Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Crypt.14125.25529.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Crypt.14125.25529.exe
Analysis ID:1431788
MD5:e9d2d1f8d13bfc61b8eba5899b98cacd
SHA1:595d42f95c0c5f35d7f13931836b7378bea997bc
SHA256:7a84132479f6c500730b87327c0bcb5cf550d889a6c116d87ce00fad7c21bb15
Tags:exe
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A1034 WSAStartup,WSACleanup,socket,WSACleanup,gethostbyname,WSACleanup,shutdown,closesocket,htons,connect,lstrlenA,send,recv,StrStrA,StrStrA,StrStrA,shutdown,closesocket,WSACleanup,0_2_009A1034
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeString found in binary or memory: http://www.e-sushi.net/minibin/
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A16DC0_2_009A16DC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A8ADC0_2_009A8ADC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A902D0_2_009A902D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009AB0600_2_009AB060
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A51320_2_009A5132
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A9D5D0_2_009A9D5D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A957E0_2_009A957E
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exe, 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameminibin.exep( vs SecuriteInfo.com.Trojan.Crypt.14125.25529.exe
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeBinary or memory string: OriginalFilenameminibin.exep( vs SecuriteInfo.com.Trojan.Crypt.14125.25529.exe
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean4.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeMutant created: \Sessions\1\BaseNamedObjects\MiniBin
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: MiniBin0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: minibin.ini0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: \empty.ico0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: \25.ico0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: \50.ico0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: \75.ico0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: \full.ico0_2_009A2502
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCommand line argument: MiniBin0_2_009A2502
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeFile read: C:\$Recycle.Bin\S-1-5-21-2246122658-3693405117-2476756634-1003\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4a04656d-52aa-49de-8a09-cb178760e748}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.Crypt.14125.25529.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A784C LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_009A784C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A4E95 push ecx; ret 0_2_009A4EA8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A11A5 lstrcatW,GetPrivateProfileStringW,lstrcpyW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,0_2_009A11A5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A1602 __aulldiv,__floor_pentium4,GetPrivateProfileIntW,SHEmptyRecycleBinW,0_2_009A1602
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-5010
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-4826
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeAPI call chain: ExitProcess graph end nodegraph_0-5012
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeAPI call chain: ExitProcess graph end nodegraph_0-5022
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A64F9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009A64F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A784C LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_009A784C
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A64F9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009A64F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A6FEE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009A6FEE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A3D5A SetUnhandledExceptionFilter,0_2_009A3D5A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exeCode function: 0_2_009A503F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_009A503F
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Crypt.14125.25529.exe5%ReversingLabs
SecuriteInfo.com.Trojan.Crypt.14125.25529.exe6%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.e-sushi.net/minibin/0%Avira URL Cloudsafe
http://www.e-sushi.net/minibin/0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.e-sushi.net/minibin/SecuriteInfo.com.Trojan.Crypt.14125.25529.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431788
Start date and time:2024-04-25 19:23:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.Crypt.14125.25529.exe
Detection:CLEAN
Classification:clean4.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 5
  • Number of non-executed functions: 12
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
19:24:47API Interceptor3587x Sleep call for process: SecuriteInfo.com.Trojan.Crypt.14125.25529.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.097493247257242
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Trojan.Crypt.14125.25529.exe
File size:71'168 bytes
MD5:e9d2d1f8d13bfc61b8eba5899b98cacd
SHA1:595d42f95c0c5f35d7f13931836b7378bea997bc
SHA256:7a84132479f6c500730b87327c0bcb5cf550d889a6c116d87ce00fad7c21bb15
SHA512:69409dd718f243ee794dc1287985f3d91539fc25d3c78fe5d861588811268ed2e2806d00eb5d7e2d5db95328fe67ca967a524f6cc7dfddee3b141be52bf143d9
SSDEEP:1536:ZxLf6c9eHYhgK10Jrn0IVHXPqIdUzd09:ZxLfTkHHNiIdUzd0
TLSH:63634C52B6D14875D0A24E3458B2D7B12A7EFC122635498FABE42FBF1EB06C04E74367
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}/...A...A...A.......A.......A..d....A...@...A.......A.......A.......A.Rich..A.........................PE..L...L..P...........
