268 403ae0 sscanf 7269 403bf6 7268->7269 7268->7277 7270 401e9e 15 API calls 7269->7270 7270->7271 7271->7049 7271->7063 7272 403c13 7273 401e9e 15 API calls 7272->7273 7273->7271 7274 403b64 sscanf 7275 403b92 htonl 7274->7275 7274->7277 7275->7277 7276 403c33 7279 401e9e 15 API calls 7276->7279 7277->7268 7277->7271 7277->7272 7277->7274 7277->7275 7277->7276 7278 40365f 3 API calls 7277->7278 7278->7277 7279->7271 7281 403436 7280->7281 7281->7180 7283 401feb 5 API calls 7282->7283 7284 401fbc MultiByteToWideChar _wfopen 7283->7284 7284->7185 7307 407eed InitializeCriticalSection 7285->7307 7287 407b87 7287->7193 7289 40874c 7288->7289 7289->7195 7291 407217 7290->7291 7291->7197 7293 40394b 7292->7293 7294 40394f 7293->7294 7308 407310 7293->7308 7294->7201 7322 407332 7297->7322 7301 407332 147 API calls 7300->7301 7302 4038cb 7301->7302 7302->7211 7302->7212 7304 407332 147 API calls 7303->7304 7305 4038eb 7304->7305 7305->7210 7305->7220 7306->7225 7307->7287 7309 407317 7308->7309 7310 40395d 7308->7310 7312 40a4a5 7309->7312 7310->7201 7313 40a4b0 7312->7313 7314 40a4c5 strncpy 7312->7314 7313->7314 7315 40a4b7 7313->7315 7318 40a4c0 7314->7318 7319 40d1b0 7315->7319 7318->7310 7320 40d1c4 strncpy 7319->7320 7320->7318 7323 4073a4 fopen 7322->7323 7324 40734d 7322->7324 7325 4073be fseek ftell fseek malloc 7323->7325 7328 40389c 7323->7328 7324->7328 7371 407760 7324->7371 7327 4073f5 fread 7325->7327 7325->7328 7329 40741c fclose 7327->7329 7330 40740c fclose 7327->7330 7328->7204 7328->7205 7341 407426 7329->7341 7332 40738c 7330->7332 7332->7328 7333 407395 free 7332->7333 7333->7328 7334 407613 7334->7328 7337 40767d 7334->7337 7338 40762e 7334->7338 7335 4074ef 7437 407696 7335->7437 7337->7328 7339 407682 free 7337->7339 7476 40c18d 7338->7476 7339->7328 7341->7328 7369 4074e5 7341->7369 7413 408099 7341->7413 7344 407674 7348 40bb66 free 7344->7348 7345 40766b 7494 40bb66 7345->7494 7348->7328 7349 40749d strncmp 7350 407500 strncmp 7349->7350 7351 4074ba 7349->7351 7353 407546 strncmp 7350->7353 7354 407519 7350->7354 7427 40e490 7351->7427 7357 40755c 7353->7357 7358 40758e strncmp 7353->7358 7449 40e5f9 7354->7449 7355 4074d0 7430 40e98f 7355->7430 7463 40d44d 7357->7463 7360 4075a4 7358->7360 7361 4075cd strncmp 7358->7361 7365 40d44d 2 API calls 7360->7365 7361->7328 7366 4075e7 7361->7366 7362 40752f 7456 40eb38 7362->7456 7364 407574 7469 40e423 7364->7469 7365->7364 7368 40d44d 2 API calls 7366->7368 7368->7364 7369->7334 7369->7335 7372 4077a2 strncpy 7371->7372 7373 407785 strncpy 7371->7373 7374 4077bd strncpy fopen 7372->7374 7373->7374 7375 4077e6 fgets 7374->7375 7412 407384 7374->7412 7377 4077fc strlen strncmp 7375->7377 7378 40783d 7375->7378 7377->7375 7379 40782a ftell 7377->7379 7380 4078c2 fgets 7378->7380 7381 407843 strncpy strncpy fseek fgets 7378->7381 7379->7378 7379->7380 7382 4078d6 strlen strncmp 7380->7382 7383 407a09 fgets 7380->7383 7384 40787a 7381->7384 7386 407905 fgets 7382->7386 7387 407a06 7382->7387 7385 407a15 7383->7385 7384->7380 7388 40787e strlen strncmp 7384->7388 7389 407a19 strlen strncmp 7385->7389 7390 407a56 7385->7390 7386->7387 7391 40791b strstr strstr 7386->7391 7387->7383 7392 4078b1 ftell 7388->7392 7393 4078a4 fgets 7388->7393 7389->7390 7394 407a3e ftell fgets 7389->7394 7395 407b1e fclose 7390->7395 7398 407a71 malloc 7390->7398 7396 407956 7391->7396 7397 407946 strstr 7391->7397 7392->7380 7393->7384 7394->7385 7395->7412 7404 40797f strstr memcpy memcpy 7396->7404 7396->7412 7397->7396 7399 407a92 fseek fread 7398->7399 7400 407a88 7398->7400 7402 407b03 free 7399->7402 7403 407ab3 malloc 7399->7403 7401 407b12 fclose 7400->7401 7401->7412 7402->7401 7403->7402 7405 407ac1 7403->7405 7406 4079d8 7404->7406 7407 4079bd strstr 7404->7407 7409 407ad9 free fclose 7405->7409 7408 4079e1 fgets ftell 7406->7408 7406->7412 7407->7406 7407->7412 7408->7387 7410 407af2 7409->7410 7409->7412 7410->7412 7512 40c269 7410->7512 7412->7332 7412->7341 7516 40ed60 7413->7516 7415 4080af strncmp 7416 4080cc strncmp 7415->7416 7417 407491 7415->7417 7418 4080e8 strncmp 7416->7418 7421 4080e0 7416->7421 7417->7328 7417->7349 7419 408105 strncmp 7418->7419 7418->7421 7420 40811a strncmp 7419->7420 7419->7421 7420->7421 7422 40812f strncmp 7420->7422 7421->7417 7423 40ed8d memcpy 7421->7423 7424 40f58d memset memset memcpy memcpy memcpy 7421->7424 7425 4081df memcpy 7421->7425 7426 408211 memcpy 7421->7426 7422->7417 7422->7421 7423->7421 7424->7421 7425->7421 7426->7421 7517 40e4bc 7427->7517 7431 40e9a2 7430->7431 7436 40ea14 7430->7436 7432 40e9b5 memcpy 7431->7432 7521 40e7d9 memcpy memcpy 7432->7521 7434 40e9cc 7435 40e9dc memcpy memcpy memcpy 7434->7435 7435->7432 7435->7436 7436->7369 7438 4076ba 7437->7438 7524 40c668 7438->7524 7441 4076e7 7541 40c44d 7441->7541 7446 4076f0 memcpy 7446->7441 7447 407745 free 7448 40774f 7447->7448 7448->7328 7450 40e4bc memset 7449->7450 7451 40e61b 7450->7451 7452 40e4bc memset 7451->7452 7453 40e633 7452->7453 7454 40e4bc memset 7453->7454 7455 40e64b memcpy 7454->7455 7455->7362 7457 40eb9f 7456->7457 7458 40eb48 7456->7458 7457->7369 7459 40eb57 memcpy 7458->7459 7652 40ea6d memcpy memcpy 7459->7652 7461 40eb6f 7462 40eb80 memcpy 7461->7462 7462->7457 7462->7459 7464 40d45a 7463->7464 7465 40d46c memcpy 7463->7465 7464->7465 7466 40d464 7464->7466 7468 40d490 7465->7468 7466->7364 7467 40d926 memcpy 7467->7466 7468->7467 7470 40e433 7469->7470 7475 40e48a 7469->7475 7471 40e442 memcpy 7470->7471 7655 40de89 memcpy memcpy memcpy memcpy 7471->7655 7473 40e45a 7474 40e46b memcpy 7473->7474 7474->7471 7474->7475 7475->7369 7477 40c1a6 7476->7477 7480 407660 7477->7480 7658 40c105 7477->7658 7480->7344 7480->7345 7481 40c105 3 API calls 7482 40c1fb 7481->7482 7482->7480 7483 40c105 3 API calls 7482->7483 7484 40c20a 7483->7484 7484->7480 7485 40c105 3 API calls 7484->7485 7486 40c219 7485->7486 7486->7480 7487 40c105 3 API calls 7486->7487 7488 40c228 7487->7488 7488->7480 7489 40c105 3 API calls 7488->7489 7490 40c237 7489->7490 7490->7480 7491 40c105 3 API calls 7490->7491 7492 40c246 7491->7492 7492->7480 7493 40c105 3 API calls 7492->7493 7493->7480 7495 40bb74 7494->7495 7496 40bbaa 7494->7496 7497 4135fb free 7495->7497 7498 4135fb free 7496->7498 7499 40bb7d 7497->7499 7500 40bbb3 7498->7500 7501 4135fb free 7499->7501 7502 4135fb free 7500->7502 7504 40bb86 7501->7504 7503 40bbb9 7502->7503 7503->7328 7505 4135fb free 7504->7505 7506 40bb8f 7505->7506 7507 4135fb free 7506->7507 7508 40bb98 7507->7508 7509 4135fb free 7508->7509 7510 40bba1 7509->7510 7511 4135fb free 7510->7511 7511->7496 7514 40c286 7512->7514 7513 40c2da 7513->7412 7514->7513 7515 40c2f2 memmove 7514->7515 7515->7513 7516->7415 7519 40e4c6 7517->7519 7518 40e4f8 memset 7518->7519 7519->7518 7520 40e4a3 memcpy 7519->7520 7520->7355 7522 40e807 7521->7522 7523 40e852 memcpy memcpy 7522->7523 7523->7434 7551 40c757 7524->7551 7527 40c6c7 7530 40c6f6 7527->7530 7531 40c6ce malloc 7527->7531 7528 40c69b malloc 7529 40c6aa memcpy 7528->7529 7537 4076cf 7528->7537 7529->7527 7532 40c6fd malloc 7530->7532 7533 40c71e 7530->7533 7534 40c6d9 memcpy 7531->7534 7531->7537 7535 40c707 memcpy 7532->7535 7532->7537 7536 40c725 malloc 7533->7536 7533->7537 7534->7530 7535->7533 7536->7537 7538 40c734 memcpy 7536->7538 7537->7441 7539 40d159 malloc 7537->7539 7538->7537 7540 4076e1 7539->7540 7540->7441 7540->7446 7542 40c46a 7541->7542 7543 40c45f 7541->7543 7545 40c47b 7542->7545 7546 40c477 free 7542->7546 7543->7542 7544 40c466 free 7543->7544 7544->7542 7547 40c48c 7545->7547 7548 40c488 free 7545->7548 7546->7545 7549 407740 7547->7549 7550 40c498 free 7547->7550 7548->7547 7549->7447 7549->7448 7550->7549 7558 40c801 7551->7558 7553 40c76c 7554 40c683 7553->7554 7555 40c7c6 memcmp 7553->7555 7554->7527 7554->7528 7554->7537 7555->7553 7556 40c7e2 7555->7556 7567 40cff1 7556->7567 7588 40c85e 7558->7588 7560 40c810 7566 40c850 7560->7566 7594 40c9fe 7560->7594 7565 40c9fe 12 API calls 7565->7566 7566->7553 7568 40d00a 7567->7568 7570 40d044 7567->7570 7611 40ed8d 7568->7611 7569 40d14c 7569->7554 7570->7569 7623 40f673 7570->7623 7577 40d03b 7577->7569 7637 40c3a8 7577->7637 7580 40d0d7 memcpy 7643 40bf26 7580->7643 7581 40d139 7584 40bb66 free 7581->7584 7583 40d106 7583->7581 7646 40c4a1 7583->7646 7584->7569 7586 40d11e 7586->7581 7587 40d122 memcmp 7586->7587 7587->7581 7589 40c88a 7588->7589 7590 40c105 malloc free realloc 7589->7590 7593 40c89a 7589->7593 7591 40c8e7 7590->7591 7592 4135fb free 7591->7592 7592->7593 7593->7560 7603 40ca14 7594->7603 7595 40c836 7595->7566 7605 40ccae 7595->7605 7596 40cc86 7597 4107a2 memset memset memcpy memcpy memcpy 7596->7597 7597->7595 7598 40caac memcpy 7598->7603 7599 40cc3a memcpy memcpy 7599->7603 7600 40cbb0 memcpy 7602 40cbc1 memcpy 7600->7602 7601 40cb69 memcpy 7601->7602 7602->7603 7603->7595 7603->7596 7603->7598 7603->7599 7603->7600 7603->7601 7604 40f673 memcpy 7603->7604 7604->7603 7606 40cccb 7605->7606 7607 40c844 7606->7607 7608 40cd0f memcpy time memset gmtime 7606->7608 7607->7565 7607->7566 7609 40ccde 7608->7609 7609->7607 7610 40cd0f memcpy time memset gmtime 7609->7610 7610->7607 7612 40d02e 7611->7612 7614 40ed9b 7611->7614 7615 40f58d 7612->7615 7613 40eda7 memcpy 7613->7614 7614->7612 7614->7613 7616 40f5a5 7615->7616 7617 40f5b8 memset 7616->7617 7618 40f5da memset memcpy memcpy 7616->7618 7619 40f5d8 7617->7619 7620 40edee 7618->7620 7619->7618 7621 40f621 memcpy 7620->7621 7622 40f639 7621->7622 7622->7577 7625 40d07a 7623->7625 7626 40f684 7623->7626 7624 40f692 memcpy 7624->7626 7627 4107a2 7625->7627 7626->7624 7626->7625 7628 4107bf 7627->7628 7629 4107f8 memset 7628->7629 7630 4107cf memset 7628->7630 7631 40f6e0 7629->7631 7633 4107ef 7630->7633 7632 410827 memcpy memcpy 7631->7632 7634 41084b 7632->7634 7633->7629 7635 410868 memcpy 7634->7635 7636 41087c 7635->7636 7636->7577 7639 40c3bf 7637->7639 7638 40c3c3 7638->7580 7638->7581 7639->7638 7640 40c105 malloc free realloc 7639->7640 7641 40c3ef 7640->7641 7641->7638 7642 40c105 malloc free realloc 7641->7642 7642->7638 7644 40bc94 malloc free realloc malloc 7643->7644 7645 40bf40 7644->7645 7645->7583 7647 40c514 memcpy 7646->7647 7648 40c4b9 7647->7648 7649 40c5c5 memcpy memcpy memcpy 7648->7649 7650 40c4c7 7649->7650 7651 40c4d6 memcpy memcpy memcpy 7650->7651 7651->7586 7653 40ea9b 7652->7653 7654 40eb0f memcpy memcpy 7653->7654 7654->7461 7656 40dee4 7655->7656 7657 40e389 memcpy memcpy memcpy memcpy 7656->7657 7657->7473 7659 40c133 7658->7659 7660 40c121 7658->7660 7659->7480 7659->7481 7660->7659 7666 4135cd malloc 7660->7666 7664 40c168 7664->7659 7674 4135fb 7664->7674 7667 40c157 7666->7667 7668 413a32 7667->7668 7669 413a3f 7668->7669 7671 413a47 7668->7671 7678 41375e 7669->7678 7672 413a7f 7671->7672 7681 413a8d 7671->7681 7672->7664 7675 413608 7674->7675 7677 413628 7674->7677 7676 413620 free 7675->7676 7675->7677 7676->7677 7677->7659 7679 41376d realloc 7678->7679 7680 413784 7678->7680 7679->7680 7680->7671 7682 413aa5 7681->7682 7683 413a9c 7681->7683 7684 413acc 7682->7684 7686 41375e realloc 7682->7686 7688 413ae0 7682->7688 7689 413703 7683->7689 7684->7688 7693 413b5c 7684->7693 7686->7684 7688->7671 7690 413711 7689->7690 7691 41371f 7689->7691 7690->7691 7692 41375e realloc 7690->7692 7691->7682 7692->7691 7694 413b66 7693->7694 7695 413b6a 7693->7695 7694->7688 7695->7694 7696 41375e realloc 7695->7696 7696->7694 7698 403cb8 7697->7698 7699 403d47 free 7698->7699 7704 403cd2 time htons memcpy htonl 7698->7704 7736 406e61 7698->7736 7745 402463 7698->7745 7748 403e1e strcmp 7698->7748 7768 403d86 7698->7768 7774 403982 WaitForSingleObject 7699->7774 7702 403d58 7775 403d70 SetEvent 7702->7775 7704->7698 7705 403d64 7776 403997 ReleaseMutex 7705->7776 7709 403d6a 7721 406f5b 7711->7721 7712 406fe3 7713 4036e2 2 API calls 7712->7713 7714 406fe9 7713->7714 8632 40705e PulseEvent 7714->8632 7715 406f8b select 7716 406fb1 Sleep 7715->7716 7715->7721 7716->7721 7718 406ff5 8633 403982 WaitForSingleObject 7718->8633 7719 406fc5 __WSAFDIsSet 7719->7721 7721->7712 7721->7715 7721->7719 8621 4070dd accept 7721->8621 7722 406ffe 7723 40700f 7722->7723 8634 406f07 ReleaseMutex WaitForMultipleObjects ReleaseMutex 7722->8634 8635 403997 ReleaseMutex 7723->8635 7727 407014 8636 407048 CloseHandle 7727->8636 7729 40701a 8637 407075 CloseHandle 7729->8637 7732 407075 2 API calls 7733 40702f 7732->7733 7734 407075 2 API calls 7733->7734 7735 40703b 7734->7735 7777 403982 WaitForSingleObject 7736->7777 7738 406e76 7739 406e9f 7738->7739 7740 406ef3 7738->7740 7778 406f07 ReleaseMutex WaitForMultipleObjects ReleaseMutex 7738->7778 7739->7740 7779 403d70 SetEvent 7739->7779 7780 403997 ReleaseMutex 7740->7780 7743 406efe 7743->7698 7781 40723a malloc 7745->7781 7747 402476 7747->7698 7758 403e44 7748->7758 7752 403fcb 7941 404029 7752->7941 7753 403fe0 7753->7698 7756 403ee5 strcmp 7757 403ef8 strcmp 7756->7757 7756->7758 7757->7758 7758->7752 7758->7753 7758->7756 7760 404029 190 API calls 7758->7760 7761 403f45 strtol 7758->7761 7762 403f52 time 7758->7762 7766 406ab3 16 API calls 7758->7766 7818 406bca 7758->7818 7821 404138 7758->7821 7825 40439d 7758->7825 7830 4041d9 7758->7830 7846 401bed 7758->7846 7850 406c9a 7758->7850 7872 4043ed strchr 7758->7872 7933 406c2b 7758->7933 7936 403fea 7758->7936 7760->7758 7761->7762 7762->7758 7766->7758 7769 403da2 7768->7769 7770 403d9c 7768->7770 7772 403db6 7769->7772 8615 403dbb shutdown 7769->8615 8611 407269 7770->8611 7772->7698 7774->7702 7775->7705 7776->7709 7777->7738 7778->7738 7779->7740 7780->7743 7782 40724d 7781->7782 7786 407261 7781->7786 7787 408923 7782->7787 7784 407257 7784->7786 7792 408c2d 7784->7792 7786->7747 7807 410aea 7787->7807 7789 4089ad 7790 408ba1 strncpy 7789->7790 7791 408b81 7789->7791 7790->7791 7791->7784 7793 408c43 free 7792->7793 7794 408c47 7792->7794 7793->7794 7795 408c51 free 7794->7795 7796 408c55 7794->7796 7795->7796 7797 408c63 7796->7797 7798 408c5f free 7796->7798 7799 408c71 7797->7799 7800 408c6d free 7797->7800 7798->7797 7801 408c7b free 7799->7801 7802 408c7f 7799->7802 7800->7799 7801->7802 7803 40bb66 free 7802->7803 7804 408c8b 7803->7804 7805 408c93 7804->7805 7806 408c8f free 7804->7806 7805->7786 7806->7805 7812 410b5f CryptAcquireContextA 7807->7812 7809 410b2b 7809->7789 7810 410b04 7810->7809 7816 410b33 memset 7810->7816 7813 410b7a 7812->7813 7814 410b7e CryptGenRandom 7812->7814 7813->7810 7814->7813 7815 410b97 CryptReleaseContext 7814->7815 7815->7813 7817 410b5b 7816->7817 7817->7809 7819 406be1 7818->7819 7820 406bd9 free 7818->7820 7819->7758 7820->7819 7824 404152 7821->7824 7822 4041d0 7822->7758 7823 404161 _isctype 7823->7824 7824->7822 7824->7823 7826 4043e4 7825->7826 7827 4043af 7825->7827 7826->7758 7827->7826 7829 404138 _isctype 7827->7829 7955 401ccc 7827->7955 7829->7827 7831 4041e0 7830->7831 7832 40421e 7831->7832 7833 4041f4 _isctype 7831->7833 7991 40428d strcspn strspn 7832->7991 7833->7831 7836 40428d 2 API calls 7837 40423d 7836->7837 7838 40428d 2 API calls 7837->7838 7839 40424e 7838->7839 7993 404327 strcmp 7839->7993 7842 404282 7842->7758 7843 40425d strncmp 7843->7842 7844 404274 7843->7844 8000 4042dd 7844->8000 7848 401bfb 7846->7848 7849 401c16 7846->7849 7848->7849 8004 401c24 7848->8004 7849->7758 7851 406de2 7850->7851 7852 406cb5 7850->7852 7851->7758 8008 406de9 7852->8008 7855 406cd7 strcmp 8014 4022f4 7855->8014 7858 406cfe 7858->7851 8035 401dff 7858->8035 7859 406d50 8040 401d20 7859->8040 7860 406d26 7860->7859 7862 401dff 188 API calls 7860->7862 7862->7860 7864 406d71 8043 405eb3 7864->8043 7866 401ccc 173 API calls 7867 406d87 7866->7867 7867->7866 7868 406dc5 7867->7868 7869 401d20 172 API calls 7867->7869 7868->7851 7870 403d86 182 API calls 7868->7870 7869->7867 7871 406dd6 free 7870->7871 7871->7851 7873 404412 7872->7873 7874 404417 strlen 7872->7874 7873->7874 8082 40216a 7874->8082 7876 404432 8090 404765 7876->8090 7878 40444f 7891 404517 7878->7891 8097 404858 7878->8097 7881 404473 strstr 7884 40449a 7881->7884 7885 40448b 7881->7885 7882 4046ff 8298 404d31 time 7882->8298 7884->7885 7886 4044b6 strcmp 7884->7886 7889 404029 190 API calls 7885->7889 7887 4044ca strcmp 7886->7887 7888 4044dd 7886->7888 7887->7888 7890 4044fb strcmp 7887->7890 7888->7882 8114 404d61 7888->8114 7889->7891 7893 40450a 7890->7893 7894 40451c strcmp 7890->7894 7891->7758 8121 406408 7893->8121 7897 40458f 7894->7897 7898 40452f 7894->7898 7899 4039e1 6 API calls 7897->7899 8149 4031e3 7898->8149 7901 40459f 7899->7901 7904 4045a3 7901->7904 7906 404637 7901->7906 7909 4045e0 7901->7909 7910 4045cc 7901->7910 7902 40453b 7902->7885 7903 40455c GetLastError strerror 7902->7903 7905 404029 190 API calls 7903->7905 7907 404029 190 API calls 7904->7907 7905->7891 8193 40470c strlen 7906->8193 7907->7891 8152 405730 strlen 7909->8152 7913 401dff 188 API calls 7910->7913 7913->7891 7915 404650 strcmp 7919 404693 7915->7919 7920 404663 strcmp 7915->7920 7916 4046a2 7918 40470c 5 API calls 7916->7918 7917 4045fa 7921 401c24 tolower 7917->7921 7923 4046b7 7918->7923 8198 405989 7919->8198 7920->7904 7920->7919 7924 40460d 7921->7924 7925 4046ca 7923->7925 7926 4046bb 7923->7926 7924->7885 7927 404611 7924->7927 8266 4057e8 7925->8266 8253 406616 7926->8253 8159 404da1 7927->8159 7935 406c56 memmove 7933->7935 7935->7758 7937 401bd9 tolower 7936->7937 7938 403ffd 7937->7938 7939 40401e 7938->7939 7940 404013 strcmp 7938->7940 7939->7758 7940->7939 7942 404044 7941->7942 7946 404104 16 API calls 7942->7946 7952 4040f6 7942->7952 7954 4040c7 7942->7954 7943 40411e 2 API calls 7944 4040cf 7943->7944 7945 401dff 188 API calls 7944->7945 7947 4040e2 7945->7947 7948 40408e 7946->7948 7950 401dff 188 API calls 7947->7950 7949 401e9e 15 API calls 7948->7949 7951 40409e 7949->7951 7950->7952 7953 401e35 16 API calls 7951->7953 7952->7753 7953->7954 7954->7943 7956 401ce6 7955->7956 7957 401cd6 7955->7957 7959 401d0a recv 7956->7959 7960 401ced fread 7956->7960 7962 4072e9 7957->7962 7961 401ce4 7959->7961 7960->7961 7961->7827 7963 4072f4 7962->7963 7966 40a330 7963->7966 7967 40a341 7966->7967 7968 40a353 7967->7968 7974 4072a8 7967->7974 7970 40a397 memcpy 7968->7970 7973 407306 7968->7973 7980 408f46 7968->7980 7970->7973 7973->7961 7975 4072b6 7974->7975 7976 4072bd 7974->7976 7977 407d20 159 API calls 7975->7977 7978 407b8b 165 API calls 7976->7978 7979 4072bb 7977->7979 7978->7979 7979->7968 7984 408f52 7980->7984 