Icon Hash:0bb2686171617117
Entrypoint:0x402cf1
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x50BBA04C [Sun Dec 2 18:39:08 2012 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:e826a19427ea857b57a365b0dc3b2bbe
Instruction
call 00007FA8555AFC5Eh
jmp 00007FA8555AD79Eh
mov edi, edi
push ebp
mov ebp, esp
sub esp, 28h
xor eax, eax
mov dword ptr [ebp-08h], eax
mov dword ptr [ebp-04h], eax
cmp dword ptr [004177E0h], eax
je 00007FA8555AD920h
push dword ptr [0041867Ch]
call dword ptr [0040C0D4h]
jmp 00007FA8555AD917h
mov eax, 0040512Fh
mov ecx, dword ptr [ebp+14h]
mov edx, 000000A6h
push esi
cmp ecx, edx
jg 00007FA8555ADAB8h
je 00007FA8555ADA9Fh
cmp ecx, 19h
jg 00007FA8555ADA2Eh
je 00007FA8555ADA1Ch
push 00000002h
pop edx
sub ecx, edx
je 00007FA8555ADA02h
dec ecx
je 00007FA8555AD9F2h
sub ecx, 05h
je 00007FA8555AD9DAh
dec ecx
je 00007FA8555AD9B2h
sub ecx, 05h
je 00007FA8555AD999h
dec ecx
je 00007FA8555AD960h
sub ecx, 09h
jne 00007FA8555ADB22h
mov dword ptr [ebp-28h], 00000003h
mov dword ptr [ebp-24h], 0040CBD8h
mov ecx, dword ptr [ebp+08h]
fld qword ptr [ecx]
mov ecx, dword ptr [ebp+0Ch]
mov esi, dword ptr [ebp+10h]
fstp qword ptr [ebp-20h]
fld qword ptr [ecx]
lea ecx, dword ptr [ebp-28h]
fstp qword ptr [ebp-18h]
push ecx
fld qword ptr [esi]
fstp qword ptr [ebp-10h]
call eax
pop ecx
test eax, eax
jne 00007FA8555ADAE8h
Programming Language:
  • [ASM] VS2010 SP1 build 40219
  • [ C ] VS2010 SP1 build 40219
  • [IMP] VS2008 SP1 build 30729
  • [C++] VS2010 SP1 build 40219
  • [RES] VS2010 SP1 build 40219
  • [LNK] VS2010 SP1 build 40219
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xe5ec0x8c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000x1aec.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b0000xae0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe3d80x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1c0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xa35c0xa40037e3b829f9fe014e4208e1533f1cdc16False0.5848418445121951data6.6772239710220065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xc0000x2f4c0x3000dbdb80a9ef1bb2814d193c1269182bd1False0.3439127604166667data4.68145293839108IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xf0000x96880x100079f3796e52b8ac124d0baf8d9b014f08False0.37353515625data3.780127677881098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x190000x1aec0x1c0016a9961124d01d4b6cff6543708a9bf5False0.19656808035714285data3.469357550036869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1b0000x10080x1200bd76a76b5ce868c930f4b5357268b0b7False0.5251736111111112data4.889909811388468IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x193700x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.0871951219512195
RT_ICON0x199d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.16263440860215053
RT_ICON0x19cc00x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.3614864864864865
RT_ICON0x19de80x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.3614864864864865
RT_ICON0x19f100x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.35135135135135137
RT_ICON0x1a0380x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.39864864864864863
RT_ICON0x1a1600x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.39864864864864863
RT_ICON0x1a2880x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.3952702702702703
RT_GROUP_ICON0x1a3b00x30data0.9166666666666666
RT_GROUP_ICON0x1a3e00x14data1.15
RT_GROUP_ICON0x1a3f40x14data1.25
RT_GROUP_ICON0x1a4080x14data1.25
RT_GROUP_ICON0x1a41c0x14data1.25
RT_GROUP_ICON0x1a4300x14data1.25
RT_VERSION0x1a4440x3ccdata0.42901234567901236
RT_MANIFEST0x1a8100x2d9ASCII text, with very long lines (729), with no line terminatorsEnglishUnited States0.49382716049382713
DLLImport
KERNEL32.dllGetModuleHandleW, GetPrivateProfileIntW, GetPrivateProfileStringW, lstrcatW, lstrcpyW, GetLogicalDrives, CopyFileW, DeleteFileW, lstrlenW, GetModuleFileNameW, GetLastError, CreateMutexW, HeapReAlloc, HeapAlloc, lstrlenA, GetStringTypeW, MultiByteToWideChar, LCMapStringW, WideCharToMultiByte, RtlUnwind, Sleep, HeapFree, LoadLibraryW, EnterCriticalSection, LeaveCriticalSection, GetCurrentProcess, TerminateProcess, IsDebuggerPresent, HeapSize, WritePrivateProfileStringW, UnhandledExceptionFilter, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, RaiseException, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, HeapCreate, InterlockedDecrement, GetCurrentThreadId, SetLastError, InterlockedIncrement, TlsFree, TlsSetValue, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, DecodePointer, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, GetProcAddress, ExitProcess, WriteFile, GetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, TlsAlloc, TlsGetValue
USER32.dllTrackPopupMenu, DestroyWindow, DestroyIcon, DestroyMenu, MessageBoxW, PostQuitMessage, DefWindowProcW, LoadImageW, wsprintfW, PostMessageW, RegisterClassExW, CreateWindowExW, GetMessageW, TranslateMessage, DispatchMessageW, RegisterWindowMessageW, SetTimer, KillTimer, CreatePopupMenu, InsertMenuItemW, EnableMenuItem, SetForegroundWindow, GetCursorPos
COMDLG32.dllGetOpenFileNameW
SHELL32.dllSHQueryRecycleBinW, SHEmptyRecycleBinW, ShellExecuteW, Shell_NotifyIconW
SHLWAPI.dllStrStrA, StrFormatByteSizeW
WS2_32.dllrecv, send, connect, htons, closesocket, shutdown, gethostbyname, socket, WSACleanup, WSAStartup
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:19:24:11
Start date:25/04/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.14125.25529.exe"
Imagebase:0x9a0000
File size:71'168 bytes
MD5 hash:E9D2D1F8D13BFC61B8EBA5899B98CACD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:6.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:16.2%
    Total number of Nodes:1305
    Total number of Limit Nodes:6
    execution_graph 5915 9a3d5a SetUnhandledExceptionFilter 5916 9a615a 5919 9a7252 LeaveCriticalSection 5916->5919 5918 9a6161 5919->5918 5335 9a3d18 5336 9a3d54 5335->5336 5337 9a3d2a 5335->5337 5337->5336 5339 9a7167 5337->5339 5340 9a7173 _doexit 5339->5340 5345 9a4b6a 5340->5345 5346 9a4af1 __getptd_noexit 66 API calls 5345->5346 5347 9a4b72 5346->5347 5348 9a4b7f 5347->5348 5349 9a4035 __amsg_exit 66 API calls 5347->5349 5350 9aab9b 5348->5350 5349->5348 5359 9a73b3 DecodePointer 5350->5359 5352 9aaba0 5355 9aabab 5352->5355 5360 9a73c0 5352->5360 5354 9aabc3 5357 9a4001 __amsg_exit 66 API calls 5354->5357 5355->5354 5381 9a64f9 5355->5381 5358 9aabcd 5357->5358 5359->5352 5363 9a73cc _doexit 5360->5363 5361 9a7427 5362 9a7409 DecodePointer 5361->5362 5368 9a7436 5361->5368 5367 9a73f8 _siglookup 5362->5367 5363->5361 5363->5362 5364 9a73f3 5363->5364 5369 9a73ef 5363->5369 5365 9a4af1 __getptd_noexit 66 API calls 5364->5365 5365->5367 5371 9a7493 5367->5371 5374 9a4001 __amsg_exit 66 API calls 5367->5374 5375 9a7401 _doexit 5367->5375 5370 9a511c __cftof_l 66 API calls 5368->5370 5369->5364 5369->5368 5372 9a743b 5370->5372 5376 9a732b __lock 66 API calls 5371->5376 5377 9a749e 