7981 40990c memmove 7981->7984 7982 40b2d9 56 API calls 7982->7984 7983 40921b memcpy 7983->7984 7984->7981 7984->7982 7984->7983 7985 40978f 16 API calls 7984->7985 7986 4091ed 7984->7986 7987 409868 memcmp 7984->7987 7988 40941e 128 API calls 7984->7988 7989 4092b8 27 API calls 7984->7989 7990 408e5c memcmp 7984->7990 7985->7984 7986->7968 7987->7984 7988->7984 7989->7984 7990->7984 7992 40422e 7991->7992 7992->7836 7994 404258 7993->7994 7995 40433d strcmp 7993->7995 7994->7842 7994->7843 7995->7994 7996 40434e strcmp 7995->7996 7996->7994 7997 40435f strcmp 7996->7997 7997->7994 7998 404370 strcmp 7997->7998 7998->7994 7999 404381 strcmp 7998->7999 7999->7994 8001 4042e9 8000->8001 8002 40428d strcspn strspn 8001->8002 8003 404321 8001->8003 8002->8001 8003->7842 8005 401c2b 8004->8005 8006 401c54 tolower 8005->8006 8007 401c4e 8005->8007 8006->8005 8007->7848 8009 406cc8 8008->8009 8010 406df8 strncmp 8008->8010 8009->7851 8009->7855 8009->7858 8011 406e10 sscanf 8010->8011 8012 406e0d 8010->8012 8011->8009 8013 406e33 sscanf 8011->8013 8012->8011 8013->8009 8015 40232a gethostbyname 8014->8015 8016 40230d 8014->8016 8017 402362 socket 8015->8017 8018 402339 GetLastError strerror 8015->8018 8016->8015 8019 402312 8016->8019 8021 402374 GetLastError strerror 8017->8021 8022 40239c htons connect 8017->8022 8020 401e9e 15 API calls 8018->8020 8023 401e9e 15 API calls 8019->8023 8024 402322 8020->8024 8025 401e9e 15 API calls 8021->8025 8026 4023ca GetLastError strerror 8022->8026 8027 4023fc calloc 8022->8027 8023->8024 8024->7858 8025->8024 8028 401e9e 15 API calls 8026->8028 8029 402411 GetLastError strerror 8027->8029 8030 402436 8027->8030 8031 4023f0 closesocket 8028->8031 8032 401e9e 15 API calls 8029->8032 8030->8024 8033 402463 13 API calls 8030->8033 8031->8024 8032->8031 8033->8024 8057 401e35 8035->8057 8038 401d20 172 API calls 8039 401e33 8038->8039 8039->7860 8064 401d44 8040->8064 8079 401bd9 8043->8079 8046 401c24 tolower 8048 405f03 8046->8048 8047 404029 190 API calls 8049 40606c 8047->8049 8051 405ee0 8048->8051 8053 401dff 188 API calls 8048->8053 8049->7867 8050 401d44 172 API calls 8052 405f7e 8050->8052 8051->8047 8051->8049 8052->8051 8055 401ccc 173 API calls 8052->8055 8056 401d44 172 API calls 8052->8056 8054 405f2b 8053->8054 8054->8050 8054->8052 8055->8052 8056->8052 8058 401e44 _vsnprintf 8057->8058 8061 401e23 8057->8061 8059 401e5d 8058->8059 8062 401e70 8058->8062 8060 401e9e 15 API calls 8059->8060 8060->8061 8061->8038 8062->8061 8063 401e9e 15 API calls 8062->8063 8063->8061 8065 401d59 8064->8065 8069 401d41 strcmp 8064->8069 8067 401dc6 send 8065->8067 8068 401daa fwrite 8065->8068 8065->8069 8070 4072ce 8065->8070 8067->8065 8068->8065 8069->7864 8069->7867 8073 40a1f0 8070->8073 8074 40a204 8073->8074 8075 4072a8 170 API calls 8074->8075 8077 40a216 8074->8077 8075->8077 8076 409df6 19 API calls 8076->8077 8077->8076 8078 4072df 8077->8078 8078->8065 8080 401bed tolower 8079->8080 8081 401bea 8080->8081 8081->8046 8081->8051 8081->8054 8083 4022e1 8082->8083 8088 402182 8082->8088 8083->7876 8084 4021b2 _isctype 8084->8088 8085 4021e7 _isctype 8085->8088 8086 402212 tolower tolower 8087 40223e _isctype 8086->8087 8086->8088 8087->8088 8088->8083 8088->8084 8088->8085 8088->8086 8089 402272 _isctype 8088->8089 8089->8088 8301 4047a4 8090->8301 8095 4020d6 2 API calls 8096 4047a0 8095->8096 8096->7878 8102 40487c 8097->8102 8098 40365f 3 API calls 8098->8102 8099 404908 8310 404934 8099->8310 8100 40488b memcmp 8100->8102 8103 4048ab 8100->8103 8102->8098 8102->8099 8102->8100 8104 404104 16 API calls 8103->8104 8106 4048c8 8104->8106 8105 404914 8107 40446b 8105->8107 8328 404a27 8105->8328 8108 401f9f 7 API calls 8106->8108 8107->7881 8107->7882 8110 4048dc 8108->8110 8110->8105 8112 4048e2 _errno strerror 8110->8112 8113 401e9e 15 API calls 8112->8113 8113->8099 8115 404d77 8114->8115 8116 4044f3 8114->8116 8117 401f9f 7 API calls 8115->8117 8116->7882 8116->7890 8118 404d82 8117->8118 8118->8116 8119 404a27 30 API calls 8118->8119 8120 404d8f fclose 8119->8120 8120->8116 8122 4039e1 6 API calls 8121->8122 8123 406421 8122->8123 8381 406521 8123->8381 8126 406451 8128 406483 8126->8128 8129 406456 GetLastError strerror 8126->8129 8127 40643b 8130 401dff 188 API calls 8127->8130 8132 401f9f 7 API calls 8128->8132 8131 40646a 8129->8131 8133 406449 8130->8133 8134 404029 190 API calls 8131->8134 8135 40648e 8132->8135 8133->7891 8134->8133 8136 406495 GetLastError strerror 8135->8136 8137 4064ab 8135->8137 8136->8131 8138 401bd9 tolower 8137->8138 8139 4064b6 8138->8139 8140 4064ef 8139->8140 8388 405713 sscanf 8139->8388 8141 405eb3 193 API calls 8140->8141 8143 4064fb 8141->8143 8145 406510 fclose 8143->8145 8147 401dff 188 API calls 8143->8147 8144 4064d4 8144->8140 8146 4064d8 fseek 8144->8146 8145->8133 8146->8140 8148 40650d 8147->8148 8148->8145 8150 401feb 5 API calls 8149->8150 8151 403200 DeleteFileW 8150->8151 8151->7902 8153 40575c 8152->8153 8154 40365f 3 API calls 8153->8154 8156 40577f 8154->8156 8155 4045f6 8155->7906 8155->7917 8156->8155 8157 40365f 3 API calls 8156->8157 8158 4039e1 6 API calls 8156->8158 8157->8156 8158->8156 8393 40501b 8159->8393 8162 404dcb GetLastError strerror 8164 404029 190 API calls 8162->8164 8163 404dff 8165 401dff 188 API calls 8163->8165 8166 404df7 8164->8166 8167 404e12 8165->8167 8166->7891 8404 401c66 8167->8404 8169 404f33 8411 4050bd 8169->8411 8170 404e49 strcmp 8173 404e60 strcmp 8170->8173 8182 404e36 8170->8182 8176 404e73 strcmp 8173->8176 8173->8182 8174 401dff 188 API calls 8177 404f54 8174->8177 8175 401c66 4 API calls 8175->8182 8176->8182 8178 401dff 188 API calls 8177->8178 8180 404f7c qsort 8178->8180 8179 404e97 realloc 8179->8182 8183 404fc7 free 8180->8183 8184 404faa 8180->8184 8181 404ffc 8187 404029 190 API calls 8181->8187 8182->8169 8182->8170 8182->8175 8182->8179 8182->8181 8185 404104 16 API calls 8182->8185 8189 4039e1 6 API calls 8182->8189 8191 404efa memset 8182->8191 8192 403408 2 API calls 8182->8192 8186 401dff 188 API calls 8183->8186 8417 4050ff 8184->8417 8185->8182 8186->8166 8187->8166 8189->8182 8191->8182 8192->8182 8194 404727 8193->8194 8195 40365f 3 API calls 8194->8195 8196 40464c 8194->8196 8197 40212d tolower 8194->8197 8195->8194 8196->7915 8196->7916 8197->8194 8199 405996 8198->8199 8434 406096 8199->8434 8202 404104 16 API calls 8203 4059c4 strrchr 8202->8203 8204 4059da _pipe 8203->8204 8206 405a31 _pipe 8204->8206 8207 405c08 GetLastError strerror 8204->8207 8206->8207 8208 405a48 8206->8208 8235 405b13 8207->8235 8504 405cb9 7 API calls 8208->8504 8210 404029 190 API calls 8252 405bf1 8210->8252 8211 405a6c 8212 405a78 _fdopen 8211->8212 8213 405c3f 8211->8213 8214 405bf3 GetLastError strerror 8212->8214 8215 405a95 _fdopen 8212->8215 8216 405c52 8213->8216 8217 405c4c _close 8213->8217 8214->8235 8215->8214 8218 405aac setbuf setbuf strcmp 8215->8218 8220 405c58 _close 8216->8220 8221 405c5e 8216->8221 8217->8216 8224 405adc 8218->8224 8231 405ae8 8218->8231 8220->8221 8222 405c71 8221->8222 8223 405c6a fclose 8221->8223 8225 405c7c 8222->8225 8226 405c77 _close 8222->8226 8223->8225 8227 405eb3 193 API calls 8224->8227 8229 405c83 fclose 8225->8229 8230 405c8a 8225->8230 8226->8225 8227->8231 8228 40439d 174 API calls 8232 405b0c 8228->8232 8233 405c95 8229->8233 8230->8233 8234 405c90 _close 8230->8234 8231->8228 8231->8252 8232->8235 8236 405b27 8232->8236 8233->7891 8234->8233 8235->8210 8237 4042dd 2 API calls 8236->8237 8238 405b4f 8237->8238 8239 401bed tolower 8238->8239 8240 405b60 8239->8240 8241 405b64 8240->8241 8242 405b6b atoi 8240->8242 8243 401dff 188 API calls 8241->8243 8242->8241 8244 405b82 8243->8244 8245 405bba 8244->8245 8247 401dff 188 API calls 8244->8247 8246 401d20 172 API calls 8245->8246 8248 405bc7 8246->8248 8247->8244 8249 401d20 172 API calls 8248->8249 8250 405bdb 8249->8250 8521 405690 8250->8521 8252->8213 8526 405c9c TerminateProcess CloseHandle 8252->8526 8254 401f9f 7 API calls 8253->8254 8255 406627 8254->8255 8256 40665b 8255->8256 8257 40662d GetLastError strerror 8255->8257 8530 40411e 8256->8530 8258 404029 190 API calls 8257->8258 8260 406656 8258->8260 8260->7891 8262 401dff 188 API calls 8263 406671 8262->8263 8533 40668f 8263->8533 8267 401bd9 tolower 8266->8267 8268 4057f6 8267->8268 8269 4046d4 8268->8269 8591 405813 memset sscanf 8268->8591 8271 4053bf time 8269->8271 8603 4055cb strlen 8271->8603 8274 401f9f 7 API calls 8275 405417 8274->8275 8276 405450 8275->8276 8277 405421 GetLastError strerror 8275->8277 8278 401bd9 tolower 8276->8278 8279 404029 190 API calls 8277->8279 8280 405467 8278->8280 8281 405448 8279->8281 8282 4054fe localtime strftime localtime strftime 8280->8282 8610 405713 sscanf 8280->8610 8281->7891 8284 404104 16 API calls 8282->8284 8286 40555b 8284->8286 8285 40547d 8285->8282 8287 405484 fseek 8285->8287 8288 40411e 2 API calls 8286->8288 8290 4054a2 8287->8290 8289 405568 8288->8289 8291 401dff 188 API calls 8289->8291 8293 404104 16 API calls 8290->8293 8292 405599 strcmp 8291->8292 8294 4055ba fclose 8292->8294 8295 4055ad 8292->8295 8296 4054f4 8293->8296 8294->8281 8297 405690 173 API calls 8295->8297 8296->8282 8297->8294 8299 401dff 188 API calls 8298->8299 8300 404d5a 8299->8300 8300->7891 8302 40365f 3 API calls 8301->8302 8304 4047cb 8302->8304 8303 40365f 3 API calls 8303->8304 8304->8303 8305 404776 8304->8305 8306 4047df memcmp 8304->8306 8307 404104 8305->8307 8306->8304 8306->8305 8308 401e35 16 API calls 8307->8308 8309 40411c 8308->8309 8309->8095 8311 40498f 8310->8311 8312 40494f 8310->8312 8314 4039e1 6 API calls 8311->8314 8313 401f9f 7 API calls 8312->8313 8315 40495a 8313->8315 8316 40499c 8314->8316 8317 404964 GetLastError strerror 8315->8317 8327 404987 8315->8327 8318 4049c9 strlen 8316->8318 8321 4049a5 8316->8321 8320 404981 8317->8320 8319 4049d4 8318->8319 8323 404104 16 API calls 8319->8323 8324 401e9e 15 API calls 8320->8324 8322 404104 16 API calls 8321->8322 8325 4049c4 8322->8325 8323->8325 8324->8327 8326 401f9f 7 API calls 8325->8326 8326->8327 8327->8105 8338 404b7b 8328->8338 8330 404a4c 8331 404a6a fgets 8330->8331 8337 404921 fclose 8330->8337 8332 404a77 sscanf 8331->8332 8331->8337 8332->8330 8333 404aa6 strcmp 8332->8333 8333->8330 8334 404abb strcmp 8333->8334 8334->8330 8335 404ae3 8334->8335 8362 404b0f strlen 8335->8362 8337->8107 8339 401bd9 tolower 8338->8339 8340 404b8d 8339->8340 8341 404d1e 8340->8341 8370 40212d 8340->8370 8341->8330 8343 404ba4 8343->8341 8344 404bbd memset 8343->8344 8345 404bd0 8344->8345 8346 404bda _isctype 8345->8346 8348 404c0a 8345->8348 8346->8345 8347 40428d 2 API calls 8347->8348 8348->8347 8349 40428d 2 API calls 8348->8349 8352 404c4b strlen 8348->8352 8353 404c62 strcmp 8348->8353 8354 404d11 8348->8354 8350 404c29 strlen 8349->8350 8350->8348 8351 404c39 strlen 8350->8351 8351->8348 8352->8353 8353->8348 8355 404c77 strcmp 8353->8355 8354->8341 8356 403408 2 API calls 8354->8356 8355->8348 8357 404c90 strcmp 8355->8357 8356->8341 8357->8348 8358 404ca9 strcmp 8357->8358 8358->8348 8359 404cc2 strcmp 8358->8359 8359->8348 8360 404cdb strcmp 8359->8360 8360->8348 8361 404cf4 strcmp 8360->8361 8361->8348 8363 404b23 8362->8363 8364 404b27 8362->8364 8363->8337 8374 4024a6 8364->8374 8366 404b3f 8367 4024a6 8 API calls 8366->8367 8368 404b62 8367->8368 8369 401c24 tolower 8368->8369 8369->8363 8372 402163 8370->8372 8373 402137 8370->8373 8371 401c54 tolower 8371->8373 8372->8343 8373->8371 8373->8372 8380 4024b6 8374->8380 8375 4024dd 8376 402e86 memset memset memcpy memset 8375->8376 8378 4024eb 8376->8378 8377 4024c1 strlen 8379 402526 memcpy memcpy memcpy 8377->8379 8378->8366 8379->8380 8380->8375 8380->8377 8382 40653c strchr 8381->8382 8383 406546 memcpy 8382->8383 8387 406435 8382->8387 8384 4039e1 6 API calls 8383->8384 8385 406576 8384->8385 8385->8382 8385->8387 8389 4065b1 8385->8389 8387->8126 8387->8127 8388->8144 8390 4065ce 8389->8390 8391 4020d6 2 API calls 8390->8391 8392 4065da MultiByteToWideChar CreateDirectoryW 8391->8392 8392->8385 8394 405039 malloc 8393->8394 8395 40502c SetLastError 8393->8395 8394->8395 8397 40504f 8394->8397 8398 404dc4 8395->8398 8399 401feb 5 API calls 8397->8399 8398->8162 8398->8163 8400 405063 GetFileAttributesW 8399->8400 8401 405075 8400->8401 8402 4050ac free 8400->8402 8401->8402 8403 40507c wcscat FindFirstFileW 8401->8403 8402->8398 8403->8398 8405 401c74 8404->8405 8407 401cb6 SetLastError 8404->8407 8405->8407 8408 401c79 WideCharToMultiByte FindNextFileW 8405->8408 8409 401cc5 8407->8409 8408->8409 8410 401ca9 FindClose 8408->8410 8409->8182 8410->8409 8412 4050c9 8411->8412 8413 4050ea SetLastError 8411->8413 8414 4050e0 free 8412->8414 8415 4050d0 FindClose 8412->8415 8416 404f3b 8413->8416 8414->8416 8415->8414 8416->8174 8420 405133 8417->8420 8421 405114 8417->8421 8418 405157 8422 404104 16 API calls 8418->8422 8419 404104 16 API calls 8423 40512b localtime strftime 8419->8423 8420->8418 8420->8421 8421->8419 8422->8423 8429 405251 8423->8429 8427 401dff 188 API calls 8428 404fb9 free 8427->8428 8428->8183 8428->8184 8430 4051f6 8429->8430 8432 405273 8429->8432 8430->8427 8431 405290 _isctype 8431->8432 8432->8430 8432->8431 8433 4052b4 strchr 8432->8433 8433->8432 8435 4047a4 4 API calls 8434->8435 8436 4060bf 8435->8436 8527 4063a5 8436->8527 8439 4063a5 16 API calls 8440 4060e4 8439->8440 8441 4063a5 16 API calls 8440->8441 8442 4060f5 8441->8442 8443 4063a5 16 API calls 8442->8443 8444 406106 8443->8444 8445 4063a5 16 API calls 8444->8445 8446 406112 8445->8446 8447 4063a5 16 API calls 8446->8447 8448 406121 htons 8447->8448 8449 4063a5 16 API calls 8448->8449 8450 406141 8449->8450 8451 4063a5 16 API calls 8450->8451 8452 40614f inet_ntoa 8451->8452 8453 4063a5 16 API calls 8452->8453 8454 40616a 8453->8454 8455 4063a5 16 API calls 8454->8455 8456 406178 8455->8456 8457 4063a5 16 API calls 8456->8457 8458 406186 strrchr strrchr 8457->8458 8459 4061a4 8458->8459 8460 4063a5 16 API calls 8459->8460 8461 4061bd 8460->8461 8462 4063a5 16 API calls 8461->8462 8463 4061cb 8462->8463 8464 4063a5 16 API calls 8463->8464 8465 4061d9 8464->8465 8466 4063a5 16 API calls 8465->8466 8467 4061fb 8466->8467 8468 401bd9 tolower 8467->8468 8469 406209 8468->8469 8470 406219 8469->8470 8472 4063a5 16 API calls 8469->8472 8471 40622f 8470->8471 8473 4063a5 16 API calls 8470->8473 8474 401bd9 tolower 8471->8474 8472->8470 8473->8471 8475 40623d 8474->8475 8476 406250 getenv 8475->8476 8477 4063a5 16 API calls 8475->8477 8478 406271 getenv 8476->8478 8479 406262 8476->8479 8480 40624d 8477->8480 8482 40628c getenv 8478->8482 8483 40627d 8478->8483 8481 4063a5 16 API calls 8479->8481 8480->8476 8486 40626e 8481->8486 8484 4062a7 getenv 8482->8484 8485 406298 8482->8485 8487 4063a5 16 API calls 8483->8487 8490 4062c1 8484->8490 8491 4062b5 8484->8491 8489 4063a5 16 API calls 8485->8489 8486->8478 8488 406289 8487->8488 8488->8482 8492 4062a4 8489->8492 8494 4063a5 16 API calls 8490->8494 8502 4062e7 8490->8502 8493 4063a5 16 API calls 8491->8493 8492->8484 8493->8490 8495 4062d7 8494->8495 8497 4063a5 16 API calls 8495->8497 8496 4063a5 16 API calls 8496->8502 8497->8502 8498 40365f 3 API calls 8499 406342 8498->8499 8499->8498 8500 4059ac 8499->8500 8501 4063a5 16 API calls 8499->8501 8500->8202 8501->8499 8502->8496 8502->8499 8503 406323 toupper 8502->8503 8503->8502 8505 405dfa 8504->8505 8506 405d4b fopen 8504->8506 8510 404104 16 API calls 8505->8510 8506->8505 8507 405d70 fgets 8506->8507 8508 405dea 8507->8508 8509 405d8f 8507->8509 8512 405df0 fclose 8508->8512 8509->8508 8511 405d98 strlen 8509->8511 8513 405e2f CreateProcessA 8510->8513 8516 405dac 8511->8516 8512->8505 8514 405e82 _close _close 8513->8514 8515 405e5b GetLastError 8513->8515 8518 405e94 CloseHandle CloseHandle CloseHandle 8514->8518 8517 401e9e 15 API calls 8515->8517 8516->8512 8520 405dc0 _isctype 8516->8520 8519 405e79 8517->8519 8518->8211 8519->8518 8520->8516 8522 40570c 8521->8522 8525 4056a3 8521->8525 8522->8252 8523 4056c1 fread 8523->8522 8523->8525 8524 401d20 172 API calls 8524->8525 8525->8522 8525->8523 8525->8524 8526->8213 8528 401e35 16 API calls 8527->8528 8529 4060d3 8528->8529 8529->8439 8531 403fea 2 API calls 8530->8531 8532 404127 8531->8532 8532->8262 8534 4066a1 8533->8534 8535 4066b9 fgetc 8533->8535 8536 401e9e 15 API calls 8534->8536 8537 406682 fclose 8535->8537 8547 4066d5 8535->8547 8536->8537 8537->8260 8538 406842 fgetc 8543 406853 8538->8543 8538->8547 8539 4067af memcmp 8539->8547 8540 406705 memcmp 8541 406723 memcmp 8540->8541 8540->8547 8544 406757 memcmp 8541->8544 8541->8547 8542 401d20 172 API calls 8542->8547 8543->8537 8545 401d20 172 API calls 8543->8545 8544->8547 8545->8537 8547->8538 8547->8539 8547->8540 8547->8542 8549 401e9e 15 API calls 8547->8549 8550 40686e 8547->8550 8581 406a19 sscanf 8547->8581 8549->8547 8551 4047a4 4 API calls 8550->8551 8552 406887 sscanf 8551->8552 8553 4068d5 sscanf 8552->8553 8554 4068ae 8552->8554 8556 4068ec 8553->8556 8557 4068fe sscanf 8553->8557 8555 404104 16 API calls 8554->8555 8558 4068cd 8555->8558 8562 404104 16 API calls 8556->8562 8559 406912 8557->8559 8560 406a03 8557->8560 8565 401f9f 7 API calls 8558->8565 8561 404104 16 API calls 8559->8561 8563 401e9e 15 API calls 8560->8563 8564 40692e strrchr 8561->8564 8562->8558 8573 4069b8 8563->8573 8566 406944 8564->8566 8567 406948 strlen strlen 8564->8567 8568 40698f 8565->8568 8566->8567 8567->8556 8569 406995 GetLastError strerror 8568->8569 8570 4069bd 8568->8570 8571 401e9e 15 API calls 8569->8571 8572 40470c 5 API calls 8570->8572 8571->8573 8574 4069d2 8572->8574 8573->8547 8575 4069d6 8574->8575 8576 4069eb 8574->8576 8577 40668f 206 API calls 8575->8577 8578 405690 173 API calls 8576->8578 8579 4069e9 8577->8579 8580 4069f9 fclose 8578->8580 8579->8580 8580->8573 8582 406a40 8581->8582 8583 406a55 _popen 8581->8583 8584 401e9e 15 API calls 8582->8584 8585 406a96 8583->8585 8586 406a6f GetLastError strerror 8583->8586 8588 406a50 8584->8588 8587 405690 173 API calls 8585->8587 8589 401e9e 15 API calls 8586->8589 8590 406aa6 _pclose 8587->8590 8588->8547 8589->8588 8590->8588 8592 4058e1 8591->8592 8593 405869 sscanf 8591->8593 8599 405957 8592->8599 8593->8592 8594 405891 sscanf 8593->8594 8594->8592 8596 4058b9 sscanf 8594->8596 8596->8592 8597 4058ea time localtime mktime 8596->8597 8597->8269 8600 405960 strcmp 8599->8600 8601 405971 8600->8601 8602 40597d 8600->8602 