5371->5377 5373 9a6674 __cftof_l 11 API calls 5372->5373 5373->5375 5374->5371 5375->5355 5376->5377 5379 9a74d3 5377->5379 5387 9a49ba EncodePointer 5377->5387 5388 9a7527 5379->5388 5382 9a6518 _memset __call_reportfault 5381->5382 5383 9a6536 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5382->5383 5386 9a6604 __call_reportfault 5383->5386 5384 9a6fee __NMSG_WRITE 5 API calls 5385 9a6620 5384->5385 5385->5354 5386->5384 5387->5379 5389 9a752d 5388->5389 5390 9a7534 5388->5390 5392 9a7252 LeaveCriticalSection 5389->5392 5390->5375 5392->5390 4619 9a16dc 4620 9a16e9 4619->4620 4621 9a1706 4620->4621 4622 9a16f4 Shell_NotifyIconW 4620->4622 4624 9a1739 4621->4624 4625 9a170e RegisterWindowMessageW 4621->4625 4623 9a24ec DefWindowProcW 4622->4623 4627 9a1768 4624->4627 4628 9a1743 KillTimer 4624->4628 4723 9a1410 GetLogicalDrives 4625->4723 4631 9a1789 4627->4631 4632 9a176d 4627->4632 4630 9a1410 12 API calls 4628->4630 4629 9a1723 SetTimer 4665 9a1d9d 4629->4665 4633 9a1752 SetTimer 4630->4633 4635 9a1c73 4631->4635 4636 9a1795 4631->4636 4634 9a1777 Shell_NotifyIconW 4632->4634 4632->4665 4633->4665 4634->4665 4637 9a1c7e 4635->4637 4638 9a2487 4635->4638 4639 9a1c50 4636->4639 4640 9a17a4 4636->4640 4642 9a1c8b 4637->4642 4664 9a1c97 4637->4664 4644 9a248c KillTimer 4638->4644 4638->4665 4641 9a1c5f 4639->4641 4639->4665 4643 9a1410 12 API calls 4640->4643 4646 9a1c69 4641->4646 4648 9a1ca1 ShellExecuteW 4641->4648 4647 9a1602 72 API calls 4642->4647 4649 9a17a9 CreatePopupMenu 4643->4649 4645 9a2498 8 API calls 4644->4645 4645->4665 4733 9a1602 4646->4733 4652 9a1c6e PostMessageW 4647->4652 4648->4665 4731 9a2ab0 4649->4731 4652->4665 4656 9a1836 6 API calls 4659 9a18a9 4656->4659 4660 9a18b0 lstrlenW InsertMenuItemW 4656->4660 4657 9a1826 EnableMenuItem 4657->4656 4658 9a1cbe 4741 9a1001 wsprintfW WritePrivateProfileStringW 4658->4741 4659->4660 4662 9a18dc 4660->4662 4663 9a18e3 lstrlenW InsertMenuItemW CreatePopupMenu lstrlenW InsertMenuItemW 4660->4663 4662->4663 4666 9a1948 4663->4666 4667 9a194f lstrlenW InsertMenuItemW 4663->4667 4664->4648 4664->4658 4668 9a1da5 4664->4668 4665->4623 4666->4667 4671 9a197b 4667->4671 4672 9a1982 lstrlenW InsertMenuItemW 4667->4672 4669 9a1f5e 4668->4669 4670 9a1db3 MessageBoxW 4668->4670 4676 9a2028 4669->4676 4677 9a1f6c _memset 4669->4677 4670->4665 4673 9a1dd4 lstrcpyW lstrcatW DeleteFileW DestroyIcon 4670->4673 4671->4672 4674 9a19af 4672->4674 4675 9a19b6 lstrlenW InsertMenuItemW CreatePopupMenu lstrlenW InsertMenuItemW 4672->4675 4742 9a1173 LoadImageW 4673->4742 4674->4675 4681 9a1a1b 4675->4681 4682 9a1a22 10 API calls 4675->4682 4679 9a20f2 4676->4679 4680 9a2036 _memset 4676->4680 4688 9a1f7a GetOpenFileNameW 4677->4688 4686 9a21bc 4679->4686 4687 9a2100 _memset 4679->4687 4694 9a2044 GetOpenFileNameW 4680->4694 4681->4682 4683 9a1b0a 22 API calls 4682->4683 4684 9a1ada EnableMenuItem EnableMenuItem EnableMenuItem 4682->4684 4690 9a2483 MessageBoxW 4683->4690 4684->4683 4691 9a21ca _memset 4686->4691 4692 9a2286 4686->4692 4700 9a210e GetOpenFileNameW 4687->4700 4688->4665 4689 9a1fcf lstrcpyW lstrcatW CopyFileW DestroyIcon 4688->4689 4695 9a1173 3 API calls 4689->4695 4690->4665 4703 9a21d8 GetOpenFileNameW 4691->4703 4698 9a235e 4692->4698 4699 9a2294 _memset 4692->4699 4693 9a1173 3 API calls 4696 9a1e6d lstrcpyW lstrcatW DeleteFileW DestroyIcon 4693->4696 4694->4665 4697 9a2099 lstrcpyW lstrcatW CopyFileW DestroyIcon 4694->4697 4695->4652 4704 9a1173 3 API calls 4696->4704 4705 9a1173 3 API calls 4697->4705 4701 9a2398 4698->4701 4702 9a2368 MessageBoxW 4698->4702 4711 9a22a2 GetOpenFileNameW 4699->4711 4700->4665 4706 9a2163 lstrcpyW lstrcatW CopyFileW DestroyIcon 4700->4706 4701->4665 4709 9a23a6 9 API calls 4701->4709 4702->4665 4707 9a2389 KillTimer 4702->4707 4703->4665 4708 9a222d lstrcpyW lstrcatW CopyFileW DestroyIcon 4703->4708 4710 9a1eb7 lstrcpyW lstrcatW DeleteFileW DestroyIcon 4704->4710 4705->4652 4712 9a1173 3 API calls 4706->4712 4707->4645 4713 9a1173 3 API calls 4708->4713 4709->4665 4714 9a2454 4709->4714 4715 9a1173 3 API calls 4710->4715 4711->4665 4716 9a22f7 lstrcpyW lstrcatW CopyFileW DestroyIcon 4711->4716 4712->4652 4713->4652 4745 9a1034 WSAStartup 4714->4745 4718 9a1f01 lstrcpyW lstrcatW DeleteFileW DestroyIcon 4715->4718 4719 9a1173 3 API calls 4716->4719 4721 9a1173 3 API calls 4718->4721 4719->4652 4720 9a2459 4720->4648 4722 9a2473 4720->4722 4721->4652 4722->4690 4726 9a143d 4723->4726 4724 9a1442 wsprintfW SHQueryRecycleBinW 4724->4726 4725 9a1496 4727 9a14aa lstrcpyW lstrcatW StrFormatByteSizeW lstrcatW 4725->4727 4728 9a14e8 lstrcpyW lstrcatW StrFormatByteSizeW lstrcatW 4725->4728 4726->4724 4726->4725 4729 9a15eb Shell_NotifyIconW 4727->4729 4730 9a1529 __aulldiv 4728->4730 4729->4629 4730->4729 4732 9a17c2 lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW 4731->4732 4732->4656 4732->4657 4734 9a1630 __aulldiv 4733->4734 4760 9a27b0 4734->4760 4736 9a1665 4771 9a1001 wsprintfW WritePrivateProfileStringW 4736->4771 4738 9a168f GetPrivateProfileIntW 4739 9a16ba SHEmptyRecycleBinW 4738->4739 4739->4652 4741->4665 4743 9a118e GetModuleHandleW LoadImageW 4742->4743 4744 9a11a3 lstrcpyW lstrcatW DeleteFileW DestroyIcon 4742->4744 4743->4744 4744->4693 4746 9a105e socket 4745->4746 4747 9a1053 WSACleanup 4745->4747 4748 9a1080 gethostbyname 4746->4748 4749 9a1075 WSACleanup 4746->4749 4747->4720 4751 9a10ad htons connect 4748->4751 4752 9a1092 WSACleanup shutdown closesocket 4748->4752 4750 9a116c 4749->4750 4750->4720 4751->4752 4753 9a10db lstrlenA send 4751->4753 4752->4750 4753->4752 4754 9a10f6 recv 4753->4754 4755 9a1156 shutdown closesocket WSACleanup 4754->4755 4756 9a110f 4754->4756 4755->4750 4756->4755 4757 9a111d StrStrA 4756->4757 4758 9a1147 4757->4758 4759 9a1135 StrStrA 4757->4759 4758->4752 4759->4758 4761 9a27bd 4760->4761 4763 9a2fd7 __ctrlfp __floor_pentium4 4760->4763 4762 9a27ee 4761->4762 4761->4763 4770 9a2838 4762->4770 4772 9a2cfb 4762->4772 4764 9a3045 __floor_pentium4 4763->4764 4765 9a3032 __ctrlfp 4763->4765 4766 9a3022 4763->4766 4764->4765 4787 9a5748 4764->4787 4765->4736 4780 9a56f3 4766->4780 4770->4736 4771->4738 4773 9a2d13 DecodePointer 4772->4773 4774 9a2d21 4772->4774 4773->4774 4775 9a2e0a 4774->4775 4776 9a2d6e 4774->4776 4778 9a2dbd 4774->4778 4777 9a511c __cftof_l 66 API calls 4775->4777 4775->4778 4776->4778 4798 9a511c 4776->4798 4777->4778 4778->4770 4781 9a5729 4780->4781 4782 9a5701 4780->4782 4784 9a511c __cftof_l 66 API calls 4781->4784 5056 9a5653 4782->5056 4786 9a572e __ctrlfp 4784->4786 4785 9a5724 4785->4765 4786->4765 4788 9a577e __handle_exc 4787->4788 4790 9a57a5 __except1 4788->4790 5071 9a5132 4788->5071 4791 9a57e7 4790->4791 4792 9a57c0 4790->4792 4793 9a55f2 __umatherr 66 API calls 4791->4793 4794 9a5653 __umatherr 66 API calls 4792->4794 4795 9a57e2 __ctrlfp 4793->4795 4794->4795 4796 9a6fee __NMSG_WRITE 5 API calls 4795->4796 4797 9a580b 4796->4797 4797->4765 