8601->8600 8601->8602 8602->8597 8607 4055ee 8603->8607 8604 40365f 3 API calls 8604->8607 8605 4053f3 8605->8274 8606 40212d tolower 8606->8607 8607->8604 8607->8605 8607->8606 8608 40562c 8607->8608 8608->8605 8609 401c24 tolower 8608->8609 8609->8608 8610->8285 8612 407270 8611->8612 8613 407279 8611->8613 8614 408c2d 7 API calls 8612->8614 8613->7769 8614->8613 8620 403dfd ioctlsocket 8615->8620 8617 403dd7 8618 401ccc 173 API calls 8617->8618 8619 403df1 closesocket 8617->8619 8618->8617 8619->7772 8620->8617 8622 407114 8621->8622 8623 40713c 8621->8623 8624 403a8c 22 API calls 8622->8624 8623->7721 8625 407120 8624->8625 8626 407124 8625->8626 8627 40713e inet_ntoa 8625->8627 8640 407173 8626->8640 8629 40715a 8627->8629 8630 401e9e 15 API calls 8629->8630 8631 407160 closesocket 8630->8631 8631->8623 8632->7718 8633->7722 8634->7722 8635->7727 8636->7729 8638 407023 8637->8638 8639 407089 CloseHandle 8637->8639 8638->7732 8639->8638 8649 403982 WaitForSingleObject 8640->8649 8642 407188 8643 4071b7 8642->8643 8650 406f07 ReleaseMutex WaitForMultipleObjects ReleaseMutex 8642->8650 8651 403d70 SetEvent 8643->8651 8646 4071e2 8652 403997 ReleaseMutex 8646->8652 8648 4071ea 8648->8623 8649->8642 8650->8642 8651->8646 8652->8648 8653->7082 8657 402f8b 8656->8657 8658 402f8f _snprintf 8656->8658 8657->8658 8659 401f9f 7 API calls 8658->8659 8660 402fb8 8659->8660 8661 402fc4 8660->8661 8662 402fbc fclose 8660->8662 8663 401f9f 7 API calls 8661->8663 8662->8661 8664 402fcf 8663->8664 8665 402fd6 _errno strerror 8664->8665 8666 402fe9 8664->8666 8667 403018 8665->8667 8668 401f9f 7 API calls 8666->8668 8672 401e9e 15 API calls 8667->8672 8669 402ffa 8668->8669 8670 403001 _errno strerror 8669->8670 8671 403033 fgets 8669->8671 8670->8667 8673 40311c 8671->8673 8674 403064 sscanf 8671->8674 8676 40155d 8672->8676 8675 403150 fclose fclose 8673->8675 8679 4024a6 8 API calls 8673->8679 8677 4030fc fgets 8674->8677 8678 40308c strcmp 8674->8678 8680 4031e3 6 API calls 8675->8680 8676->7113 8677->8673 8677->8674 8681 4030a1 strcmp 8678->8681 8682 4030e8 fprintf 8678->8682 8683 40313d fprintf 8679->8683 8684 40316a 8680->8684 8681->8682 8685 4030b6 8681->8685 8682->8677 8683->8675 8689 403194 8684->8689 8685->8677 8687 4024a6 8 API calls 8685->8687 8688 4030d3 fprintf 8687->8688 8688->8677 8690 401feb 5 API calls 8689->8690 8691 4031b3 8690->8691 8692 401feb 5 API calls 8691->8692 8693 4031c3 MoveFileW 8692->8693 8693->8676 8694->7006 8696 401b7e 2 API calls 8695->8696 8697 401b61 8696->8697 8697->7017 9026 4160bf 9027 4135cd malloc 9026->9027 9033 4160ce 9027->9033 9028 41613e 9029 4137d2 3 API calls 9029->9033 9030 416135 9031 4135fb free 9030->9031 9031->9028 9032 4154d1 3 API calls 9032->9033 9033->9028 9033->9029 9033->9030 9033->9032 9034 41476a realloc 9033->9034 9035 414842 realloc 9033->9035 9034->9033 9035->9033 9036 40395e 9037 403973 9036->9037 9038 40397a 9036->9038 9042 403982 WaitForSingleObject 9037->9042 9043 403997 ReleaseMutex 9038->9043 9041 403978 9042->9041 9043->9041

        Control-flow Graph

        APIs
        • __p___argv.MSVCRT ref: 004011EE
        • CreatePopupMenu.USER32 ref: 00401240
        • AppendMenuA.USER32(00000000,00000001,00000067,Mongoose web server v.2.11), ref: 00401258
        • AppendMenuA.USER32(00000000,00000800,00000067,0041EA48), ref: 00401267
        • _snprintf.MSVCRT ref: 00401292
        • AppendMenuA.USER32(00000000,00000001,00000067,?), ref: 004012A7
        • AppendMenuA.USER32(00000000,00000000,00000068,Install), ref: 004012BA
        • AppendMenuA.USER32(00000000,00000000,00000069,Deinstall), ref: 004012CD
        • AppendMenuA.USER32(00000000,00000800,00000067,0041EA48), ref: 004012DC
        • AppendMenuA.USER32(00000000,00000000,00000066,Edit config file), ref: 004012E7
        • AppendMenuA.USER32(00000000,00000000,00000065,Exit), ref: 004012F2
        • GetCursorPos.USER32(?), ref: 004012F8
        • SetForegroundWindow.USER32(?), ref: 00401301
        • TrackPopupMenu.USER32(00000000,00000000,?,?,00000000,?,00000000), ref: 00401314
        • PostMessageA.USER32(?,00000000,00000000,00000000), ref: 00401320
        • DestroyMenu.USER32(00000000), ref: 00401327
          • Part of subcall function 00401919: fopen.MSVCRT ref: 00401933
          • Part of subcall function 00401919: fclose.MSVCRT ref: 0040193C
          • Part of subcall function 00401919: _snprintf.MSVCRT ref: 004019BB
          • Part of subcall function 00401919: WinExec.KERNEL32(?,00000005), ref: 004019CB
        • __p___argv.MSVCRT ref: 0040137F
        • __p___argv.MSVCRT ref: 0040138E
        • strcmp.MSVCRT ref: 00401395
        • StartServiceCtrlDispatcherA.ADVAPI32(0041C018,00000001,?), ref: 004013B0
        • exit.MSVCRT ref: 004013B7
        • __p___argv.MSVCRT ref: 004013BD
        • __p___argc.MSVCRT ref: 004013C1
        • DefWindowProcA.USER32(?,?,?,?,00000000), ref: 004013DA
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Menu$Append$__p___argv$PopupWindow_snprintf$CreateCtrlCursorDestroyDispatcherExecForegroundMessagePostProcServiceStartTrack__p___argcexitfclosefopenstrcmp
        • String ID: Deinstall$Edit config file$Exit$HA$Install$Mongoose web server v.2.11$NT service: %s installed$not
        • API String ID: 3027329245-2341887206
        • Opcode ID: c12703516d0bcbe26c4a5e167041d00d1514cbb1c8d54a5a830500ee4c167f7a
        • Instruction ID: b3b0f60b90a3ab617dc186cc2026bf5c19435290f6956d2a4900c6a0cd96bf70
        • Opcode Fuzzy Hash: c12703516d0bcbe26c4a5e167041d00d1514cbb1c8d54a5a830500ee4c167f7a
        • Instruction Fuzzy Hash: 58516071640208FFEB10AFA1DC89EAE3EB9AB08745F108477F901A61F0C7788D51DB69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 115 4034cd-4034db 116 4034e3-4034f7 call 40365f 115->116 119 403645-403649 116->119 120 4034fd-40350e call 40370d 116->120 122 403651-40365c 119->122 123 40364b-40364c call 4036e2 119->123 126 4035d3-4035f9 call 403183 call 401e9e 120->126 127 403514-403518 120->127 123->122 144 40363f-403643 126->144 129 403523-403534 socket 127->129 130 40351a-40351d 127->130 133 403585-4035bc closesocket GetLastError strerror call 403183 call 401e9e 129->133 134 403536-403548 bind 129->134 130->129 132 4035fb-40360e call 403183 call 401e9e 130->132 132->144 151 4035c0-4035c4 133->151 134->133 137 40354a-403555 listen 134->137 137->133 142 403557-403565 calloc 137->142 146 403610-40363c closesocket GetLastError strerror call 403183 call 401e9e 142->146 147 40356b-403583 142->147 144->123 146->144 147->151 151->123 153 4035ca-4035ce 151->153 153->116
        APIs
          • Part of subcall function 0040365F: strchr.MSVCRT ref: 00403678
          • Part of subcall function 0040365F: memchr.MSVCRT ref: 004036B4
          • Part of subcall function 0040370D: memset.MSVCRT ref: 0040371E
          • Part of subcall function 0040370D: sscanf.MSVCRT ref: 0040374B
          • Part of subcall function 0040370D: htonl.WS2_32(00000000), ref: 00403788
          • Part of subcall function 0040370D: strchr.MSVCRT ref: 004037A0
          • Part of subcall function 0040370D: htons.WS2_32(?), ref: 004037DB
        • socket.WS2_32(00000002,00000001,00000006), ref: 00403529
        • bind.WS2_32(00000000,?,?), ref: 00403540
        • listen.WS2_32(00000000,00000014), ref: 0040354D
        • calloc.MSVCRT ref: 0040355B
        • closesocket.WS2_32(00000000), ref: 00403586
        • GetLastError.KERNEL32 ref: 0040358C
        • strerror.MSVCRT ref: 00403593
        • closesocket.WS2_32(00000000), ref: 00403611
        • GetLastError.KERNEL32(?,00000000), ref: 00403617
        • strerror.MSVCRT ref: 0040361E
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$ErrorLastclosesocketstrchrstrerror$_vsnprintfbindcallocfclosefputchtonlhtonsinet_ntoalistenmemchrmemsetsocketsscanftime
        • String ID: %s: %.*s: invalid port spec. Expecting list of: %s$%s: %s$%s: cannot bind to %.*s: %s$Cannot add SSL socket, is -ssl_cert option set?$[IP_ADDRESS:]PORT[s|p]$line 3283$line 3298$line 3303
        • API String ID: 4281905591-1965145212
        • Opcode ID: 798cd53ed21bf49a532603f4919389de453ca77fb5d7323985f74bb22d618b02
        • Instruction ID: 630a0e11554f8b9424e38d9dd4c25bbb11b9cc353d9a06a98028f573021a26d5
        • Opcode Fuzzy Hash: 798cd53ed21bf49a532603f4919389de453ca77fb5d7323985f74bb22d618b02
        • Instruction Fuzzy Hash: A8417471544300BFC610AF60DC45A5BBFACAB48B06F10493FF946B62E1EA79D641875E

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$_errno_snprintfexitfgetsfopensscanfstrerrorstrrchr
        • String ID: -%s %s (default: "%s")$ mongoose -A <htpasswd_file> <realm> <user> <passwd>$ mongoose <config_file>$ mongoose [-option value ...]$#$%s %[^#]$%s: line %d is invalid$Cannot open config file %s: %s$Example: mongoose -s cert.pem -p 80,443s -d no$HA$Loading config file %s$Mongoose version %s (c) Sergey Lyubka$OPTIONS:$See http://code.google.com/p/mongoose/wiki/MongooseManual for more details.$Usage:$c:\Mongoose\mongoose.conf$mongoose.conf
        • API String ID: 4061444988-3999420203
        • Opcode ID: 2baf541621830d366c973037c9738947ce14974c9cfa0915dae2c3178250e76d
        • Instruction ID: df13d1741afd1f7eee6ef90c1a9593053dbc86eaa52b3bc6240777a356ad1431
        • Opcode Fuzzy Hash: 2baf541621830d366c973037c9738947ce14974c9cfa0915dae2c3178250e76d
        • Instruction Fuzzy Hash: D56192B2D40215BBDB119B98DC85FDA7BB8AF08304F148067F505E72A1E778D980CB9D

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 79 401646-40166a 80 40166c-40166f 79->80 81 40168d-40169b strrchr 79->81 80->81 82 401671 80->82 83 4016a4-4016c7 _snprintf 81->83 84 40169d-4016a2 81->84 85 401672-40168b _snprintf 82->85 86 4016ca-4016de fopen 83->86 84->85 85->86 87 4016e0-4016e4 86->87 88 401707-40170b 86->88 87->88 89 4016e6-4016e8 87->89 90 401711-40173e fprintf fgets 88->90 91 4017c8-4017cb 88->91 89->90 92 4016ea-401704 _errno strerror call 4014e5 89->92 95 401741-401743 90->95 93 4017fa-4017fe 91->93 94 4017cd 91->94 92->88 97 4017cf-4017d4 94->97 98 401745-40174f 95->98 99 4017bb-4017c7 fclose 95->99 101 4017d6-4017da 97->101 102 4017dc call 40156d 97->102 103 401751-401758 98->103 104 4017a9-4017b9 fgets 98->104 99->91 101->102 105 4017e1-4017f8 call 401801 101->105 102->105 103->104 107 40175a-401780 sscanf 103->107 104->95 105->93 105->97 109 401782-401790 call 4014e5 107->109 110 401793-4017a4 call 401801 107->110 109->110 110->104
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _snprintffgets$_errnofopenfprintfsscanfstrerrorstrrchr
        • String ID: #$%.*s%c%s$%s %[^#]$%s: line %d is invalid$Cannot open config file %s: %s$Loading config file %s$c:\Mongoose\mongoose.conf$mongoose.conf
        • API String ID: 3319206403-3217560927
        • Opcode ID: 3d3b91bb5b6c84cf3dbc0ed4eb0d5c7b8d1013268f4f5cf9eb79fe3c35852779
        • Instruction ID: 1028c2ae47c57b1951b2b5dc92a25f65961a07d5799eeeaf5bcbdda15485909e
        • Opcode Fuzzy Hash: 3d3b91bb5b6c84cf3dbc0ed4eb0d5c7b8d1013268f4f5cf9eb79fe3c35852779
        • Instruction Fuzzy Hash: ED41C371940218BFDB219B94CC85BDA7BB8EF05304F5480B7F944A72E1D7789E90CBA9

        Control-flow Graph

        APIs
          • Part of subcall function 004011C1: _snprintf.MSVCRT ref: 004011D3
        • memset.MSVCRT ref: 004010C9
        • LoadIconA.USER32(00000000,00007F00), ref: 004010DE
        • RegisterClassA.USER32(?), ref: 004010F3
        • CreateWindowExA.USER32(00000000,?,Mongoose web server v.2.11,00CF0000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040110B
        • ShowWindow.USER32(00000000,00000000,?,?,00000000), ref: 00401115
        • GetModuleHandleA.KERNEL32(00000000,000000C8,00000001,00000010,00000010,00000000,?,?,00000000), ref: 00401146
        • LoadImageA.USER32(00000000,?,?,00000000), ref: 0040114D
        • _snprintf.MSVCRT ref: 0040116B
        • Shell_NotifyIconA.SHELL32(00000000,0041E9F0), ref: 00401184
        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00401197
        • TranslateMessage.USER32(?), ref: 004011A1
        • DispatchMessageA.USER32(?), ref: 004011AB
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Message$IconLoadWindow_snprintf$ClassCreateDispatchHandleImageModuleNotifyRegisterShell_ShowTranslatememset
        • String ID: Mongoose web server v.2.11
        • API String ID: 4091936274-2848873769
        • Opcode ID: 465eb1b4d5896550f5dae889aa67613aec9c38f9b51bcd54aa65b02fd433deeb
        • Instruction ID: c81dbd0f87c7e809291cad0e189476809b7a1cb4c995ae344f42c1a4fc6c77f6
        • Opcode Fuzzy Hash: 465eb1b4d5896550f5dae889aa67613aec9c38f9b51bcd54aa65b02fd433deeb
        • Instruction Fuzzy Hash: 8B216DB6942229BBD7109BA2EC4DEDF3F7CEF49744F008565FA05A6190C7B85006CBAD

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 162 416a2f-416aa4 __set_app_type __p__fmode __p__commode call 416c3e 165 416ab2-416b09 call 416c2c _initterm __getmainargs _initterm 162->165 166 416aa6-416ab1 __setusermatherr 162->166 169 416b45-416b48 165->169 170 416b0b-416b13 165->170 166->165 171 416b22-416b26 169->171 172 416b4a-416b4e 169->172 173 416b15-416b17 170->173 174 416b19-416b1c 170->174 176 416b28-416b2a 171->176 177 416b2c-416b3d GetStartupInfoA 171->177 172->169 173->170 173->174 174->171 175 416b1e-416b1f 174->175 175->171 176->175 176->177 178 416b50-416b52 177->178 179 416b3f-416b43 177->179 180 416b53-416b5e GetModuleHandleA call 4010b2 178->180 179->180 182 416b63-416b80 exit _XcptFilter 180->182
        APIs
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
        • String ID:
        • API String ID: 801014965-0
        • Opcode ID: bd5cb691d8af13c4f9e70bb1e19a4dc403c33a907dcbea3e278e747aad2a9e87
        • Instruction ID: fdf2fb2138757aa62f0b2f98c97dd9d781ac8ee512a3acf9c520c0a961696f3f
        • Opcode Fuzzy Hash: bd5cb691d8af13c4f9e70bb1e19a4dc403c33a907dcbea3e278e747aad2a9e87
        • Instruction Fuzzy Hash: B9417E71944354AFC720AFA4DC45AEA7FB8EB09710F21852FE98197391D7389881CB58

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 183 4013e6-4013f7 184 4013f9-4013ff 183->184 185 40142f-401433 183->185 184->185 188 401401-401405 184->188 186 401460-4014a2 call 401646 signal * 2 call 403289 185->186 187 401435-401446 strcmp 185->187 202 4014a4 186->202 203 4014bc-4014c3 186->203 189 401448-401459 strcmp 187->189 190 40145b call 40156d 187->190 188->185 192 401407-40140b 188->192 189->186 189->190 190->186 195 401412-401429 call 401528 exit 192->195 196 40140d call 40156d 192->196 195->185 196->195 206 4014aa-4014ba free 202->206 204 4014c5-4014d5 call 4014e5 203->204 205 4014d6-4014d8 203->205 204->205 206->203 206->206
        APIs
        • exit.MSVCRT ref: 00401429
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 00401588
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 00401598
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 004015A8
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 004015B8
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 004015C8
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 004015D8
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 0040160A
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 00401628
          • Part of subcall function 0040156D: fprintf.MSVCRT ref: 00401638
          • Part of subcall function 0040156D: exit.MSVCRT ref: 0040163F
          • Part of subcall function 0040156D: _snprintf.MSVCRT ref: 00401682
        • strcmp.MSVCRT ref: 0040143D
        • strcmp.MSVCRT ref: 00401450
        • signal.MSVCRT ref: 0040147C
        • signal.MSVCRT ref: 00401481
        • free.MSVCRT ref: 004014AB
        Strings
        • Failed to start Mongoose. Maybe some options are assigned bad values?Try to run with '-e error_log.txt' and check error_log.txt for more information., xrefs: 004014C5
        • pr4v, xrefs: 0040146E
        • --help, xrefs: 00401448
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$exitsignalstrcmp$_snprintffree
        • String ID: --help$Failed to start Mongoose. Maybe some options are assigned bad values?Try to run with '-e error_log.txt' and check error_log.txt for more information.$pr4v
        • API String ID: 3458989752-243818466
        • Opcode ID: e9e4e1881729414940f7b5fe6451e51a54a1c25a2b98b9dd1953868935ea6681
        • Instruction ID: 82d21cab4819b9b5620618a306a2e9bdff39ec7c61b6e0ba9b4bb3b8a13f6aaf
        • Opcode Fuzzy Hash: e9e4e1881729414940f7b5fe6451e51a54a1c25a2b98b9dd1953868935ea6681
        • Instruction Fuzzy Hash: 1721F331A40314AEDB30ABA5DC46BA63BB8EF41714F50803FF949A61F1D7389984CA59

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 209 403289-4032be WSAStartup calloc 210 4032c1-4032c3 209->210 211 403320-403327 210->211 212 4032c5-4032cc 210->212 214 403350-403358 call 4039b8 211->214 215 403329-40332e 211->215 212->211 213 4032ce-4032da call 401b7e 212->213 225 4032f4-4032fa 213->225 226 4032dc-4032e3 213->226 223 403311-403317 call 403240 214->223 224 40335a 214->224 218 403331-403337 215->218 221 403345-40334e 218->221 222 403339-40333b 218->222 221->214 221->218 222->221 227 40333d-403343 call 403408 222->227 241 403319-40331d 223->241 228 40335b call 4037f3 224->228 233 403302-40330e call 403183 call 401e9e 225->233 230 4032e5-4032f2 call 403408 226->230 231 4032fc-4032fd 226->231 227->221 235 403360-403362 228->235 230->210 231->233 233->223 235->223 240 403364-40336c call 4034cd 235->240 240->223 247 40336e-403376 call 403a6c 240->247 247->223 250 403378-40337f call 403448 247->250 252 403384-4033c4 call 403467 * 3 call 40349d atoi 250->252 261 403401-403403 252->261 262 4033c6-4033d4 call 40349d 252->262 261->241 265 4033f3 262->265 266 4033d6-4033f1 GetLastError call 403183 call 401e9e 262->266 267 4033f6-4033ff atoi 265->267 266->267 267->261 267->262
        APIs
        • WSAStartup.WS2_32(00000202,?), ref: 004032A1
        • calloc.MSVCRT ref: 004032AE
        • atoi.MSVCRT(?,00000000,Function_00006F4A,00000000,000004E0,00000000,000004E8,00000000,00000070,00000000,0000006C,00000000,00000000,00000000,00000000,00000000), ref: 004033BF
        • GetLastError.KERNEL32(00000000,Function_00003C80,00000000), ref: 004033D6
        • atoi.MSVCRT(?,00000000,Function_00003C80,00000000), ref: 004033FA
          • Part of subcall function 00401B7E: strcmp.MSVCRT ref: 00401B97
          • Part of subcall function 00401B7E: strcmp.MSVCRT ref: 00401BA9
          • Part of subcall function 00403408: strlen.MSVCRT ref: 0040340C
        Strings
        • Cannot start worker thread: %d, xrefs: 004033DD
        • %s: option value cannot be NULL, xrefs: 004032FD