4801 9a4af1 GetLastError 4798->4801 4800 9a5121 4800->4778 4815 9a49cc TlsGetValue 4801->4815 4804 9a4b5e SetLastError 4804->4800 4807 9a4b24 DecodePointer 4808 9a4b39 4807->4808 4809 9a4b3d 4808->4809 4810 9a4b55 4808->4810 4824 9a4a3d 4809->4824 4837 9a7bb7 4810->4837 4813 9a4b45 GetCurrentThreadId 4813->4804 4814 9a4b5b 4814->4804 4816 9a49fc 4815->4816 4817 9a49e1 DecodePointer TlsSetValue 4815->4817 4816->4804 4818 9a7c36 4816->4818 4817->4816 4819 9a7c3f 4818->4819 4821 9a4b1c 4819->4821 4822 9a7c5d Sleep 4819->4822 4843 9aac95 4819->4843 4821->4804 4821->4807 4823 9a7c72 4822->4823 4823->4819 4823->4821 4854 9a4e50 4824->4854 4826 9a4a49 GetModuleHandleW 4855 9a732b 4826->4855 4828 9a4a87 InterlockedIncrement 4862 9a4adf 4828->4862 4831 9a732b __lock 64 API calls 4832 9a4aa8 4831->4832 4865 9a61b1 InterlockedIncrement 4832->4865 4834 9a4ac6 4877 9a4ae8 4834->4877 4836 9a4ad3 _doexit 4836->4813 4838 9a7bc2 HeapFree 4837->4838 4842 9a7beb _free 4837->4842 4839 9a7bd7 4838->4839 4838->4842 4840 9a511c __cftof_l 64 API calls 4839->4840 4841 9a7bdd GetLastError 4840->4841 4841->4842 4842->4814 4844 9aaca1 4843->4844 4849 9aacbc 4843->4849 4845 9aacad 4844->4845 4844->4849 4846 9a511c __cftof_l 65 API calls 4845->4846 4848 9aacb2 4846->4848 4847 9aaccf HeapAlloc 4847->4849 4850 9aacf6 4847->4850 4848->4819 4849->4847 4849->4850 4852 9a7590 DecodePointer 4849->4852 4850->4819 4853 9a75a5 4852->4853 4853->4849 4854->4826 4856 9a7353 EnterCriticalSection 4855->4856 4857 9a7340 4855->4857 4856->4828 4880 9a7269 4857->4880 4859 9a7346 4859->4856 4905 9a4035 4859->4905 5054 9a7252 LeaveCriticalSection 4862->5054 4864 9a4aa1 4864->4831 4866 9a61cf InterlockedIncrement 4865->4866 4867 9a61d2 4865->4867 4866->4867 4868 9a61df 4867->4868 4869 9a61dc InterlockedIncrement 4867->4869 4870 9a61e9 InterlockedIncrement 4868->4870 4871 9a61ec 4868->4871 4869->4868 4870->4871 4872 9a61f9 4871->4872 4873 9a61f6 InterlockedIncrement 4871->4873 4874 9a6212 InterlockedIncrement 4872->4874 4875 9a6222 InterlockedIncrement 4872->4875 4876 9a622d InterlockedIncrement 4872->4876 4873->4872 4874->4872 4875->4872 4876->4834 5055 9a7252 LeaveCriticalSection 4877->5055 4879 9a4aef 4879->4836 4881 9a7275 _doexit 4880->4881 4883 9a729b 4881->4883 4912 9a4228 4881->4912 4888 9a72ab _doexit 4883->4888 4948 9a7bf1 4883->4948 4888->4859 4890 9a72cc 4892 9a732b __lock 65 API calls 4890->4892 4891 9a72bd 4894 9a511c __cftof_l 65 API calls 4891->4894 4895 9a72d3 4892->4895 4894->4888 4896 9a72db InitializeCriticalSectionAndSpinCount 4895->4896 4897 9a7306 4895->4897 4898 9a72eb 4896->4898 4899 9a72f7 4896->4899 4900 9a7bb7 _free 65 API calls 4897->4900 4901 9a7bb7 _free 65 API calls 4898->4901 4953 9a7322 4899->4953 4900->4899 4902 9a72f1 4901->4902 4904 9a511c __cftof_l 65 API calls 4902->4904 4904->4899 4906 9a4228 __FF_MSGBANNER 66 API calls 4905->4906 4907 9a403f 4906->4907 4908 9a4079 __NMSG_WRITE 66 API calls 4907->4908 4909 9a4047 4908->4909 5030 9a4001 4909->5030 4956 9a7b78 4912->4956 4914 9a422f 4915 9a7b78 __NMSG_WRITE 66 API calls 4914->4915 4919 9a423c 4914->4919 4915->4919 4916 9a4079 __NMSG_WRITE 66 API calls 4917 9a4254 4916->4917 4920 9a4079 __NMSG_WRITE 66 API calls 4917->4920 4918 9a425e 4921 9a4079 4918->4921 4919->4916 4919->4918 4920->4918 4922 9a409a __NMSG_WRITE 4921->4922 4923 9a7b78 __NMSG_WRITE 63 API calls 4922->4923 4944 9a41b6 4922->4944 4925 9a40b4 4923->4925 4927 9a41c5 GetStdHandle 4925->4927 4928 9a7b78 __NMSG_WRITE 63 