        • Invalid option: %s, xrefs: 004032F5
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: atoistrcmp$ErrorLastStartupcallocstrlen
        • String ID: %s: option value cannot be NULL$Cannot start worker thread: %d$Invalid option: %s
        • API String ID: 1280764243-3226165084
        • Opcode ID: 6564aebbaadb434432a1d126d3be8bee44e2fae7180af9b28c3024287ac3e484
        • Instruction ID: 0db026bc6bc77ed40038cf6359e0936edcd257cf8d38cba91543af228e63f920
        • Opcode Fuzzy Hash: 6564aebbaadb434432a1d126d3be8bee44e2fae7180af9b28c3024287ac3e484
        • Instruction Fuzzy Hash: 774181716003016AD711AF769C86E9B3EAC9F4531AF14443BB906B62C2DB7CDB41866D

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: atoicallocfreehtonlhtonsmemcpytime
        • String ID: VD
        • API String ID: 1951994481-297103433
        • Opcode ID: 67328113d7cf1e419171672e71b18e28e361dedae0a9da691245c0ec84345ebc
        • Instruction ID: 3c7bce99130b73eb495c973d56a6fd04ac09ea3a1156c8a4c93082bd7bac16f3
        • Opcode Fuzzy Hash: 67328113d7cf1e419171672e71b18e28e361dedae0a9da691245c0ec84345ebc
        • Instruction Fuzzy Hash: DD215E71504711AFC711AF31D889BDB7BECBF49305F00053AF95AE2281DB78A605CA69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 293 401883-4018a0 strchr 294 4018a2-4018a9 293->294 295 4018c3-4018d2 _stat 293->295 294->295 298 4018ab-4018bd strncpy 294->298 296 4018d4-4018d8 295->296 297 4018da-4018e6 call 4014e5 295->297 296->297 299 4018e7-4018ea 296->299 297->299 298->295
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _statstrchrstrncpy
        • String ID: @$Invalid root directory: "%s"
        • API String ID: 3719870297-2171919715
        • Opcode ID: a14d0238bfb74ff801bb54141e4b5d70e0bf060e2b823dbaf53cd27b427c333e
        • Instruction ID: ce19ffdefb482cfea4e55ac77e2e2ee80468468da0517748b0d798a15216cdf5
        • Opcode Fuzzy Hash: a14d0238bfb74ff801bb54141e4b5d70e0bf060e2b823dbaf53cd27b427c333e
        • Instruction Fuzzy Hash: 5FF0C2335042196ADB14AAA5AC09EDB3BECDB4A734F108037E900F61D1DA78974586EC

        Control-flow Graph

        APIs
        • RegisterServiceCtrlHandlerA.ADVAPI32(Mongoose web server v.2.11,00401082), ref: 0040102A
        • SetServiceStatus.SECHOST(00000000,0041E9A8), ref: 00401042
        • Sleep.KERNELBASE(000003E8), ref: 00401052
        • SetServiceStatus.ADVAPI32(0041E9A8), ref: 0040107D
        Strings
        • Mongoose web server v.2.11, xrefs: 00401007
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Service$Status$CtrlHandlerRegisterSleep
        • String ID: Mongoose web server v.2.11
        • API String ID: 2346796585-2848873769
        • Opcode ID: fc53310aeff9b701d5d238f7a9316dcb6b176575eb79809b336af9f8bb26df8d
        • Instruction ID: b746e6ba5b5d7dd8439937ef474e3dcd0d1bf0518f675fd0017a2ab6bd371a1d
        • Opcode Fuzzy Hash: fc53310aeff9b701d5d238f7a9316dcb6b176575eb79809b336af9f8bb26df8d
        • Instruction Fuzzy Hash: ECF049B8925280DAD750AB13EC08B823EA4EBC4325F00C13AEA08662F0C3790541DF5E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 308 401801-401815 strcmp 309 401817-401828 strcmp 308->309 310 40182a-40182d call 401883 308->310 309->310 311 401832-401839 309->311 310->311 313 40183b-40183e 311->313 314 401840-401847 313->314 315 40184b-401862 call 4018ed * 2 313->315 314->313 316 401849 314->316 318 401867-40186c 315->318 316->318 321 40186e-40187e call 4014e5 318->321 322 40187f-401880 318->322 321->322
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp
        • String ID: Too many options specified$document_root
        • API String ID: 1004003707-3944412641
        • Opcode ID: febac9a286801631834c776c15bb2ec41fd7ee757ee78aa8ec04ab71d1ecd3fa
        • Instruction ID: 8e5f3c9edfc55107dc5a630e6bb6574d5787e743508526015ebc562af2661075
        • Opcode Fuzzy Hash: febac9a286801631834c776c15bb2ec41fd7ee757ee78aa8ec04ab71d1ecd3fa
        • Instruction Fuzzy Hash: 1A01A233180215BBDB153F9AEC42A9A77A4AF10368F21C13BF811751F0D73DDA9196D9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 326 406f4a-406f59 327 406f5b-406f5d 326->327 328 406fe3-406ff9 call 4036e2 call 40705e call 403982 327->328 329 406f63-406f6a 327->329 346 406ffe-407002 328->346 331 406f70-406f72 329->331 333 406f74-406f89 call 40709e 331->333 334 406f8b-406faf select 331->334 333->331 335 406fb1-406fbc Sleep 334->335 336 406fbe 334->336 335->327 340 406fc1-406fc3 336->340 340->327 342 406fc5-406fd6 __WSAFDIsSet 340->342 344 406fd8-406fda call 4070dd 342->344 345 406fdf-406fe1 342->345 344->345 345->340 347 407004-40700d call 406f07 346->347 348 40700f-407045 call 403997 call 407048 call 407075 * 3 346->348 347->346
        APIs
        • select.WS2_32(00000002,?,00000000,00000000,000000FF), ref: 00406FA7
        • Sleep.KERNEL32(000003E8), ref: 00406FB6
        • __WSAFDIsSet.WS2_32(?,?), ref: 00406FCF
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Sleepselect
        • String ID:
        • API String ID: 3651608395-0
        • Opcode ID: c54da4b483b65c0ab9b3c7e633be1f93ccc3620827f2dbb8e8b9078a25ac45cf
        • Instruction ID: 4283d8713967163e2ba3648652a9297ff0c3089b56806b789f56bf6a6070e9df
        • Opcode Fuzzy Hash: c54da4b483b65c0ab9b3c7e633be1f93ccc3620827f2dbb8e8b9078a25ac45cf
        • Instruction Fuzzy Hash: 2931C4B2804609ABC720EFA5C881DEBB7BDAF00314F11453FF146A3181D738BA51CB59

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 362 40349d-4034b8 CreateThread 363 4034c1-4034ca 362->363 364 4034ba-4034bb CloseHandle 362->364 364->363
        APIs
        • CreateThread.KERNELBASE(00000000,00000000,00000070,00000070,00000000,00000000), ref: 004034AE
        • CloseHandle.KERNELBASE(00000000), ref: 004034BB
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: CloseCreateHandleThread
        • String ID:
        • API String ID: 3032276028-0
        • Opcode ID: fcbd532bf3ec9640bf4904635f01fe5e4db24dbf2e7bb2f4c9c5930b3b3c6ccb
        • Instruction ID: bc9f89bd7913208e9571a17ceead3d1314e1f8da3389e7b609bd28edb318a6c9
        • Opcode Fuzzy Hash: fcbd532bf3ec9640bf4904635f01fe5e4db24dbf2e7bb2f4c9c5930b3b3c6ccb
        • Instruction Fuzzy Hash: BCD05E32999B32A7E2224B506C05F8B6E609F18B91F028510BA04AD1E0C664CD9586E9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 365 403448-403464 CreateMutexA
        APIs
        • CreateMutexA.KERNELBASE(00000000,00000000,00000000,0040391B,00000000,00000000,00403360,00000000,00000000), ref: 0040344E
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: CreateMutex
        • String ID:
        • API String ID: 1964310414-0
        • Opcode ID: f24674c1958c31e43000196e10ad25bfa6aa6e9b22db0195e4c8837c04cba69a
        • Instruction ID: 9848c7f95141e3b988b8d6b029c04f5785c2e4b51aa7fefa3a5202728d7aa73f
        • Opcode Fuzzy Hash: f24674c1958c31e43000196e10ad25bfa6aa6e9b22db0195e4c8837c04cba69a
        • Instruction Fuzzy Hash: 69C08C3434930157E30C8B348D16B0A36E4AB48B01F20C02CB60BDA2D0CAB09C109618
        APIs
        • OpenSCManagerA.ADVAPI32(00000000,00000000,-80000001,76325C80,00000000), ref: 00401A0F
        • GetModuleFileNameA.KERNEL32(00000000,?,00000118), ref: 00401A3E
        • strncat.MSVCRT ref: 00401A57
        • strncat.MSVCRT ref: 00401A67
        • CreateServiceA.ADVAPI32(00000068,0041C028,0041C028,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 00401A8D
        • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,Mongoose web server v.2.11), ref: 00401AA1
        • CloseServiceHandle.ADVAPI32(00000000), ref: 00401AFA
        • CloseServiceHandle.ADVAPI32(00000069), ref: 00401AFF
          • Part of subcall function 00401B0A: GetLastError.KERNEL32(00000400,?,00000100,00000000), ref: 00401B26
          • Part of subcall function 00401B0A: FormatMessageA.KERNEL32(00001200,00000000,00000000), ref: 00401B34
          • Part of subcall function 00401B0A: MessageBoxA.USER32(00000000,?,Error,00000000), ref: 00401B4A
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Service$CloseHandleMessagestrncat$ChangeConfig2CreateErrorFileFormatLastManagerModuleNameOpen
        • String ID: Mongoose web server v.2.11$i
        • API String ID: 714193591-3586339273
        • Opcode ID: a7d25674349965e659f51cf7e0bffeaf1afb26e83de53252aeabfadec2a5615c
        • Instruction ID: 238eb56d3514fed8b205fb28953995f0121f8702d0a1a630f391fe02de2bd528
        • Opcode Fuzzy Hash: a7d25674349965e659f51cf7e0bffeaf1afb26e83de53252aeabfadec2a5615c
        • Instruction Fuzzy Hash: E5310372A45218FBDB209FA4DC85BDE7ABCFB08354F118476F601B2160D3789E50DB69
        APIs
        • memcpy.MSVCRT(0041C13C,0041C038,00000004,0041C038,0041C038,0041C13C,0040E45A,0041C038,0041C13C,?,<=@,0041C038,00000000), ref: 0040DEA7
        • memcpy.MSVCRT(0041C038,Mongoose web server v.%s,00000004,0041C13C,0041C038,00000004,0041C038,0041C038,0041C13C,0040E45A,0041C038,0041C13C,?,<=@,0041C038,00000000), ref: 0040DEB6
        • memcpy.MSVCRT(?,0041C040,00000004,0041C038,Mongoose web server v.%s,00000004,0041C13C,0041C038,00000004,0041C038,0041C038,0041C13C,0040E45A,0041C038,0041C13C,?), ref: 0040DEC5
        • memcpy.MSVCRT(0041C13C,0041C02C,00000004,?,0041C040,00000004,0041C038,Mongoose web server v.%s,00000004,0041C13C,0041C038,00000004,0041C038,0041C038,0041C13C,0040E45A), ref: 0040DED4
        • memcpy.MSVCRT(0040E45A,0041C13C,00000004,0041C13C,?,0041C038,0041C13C,0041C13C,?,0041C038,0041C13C), ref: 0040E398
        • memcpy.MSVCRT(0040E45E,0041C038,00000004,0040E45A,0041C13C,00000004,0041C13C,?,0041C038,0041C13C,0041C13C,?,0041C038,0041C13C), ref: 0040E3A6
        • memcpy.MSVCRT(0040E462,?,00000004,0040E45E,0041C038,00000004,0040E45A,0041C13C,00000004,0041C13C,?,0041C038,0041C13C,0041C13C,?,0041C038), ref: 0040E3B4
        • memcpy.MSVCRT(0040E44E,0041C13C,00000004,0040E462,?,00000004,0040E45E,0041C038,00000004,0040E45A,0041C13C,00000004,0041C13C,?,0041C038,0041C13C), ref: 0040E3C2
        Strings
        • Mongoose web server v.%s, xrefs: 0040DEB1
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: Mongoose web server v.%s
        • API String ID: 3510742995-2175243079
        • Opcode ID: e0de17d777144d2e9099a0aad09dfe8ea885b82285641bbc473e9373a3a49cf7
        • Instruction ID: 11632d8f44d237656281d3a92e057c836be0e97cde5e591e001609247cbc8d56
        • Opcode Fuzzy Hash: e0de17d777144d2e9099a0aad09dfe8ea885b82285641bbc473e9373a3a49cf7
        • Instruction Fuzzy Hash: 44F19772900265ABCB00CFA9ECD08DE77B1EF4A301B45C52FE64957691C734EA11DBA4
        APIs
        • memcpy.MSVCRT(?,?,00000004,?,?,?,?,?,?,?,?,?,0041C038,0041C038,?,00401DA4), ref: 0040D966
        • memcpy.MSVCRT(?,FFFFFF1D,00000004,?,?,00000004,?,?,?,?,?,?,?,?,?,0041C038), ref: 0040D974
        • memcpy.MSVCRT(?,?,00000004,?,FFFFFF1D,00000004,?,?,00000004,?,?,?), ref: 0040D982
        • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,FFFFFF1D,00000004,?,?,00000004,?,?,?), ref: 0040D990
        • memcpy.MSVCRT(?,?,00000004,?,?,?,?,?,?,?,?), ref: 0040DE50
        • memcpy.MSVCRT(FFFFFF1D,?,00000004,?,?,00000004,?,?,?,?,?,?,?,?), ref: 0040DE5E
        • memcpy.MSVCRT(?,?,00000004,FFFFFF1D,?,00000004,?,?,00000004,?,?,?,?,?,?,?), ref: 0040DE6C
        • memcpy.MSVCRT(?,?,00000004,?,?,00000004,FFFFFF1D,?,00000004,?,?,00000004,?,?,?,?), ref: 0040DE7A
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: 87e92e811f9f662f4f1b9f8f707ae50d97cc192f18cb8d45e9d99136d26c9ebc
        • Instruction ID: 7eb74d126974f385b962462bdec1fefd5e0b7245d53fd0843a95915955db48a9
        • Opcode Fuzzy Hash: 87e92e811f9f662f4f1b9f8f707ae50d97cc192f18cb8d45e9d99136d26c9ebc
        • Instruction Fuzzy Hash: 18F1B976900225ABDB01CFAADCC04DE77F6EF8A311B46C56AEA4857351C734FA11CBA4
        APIs
        • SetLastError.KERNEL32(00000008), ref: 00405031
        • malloc.MSVCRT ref: 0040503E
          • Part of subcall function 00401FEB: strlen.MSVCRT ref: 0040201B
          • Part of subcall function 00401FEB: fprintf.MSVCRT ref: 0040207C
          • Part of subcall function 00401FEB: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00401FBC), ref: 004020A2
        • GetFileAttributesW.KERNEL32(00000104,00000000,?,00000104), ref: 0040506A
        • wcscat.MSVCRT ref: 00405088
        • FindFirstFileW.KERNEL32(?,00000004), ref: 0040509B
        • free.MSVCRT ref: 004050AD
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: File$AttributesByteCharErrorFindFirstLastMultiWidefprintffreemallocstrlenwcscat
        • String ID:
        • API String ID: 392836878-0
        • Opcode ID: e79b47d1286230eb7d141f15a89abe5fc7a5f6592ced7b812b44449566576ae1
        • Instruction ID: 6205375535422fb98c65416112280eb74cae250845da2a52f834980c0f9ca461
        • Opcode Fuzzy Hash: e79b47d1286230eb7d141f15a89abe5fc7a5f6592ced7b812b44449566576ae1
        • Instruction Fuzzy Hash: E211E172804718ABDB219B64DC49BCF7BB8EB08710F104237F592E11D1DB7899848ED9
        APIs
        • GetLastError.KERNEL32(00000400,?,00000100,00000000), ref: 00401B26
        • FormatMessageA.KERNEL32(00001200,00000000,00000000), ref: 00401B34
        • MessageBoxA.USER32(00000000,?,Error,00000000), ref: 00401B4A
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Message$ErrorFormatLast
        • String ID: Error
        • API String ID: 3971115935-2619118453
        • Opcode ID: 4ccfe3fa539967b1ae96428d2f5248a1eebe62ae31662a1700949b05acea0baa
        • Instruction ID: 763ea1061007aa920f46b8dc7f88ff7b1de4ebba141e84736df05a43fb68c6f2
        • Opcode Fuzzy Hash: 4ccfe3fa539967b1ae96428d2f5248a1eebe62ae31662a1700949b05acea0baa
        • Instruction Fuzzy Hash: 39E012753C83087BF311A7909C0BFE53A7CA70CB46F1000A1B745EA0D1D6E066858BBE
        APIs
        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00410B04,?,?,00000020,00000000,?), ref: 00410B70
        • CryptGenRandom.ADVAPI32(00000000,?,?), ref: 00410B88
        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 00410B9B
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Crypt$Context$AcquireRandomRelease
        • String ID:
        • API String ID: 1815803762-0
        • Opcode ID: 30b063b7c377ade30999de5261aa69e96fa3445498b83d155d090c18a643c283
        • Instruction ID: a71b62a3c0dc8fed6adabca901635108085f1f366887e3670e039babefef7bde
        • Opcode Fuzzy Hash: 30b063b7c377ade30999de5261aa69e96fa3445498b83d155d090c18a643c283
        • Instruction Fuzzy Hash: EAE0123124C311FEEA310FA0DC04FD67BA5AF097A8F218926F295B40E4D2B5A4D0961D
        APIs
        • recv.WS2_32(?,?,?,00000000), ref: 004114D2
        • WSAGetLastError.WS2_32(?,?,?,00000000), ref: 004114DC
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: ErrorLastrecv
        • String ID:
        • API String ID: 2514157807-0
        • Opcode ID: ed0bf3bbaab8c12acd455cb48166f4a06002cce13a8dd5f765726d1e335034f3
        • Instruction ID: 633b258b162bd797bd3c45fa1815db1eeecf56bba4e2147d0149f59b7c395aed
        • Opcode Fuzzy Hash: ed0bf3bbaab8c12acd455cb48166f4a06002cce13a8dd5f765726d1e335034f3
        • Instruction Fuzzy Hash: 59F0393120C1017ADE2947B88C85AAE2242EB85738F308B1BF637D12F1EA3CC981611B
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fgets$strncpystrstr$ftellstrlenstrncmp$fclose$freefseekmallocmemcpy$fopenfread
        • String ID: -----BEGIN CERTIFICATE-----$-----BEGIN PRIVATE KEY-----$-----BEGIN RSA PRIVATE KEY-----$-----END CERTIFICATE-----$-----END PRIVATE KEY-----$-----END RSA PRIVATE KEY-----$AES$DES$Proc-Type
        • API String ID: 2511635278-3331026054
        • Opcode ID: 0625b4b3e10c662d94f6aa3efc5f993f840230278a3a7afb6e35378b699bb929
        • Instruction ID: 06edf912bd889ffcaba2f9a4d916694d605f8109571f26fba2d413c4cecf1970
        • Opcode Fuzzy Hash: 0625b4b3e10c662d94f6aa3efc5f993f840230278a3a7afb6e35378b699bb929
        • Instruction Fuzzy Hash: 6DC15F71D04209ABDB10DFA5DD45BDE7BB8AB04714F208166FA04B72C1D738AA458FA9
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: getenv$strrchr$htonsinet_ntoamemcmptoupper
        • String ID: %.*s$AUTH_TYPE=Digest$COMSPEC$COMSPEC=%s$CONTENT_LENGTH=%s$CONTENT_TYPE=%s$Content-Length$Content-Type$DOCUMENT_ROOT=%.*s$GATEWAY_INTERFACE=CGI/1.1$HTTPS=%s$HTTP_%s=%s$PATH$PATH=%s$PATH_TRANSLATED=%s$PERLLIB$PERLLIB=%s$PUT$QUERY_STRING=%s$REDIRECT_STATUS=200$REMOTE_ADDR=%s$REMOTE_PORT=%d$REMOTE_USER=%s$REQUEST_METHOD=%s$REQUEST_URI=%s$SCRIPT_FILENAME=%s$SCRIPT_NAME=%.*s%s$SERVER_NAME=%s$SERVER_PORT=%d$SERVER_PROTOCOL=HTTP/1.1$SERVER_ROOT=%.*s$SYSTEMROOT$SYSTEMROOT=%s$off
        • API String ID: 2682622969-2207420381
        • Opcode ID: d41ee1b85019d6e4a25e2537261692bf93959dffc74d76a611ff6d55b3fb199b
        • Instruction ID: b0a25b9eb5586ebf6524b6ddf73e8a91bb3a14c26a3d2b7d1985fad6d9e0b155
        • Opcode Fuzzy Hash: d41ee1b85019d6e4a25e2537261692bf93959dffc74d76a611ff6d55b3fb199b
        • Instruction Fuzzy Hash: 4681B2B1A402017FEB017BA58C82EBB7778AF54714B11403FFD16B21C2D77CA961A6AD
        APIs
        Strings
        • peer subject name mismatch, xrefs: 0040A5F0
        • premaster secret version mismatch error, xrefs: 0040A614
        • error during decryption, xrefs: 0040A578
        • record layer version error, xrefs: 0040A620
        • verify mac problem, xrefs: 0040A50C
        • unsupported cipher suite, xrefs: 0040A4DC
        • verify problem on finished, xrefs: 0040A500
        • parse error on header, xrefs: 0040A518
        • handshake layer not ready yet, complete first, xrefs: 0040A608
        • unknown type in record hdr, xrefs: 0040A56C
        • out of memory, xrefs: 0040A4F4
        • verify problem based on signature, xrefs: 0040A650
        • error during encryption, xrefs: 0040A590
        • malformed buffer input error, xrefs: 0040A638
        • gettimeofday() error, xrefs: 0040A68F
        • build message failure, xrefs: 0040A5D8
        • need peer's key, xrefs: 0040A5A8
        • error during rsa priv op, xrefs: 0040A5C0
        • client hello malformed, xrefs: 0040A5E4
        • zlib init error, xrefs: 0040A674
        • psk server hint error, xrefs: 0040A662
        • don't have enough data to complete task, xrefs: 0040A560
        • expected data, not there, xrefs: 0040A554
        • non-blocking socket wants data to be read, xrefs: 0040A5FC
        • bad index to key rounds, xrefs: 0040A4E8
        • revcd alert fatal error, xrefs: 0040A584
        • getitimer() error, xrefs: 0040A698
        • psk key callback error, xrefs: 0040A66B
        • cant decode peer key, xrefs: 0040A6BC
        • psk client identity error, xrefs: 0040A659
        • error state on socket, xrefs: 0040A548
        • non-blocking socket write buffer full, xrefs: 0040A62C
        • weird handshake type, xrefs: 0040A53C
        • fread problem, xrefs: 0040A59C
        • peer sent close notify alert, xrefs: 0040A6C5
        • setitimer() error, xrefs: 0040A6AA
        • can't match cipher suite, xrefs: 0040A5CC
        • zlib decompress error, xrefs: 0040A686
        • record layer length error, xrefs: 0040A6B3
        • unknown error number, xrefs: 0040A6CE
        • sigaction() error, xrefs: 0040A6A1
        • need the private key, xrefs: 0040A5B4
        • verify problem on certificate, xrefs: 0040A644
        • peer didn't send cert, xrefs: 0040A530
        • zlib compress error, xrefs: 0040A67D
        • wrong client/server type, xrefs: 0040A524
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strncpy
        • String ID: bad index to key rounds$build message failure$can't match cipher suite$cant decode peer key$client hello malformed$don't have enough data to complete task$error during decryption$error during encryption$error during rsa priv op$error state on socket$expected data, not there$fread problem$getitimer() error$gettimeofday() error$handshake layer not ready yet, complete first$malformed buffer input error$need peer's key$need the private key$non-blocking socket wants data to be read$non-blocking socket write buffer full$out of memory$parse error on header$peer didn't send cert$peer sent close notify alert$peer subject name mismatch$premaster secret version mismatch error$psk client identity error$psk key callback error$psk server hint error$record layer length error$record layer version error$revcd alert fatal error$setitimer() error$sigaction() error$unknown error number$unknown type in record hdr$unsupported cipher suite$verify mac problem$verify problem based on signature$verify problem on certificate$verify problem on finished$weird handshake type$wrong client/server type$zlib compress error$zlib decompress error$zlib init error
        • API String ID: 3301158039-364039421
        • Opcode ID: e6f1fa37ab2957cf8300f6eff9de2c7fbf376bd373020a0a0dc7b613a64dbda1
        • Instruction ID: e7a1c5c8748af2ae978f75a9bd96f1b358aa4c47acd9aa4faaa42a1dadc513c3
        • Opcode Fuzzy Hash: e6f1fa37ab2957cf8300f6eff9de2c7fbf376bd373020a0a0dc7b613a64dbda1
        • Instruction Fuzzy Hash: 9F41F478FC8B14B2E1240541AD07FAB66661714FC2F7849637B967DAC042FE62A3380F
        APIs
        Strings
        • ASN version error, invalid number, xrefs: 0040D2C4
        • ASN oid error, unknown sum id, xrefs: 0040D303
        • ASN parsing error, invalid input, xrefs: 0040D2B8
        • ASN input error, not enough data, xrefs: 0040D339
        • reading random device error, xrefs: 0040D1E0
        • ASN bit string error, wrong id, xrefs: 0040D2FA
        • mp_read error state, xrefs: 0040D21C
        • mp_init error state, xrefs: 0040D210
        • ASN date error, current date after, xrefs: 0040D31E
        • mp_to_xxx error state, can't convert, xrefs: 0040D234
        • windows crypt generation error, xrefs: 0040D1F8
        • ASN sig error, unsupported hash type, xrefs: 0040D34B
        • ASN object id error, invalid id, xrefs: 0040D2DC
        • mp_mod error state, can't mod, xrefs: 0040D270
        • windows crypt init error, xrefs: 0040D1EC
        • ASN sig error, unsupported key type, xrefs: 0040D354
        • ASN tag error, not null, xrefs: 0040D2E8
        • ASN expect error, not zero, xrefs: 0040D2F1
        • opening random device error, xrefs: 0040D1D4
        • ASN sig error, confirm failure, xrefs: 0040D342
        • mp_sub error state, can't subtract, xrefs: 0040D240
        • RSA buffer error, output too small or input too big, xrefs: 0040D2AC
        • RSA wrong block type for RSA function, xrefs: 0040D2A0
        • ASN date error, current date before, xrefs: 0040D315
        • mp_cmp error state, xrefs: 0040D288
        • ASN date error, bad size, xrefs: 0040D30C
        • out of memory error, xrefs: 0040D294
        • ASN signature error, mismatched oid, xrefs: 0040D327
        • mp_exptmod error state, xrefs: 0040D228
        • unknown error number, xrefs: 0040D366
        • ASN key init error, invalid input, xrefs: 0040D35D
        • random device read would block error, xrefs: 0040D204
        • ASN time error, unkown time type, xrefs: 0040D330
        • ASN get big int error, invalid data, xrefs: 0040D2D0
        • mp_mulmod error state, can't multiply mod, xrefs: 0040D264
        • mp_add error state, can't add, xrefs: 0040D24C
        • mp_mul error state, can't multiply, xrefs: 0040D258
        • mp_invmod error state, can't inv mod, xrefs: 0040D27C
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strncpy
        • String ID: ASN bit string error, wrong id$ASN date error, bad size$ASN date error, current date after$ASN date error, current date before$ASN expect error, not zero$ASN get big int error, invalid data$ASN input error, not enough data$ASN key init error, invalid input$ASN object id error, invalid id$ASN oid error, unknown sum id$ASN parsing error, invalid input$ASN sig error, confirm failure$ASN sig error, unsupported hash type$ASN sig error, unsupported key type$ASN signature error, mismatched oid$ASN tag error, not null$ASN time error, unkown time type$ASN version error, invalid number$RSA buffer error, output too small or input too big$RSA wrong block type for RSA function$mp_add error state, can't add$mp_cmp error state$mp_exptmod error state$mp_init error state$mp_invmod error state, can't inv mod$mp_mod error state, can't mod$mp_mul error state, can't multiply$mp_mulmod error state, can't multiply mod$mp_read error state$mp_sub error state, can't subtract$mp_to_xxx error state, can't convert$opening random device error$out of memory error$random device read would block error$reading random device error$unknown error number$windows crypt generation error$windows crypt init error
        • API String ID: 3301158039-3443631539
        • Opcode ID: 5b72e3aba17b383f0d558ece8212d05e6e90c0cc42f884a62ec52b624125e9ff
        • Instruction ID: 1975c9eabfe9b03da948abcedc8dfc902c2944fa7a18c90636db9a8dd2115001
        • Opcode Fuzzy Hash: 5b72e3aba17b383f0d558ece8212d05e6e90c0cc42f884a62ec52b624125e9ff
        • Instruction Fuzzy Hash: 3E31CD38BCCF44B1E12405A65D23FAAA6516722F07FB0C9237F16BA0D191FD609A6C5F
        APIs
          • Part of subcall function 00406096: htons.WS2_32(?), ref: 0040612C
          • Part of subcall function 00406096: inet_ntoa.WS2_32(?), ref: 00406158
          • Part of subcall function 00406096: strrchr.MSVCRT ref: 00406191
          • Part of subcall function 00406096: strrchr.MSVCRT ref: 0040619B
        • strrchr.MSVCRT ref: 004059CD
        • _pipe.MSVCRT ref: 00405A24
        • _pipe.MSVCRT ref: 00405A3B
        • _fdopen.MSVCRT ref: 00405A86
        • _fdopen.MSVCRT ref: 00405A9D
        • setbuf.MSVCRT ref: 00405AB7
        • setbuf.MSVCRT ref: 00405ABE
        • strcmp.MSVCRT ref: 00405AD0
        • _close.MSVCRT ref: 00405C4F
        • _close.MSVCRT ref: 00405C5B
        • fclose.MSVCRT ref: 00405C6D
        • fclose.MSVCRT ref: 00405C86
          • Part of subcall function 00405C9C: TerminateProcess.KERNEL32(000000FF,000000FF,00405C3F,000000FF,00000000), ref: 00405CA4
          • Part of subcall function 00405C9C: CloseHandle.KERNEL32(?), ref: 00405CAE
        • _close.MSVCRT ref: 00405C7A
        • _close.MSVCRT ref: 00405C93
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _close$strrchr$_fdopen_pipefclosesetbuf$CloseHandleProcessTerminatehtonsinet_ntoastrcmp
        • String ID: %s: %s$.$CGI program sent malformed HTTP headers: [%.*s]$Cannot create CGI pipe: %s$HTTP/1.1 %d OK$POST$PUT$Status$fopen: %s
        • API String ID: 886371925-1420429565
        • Opcode ID: a955a8f615620f707e8ab418eae0642e0079c25be4419ce2ce445c2cbda1678d
        • Instruction ID: 89ca7185bf190e9658fff9592c8cab39169cbb7ab8633a9bfa65a5190be44952
        • Opcode Fuzzy Hash: a955a8f615620f707e8ab418eae0642e0079c25be4419ce2ce445c2cbda1678d
        • Instruction Fuzzy Hash: 7C916C71C04619AADF119FA4CC45AEF7BB8EF04725F20426BF528B21D0D7789A818F99
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp$ErrorLaststrchrstrerrorstrlenstrstr
        • String ID: .htpasswd$Access Forbidden$DELETE$Directory Listing Denied$Directory listing denied$File not found$Forbidden$GET$HTTP/1.1 301 Moved PermanentlyLocation: %s/$Method %s is not implemented$Not Found$Not Implemented$Not Modified$POST$PUT$remove(%s): %s$yes
        • API String ID: 3052132889-2522122181
        • Opcode ID: 2f47bf66a04e6effec4fc2ec711b0a34e01662a363c8bf4cea31b8b66c235e8a
        • Instruction ID: 2276f47d087f3cec3993cb5c19a9260cadb13ee9470fbdf07f3126a1a2beec67
        • Opcode Fuzzy Hash: 2f47bf66a04e6effec4fc2ec711b0a34e01662a363c8bf4cea31b8b66c235e8a
        • Instruction Fuzzy Hash: 6D7106F1540615BBE721A6A1CC42EEB77ACAF46308F10443BF705B21D1E77CDA828A6D
        APIs
        • memset.MSVCRT ref: 00405CD0
        • memset.MSVCRT ref: 00405CDC
        • GetCurrentProcess.KERNEL32(?,?,?,?,7633BBC0,00000200), ref: 00405CF2
        • _get_osfhandle.MSVCRT ref: 00405D10
        • DuplicateHandle.KERNEL32(?,00000000,?,?,?,7633BBC0,00000200), ref: 00405D1D
        • _get_osfhandle.MSVCRT ref: 00405D2E
        • DuplicateHandle.KERNEL32(?,00000000,?,?,7633BBC0,00000200), ref: 00405D35
        • fopen.MSVCRT ref: 00405D5D
        • fgets.MSVCRT ref: 00405D7D
        • strlen.MSVCRT ref: 00405D9F
        • _isctype.MSVCRT ref: 00405DC6
        • fclose.MSVCRT ref: 00405DF3
        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000200,00000000,?,?,?), ref: 00405E51
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,7633BBC0,00000200), ref: 00405E5B
        • _close.MSVCRT ref: 00405E8B
        • _close.MSVCRT ref: 00405E90
        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,7633BBC0,00000200), ref: 00405E9D
        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,7633BBC0,00000200), ref: 00405EA2
        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,7633BBC0,00000200), ref: 00405EA7
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Handle$Close$DuplicateProcess_close_get_osfhandlememset$CreateCurrentErrorLast_isctypefclosefgetsfopenstrlen
        • String ID: !$#$%s%s%s%c%s$%s: CreateProcess(%s): %d$HA$lZ@$lZ@$line 1149
        • API String ID: 169626730-1423124989
        • Opcode ID: c038794c2cd251ca563de7eec8b3eb6590880ea42219e39299bfd52d1f518da8
        • Instruction ID: 633f74d37b786cf605677604e4736b3c9370b51969d049de13626e66391ad64f
        • Opcode Fuzzy Hash: c038794c2cd251ca563de7eec8b3eb6590880ea42219e39299bfd52d1f518da8
        • Instruction Fuzzy Hash: 68518DB2944218BFDB119F90DC89EEF7B78EF04315F104066FA05A6291D6799E848FA8
        APIs
        • gethostbyname.WS2_32(?), ref: 0040232D
        • GetLastError.KERNEL32 ref: 00402339
        • strerror.MSVCRT ref: 00402340
        • socket.WS2_32(00000002,00000001,00000000), ref: 00402367
        • GetLastError.KERNEL32 ref: 00402374
        • strerror.MSVCRT ref: 0040237B
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$ErrorLaststrerror$_vsnprintffclosefputcgethostbynameinet_ntoasockettime
        • String ID: %s: SSL is not initialized$%s: calloc: %s$%s: connect(%s:%d): %s$%s: gethostbyname(%s): %s$%s: socket: %s$line 1541$line 1543$line 1545$line 1551$line 1555
        • API String ID: 22702776-2137221567
        • Opcode ID: 560963c9d139f978dd6e1ff3042e4a1d32f833f8f76a1e109bb17086254c2ea0
        • Instruction ID: 13a1a414ae75e44cd5ce26621fc4a298a2e9c8f23a9d3a71ea5778f7affc2ebb
        • Opcode Fuzzy Hash: 560963c9d139f978dd6e1ff3042e4a1d32f833f8f76a1e109bb17086254c2ea0
        • Instruction Fuzzy Hash: 50419471584215BFDB006F64DD8DADB3738BF15705B008076FE06B62E1E7B989418BAD
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fseek$fopenfreeftellmalloc
        • String ID: AES-128-CBC$AES-192-CBC$AES-256-CBC$DES-CBC$DES-EDE3-CBC$MD5$`3@
        • API String ID: 3333732893-1192020056
        • Opcode ID: 484ba6a3c57c02b6c9866958ad81eedde6b879c02128f73b4e2a3efe078c56bd
        • Instruction ID: 9cac7e081f9dac57fbd914f346ab4ae59a965c0f17a9787744fdf5cf22731d1a
        • Opcode Fuzzy Hash: 484ba6a3c57c02b6c9866958ad81eedde6b879c02128f73b4e2a3efe078c56bd
        • Instruction Fuzzy Hash: 0CA15672D04219BACF11DBE4CC45FDEBB7CAB08314F1005A7F505B2190EB79AA94DB6A
        APIs
        Strings
        • a, xrefs: 00404E22
        • <html><head><title>Index of %s</title><style>th {text-align: left;}</style></head><body><h1>Index of %s</h1><pre><table cellpadding="0"><tr><th><a href="?n%c">Name</a></th><th><a href="?d%c">Modified</a></th><th><a href="?s%c">Size</a></th></tr><tr><td colspan, xrefs: 00404F49
        • Error: opendir(%s): %s, xrefs: 00404DE0
        • PUT, xrefs: 00404DAA
        • .htpasswd, xrefs: 00404E73
        • , xrefs: 00404F17
        • Parent directory, xrefs: 00404F62
        • HTTP/1.1 200 OKConnection: closeContent-Type: text/html; charset=utf-8, xrefs: 00404E02
        • Error: cannot allocate memory, xrefs: 00404FFC
        • Cannot open directory, xrefs: 00404DE5, 00405006
        • %s%c%s, xrefs: 00404ECA
        • <tr><td><a href="%s%s">%s</a></td><td>&nbsp;%s</td><td>&nbsp;&nbsp;%s</td></tr>, xrefs: 00404F71
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp$ErrorLast$memsetreallocstrerror
        • String ID: $%s%c%s$.htpasswd$<html><head><title>Index of %s</title><style>th {text-align: left;}</style></head><body><h1>Index of %s</h1><pre><table cellpadding="0"><tr><th><a href="?n%c">Name</a></th><th><a href="?d%c">Modified</a></th><th><a href="?s%c">Size</a></th></tr><tr><td colspan$<tr><td><a href="%s%s">%s</a></td><td>&nbsp;%s</td><td>&nbsp;&nbsp;%s</td></tr>$Cannot open directory$Error: cannot allocate memory$Error: opendir(%s): %s$HTTP/1.1 200 OKConnection: closeContent-Type: text/html; charset=utf-8$PUT$Parent directory$a
        • API String ID: 3308412080-3775122214
        • Opcode ID: 8e276271ea34854413d26fbdec08550129e747bb9f1708f68fca426b4be5fbb7
        • Instruction ID: 0a049c7bb59596c2ac837f000157fc62c0ef18580605723adf4420b4e97d06e7
        • Opcode Fuzzy Hash: 8e276271ea34854413d26fbdec08550129e747bb9f1708f68fca426b4be5fbb7
        • Instruction Fuzzy Hash: F66194B1940209BFDF11AF65CC42ADFBBB5EF44304F24806BF914B2291D7789A909F99
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fclosefprintf$_errnofgetsstrcmpstrerror$ByteCharFileMoveMultiWide_snprintf_wfopensscanf
        • String ID: %[^:]:%[^:]:%*s$%s.tmp$%s:%s:%s$Cannot open %s: %s
        • API String ID: 1040975815-1398897490
        • Opcode ID: 686b21a836f19e691594bdc839e4b1e0711da7fcfcb99ff99a34cea6997bddd1
        • Instruction ID: 925f406cee9d15ba0998cdf605ae857f8100d02fff854eb34d00fbe5eddc56b1
        • Opcode Fuzzy Hash: 686b21a836f19e691594bdc839e4b1e0711da7fcfcb99ff99a34cea6997bddd1
        • Instruction Fuzzy Hash: 31514772901219BFDF11AFA0DD45EEE7B7CEF08355F104066F904A21A0E739AB549BA8
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp$strlen$_isctypememset
        • String ID: Authorization$Digest $cnonce$nonce$qop$response$uri$username
        • API String ID: 565432818-1180773434
        • Opcode ID: c31579c72db72d49b7f2849db31089ed999bd7f77b81f65a8f068daf0d92c2d6
        • Instruction ID: e679fb6d81753edb72cde198fad3ba71fcf6ffb8778a7efc634d105b1d4472bc
        • Opcode Fuzzy Hash: c31579c72db72d49b7f2849db31089ed999bd7f77b81f65a8f068daf0d92c2d6
        • Instruction Fuzzy Hash: CD418CF1549311BBE7119BA19D01BAE77689F85718B31007FF601BA2C2EB7CE941879C
        APIs
        • time.MSVCRT(00000000,00000000,00000000,PUT), ref: 004053D4
          • Part of subcall function 004055CB: strlen.MSVCRT ref: 004055D7
          • Part of subcall function 00401F9F: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0041C478,000000FF,?,00000014,00000000,?,00000104), ref: 00401FCE
          • Part of subcall function 00401F9F: _wfopen.MSVCRT ref: 00401FDF
        • GetLastError.KERNEL32(?,0041D694,?,?,?), ref: 00405421
        • strerror.MSVCRT ref: 00405428
        • fseek.MSVCRT ref: 00405493
        • localtime.MSVCRT(00000000,?,Range,?,0041D694,?,?,?), ref: 00405502
        • strftime.MSVCRT ref: 00405517
        • localtime.MSVCRT(00000010), ref: 00405524
        • strftime.MSVCRT ref: 00405539
        Strings
        • Content-Range: bytes %I64d-%I64d/%I64d, xrefs: 004054E6
        • %a, %d %b %Y %H:%M:%S %Z, xrefs: 00405509, 0040552B
        • PUT, xrefs: 004053C8
        • HTTP/1.1 %d %sDate: %sLast-Modified: %sEtag: "%s"Content-Type: %.*sContent-Length: %I64dConnection: %sAccept-Ranges: bytes%s, xrefs: 0040558E
        • fopen(%s): %s, xrefs: 00405432
        • HEAD, xrefs: 00405599
        • %lx.%lx, xrefs: 0040554D
        • Range, xrefs: 00405450
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: localtimestrftime$ByteCharErrorLastMultiWide_wfopenfseekstrerrorstrlentime
        • String ID: %a, %d %b %Y %H:%M:%S %Z$%lx.%lx$Content-Range: bytes %I64d-%I64d/%I64d$HEAD$HTTP/1.1 %d %sDate: %sLast-Modified: %sEtag: "%s"Content-Type: %.*sContent-Length: %I64dConnection: %sAccept-Ranges: bytes%s$PUT$Range$fopen(%s): %s
        • API String ID: 2369655464-650397243
        • Opcode ID: 7987a64adadd334ef35be0e60877aee5dcd1fec68f5c7e0fb0ab34db947e4220
        • Instruction ID: 5baf913c6f3ccf0b6f5f85429a6d2f5d87d92ec1d7e4190584da1b8e740696b7
        • Opcode Fuzzy Hash: 7987a64adadd334ef35be0e60877aee5dcd1fec68f5c7e0fb0ab34db947e4220
        • Instruction Fuzzy Hash: ED511EB1900209BFDF019FA5CC45FDEBBB9EF08304F108066FA09B6150D739A6949F58
        APIs
        • memcpy.MSVCRT(?, q@,00000004,?,00000001,?,?,?,?,?,?,?,?,?,00407120,?), ref: 00403AB4
        • sscanf.MSVCRT ref: 00403B06
        • sscanf.MSVCRT ref: 00403B76
        • htonl.WS2_32(?), ref: 00403BBA
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: sscanf$htonlmemcpy
        • String ID: q@$ q@$%c%d.%d.%d.%d%n$%s: bad ip address: [%s]$%s: bad subnet mask: %d [%s]$%s: flag must be + or -: [%s]$%s: subnet must be [+|-]x.x.x.x[/x]$+$-$/%d$line 3394$line 3397$line 3400$line 3405
        • API String ID: 359337409-965355043
        • Opcode ID: a4fbb34e6d32b9ff8a3e1206e17de83256c0cc8ee94067d24eda1260b434a218
        • Instruction ID: f08b20ad89a365d4353c46ea2b709063bd2c42ae41fc1999f3b94109c030d2ca
        • Opcode Fuzzy Hash: a4fbb34e6d32b9ff8a3e1206e17de83256c0cc8ee94067d24eda1260b434a218
        • Instruction Fuzzy Hash: DE518F72D44208AADF11AFA5CC42AEEBF7CAF08306F104137F910F61D1D7799A4186A8
        APIs
          • Part of subcall function 004047A4: memcmp.MSVCRT(?,00000000,?,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004047E6