API calls 4925->4928 4926 9a4226 4945 9a3d93 4926->4945 4931 9a41d3 _strlen 4927->4931 4927->4944 4929 9a40c5 4928->4929 4929->4927 4930 9a40d7 4929->4930 4930->4944 4963 9a7b15 4930->4963 4934 9a4209 WriteFile 4931->4934 4931->4944 4934->4944 4935 9a4103 GetModuleFileNameW 4936 9a4124 4935->4936 4939 9a4130 _wcslen 4935->4939 4938 9a7b15 __NMSG_WRITE 63 API calls 4936->4938 4938->4939 4940 9a79b8 63 API calls __NMSG_WRITE 4939->4940 4942 9a41a6 4939->4942 4972 9a6622 4939->4972 4975 9a7a2d 4939->4975 4940->4939 4984 9a784c 4942->4984 5002 9a6fee 4944->5002 5010 9a3d68 GetModuleHandleW 4945->5010 4952 9a7bfa 4948->4952 4950 9a72b6 4950->4890 4950->4891 4951 9a7c11 Sleep 4951->4952 4952->4950 4952->4951 5013 9aac01 4952->5013 5029 9a7252 LeaveCriticalSection 4953->5029 4955 9a7329 4955->4888 4957 9a7b84 4956->4957 4958 9a7b8e 4957->4958 4959 9a511c __cftof_l 66 API calls 4957->4959 4958->4914 4960 9a7ba7 4959->4960 4961 9a6674 __cftof_l 11 API calls 4960->4961 4962 9a7bb2 4961->4962 4962->4914 4964 9a7b2a 4963->4964 4965 9a7b23 4963->4965 4966 9a511c __cftof_l 66 API calls 4964->4966 4965->4964 4967 9a7b4b 4965->4967 4971 9a7b2f 4966->4971 4969 9a40f8 4967->4969 4970 9a511c __cftof_l 66 API calls 4967->4970 4968 9a6674 __cftof_l 11 API calls 4968->4969 4969->4935 4969->4939 4970->4971 4971->4968 4973 9a64f9 __call_reportfault 8 API calls 4972->4973 4974 9a6634 GetCurrentProcess TerminateProcess 4973->4974 4974->4939 4979 9a7a3f 4975->4979 4976 9a7a43 4977 9a7a48 4976->4977 4978 9a511c __cftof_l 66 API calls 4976->4978 4977->4939 4980 9a7a5f 4978->4980 4979->4976 4979->4977 4982 9a7a86 4979->4982 4981 9a6674 __cftof_l 11 API calls 4980->4981 4981->4977 4982->4977 4983 9a511c __cftof_l 66 API calls 4982->4983 4983->4980 4985 9a49ba ___crtMessageBoxW EncodePointer 4984->4985 4986 9a7872 4985->4986 4987 9a78ff 4986->4987 4988 9a7882 LoadLibraryW 4986->4988 4994 9a7919 DecodePointer DecodePointer 4987->4994 4999 9a792c 4987->4999 4989 9a7897 GetProcAddress 4988->4989 4990 9a7997 4988->4990 4989->4990 4993 9a78ad 7 API calls 4989->4993 4995 9a6fee __NMSG_WRITE 5 API calls 4990->4995 4991 9a798b DecodePointer 4991->4990 4992 9a7962 DecodePointer 4992->4991 4996 9a7969 4992->4996 4993->4987 4997 9a78ef GetProcAddress EncodePointer 4993->4997 4994->4999 4998 9a79b6 4995->4998 4996->4991 5000 9a797c DecodePointer 4996->5000 4997->4987 4998->4944 4999->4991 4999->4992 5001 9a794f 4999->5001 5000->4991 5000->5001 5001->4991 5003 9a6ff8 IsDebuggerPresent 5002->5003 5004 9a6ff6 5002->5004 5006 9a89e4 __call_reportfault 5003->5006 5004->4926 5007 9aa722 SetUnhandledExceptionFilter UnhandledExceptionFilter 5006->5007 5008 9aa73f __call_reportfault 5007->5008 5009 9aa747 GetCurrentProcess TerminateProcess 5007->5009 5008->5009 5009->4926 5011 9a3d7c GetProcAddress 5010->5011 5012 9a3d8c ExitProcess 5010->5012 5011->5012 5014 9aac7e 5013->5014 5025 9aac0f 5013->5025 5015 9a7590 _malloc DecodePointer 5014->5015 5016 9aac84 5015->5016 5017 9a511c __cftof_l 65 API calls 5016->5017 5028 9aac76 5017->5028 5018 9a4228 __FF_MSGBANNER 65 API calls 5018->5025 5019 9aac3d HeapAlloc 5019->5025 5019->5028 5020 9a4079 __NMSG_WRITE 65 API calls 5020->5025 5021 9aac6a 5024 9a511c __cftof_l 65 API calls 5021->5024 5022 9a3d93 _doexit GetModuleHandleW GetProcAddress ExitProcess 5022->5025 5023 9a7590 _malloc DecodePointer 5023->5025 5026 9aac68 5024->5026 5025->5018 5025->5019 5025->5020 5025->5021 5025->5022 5025->5023 5025->5026 5027 9a511c __cftof_l 