        • sscanf.MSVCRT ref: 0040689D
        • sscanf.MSVCRT ref: 004068DB
        • GetLastError.KERNEL32(?,0041D694), ref: 00406995
        • strerror.MSVCRT ref: 0040699C
          • Part of subcall function 0040470C: strlen.MSVCRT ref: 00404716
        • fclose.MSVCRT ref: 004069FA
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$fclosesscanf$ErrorLast_vsnprintffputcinet_ntoamemcmpstrerrorstrlentime
        • String ID: "%[^"]"$ file="%[^"]"$ virtual="%[^"]"$%.*s%c%s$Bad SSI #include: [%s]$Cannot open SSI #include: [%s]: fopen(%s): %s$Rg@
        • API String ID: 3220242722-3770262602
        • Opcode ID: c6b647496b7e2a028bbc22c3026968deaa3ddcbf300f18b2ba98b7a5114157ed
        • Instruction ID: a1efbb3680c02e2bff453eaffec654aae7fbdc328293c667888d75324f1fd531
        • Opcode Fuzzy Hash: c6b647496b7e2a028bbc22c3026968deaa3ddcbf300f18b2ba98b7a5114157ed
        • Instruction Fuzzy Hash: 5441A9F69002187BCB11EB608C85EDB376C9B55314F1141B7FA06F61C2E678DA948FA5
        APIs
        • fgetc.MSVCRT ref: 004066C7
        • memcmp.MSVCRT(?,<!--#,00000005), ref: 00406713
        • memcmp.MSVCRT(?,include,00000007), ref: 00406731
        • fgetc.MSVCRT ref: 00406845
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$fgetcmemcmp$_vsnprintffclosefputcinet_ntoatime
        • String ID: %s: SSI tag is too large$%s: unknown SSI command: "%s"$<$<!--#$PUT$SSI #include level is too deep (%s)$exec$include
        • API String ID: 1741009251-3645676390
        • Opcode ID: cbc203ae559e5128f1b47167f0e3c4af9c511080d1774e2e2a0a1495936a111b
        • Instruction ID: c01bd65600cf02c84e4ca60ae2e6fd1c70176a9bd45ccc39fcd109c84131a774
        • Opcode Fuzzy Hash: cbc203ae559e5128f1b47167f0e3c4af9c511080d1774e2e2a0a1495936a111b
        • Instruction Fuzzy Hash: 45412BB2D01219AADF10BA60CD45BEE7B689F10348F028077FE16B61D1D2798E658B99
        APIs
        • strcmp.MSVCRT ref: 00403E34
          • Part of subcall function 00406BCA: free.MSVCRT ref: 00406BDA
          • Part of subcall function 00404138: _isctype.MSVCRT ref: 00404166
        • strcmp.MSVCRT ref: 00403EED
        • strcmp.MSVCRT ref: 00403F00
        • strtol.MSVCRT ref: 00403F49
          • Part of subcall function 004043ED: strchr.MSVCRT ref: 00404401
          • Part of subcall function 004043ED: strlen.MSVCRT ref: 0040441A
          • Part of subcall function 004043ED: strstr.MSVCRT ref: 0040447F
        • time.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00403F60
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp$_isctypefreestrchrstrlenstrstrstrtoltime
        • String ID: 1.0$1.1$Bad Request$Cannot parse HTTP request: [%.*s]$Content-Length$HTTP version not supported$Request Too Large$yes
        • API String ID: 3210047668-172848610
        • Opcode ID: 7e703d405dd95234ecde791e90470daef65252fc4b9fa732b02c97d6b0e8fd10
        • Instruction ID: 89f3a0490ecb325aa62c9d102e1c027504e154a25bcb637ebf64d53d5247bb75
        • Opcode Fuzzy Hash: 7e703d405dd95234ecde791e90470daef65252fc4b9fa732b02c97d6b0e8fd10
        • Instruction Fuzzy Hash: 8941E670A45702AEC720BF618C85EA7BBA9AF0130AF20083FF15A711D1DB396A518A5D
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: sscanf$localtimememsetmktimetime
        • String ID: %*3s, %d %3s %d %d:%d:%d$%d %3s %d %d:%d:%d$%d-%3s-%d %d:%d:%d$%d/%3s/%d %d:%d:%d$d
        • API String ID: 2308227440-4021877339
        • Opcode ID: ba7f1855973b3a0a6b62e520855fe223cbb773b2814d9c847278fb52da3dd56d
        • Instruction ID: e233cfaf12ee3f62d8292cfd4d7c4490a84b9ab5367e884e92d9af0279f4cd8b
        • Opcode Fuzzy Hash: ba7f1855973b3a0a6b62e520855fe223cbb773b2814d9c847278fb52da3dd56d
        • Instruction Fuzzy Hash: 954190B6D0021CABCB11DBD5C885DEFBBBCEB08710F144567E616F2240E634AA85CFA5
        APIs
        Strings
        • <value>, xrefs: 00401984, 00401989
        • # %s %s, xrefs: 0040198D
        • # Mongoose web server configuration file.# Lines starting with '#' and empty lines are ignored.# For detailed description of every option, visit# http://code.google.com/p/mongoose/wiki/MongooseManual, xrefs: 0040195C
        • c:\Mongoose\mongoose.conf, xrefs: 00401928, 00401932, 0040194A, 004019AB
        • notepad.exe %s, xrefs: 004019AC
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fclosefopenfprintf$Exec_snprintf
        • String ID: # %s %s$# Mongoose web server configuration file.# Lines starting with '#' and empty lines are ignored.# For detailed description of every option, visit# http://code.google.com/p/mongoose/wiki/MongooseManual$<value>$c:\Mongoose\mongoose.conf$notepad.exe %s
        • API String ID: 3729112075-1207232489
        • Opcode ID: 2034fbd226cdbadba671e74a9c6999986974fda3e50559c9fbc882b7d8c389fa
        • Instruction ID: 3753513ac3c6f0837f2992d5d53ff091845cca147fa0e5b3da4a3c5000533862
        • Opcode Fuzzy Hash: 2034fbd226cdbadba671e74a9c6999986974fda3e50559c9fbc882b7d8c389fa
        • Instruction Fuzzy Hash: B2110172984309AFE7102764EC45FE27B6CDB45322F118477FC05A31E0EA7D98488BAD
        APIs
        • memcpy.MSVCRT(?,?,00000002,?,?,20746962,?,?,?,?,?,?,?,?,73250000,?), ref: 0040CABB
        • memcpy.MSVCRT(?,/O=,00000003,?,?,0041C038,?,?,?,00000001,?,?,?,?,0040C836,?), ref: 0040CB6F
        • memcpy.MSVCRT(?,/OU=,00000004,?,?,0041C038,?,?,?,00000001,?,?,?,?,0040C836,?), ref: 0040CBB6
        • memcpy.MSVCRT(?,?,0041C038,?,?,0041C038,?,?,?,00000001,?,?,?,?,0040C836,?), ref: 0040CBD3
        • memcpy.MSVCRT(?,/emailAddress=,0000000E,?,?,?,00000001,?,?,?,?,0040C836,?,00000000,?,?), ref: 0040CC47
        • memcpy.MSVCRT(?,?,?,?,/emailAddress=,0000000E,?,?,?,00000001,?,?,?,?,0040C836,?), ref: 0040CC61
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: /C=$/CN=$/L=$/O=$/OU=$/SN=$/ST=$/emailAddress=
        • API String ID: 3510742995-3781244610
        • Opcode ID: 66fe7cd7d33252a9df22d45fc2c862b0f0e1074e550771a03dd2c0a38ecc6f3e
        • Instruction ID: eec6006a7a14da3ac42bb435d593a2175b2dd9abe7681775d92ea7c220317747
        • Opcode Fuzzy Hash: 66fe7cd7d33252a9df22d45fc2c862b0f0e1074e550771a03dd2c0a38ecc6f3e
        • Instruction Fuzzy Hash: 6C81B771A04209EBDB10DBA5DCC6FEBB7B8EF15304F10023BE954E7281D339A9558B59
        APIs
        • strncmp.MSVCRT ref: 004080BF
        • strncmp.MSVCRT ref: 004080D7
        • strncmp.MSVCRT ref: 004080F0
        • memcpy.MSVCRT(00407491,?,00000001,?,?,?,?,?), ref: 004081ED
        • memcpy.MSVCRT(?,00000001,00000001,?,?,?,?,?), ref: 00408222
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strncmp$memcpy
        • String ID: AES-128-CBC$AES-192-CBC$AES-256-CBC$DES-CBC$DES-EDE3-CBC$MD5
        • API String ID: 2549481713-1991666797
        • Opcode ID: dab578d20aae787007d3367acb8d9b5f1aa2e1f13acb87f60d74b30c0de9dea9
        • Instruction ID: 4da21b7980687ad04be761c49a374ad44bf65784bc340256a40777f49e590189
        • Opcode Fuzzy Hash: dab578d20aae787007d3367acb8d9b5f1aa2e1f13acb87f60d74b30c0de9dea9
        • Instruction Fuzzy Hash: D8519072A40209ABDB20DEA5CE45FDF7778AF44714F20443FB944BB1C1EA78DA458B94
        APIs
          • Part of subcall function 004039E1: GetFileAttributesExW.KERNEL32(?,00000000,?,00000000,?,00000104,00000000), ref: 00403A0F
          • Part of subcall function 004039E1: __aulldiv.LIBCMT ref: 00403A52
          • Part of subcall function 00406521: strchr.MSVCRT ref: 0040653C
          • Part of subcall function 00406521: memcpy.MSVCRT(?,00000000,00000000), ref: 00406556
        • GetLastError.KERNEL32(?,?,?,00000000,00000000,PUT), ref: 00406456
        • strerror.MSVCRT ref: 0040645D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: AttributesErrorFileLast__aulldivmemcpystrchrstrerror
        • String ID: Content-Range$HTTP/1.1 %d OK$PUT$fopen(%s): %s$put_dir(%s): %s$wb+
        • API String ID: 2355206587-3832267214
        • Opcode ID: af9a72bd29ea63ced43f11305f6f7f22f49207e18c8f90eeab1001ffbe8e006d
        • Instruction ID: 4f51b300b3a5a71adb1564c1299078f1b5aa9a1f8950bcb9d2dde639eb2796a0
        • Opcode Fuzzy Hash: af9a72bd29ea63ced43f11305f6f7f22f49207e18c8f90eeab1001ffbe8e006d
        • Instruction Fuzzy Hash: FD31DFB1840204BBDB01AFA2DC41CEF7BADEF58308B10452BF502B21E1D67886508B6D
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp
        • String ID: <=@$CONNECT$DELETE$GET$HEAD$POST$PUT
        • API String ID: 1004003707-1120301421
        • Opcode ID: e1635dfffc2841786f9072f6dcee5a3dcac235695695e976b6e410eb0784f301
        • Instruction ID: 036bc0aeba7c57b4b9eb2d94cd2764d73116e49e78a166828600b6f22c3ef5eb
        • Opcode Fuzzy Hash: e1635dfffc2841786f9072f6dcee5a3dcac235695695e976b6e410eb0784f301
        • Instruction Fuzzy Hash: EDF04FFA75BB2325A134A0A56C03BDB12484F463B9732402FF904B4AD0CA7CC9C2049D
        APIs
          • Part of subcall function 00401F9F: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0041C478,000000FF,?,00000014,00000000,?,00000104), ref: 00401FCE
          • Part of subcall function 00401F9F: _wfopen.MSVCRT ref: 00401FDF
        • localtime.MSVCRT(004041F8,?,0041C478,?,?), ref: 00406AEB
        • strftime.MSVCRT ref: 00406AFD
        • inet_ntoa.WS2_32(74C08400), ref: 00406B48
        • fprintf.MSVCRT ref: 00406B55
        • fputc.MSVCRT ref: 00406B79
        • fflush.MSVCRT ref: 00406B80
        • fclose.MSVCRT ref: 00406B87
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: ByteCharMultiWide_wfopenfclosefflushfprintffputcinet_ntoalocaltimestrftime
        • String ID: %d/%b/%Y:%H:%M:%S %z$%s - %s [%s] "%s %s HTTP/%s" %d %I64d$Referer$User-Agent
        • API String ID: 406731650-2090738960
        • Opcode ID: ca605b9dd49a38241723ceab13e8d76410d3f0be0ef77ea796d9e2c3da8a38ff
        • Instruction ID: e358d8f61db2daedbb639b80aa4e44a43d31f75799867a7f036013d19bba80dd
        • Opcode Fuzzy Hash: ca605b9dd49a38241723ceab13e8d76410d3f0be0ef77ea796d9e2c3da8a38ff
        • Instruction Fuzzy Hash: F721B3B1204710BBDB10AB65DC49EBB7BBDAF88704B01842DF55BD2291D638F8108728
        APIs
        • localtime.MSVCRT(00404FD1,?,?,?,76337310,00000000,00000104), ref: 004051C4
        • strftime.MSVCRT ref: 004051D9
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: localtimestrftime
        • String ID: %.1fG$%.1fM$%.1fk$%d-%b-%Y %H:%M$%lu$<tr><td><a href="%s%s%s">%s%s</a></td><td>&nbsp;%s</td><td>&nbsp;&nbsp;%s</td></tr>$HA$[DIRECTORY]
        • API String ID: 1424577559-2610314356
        • Opcode ID: 4e151a59139893a3dca14552b4f934b433ae60a159c5d92e8ccc55020b1d3953
        • Instruction ID: cf65dc2ddde2a3ace0d540f488ece434f9f7ecbb6dbb8f512d2ee75809582e52
        • Opcode Fuzzy Hash: 4e151a59139893a3dca14552b4f934b433ae60a159c5d92e8ccc55020b1d3953
        • Instruction Fuzzy Hash: 013115B1E00A04BBDB149B95DC45BEB77B9EF08700F10847BF645A6190E77899848F1C
        APIs
        • _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401F9F: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0041C478,000000FF,?,00000014,00000000,?,00000104), ref: 00401FCE
          • Part of subcall function 00401F9F: _wfopen.MSVCRT ref: 00401FDF
        • time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
        • inet_ntoa.WS2_32(?), ref: 00401F15
        • fprintf.MSVCRT ref: 00401F29
        • fprintf.MSVCRT ref: 00401F3F
        • fprintf.MSVCRT ref: 00401F51
        • fputc.MSVCRT ref: 00401F56
        • fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$ByteCharMultiWide_vsnprintf_wfopenfclosefputcinet_ntoatime
        • String ID: %s %s: $[%010lu] [error] [client %s]
        • API String ID: 3083441-1168560208
        • Opcode ID: aefc8f5e88ccad6ce2f400e6c5f6c1c53bb43ce1f5b037de17076794da5f9477
        • Instruction ID: c3e367b2c5833ae0a96fa87e4bee82f41e62fdb5037da7f10a95e1f739f5d92d
        • Opcode Fuzzy Hash: aefc8f5e88ccad6ce2f400e6c5f6c1c53bb43ce1f5b037de17076794da5f9477
        • Instruction Fuzzy Hash: F521B771644305BBE720AB79DC89FE777BCEF04304F144476F915E22A2E774E9008A68
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: sscanf$htonlhtonsmemsetstrchr
        • String ID: %d%n$%d.%d.%d.%d:%d%n$sp,
        • API String ID: 1351488546-3207130800
        • Opcode ID: 83c75d84e1bd344d3d3445a0db5353238d84388dbe654234ba3f122f2ed13db5
        • Instruction ID: 2ffaa9949a3a6b23c46fd9ed3c5c6b4bcf69d8f25be4d595818b4160695434e4
        • Opcode Fuzzy Hash: 83c75d84e1bd344d3d3445a0db5353238d84388dbe654234ba3f122f2ed13db5
        • Instruction Fuzzy Hash: 06314CBA940209ABD711CFA4CC80EEBBBBCEF48311F10846AE915E7190D774AB45CB64
        APIs
        • sscanf.MSVCRT ref: 00406A32
        • _popen.MSVCRT ref: 00406A61
        • GetLastError.KERNEL32 ref: 00406A6F
        • strerror.MSVCRT ref: 00406A76
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$ErrorLast_popen_vsnprintffclosefputcinet_ntoasscanfstrerrortime
        • String ID: "%[^"]"$Bad SSI #exec: [%s]$Cannot SSI #exec: [%s]: %s
        • API String ID: 3194429842-19566311
        • Opcode ID: 8a75b61d93de6ea758b8a3ec6f43006c449b0c1530dab1ae961e506731b07e0d
        • Instruction ID: 8ac9c01a8730cf46aaf01bbd84f2839ad95485a90cf1337a4b3004bb040d0bb3
        • Opcode Fuzzy Hash: 8a75b61d93de6ea758b8a3ec6f43006c449b0c1530dab1ae961e506731b07e0d
        • Instruction Fuzzy Hash: 9E01D876948214BBDB107B50DC09DDA3B3CEF05321F118233FD16B11E1EB3996608AAD
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _isctype$tolower
        • String ID: 2D@
        • API String ID: 2917967906-979837821
        • Opcode ID: dba6eedc6260a1b920bdba40027422d87ae7eaf9795249da1993a1b478eaa078
        • Instruction ID: c56617d51dc63e33b9062a809599591f15af822dd4bf4ec9e6c2574c0892f7ca
        • Opcode Fuzzy Hash: dba6eedc6260a1b920bdba40027422d87ae7eaf9795249da1993a1b478eaa078
        • Instruction Fuzzy Hash: 0451D13110C341DFD3198FA4D988A677BE4AB4A315F1409BEE592A73E1D778E804CB69
        APIs
          • Part of subcall function 00401F9F: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0041C478,000000FF,?,00000014,00000000,?,00000104), ref: 00401FCE
          • Part of subcall function 00401F9F: _wfopen.MSVCRT ref: 00401FDF
        • GetLastError.KERNEL32(?,0041C318,00000000,00000000), ref: 00404964
        • strerror.MSVCRT ref: 0040496B
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintf$ByteCharErrorLastMultiWide_vsnprintf_wfopenfclosefputcinet_ntoastrerrortime
        • String ID: %.*s%c%s$%s%c%s$.htpasswd$fopen(%s): %s
        • API String ID: 3627448326-3722374166
        • Opcode ID: 01dde92edbe4183ec00036d300cc64556b9df03bf934aa822907ceff9c5f2fec
        • Instruction ID: 5cc7c99360e4cd3e937f2c02f4a5ac3393b3536b267bf461f190d5935c371c2e
        • Opcode Fuzzy Hash: 01dde92edbe4183ec00036d300cc64556b9df03bf934aa822907ceff9c5f2fec
        • Instruction Fuzzy Hash: 4721C2F1A802197ADB20A6618C47FFB7B6C9B81754F100077FB04B62C1D67CDA418AAD
        APIs
          • Part of subcall function 0040365F: strchr.MSVCRT ref: 00403678
          • Part of subcall function 0040365F: memchr.MSVCRT ref: 004036B4
        • memcmp.MSVCRT(?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00404894
        • _errno.MSVCRT ref: 004048E2
        • strerror.MSVCRT ref: 004048EA
        • fclose.MSVCRT ref: 00404924
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _errnofclosememchrmemcmpstrchrstrerror
        • String ID: %.*s$%s: cannot open %s: %s$line 2137
        • API String ID: 3493416221-1352859754
        • Opcode ID: 2b57ef3cd22d0e7ed5f78827157aaa8046c548069c129a19213280e805f33b25
        • Instruction ID: 320c7bbb744ce5b03666b36a0ffe133b17fd3384dd7db7db2778a12af42bd3a1
        • Opcode Fuzzy Hash: 2b57ef3cd22d0e7ed5f78827157aaa8046c548069c129a19213280e805f33b25
        • Instruction Fuzzy Hash: 7F21D7B2940118BBCB02ABA5CC42DEF777DEF94704F00007AF710B2191EB79DA408769
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp$free
        • String ID: %s %s HTTP/%s$%s: %s$CONNECT$POST
        • API String ID: 3401341699-164389875
        • Opcode ID: 3e79bdd37d97035f1466cbb25d492d40baa2bf1b2faecbbcfe4e8a980eff2087
        • Instruction ID: a2e4c323c497faed5c78c0f1fd1f294f9ff8c61e4a571f2c929ba36fb2d8b983
        • Opcode Fuzzy Hash: 3e79bdd37d97035f1466cbb25d492d40baa2bf1b2faecbbcfe4e8a980eff2087
        • Instruction Fuzzy Hash: C341F572200205AFE721AF55CC86FA77BE9EF04304F21447FF685A61A1D779E960CB58
        APIs
        • malloc.MSVCRT ref: 0040C69D
        • memcpy.MSVCRT(00000000,?,?,004076CF,?,004074FB,00000002,00000000,00000000,?,?,?,?,763696C0,00000000), ref: 0040C6B1
        • malloc.MSVCRT ref: 0040C6D0
        • memcpy.MSVCRT(00000000,?,?,004076CF,?,004074FB,00000002,00000000,00000000,?,?,?,?,763696C0,00000000), ref: 0040C6E0
        • malloc.MSVCRT ref: 0040C6FE
        • memcpy.MSVCRT(00000000,763696C0,?,004076CF,?,004074FB,00000002,00000000,00000000,?,?,?,?,763696C0,00000000), ref: 0040C70D
        • malloc.MSVCRT ref: 0040C726
        • memcpy.MSVCRT(00000000,?,?,004076CF,?,004074FB,00000002,00000000,00000000,?,?,?,?,763696C0,00000000), ref: 0040C73B
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: mallocmemcpy
        • String ID:
        • API String ID: 4276657696-0
        • Opcode ID: 88c62f63581244c734dc4a7e7799446ef6b09d0d38fb5ccf2928055f9686e102
        • Instruction ID: 30cf831c6cb86097104c99d217ca3d7e38f602569a77622842b391dc1d4f76ec
        • Opcode Fuzzy Hash: 88c62f63581244c734dc4a7e7799446ef6b09d0d38fb5ccf2928055f9686e102
        • Instruction Fuzzy Hash: D831C272500706AFDB209FAADCC0A57BBE8EF14318F01082EF985D3661D3BAE8148F54
        APIs
          • Part of subcall function 0040873C: malloc.MSVCRT ref: 0040873F
          • Part of subcall function 00407204: malloc.MSVCRT ref: 0040720A
          • Part of subcall function 00401E9E: _vsnprintf.MSVCRT ref: 00401EBC
          • Part of subcall function 00401E9E: time.MSVCRT(00000000,00000200,?,0041C478,00000000,00000002), ref: 00401F06
          • Part of subcall function 00401E9E: inet_ntoa.WS2_32(?), ref: 00401F15
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F29
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F3F
          • Part of subcall function 00401E9E: fprintf.MSVCRT ref: 00401F51
          • Part of subcall function 00401E9E: fputc.MSVCRT ref: 00401F56
          • Part of subcall function 00401E9E: fclose.MSVCRT ref: 00401F6D
        • malloc.MSVCRT ref: 0040384B
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fprintfmalloc$_vsnprintffclosefputcinet_ntoatime
        • String ID: %s: cannot allocate mutexes: %s$%s: cannot open %s: %s$SSL_CTX_new error: %s$line 3533$line 3551
        • API String ID: 3593249021-1043004576
        • Opcode ID: d5477f1af05b84df6b1284a455b9087b55c986238ad56c2a4411734b98a3ff14
        • Instruction ID: 3fa8b53a9451d537d561b4025e79622436e9ca7e6ae615ab055308e23c93aa7a
        • Opcode Fuzzy Hash: d5477f1af05b84df6b1284a455b9087b55c986238ad56c2a4411734b98a3ff14
        • Instruction Fuzzy Hash: F23176B1A4430435D6207FB38C82F6B2E9D9F41B8AF10443FBA41B61C2DABCD641417E
        APIs
        • memset.MSVCRT ref: 004107DA
        • memset.MSVCRT ref: 00410805
        • memcpy.MSVCRT(00403D74,?,00000004,VD,VD,00000040,00000004,?,?,?,00000018,?,0041C038,?), ref: 00410831
        • memcpy.MSVCRT(00403D00,FFFFFF1D,00000004,00403D74,?,00000004,VD,VD,00000040,00000004,?,?,?,00000018,?,0041C038), ref: 0041083D
        • memcpy.MSVCRT(00000004,?,00000014,?,?,?,?,?,VD,VD,00000040,00000004), ref: 0041086E
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memset
        • String ID: VD
        • API String ID: 438689982-297103433
        • Opcode ID: 97715f420355b05f0fb7dec5e636a0656a8c074562483949877d55b3ad7fa429
        • Instruction ID: 8e8a96b5161e99258343f5622bcc139e7d947449c53ae981801bb6f8620d946d
        • Opcode Fuzzy Hash: 97715f420355b05f0fb7dec5e636a0656a8c074562483949877d55b3ad7fa429
        • Instruction Fuzzy Hash: 6F2125B1640204ABC730AF16CC42F9BB7ECEF51304F11082EF6449B292D6B8E485CBA8
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: sscanf$strncmp
        • String ID: %1024[^/]/%n$%1024[^:]:%d/%n$http://
        • API String ID: 3429437187-1181495805
        • Opcode ID: 6fec6f9f77b246b69fcadc81b92791e8c16c1a71a5e0883eecf4d841ac8badb4
        • Instruction ID: 95e09372c3734172eb6d8c5fc18091c86cc5219cff2f167617469cf405a26fb4
        • Opcode Fuzzy Hash: 6fec6f9f77b246b69fcadc81b92791e8c16c1a71a5e0883eecf4d841ac8badb4
        • Instruction Fuzzy Hash: 9901DF76900309BBDB109E18CC81FEB3BADDF44B50F118427FD09A6242E279D9219AE5
        APIs
        • memcpy.MSVCRT(?,0041E860,00000001,?,0041119B,?,00000000,0041C038,004279D8,?), ref: 004112C6
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: CCC$DDDD$EEEEE$FFFFFF$GGGGGGG
        • API String ID: 3510742995-2380088536
        • Opcode ID: e9813a9c3c2caec6b928d553deb1097a05452135b44dc8f0a178dd48fa6a60a5
        • Instruction ID: 13055d4be77394f94bc71724d8cdbf94d4ebecf7834e3778282c180ea4b1dc11
        • Opcode Fuzzy Hash: e9813a9c3c2caec6b928d553deb1097a05452135b44dc8f0a178dd48fa6a60a5
        • Instruction Fuzzy Hash: D1F01D38AE8749B0D9302306AC53FE211815304B90F6449833B05FA1E0D4FD9AC2A02F
        APIs
        • send.WS2_32(?,?,?,00000000), ref: 00411526
        • WSAGetLastError.WS2_32(?,?,?,00000000), ref: 00411530
        • WSAGetLastError.WS2_32(?,?,?,00000000), ref: 0041153E
        • WSAGetLastError.WS2_32(?,?,?,00000000), ref: 00411547
        • WSAGetLastError.WS2_32(?,?,?,00000000), ref: 00411557
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: ErrorLast$send
        • String ID:
        • API String ID: 3964319974-0
        • Opcode ID: c456a6f8dc68f5e949c94808d216391820c55d4afd63ff56f154d4a27d3ba358
        • Instruction ID: c73342d56370c3dfdb468e43380184260cfed3add4562a42c6a849998165ece3
        • Opcode Fuzzy Hash: c456a6f8dc68f5e949c94808d216391820c55d4afd63ff56f154d4a27d3ba358
        • Instruction Fuzzy Hash: 24F03072B48111769A20A7B99C42AEE61439B91778F710F1BF2F6D12F0E52CC5C0919F
        APIs
          • Part of subcall function 00404B7B: memset.MSVCRT ref: 00404BC8
          • Part of subcall function 00404B7B: _isctype.MSVCRT ref: 00404BE3
          • Part of subcall function 00404B7B: strlen.MSVCRT ref: 00404C2C
          • Part of subcall function 00404B7B: strlen.MSVCRT ref: 00404C3A
          • Part of subcall function 00404B7B: strlen.MSVCRT ref: 00404C4D
          • Part of subcall function 00404B7B: strcmp.MSVCRT ref: 00404C68
          • Part of subcall function 00404B7B: strcmp.MSVCRT ref: 00404C7D
        • fgets.MSVCRT ref: 00404A6A
        • sscanf.MSVCRT ref: 00404A98
        • strcmp.MSVCRT ref: 00404AB0
        • strcmp.MSVCRT ref: 00404ACB
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp$strlen$_isctypefgetsmemsetsscanf
        • String ID: %[^:]:%[^:]:%s
        • API String ID: 327574129-3799016729
        • Opcode ID: 4e25fb76574f70fc9ec065f3184315b65a81cf8742ae4bdf82ba6af93c41c532
        • Instruction ID: 08ae39bb38a1d1a8fd659a0f22f7402fa382a86d31219c8e43519b277fe83e99
        • Opcode Fuzzy Hash: 4e25fb76574f70fc9ec065f3184315b65a81cf8742ae4bdf82ba6af93c41c532
        • Instruction Fuzzy Hash: 22213CB694011DABDF11DA91DC81EDFB77DEB48310F1080B3EA05E2151E635EA55CF68
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: acceptclosesocketinet_ntoa
        • String ID: %s: %s is not allowed to connect$line 3884
        • API String ID: 4056037703-2564180978
        • Opcode ID: 5460781ff3f3f77464f4b6eb3cd8324768a2d74e01832c77e3241837946dea83
        • Instruction ID: c2cdf6ddd75f09341db7c86c2f1c72a360341ed289d3915d68a4b8ee3a3bd73b
        • Opcode Fuzzy Hash: 5460781ff3f3f77464f4b6eb3cd8324768a2d74e01832c77e3241837946dea83
        • Instruction Fuzzy Hash: 87114C72900108ABCF00AFA4DD859EFBBBDEF04311F508126F915AA291D734AA45CBA5
        APIs
          • Part of subcall function 00401F9F: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0041C478,000000FF,?,00000014,00000000,?,00000104), ref: 00401FCE
          • Part of subcall function 00401F9F: _wfopen.MSVCRT ref: 00401FDF
        • GetLastError.KERNEL32(?,0041D694,00000000,?,004046C8,00000000,?,?,?,?,?,?,?,00000000), ref: 0040662D
        • strerror.MSVCRT ref: 00406634
        • fclose.MSVCRT ref: 00406683
        Strings
        • HTTP/1.1 200 OKContent-Type: text/htmlConnection: %s, xrefs: 00406664
        • fopen(%s): %s, xrefs: 0040663E
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: ByteCharErrorLastMultiWide_wfopenfclosestrerror
        • String ID: HTTP/1.1 200 OKContent-Type: text/htmlConnection: %s$fopen(%s): %s
        • API String ID: 3205250981-3145790220
        • Opcode ID: 8d5a028876da06db07539b86240eb7b27f26c43a197b7322776485a1914c3c4e
        • Instruction ID: b638b5a21c5ecf989cd6861050b4d4364665f3241667afa21bced490716fbbd0
        • Opcode Fuzzy Hash: 8d5a028876da06db07539b86240eb7b27f26c43a197b7322776485a1914c3c4e
        • Instruction Fuzzy Hash: 59F04F72484224BBCB123BA1DC06EDA3F2AAF14754F118136FE09681B1DB3A46609A9D
        APIs
        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,00000000,00000000,00404E36,?,00000000,00000000,PUT), ref: 00401C93
        • FindNextFileW.KERNEL32(6N@,?), ref: 00401C9F
        • FindClose.KERNEL32(6N@), ref: 00401CAB
        • SetLastError.KERNEL32(000000A0,00000000,00000000,00404E36,?,00000000,00000000,PUT), ref: 00401CBF
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Find$ByteCharCloseErrorFileLastMultiNextWide
        • String ID: 6N@
        • API String ID: 2042606875-3347145515
        • Opcode ID: f9e3ef4f9b449e827c555a678b5ecb803e5dc583e94f95add628a1b1fd34725f
        • Instruction ID: a6b72e4290548564f95069e6ba3a34dc0d13d59d507832aa714465fea3797e28
        • Opcode Fuzzy Hash: f9e3ef4f9b449e827c555a678b5ecb803e5dc583e94f95add628a1b1fd34725f
        • Instruction Fuzzy Hash: 6EF0C276248202EFE3205F24CD48DA377E9EB84760F10473AF6E6E21F0D670A8418725
        APIs
        • memcpy.MSVCRT(?,0041753F,1A1A2E58,?,?), ref: 0041137E
        • memcpy.MSVCRT(?,FFFFFFC0,FFFFFFC0,FFFFFFC0,FFFFFFBF,?,0041C038,00427C84), ref: 004113EF
        • memcpy.MSVCRT(?,0041753F,1A1A2E58,?,FFFFFFC0,FFFFFFC0,FFFFFFC0,FFFFFFBF,?,0041C038,00427C84), ref: 004113FF
        • memcpy.MSVCRT(?,004174DF,00000020,?,0041753F,1A1A2E58,?,FFFFFFC0,FFFFFFC0,FFFFFFC0,FFFFFFBF,?,0041C038,00427C84), ref: 00411413
        • memcpy.MSVCRT(?,004174FF,00000020,?,004174DF,00000020,?,0041753F,1A1A2E58,?,FFFFFFC0,FFFFFFC0,FFFFFFC0,FFFFFFBF,?,0041C038), ref: 00411427
        • memcpy.MSVCRT(?,?,00000014,?,?,?,?,1A1A2E99), ref: 00411461
          • Part of subcall function 004085B5: memcpy.MSVCRT(?,004279F4,00000020,0041C038), ref: 004085CC
          • Part of subcall function 004085B5: memcpy.MSVCRT(?,00427A14,00000020,?,004279F4,00000020,0041C038), ref: 004085DE
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: 0fe96c841b0c32936f4366c30ce6f775ad9a34262579ecbe61e5c1256bad5883
        • Instruction ID: f14d2b1a9620b48150b34399b996c3c3fdf690a50336aa01e5b4079a384d368b
        • Opcode Fuzzy Hash: 0fe96c841b0c32936f4366c30ce6f775ad9a34262579ecbe61e5c1256bad5883
        • Instruction Fuzzy Hash: 3241EFB290011CABCB11DBA5DD85EDFB7BCEF04314F0445A7BA09E6141EB34E7858BA4
        APIs
        • memcpy.MSVCRT(?,?,00000010,client finished,0041051C,?), ref: 00408455
        • memcpy.MSVCRT(?,?,00000010,?,?,00000010,client finished,0041051C,?), ref: 00408470
        • memcpy.MSVCRT(?,?,00000030,?,?,00000010,?,?,00000010,client finished,0041051C,?), ref: 0040847D
        • memcpy.MSVCRT(?,0041051C,0000000C,?,?,00000030,?,?,00000010,?,?,00000010,client finished,0041051C,?), ref: 0040848D
          • Part of subcall function 00408258: memcpy.MSVCRT(?,?,00000000,?,?,?,00000094,?,?,?,004084D4,?,?,?,00000094,?), ref: 00408343
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: client finished
        • API String ID: 3510742995-2813564925
        • Opcode ID: 2ec780f393483ce889654bee737f469ddf525a1239af2f3b9bf33bc893f5182a
        • Instruction ID: 8d7aa6ffeb0ff36f072458a0f6d1f8f5e64a6fd1d6334aaddff3a2809dc6d1f4
        • Opcode Fuzzy Hash: 2ec780f393483ce889654bee737f469ddf525a1239af2f3b9bf33bc893f5182a
        • Instruction Fuzzy Hash: 96318DB250015CBBCF11DEE4CD48EEF77ADAF48304F05456AFA48A6181DA38EA54CFA0
        APIs
        • memcpy.MSVCRT(?,00411257,?,0041C038,?,00000000,?,00411257,?,?,0041C038,004279D8,?), ref: 00410EC8
        • memcpy.MSVCRT(?,00000000,?,?,00411257,?,0041C038,?,00000000,?,00411257,?,?,0041C038,004279D8,?), ref: 00410ED9
        • memcpy.MSVCRT(?,?,?,?,00000000,?,?,00411257,?,0041C038,?,00000000,?,00411257,?,?), ref: 00410EF6
        • memcpy.MSVCRT(?,00000000,?,?,?,?,?,00000000,?,?,00411257,?,0041C038,?,00000000), ref: 00410F0C
        • memcpy.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,00000000,?,?,00411257,?,0041C038), ref: 00410F2A
        • memcpy.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,00000000,?,?), ref: 00410F3F
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: ea937474f070778c49189097a4f6a97db660a4395ee095ca31da1b074c2f0964
        • Instruction ID: 03501868211d416b618bd9510409599cd3215b822fe2b5f2f0c46fc48313ac8f
        • Opcode Fuzzy Hash: ea937474f070778c49189097a4f6a97db660a4395ee095ca31da1b074c2f0964
        • Instruction Fuzzy Hash: 2B21EAB2400A19BBC7129FA5D884CEBB7ECEF49244B01452BB59ACB101D635F655CBA4
        APIs
        • memcpy.MSVCRT(?,?,00000008,?,76379AC0,00000000,?,0040389C,?,00000001), ref: 0040E9BA
          • Part of subcall function 0040E7D9: memcpy.MSVCRT(0040389C,?,00000004,00000008,?,?,0040E9CC,?,?,0040389C,?,76379AC0,00000000,?,0040389C,?), ref: 0040E7E8
          • Part of subcall function 0040E7D9: memcpy.MSVCRT(?,?,00000004,0040389C,?,00000004,00000008,?,?,0040E9CC,?,?,0040389C,?,76379AC0,00000000), ref: 0040E7F7
          • Part of subcall function 0040E7D9: memcpy.MSVCRT(0040E9CC,?,00000004,?,0040389C,0040389C,?,0040389C,?,?,0040389C,?,?,0040389C), ref: 0040E85F
          • Part of subcall function 0040E7D9: memcpy.MSVCRT(0040E9C8,0040389C,00000004,0040E9CC,?,00000004,?,0040389C,0040389C,?,0040389C,?,?,0040389C,?,?), ref: 0040E86E
        • memcpy.MSVCRT(?,?,00000008,0040389C,?,00000008,?,?,0040389C,?,76379AC0,00000000,?,0040389C,?,00000001), ref: 0040E9E8
        • memcpy.MSVCRT(?,?,00000008,?,?,00000008,0040389C,?,00000008,?,?,0040389C,?,76379AC0,00000000,?), ref: 0040E9F6
        • memcpy.MSVCRT(?,?,00000008,?,?,00000008,?,?,00000008,0040389C,?,00000008,?,?,0040389C,?), ref: 0040EA01
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: `3@
        • API String ID: 3510742995-891369106
        • Opcode ID: 54264571b64d918f162b781116069eaf670b5e6448bf8c8c2ada5e05681f38fa
        • Instruction ID: 1590678cad751e20d1ac48811db81138ba3ff977a76aa47bf4384b4b6b7836a5
        • Opcode Fuzzy Hash: 54264571b64d918f162b781116069eaf670b5e6448bf8c8c2ada5e05681f38fa
        • Instruction Fuzzy Hash: A70139B25002186BCF10EE569C85EEB7B6CFF45324F05483AFD49AA142EA34D5248BB0
        APIs
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: free
        • String ID:
        • API String ID: 1294909896-0
        • Opcode ID: f7e1263fa514c13471d8f834274539f18e02db5c6bf89f0694c383ef9ec6be60
        • Instruction ID: 1753344832c3d68424e835e5cfdc80cfc45faf857e01f48e8f7c2d59dccd7afd
        • Opcode Fuzzy Hash: f7e1263fa514c13471d8f834274539f18e02db5c6bf89f0694c383ef9ec6be60
        • Instruction Fuzzy Hash: 64F04436709B0556DA24AA7AAE88E9773EC9F84711705083FF695E32C0DF38E804897C
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _isctypestrncmp
        • String ID: <=@$HTTP/
        • API String ID: 2225848299-3200335489
        • Opcode ID: e4075f26d85ee82339b6d8c7abad51c391bf97fecbb479011a69ad698756fb40
        • Instruction ID: 93c608d2be356f14aecd05eaea80e8b4fdf1e6b62aac33f5781ecddff51188cd
        • Opcode Fuzzy Hash: e4075f26d85ee82339b6d8c7abad51c391bf97fecbb479011a69ad698756fb40
        • Instruction Fuzzy Hash: D411D2B1644304ABC7109FA1DC45AE67BACAB85398B10807FFE44EB2D1D639E545C758
        APIs
          • Part of subcall function 004020D6: strlen.MSVCRT ref: 0040210B
          • Part of subcall function 004020D6: memmove.MSVCRT(00000105,00000106,00000000,00000105,00000200,00000000,00402014,?,?,?,00000104), ref: 00402116
        • strlen.MSVCRT ref: 0040201B
        • fprintf.MSVCRT ref: 0040207C
        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00401FBC), ref: 004020A2
        Strings
        • Rejecting suspicious path: [%s], xrefs: 00402076
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strlen$ByteCharMultiWidefprintfmemmove
        • String ID: Rejecting suspicious path: [%s]
        • API String ID: 1015408857-3549046145
        • Opcode ID: 36d3321a847911522c2a8b964d607736dab9e756d0f2744529ccdf4e3dc72384
        • Instruction ID: 9572e5d84daa92a431ce77e67741ed23f51d1a7a0111368cdf7d34e933c31dbd
        • Opcode Fuzzy Hash: 36d3321a847911522c2a8b964d607736dab9e756d0f2744529ccdf4e3dc72384
        • Instruction Fuzzy Hash: 1411B6B15043596FDB20D764CE8DBDAB7A9AB15304F4440A3E344B61E1D3FC9AC4CB59
        APIs
        • FindClose.KERNEL32(00000000,00000000,00000000,00404F3B,?,?,00000000,00000000,PUT), ref: 004050D1
        • free.MSVCRT ref: 004050E1
        • SetLastError.KERNEL32(000000A0,00000000,00000000,00404F3B,?,?,00000000,00000000,PUT), ref: 004050F2
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: CloseErrorFindLastfree
        • String ID: ;O@
        • API String ID: 1593916217-3594699065
        • Opcode ID: b7fb7194298a5aadb68c13890f54cc5cb0878795387683123210573c38787d27
        • Instruction ID: 43a3aa3fe78abe9e1eff5d609cfd46805ec357d30c9ee23ed1c17e6599470d4b
        • Opcode Fuzzy Hash: b7fb7194298a5aadb68c13890f54cc5cb0878795387683123210573c38787d27
        • Instruction Fuzzy Hash: 8EE048366046319BC1204768AC0CA9BBF74DF89B71726C336F975E72D4CB345C0285E9
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: Message_vsnprintfexit
        • String ID: Error
        • API String ID: 2513116298-2619118453
        • Opcode ID: d47bc7bc683f7e5bfc4230be41bd681c17e036806d325f746a382f8bf02f02c7
        • Instruction ID: d71f96a6a7750fb50719775450a9e6b300c18641d96c7b5459aee6eeb4d06487
        • Opcode Fuzzy Hash: d47bc7bc683f7e5bfc4230be41bd681c17e036806d325f746a382f8bf02f02c7
        • Instruction Fuzzy Hash: 24E08C31684308BBF750AB94CC0AFDA3B7CAB08701F00C561F60D960C1DBB0928C8BAD
        APIs
        • strlen.MSVCRT ref: 0040AC77
          • Part of subcall function 00410B33: memset.MSVCRT ref: 00410B3E
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memsetstrlen
        • String ID:
        • API String ID: 841943882-0
        • Opcode ID: b30492fa55139c15f66e11d01aa87db8601dd3cfc4d74e00898182e5214a8d1f
        • Instruction ID: 4f1f0ea92e3b2dd738ecfdc4c1abeca4b8ca582276ed1050d89b188b53480818
        • Opcode Fuzzy Hash: b30492fa55139c15f66e11d01aa87db8601dd3cfc4d74e00898182e5214a8d1f
        • Instruction Fuzzy Hash: 68610771540705AFD720CB74C844FEFBBB99F15304F10852EE19AA72C1DB38AA95CB6A
        APIs
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strlenstrncpy$strncmp
        • String ID:
        • API String ID: 3293407871-0
        • Opcode ID: 6258b604f2f99a2ba80117d0c64480dd25ac6a4bfc8478e6e3578d9a2319c0af
        • Instruction ID: 2596699d54b189e214f6f0c02ed9fa536009ceb31cedf16e08d0d03213f3f54b
        • Opcode Fuzzy Hash: 6258b604f2f99a2ba80117d0c64480dd25ac6a4bfc8478e6e3578d9a2319c0af
        • Instruction Fuzzy Hash: BA519271800609EFDF21CF75CC44BEBBBB8EB04314F1485AAE569A7282D778AA44CF54
        APIs
        • memcpy.MSVCRT(?,?,00000030,?,?,0041C038,004279D8,?), ref: 00411162
        • memcpy.MSVCRT(?,?,00000030,?,00000000,0041C038,004279D8,?), ref: 004111B7
        • memcpy.MSVCRT(?,?,00000020,?,?,00000030,?,00000000,0041C038,004279D8,?), ref: 004111C9
        • memcpy.MSVCRT(?,?,00000020,?,?,00000020,?,?,00000030,?,00000000,0041C038,004279D8,?), ref: 004111D8
          • Part of subcall function 0040F673: memcpy.MSVCRT(00000000,?,00000040,?,00419BF3,00000005,?,00409F63,00419BF3,?,00000005,0041E417,?,00000005,?,0041C038), ref: 0040F69B
          • Part of subcall function 004107A2: memset.MSVCRT ref: 004107DA
          • Part of subcall function 004107A2: memset.MSVCRT ref: 00410805
          • Part of subcall function 004107A2: memcpy.MSVCRT(00403D74,?,00000004,VD,VD,00000040,00000004,?,?,?,00000018,?,0041C038,?), ref: 00410831
          • Part of subcall function 004107A2: memcpy.MSVCRT(00403D00,FFFFFF1D,00000004,00403D74,?,00000004,VD,VD,00000040,00000004,?,?,?,00000018,?,0041C038), ref: 0041083D
          • Part of subcall function 004107A2: memcpy.MSVCRT(00000004,?,00000014,?,?,?,?,?,VD,VD,00000040,00000004), ref: 0041086E
        • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411213
          • Part of subcall function 0040ED8D: memcpy.MSVCRT(?,?,00000040,?,0041C033,00000005,00409F53,0041E417,?,00000005,?,0041C038,?,00409EC9), ref: 0040EDB4
          • Part of subcall function 0040F58D: memset.MSVCRT ref: 0040F5C4
          • Part of subcall function 0040F58D: memset.MSVCRT ref: 0040F5E8
          • Part of subcall function 0040F58D: memcpy.MSVCRT(00000059,00000008,00000004,?,00000000,00000038,0041051C,0041E41C,?,00409376,0041E41C,00000018,0041E41C,004175D8,00000030,0041E41C), ref: 0040F607
          • Part of subcall function 0040F58D: memcpy.MSVCRT(0000005D,0000000D,00000004,00000059,00000008,00000004,?,00000000,00000038,0041051C,0041E41C,?,00409376,0041E41C,00000018,0041E41C), ref: 0040F613
          • Part of subcall function 0040F58D: memcpy.MSVCRT(?,00000011,00000010,00000005,00000030,0041E41C,0041051C,00000030,0041E41C,00000018,00000004,?,?,00000018,?,0041C038), ref: 0040F62B
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memset
        • String ID:
        • API String ID: 438689982-0
        • Opcode ID: 76cab3a4bed67648891fb88762c72cdd46013421ae0414b41eb38a02121b2efc
        • Instruction ID: 50d19c7672cc0cd360790473cf46d5a29f25d8d1165bbfb54c110201c803f0b0
        • Opcode Fuzzy Hash: 76cab3a4bed67648891fb88762c72cdd46013421ae0414b41eb38a02121b2efc
        • Instruction Fuzzy Hash: 034103B290021CABDB11DBE5DD85EDEB3BCAF04304F00446BB619E6081E778A7898B64
        APIs
        • memcpy.MSVCRT(?,0041C038,00000002,0041C038,?,0041C038,?,004094B3,0041C038,?,0041C038,0041C038,00000000,?,0041C038,?), ref: 0040A999
        • memcpy.MSVCRT(00427A14,00000000,00000020,?,0041C038,00000002,0041C038,?,0041C038,?,004094B3,0041C038,?,0041C038,0041C038,00000000), ref: 0040A9B0
        • memcpy.MSVCRT(00427A34,0044E856,0044E856,00000000,0041C038,0041C038,<=@,0041C038), ref: 0040A9D6
          • Part of subcall function 00411108: memcpy.MSVCRT(?,?,00000030,?,?,0041C038,004279D8,?), ref: 00411162
          • Part of subcall function 00411108: memcpy.MSVCRT(?,?,00000030,?,00000000,0041C038,004279D8,?), ref: 004111B7
          • Part of subcall function 00411108: memcpy.MSVCRT(?,?,00000020,?,?,00000030,?,00000000,0041C038,004279D8,?), ref: 004111C9
          • Part of subcall function 00411108: memcpy.MSVCRT(?,?,00000020,?,?,00000020,?,?,00000030,?,00000000,0041C038,004279D8,?), ref: 004111D8
          • Part of subcall function 00411108: memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411213
        • memcmp.MSVCRT(00427A34,00427CCC,00000020), ref: 0040AA2D
        • memcpy.MSVCRT(00427B54,00427CEC,00000030,0041C038,?,?,?,00000000,0041C038,0041C038,<=@,0041C038), ref: 0040AA53
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memcmp
        • String ID:
        • API String ID: 3384217055-0
        • Opcode ID: a44ba9ebd12d9726e44e3bedf917c04986d2444acdd4858111d701a25f5d401a
        • Instruction ID: daab44961b7cfb56bb28067222da4d7d4bb8a57247489fd4e435de34ff31c020
        • Opcode Fuzzy Hash: a44ba9ebd12d9726e44e3bedf917c04986d2444acdd4858111d701a25f5d401a
        • Instruction Fuzzy Hash: A53124B26047557BC702CB748C41FE7FB9CAB06304F05022BA989DB282D738B524CBE6
        APIs
        • memset.MSVCRT ref: 004168C7
        • memset.MSVCRT ref: 004168F2
        • memcpy.MSVCRT(00000038,?,00000004,00000000,00000000,00000040,00000010,?,004084D4), ref: 0041691E
        • memcpy.MSVCRT(-0000003C,FFFFFF1D,00000004,00000038,?,00000004,00000000,00000000,00000040,00000010,?,004084D4), ref: 0041692A
        • memcpy.MSVCRT(00000010,?,00000020,?,?,?,?,?,00000000,00000000,00000040,00000010), ref: 0041695B
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memset
        • String ID:
        • API String ID: 438689982-0
        • Opcode ID: 63530bcd349b526370fce13deddede0d8152a9948cf65c0c798804a167fefd6f
        • Instruction ID: 72d06965a59bfcca5a8694250986cd12e35528496a975f5dd0aa9594e33b963e
        • Opcode Fuzzy Hash: 63530bcd349b526370fce13deddede0d8152a9948cf65c0c798804a167fefd6f
        • Instruction Fuzzy Hash: 432106B1640204ABD720AF26CC42FDBB7ECEF51718F11441EFA459B282D6B8E481CB69
        APIs
        • memset.MSVCRT ref: 0040F5C4
        • memset.MSVCRT ref: 0040F5E8
        • memcpy.MSVCRT(00000059,00000008,00000004,?,00000000,00000038,0041051C,0041E41C,?,00409376,0041E41C,00000018,0041E41C,004175D8,00000030,0041E41C), ref: 0040F607
        • memcpy.MSVCRT(0000005D,0000000D,00000004,00000059,00000008,00000004,?,00000000,00000038,0041051C,0041E41C,?,00409376,0041E41C,00000018,0041E41C), ref: 0040F613
        • memcpy.MSVCRT(?,00000011,00000010,00000005,00000030,0041E41C,0041051C,00000030,0041E41C,00000018,00000004,?,?,00000018,?,0041C038), ref: 0040F62B
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memset
        • String ID:
        • API String ID: 438689982-0
        • Opcode ID: d0c0309f2109f6802b76f410299c15ce53331ce690c7160ae7c9e5633e2facf1
        • Instruction ID: d6d66a6b462f4353b1c9c83a3ddaa04aaf778cc08a8ada683952d642ab34df5f
        • Opcode Fuzzy Hash: d0c0309f2109f6802b76f410299c15ce53331ce690c7160ae7c9e5633e2facf1
        • Instruction Fuzzy Hash: EA2192B2500705AFC730AF65D881D9AB3ECEF14308B11492EF68697292DB78E559CB68
        APIs
        • memcpy.MSVCRT(?,00000100,00000040,00000000,00000000,00000000,?,004024D3,?,00000000,00000000,00000100,?,0041CD10), ref: 0040256B
        • memcpy.MSVCRT(?,00000100,00000040,00000000,00000000,00000000,?,004024D3,?,00000000,00000000,00000100,?,0041CD10), ref: 004025A0
        • memcpy.MSVCRT(?,00000100,00000000,00000000,00000000,00000000,?,004024D3,?,00000000,00000000,00000100,?,0041CD10), ref: 004025CF
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: @
        • API String ID: 3510742995-2766056989
        • Opcode ID: 683450fa895aaa1917bd83834d58a49618c1cf3b0a22afe8fa436cd18943b5d4
        • Instruction ID: 414a7300c91830e1f56b2ce06e89bdb2d177afa795d6104d7e940eebdf4f7998
        • Opcode Fuzzy Hash: 683450fa895aaa1917bd83834d58a49618c1cf3b0a22afe8fa436cd18943b5d4
        • Instruction Fuzzy Hash: 28212CF24007047BCB20CE51CD45DDB73ACEF54310B00452FF905AA1D2E7B9E6558BA8
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp
        • String ID: d$n$s
        • API String ID: 1004003707-4285348339
        • Opcode ID: 79f56495b64d96206cc804dbae2aafff9c2b4d2a5c8095114f9a5237e29c6647
        • Instruction ID: a9daa6db6a3d0d24a5a7627b285fc334112293732a9aec2a9cf6a7c9b775b7a5
        • Opcode Fuzzy Hash: 79f56495b64d96206cc804dbae2aafff9c2b4d2a5c8095114f9a5237e29c6647
        • Instruction Fuzzy Hash: B8210435A05A128FDB388920D04112BB752EB443E4B788E7BDD51BB3C1D2B9DCC28E89
        APIs
        • memcpy.MSVCRT(00000006,00000000,00000001,00000001,00000000,00000005,00000000,00419B64,00000000,00000000), ref: 0040C635
        • memcpy.MSVCRT(00000006,00000000,00000000,00000006,00000000,00000001,00000001,00000000,00000005,00000000,00419B64,00000000,00000000), ref: 0040C645
        • memcpy.MSVCRT(00000006,00417660,00000007,00000006,00000000,00000000,00000006,00000000,00000001,00000001,00000000,00000005,00000000,00419B64,00000000,00000000), ref: 0040C656
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID: `vA
        • API String ID: 3510742995-3475553604
        • Opcode ID: 456224cdc5ebecf7c5c2905663e3cb9aeeb8caa6af34679a61b39c8fae8748d1
        • Instruction ID: f638c6e16efac623692dab44603c537b62e419cdc900073a20f3fecd908f3e10
        • Opcode Fuzzy Hash: 456224cdc5ebecf7c5c2905663e3cb9aeeb8caa6af34679a61b39c8fae8748d1
        • Instruction Fuzzy Hash: 631184B6504108F7CB209FA9DCC9DCB7BACDB44394F108237F909AA240D239E645C7A8
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: _vsnprintf
        • String ID: <=@$truncating vsnprintf buffer: [%.*s]$vsnprintf error
        • API String ID: 2997827189-4271256169
        • Opcode ID: b03f3731f8015ba858ee48a0cbc3ddc4b45de93f94592c7382b3ae43d64a7ec4
        • Instruction ID: e0e831ebc17e6b0758f5e8d093d15e0ae71ce5efb6e63733b7891d4dc5a1b3fa
        • Opcode Fuzzy Hash: b03f3731f8015ba858ee48a0cbc3ddc4b45de93f94592c7382b3ae43d64a7ec4
        • Instruction Fuzzy Hash: 95F0CD3220820A6BEB119E15DC02EBF3B69DB51754F10443BFD04EA1F2E679E86192ED
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: strcmp
        • String ID: 1.1$Connection$keep-alive
        • API String ID: 1004003707-1749409918
        • Opcode ID: 2ef259d729a866d5c9562d499ea0871c90f7d32c386df42bb776be7e9b661880
        • Instruction ID: 5c566aabf3cbf950743589e5a0ecf0d49fc986290ff2ac401aa11061c50096f1
        • Opcode Fuzzy Hash: 2ef259d729a866d5c9562d499ea0871c90f7d32c386df42bb776be7e9b661880
        • Instruction Fuzzy Hash: 62E07DF364422135D1309021AD01F9356484F9C72CF200433FF00F21D5D27CDC81505C
        APIs
        • fwrite.MSVCRT ref: 00401DB2
        • send.WS2_32(00000200,0041C038,0041C038,00000000), ref: 00401DD0
        Strings
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: fwritesend
        • String ID: <=@
        • API String ID: 482115517-3456421064
        • Opcode ID: c80984b705a2d0aeecc3422c244af3d0b093bb4c3e68844f915c58e3a15c54fe
        • Instruction ID: 3717ae8ba8e3e1bca51b9fdc0629ee0939a51b24cd31bf664b5d97951a5250f6
        • Opcode Fuzzy Hash: c80984b705a2d0aeecc3422c244af3d0b093bb4c3e68844f915c58e3a15c54fe
        • Instruction Fuzzy Hash: ED214175900219EBCB20DE59C881A9F77B9BF04714F10423BFC21A22E5D638FA519BE8
        APIs
          • Part of subcall function 0040ED8D: memcpy.MSVCRT(?,?,00000040,?,0041C033,00000005,00409F53,0041E417,?,00000005,?,0041C038,?,00409EC9), ref: 0040EDB4
          • Part of subcall function 0040F673: memcpy.MSVCRT(00000000,?,00000040,?,00419BF3,00000005,?,00409F63,00419BF3,?,00000005,0041E417,?,00000005,?,0041C038), ref: 0040F69B
        • memcpy.MSVCRT(?,00000001,00000002,0041E478,00000000,00000000,0041E41C,?,00000000,0041E560,0041C038,00000000), ref: 0040B3EE
        • memcpy.MSVCRT(00427A34,00000000,00000000,0041E478,00000000,00000000,0041E41C,?,00000000,0041E560,0041C038,00000000), ref: 0040B431
        • memset.MSVCRT ref: 0040B45D
        • memcpy.MSVCRT(0041065C,65736F6F,00000020,0041E478,00000000,00000000,0041E41C,?,00000000,0041E560,0041C038,00000000), ref: 0040B47C
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memset
        • String ID:
        • API String ID: 438689982-0
        • Opcode ID: b4fb8f8ccb75113e4e86cc6e5b49e7d612bb178fa0e3c8fbf1f054b014de9ae4
        • Instruction ID: 4ddf41772e7400a355c0d8c05d35ec2a30584b6419acd315987ce76fdce50095
        • Opcode Fuzzy Hash: b4fb8f8ccb75113e4e86cc6e5b49e7d612bb178fa0e3c8fbf1f054b014de9ae4
        • Instruction Fuzzy Hash: B2715A7140465ABBCB169F70C850BFBBBA8EF05304F10416BF995D7282E338A655C7E9
        APIs
        • memcpy.MSVCRT(?,0041C038,00000002,0041C038,?,0041C038), ref: 0040B5D5
        • memcpy.MSVCRT(004279F4,?,00000020,0041C038,?,0041C038), ref: 0040B63C
        • memcpy.MSVCRT(00427A34,0041C038,00000020,?,?,?,0041C038,?,0041C038), ref: 0040B66C
        • memcpy.MSVCRT(?,0041C038,0041C038,?,?,?,0041C038,?,0041C038), ref: 0040B6C7
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: 9ae32d830502216e54ecabf6dbf0f5ed9fb42a1af464453efcda1ccbed4e7f18
        • Instruction ID: d0e5491082fb3044d9f4710045b8e9ee1868968a20e6524377059eaed722e3f7
        • Opcode Fuzzy Hash: 9ae32d830502216e54ecabf6dbf0f5ed9fb42a1af464453efcda1ccbed4e7f18
        • Instruction Fuzzy Hash: 03615971904655ABC711DB74C840BEBB7A8EF05304F04427BE9A9EB2C2D338A955C7EE
        APIs
        • memcpy.MSVCRT(00427A54,00000000,00000030,?,00000000,00000000,?,?,7277202C,00000000,?,726F7272,?,?), ref: 0040B9DF
        • memcpy.MSVCRT(00427B84,65746363,?), ref: 0040BA90
        • memset.MSVCRT ref: 0040BADF
        • memcpy.MSVCRT(?,00427C84,?,00427A56,00000000,?), ref: 0040BB05
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy$memset
        • String ID:
        • API String ID: 438689982-0
        • Opcode ID: b4e3429e4cdfab6df8bc6e0e2c0ee826e5f60d2d655c70a500c84b45e80e4b15
        • Instruction ID: 70cfab1cb81d2e29525c0c02066bef9c429d6aca123b581cd3fed53bcf3359bc
        • Opcode Fuzzy Hash: b4e3429e4cdfab6df8bc6e0e2c0ee826e5f60d2d655c70a500c84b45e80e4b15
        • Instruction Fuzzy Hash: 9F5104716007459BDB21DB348841BEBB7A9EF45314F04442EF5AAAB3C1DB38A905CBAD
        APIs
        • memcpy.MSVCRT(?,0041C040,00000002,?,0041C038,00000001,0041C038,00000000,?,00000000,00000000,00000000,?,00407BDD,?,00000000), ref: 0040A863
        • memcpy.MSVCRT(004279F4,?,00000020,0041E314,?,00000020), ref: 0040A89B
        • memcpy.MSVCRT(?,00427CCC,00000020), ref: 0040A8BC
        • memcpy.MSVCRT(0041C048,0041C048,656D6F73), ref: 0040A8EB
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: 108109156ab526da466de6b7009e971ebc6f6538474ee461fb93e7cdfc924acc
        • Instruction ID: 700c18113f9d4183e0550ae1d2ab742cabb83e7879dfdb0a9ea871eec3e54b34
        • Opcode Fuzzy Hash: 108109156ab526da466de6b7009e971ebc6f6538474ee461fb93e7cdfc924acc
        • Instruction Fuzzy Hash: B1412972500B44AAD7219BB4D885FE7B7E8EF05304F00052FF29E9B182D378B555C7A9
        APIs
        • memcpy.MSVCRT(?,?,00000004,?,?,?,0040EA4E,?,?,?,?,?,00000008,0041C038,?), ref: 0040EA7C
        • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,0040EA4E,?,?,?,?,?,00000008), ref: 0040EA8B
        • memcpy.MSVCRT(?,?,00000004,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040EB1C
        • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?,?,?,?,?,?,?), ref: 0040EB2B
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: 8780e5a379dfc14a6a459a4b0277e0ed2907a278e191f8d6dc5c89ae09aed47c
        • Instruction ID: cb19a57c4209d214128b6427b2b505cd27ebaf86cc2a42d08330e4c26db68177
        • Opcode Fuzzy Hash: 8780e5a379dfc14a6a459a4b0277e0ed2907a278e191f8d6dc5c89ae09aed47c
        • Instruction Fuzzy Hash: 8F21DAB6C0011CFACF11EFA2DD45DCE776CAF14324F418467BA19AB141E639EB149BA4
        APIs
        • EnterCriticalSection.KERNEL32(0041F8B8,?,0041C038,004279D8,?,?,?,0040B4BD,0041C038,00427B54), ref: 00407F31
        • memcmp.MSVCRT(0041ED07,?,00000020,?,?,0040B4BD,0041C038,00427B54), ref: 00407F6B
        • LeaveCriticalSection.KERNEL32(0041F8B8,?,?,0040B4BD,0041C038,00427B54), ref: 00407FAF
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeavememcmp
        • String ID:
        • API String ID: 4275994184-0
        • Opcode ID: 9ced871ec745efad06d9285803bfbfe8de0d9095b37d4e49853eadacd25deccb
        • Instruction ID: b1aaf014b560a21ff2ac8ea03bc1435a38b3294080dfe8c6d1c584175207f86e
        • Opcode Fuzzy Hash: 9ced871ec745efad06d9285803bfbfe8de0d9095b37d4e49853eadacd25deccb
        • Instruction Fuzzy Hash: A0112771E08213BBE714A715DC4AFEA7764EB84714F14807AE805BB2C1D37CB949C66E
        APIs
        • memset.MSVCRT ref: 00402EAA
        • memset.MSVCRT ref: 00402ED2
        • memcpy.MSVCRT(00000004,?,00000010,?,00000004,?,?,?,0000000E,?,?,0041CD10), ref: 00402F07
        • memset.MSVCRT ref: 00402F11
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memset$memcpy
        • String ID:
        • API String ID: 368790112-0
        • Opcode ID: 566e86343523834fc280e4103b62e3bf4179eaf750bc396b973187ac326f8714
        • Instruction ID: 96a07799da38aecc15c343ca88b9fdb3779bdf4c27635c394d5fda9655532e54
        • Opcode Fuzzy Hash: 566e86343523834fc280e4103b62e3bf4179eaf750bc396b973187ac326f8714
        • Instruction Fuzzy Hash: F6110CB555070077D230AA259D07F9773789FA6B14F010A1EF2417A1C3D7F8E14596ED
        APIs
        • memcpy.MSVCRT(0040389C,?,00000004,00000008,?,?,0040E9CC,?,?,0040389C,?,76379AC0,00000000,?,0040389C,?), ref: 0040E7E8
        • memcpy.MSVCRT(?,?,00000004,0040389C,?,00000004,00000008,?,?,0040E9CC,?,?,0040389C,?,76379AC0,00000000), ref: 0040E7F7
        • memcpy.MSVCRT(0040E9CC,?,00000004,?,0040389C,0040389C,?,0040389C,?,?,0040389C,?,?,0040389C), ref: 0040E85F
        • memcpy.MSVCRT(0040E9C8,0040389C,00000004,0040E9CC,?,00000004,?,0040389C,0040389C,?,0040389C,?,?,0040389C,?,?), ref: 0040E86E
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: memcpy
        • String ID:
        • API String ID: 3510742995-0
        • Opcode ID: 1d07b5dba091eb54729381db5ccf5a17f1c76154a893c5354cc346082cffae30
        • Instruction ID: 59806f3c6d0a750e4a3280beb16737bb36094a3f4a3fb91f911148a5a3bb5ab2
        • Opcode Fuzzy Hash: 1d07b5dba091eb54729381db5ccf5a17f1c76154a893c5354cc346082cffae30
        • Instruction Fuzzy Hash: 6D11DDB6C0011CBACF11EFA1CD46DCE776CAF14314F018467BA18AB151E639D7149BA8
        APIs
        • EnterCriticalSection.KERNEL32(0041F8B8,?,00000000,0041C038,?,?,00409D8B,0041C038,0041C038,?,?,?,00000016,0041C038,004072DF,CLNTSRVRclient finished), ref: 0040800E
        • memcpy.MSVCRT(0041ED28,?,00000030,?,?,00409D8B,0041C038,0041C038,?,?,?,00000016,0041C038,004072DF,CLNTSRVRclient finished), ref: 0040803F
        • memcpy.MSVCRT(0041ED08,?,00000020,0041ED28,?,00000030,?,?,00409D8B,0041C038,0041C038,?,?,?,00000016,0041C038), ref: 0040804E
        • LeaveCriticalSection.KERNEL32(0041F8B8,?,00000014,0041C038,-00000005,?,00000000,?,004072DF,?,?,?,00401DA4,00000000,0041C038,0041C038), ref: 00408086
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: CriticalSectionmemcpy$EnterLeave
        • String ID:
        • API String ID: 469056452-0
        • Opcode ID: a7d502950f591e0667a9a604821440ae0f7dd1e272eabc841f89518a0ad23f5b
        • Instruction ID: d5f4536d1e2fcc52bd219eeafbc282f2800d7c97c6314a2d4b4ab70f71b896df
        • Opcode Fuzzy Hash: a7d502950f591e0667a9a604821440ae0f7dd1e272eabc841f89518a0ad23f5b
        • Instruction Fuzzy Hash: 2D114C7A940306ABE314DB62FC49BD3F76CEF50304F05493FE9095A182C73460698B68
        APIs
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: free
        • String ID:
        • API String ID: 1294909896-0
        • Opcode ID: 8a0d45980218b09f9622a5a8dd20d9619e6e82e53e2112b707b93aa0ec30ba3e
        • Instruction ID: 88c20f03468e29b2b30f209abd394c9afeae26a693a41e803b67054a6ccd84ae
        • Opcode Fuzzy Hash: 8a0d45980218b09f9622a5a8dd20d9619e6e82e53e2112b707b93aa0ec30ba3e
        • Instruction Fuzzy Hash: B9F0FF71600720DBD6209B3698D4B67B3E8FF90B15F158A3ED541B3690D778E888CE68
        APIs
        Memory Dump Source
        • Source File: 0000000C.00000002.4519137934.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 0000000C.00000002.4519123618.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519156723.0000000000417000.00000002.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519172145.000000000041C000.00000008.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519187175.000000000041E000.00000004.00000001.01000000.00000006.sdmpDownload File
        • Associated: 0000000C.00000002.4519202095.0000000000420000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_12_2_400000_mongoose-2.jbxd
        Similarity
        • API ID: free
        • String ID:
        • API String ID: 1294909896-0
        • Opcode ID: 29a00420e931546b69fa788b926fb90a5f889836271eac78790b4cc30ec82501
        • Instruction ID: 9f6f964e3c3c51a544714275ee11e5fdd5d009880d0025563bf6347c6d533085
        • Opcode Fuzzy Hash: 29a00420e931546b69fa788b926fb90a5f889836271eac78790b4cc30ec82501
        • Instruction Fuzzy Hash: 07F01C377047105ACA20BA7AED00A57B3E89F847217168C3FF690F32A0DE34E8048A78