65 API calls 5026->5027 5027->5028 5028->4952 5029->4955 5033 9a3eab 5030->5033 5032 9a4012 5034 9a3eb7 _doexit 5033->5034 5035 9a732b __lock 61 API calls 5034->5035 5036 9a3ebe 5035->5036 5038 9a3ee9 DecodePointer 5036->5038 5042 9a3f68 5036->5042 5037 9a3fd6 _doexit LeaveCriticalSection 5039 9a3fb6 5037->5039 5040 9a3f00 DecodePointer 5038->5040 5038->5042 5041 9a3fe5 _doexit 5039->5041 5043 9a7252 _doexit LeaveCriticalSection 5039->5043 5048 9a3f13 5040->5048 5041->5032 5042->5037 5045 9a3fcd 5043->5045 5044 9a49ba ___crtMessageBoxW EncodePointer 5044->5048 5046 9a3d93 _doexit GetModuleHandleW GetProcAddress ExitProcess 5045->5046 5047 9a3fd6 5046->5047 5049 9a3fe3 5047->5049 5051 9a7252 _doexit LeaveCriticalSection 5047->5051 5048->5042 5048->5044 5050 9a3f2a DecodePointer 5048->5050 5053 9a3f39 DecodePointer DecodePointer 5048->5053 5049->5032 5052 9a49ba ___crtMessageBoxW EncodePointer 5050->5052 5051->5049 5052->5048 5053->5048 5054->4864 5055->4879 5057 9a565d 5056->5057 5058 9a5678 __umatherr __ctrlfp 5057->5058 5059 9a56d6 __ctrlfp 5057->5059 5062 9a56c6 5058->5062 5064 9a55f2 5058->5064 5060 9a55f2 __umatherr 66 API calls 5059->5060 5061 9a56eb 5060->5061 5061->4785 5062->4785 5065 9a55fd 5064->5065 5066 9a5612 5064->5066 5067 9a5617 5065->5067 5069 9a511c __cftof_l 66 API calls 5065->5069 5068 9a511c __cftof_l 66 API calls 5066->5068 5067->5062 5068->5067 5070 9a560a 5069->5070 5070->5062 5072 9a5159 __raise_exc_ex 5071->5072 5073 9a534c RaiseException 5072->5073 5074 9a5365 5073->5074 5074->4790 5393 9a5e10 5403 9a5d94 5393->5403 5396 9a5e3b setSBCS 5397 9a6fee __NMSG_WRITE 5 API calls 5396->5397 5399 9a5ff7 5397->5399 5398 9a5e7f IsValidCodePage 5398->5396 5400 9a5e91 GetCPInfo 5398->5400 5400->5396 5402 9a5ea4 _memset __setmbcp_nolock 5400->5402 5410 9a5b60 GetCPInfo 5402->5410 5420 9a30af 5403->5420 5406 9a5db3 GetOEMCP 5409 9a5dc3 5406->5409 5407 9a5dd1 5408 9a5dd6 GetACP 5407->5408 5407->5409 5408->5409 5409->5396 5409->5398 5409->5402 5411 9a5c48 5410->5411 5413 9a5b94 _memset 5410->5413 5415 9a6fee __NMSG_WRITE 5 API calls 5411->5415 5733 9a84c6 5413->5733 5417 9a5cee 5415->5417 5417->5402 5419 9a8399 ___crtLCMapStringA 82 API calls 5419->5411 5421 9a30c2 5420->5421 5427 9a310f 5420->5427 5422 9a4b6a __getptd 66 API calls 5421->5422 5423 9a30c7 5422->5423 5424 9a30ef 5423->5424 5428 9a6471 5423->5428 5424->5427 5443 9a5cf0 5424->5443 5427->5406 5427->5407 5429 9a647d _doexit 5428->5429 5430 9a4b6a __getptd 66 API calls 5429->5430 5431 9a6482 5430->5431 5432 9a64b0 5431->5432 5434 9a6494 5431->5434 5433 9a732b __lock 66 API calls 5432->5433 5435 9a64b7 5433->5435 5436 9a4b6a __getptd 66 API calls 5434->5436 5459 9a6424 5435->5459 5438 9a6499 5436->5438 5441 9a64a7 _doexit 5438->5441 5442 9a4035 __amsg_exit 66 API calls 5438->5442 5441->5424 5442->5441 5444 9a5cfc _doexit 5443->5444 5445 9a4b6a __getptd 66 API calls 5444->5445 5446 9a5d01 5445->5446 5447 9a732b __lock 66 API calls 5446->5447 5455 9a5d13 5446->5455 5450 9a5d31 5447->5450 5448 9a5d21 _doexit 5448->5427 5449 9a5d7a 5729 9a5d8b 5449->5729 5450->5449 5453 9a5d48 InterlockedDecrement 5450->5453 5454 9a5d62 InterlockedIncrement 5450->5454 5451 9a4035 __amsg_exit 66 API calls 5451->5448 5453->5454 5456 9a5d53 5453->5456 5454->5449 5455->5448 5455->5451 5456->5454 5457 9a7bb7 _free 66 API calls 5456->5457 5458 9a5d61 5457->5458 5458->5454 5460 9a6466 5459->5460 5461 9a6431 5459->5461 5467 9a64de 5460->5467 5461->5460 5462 9a61b1 ___addlocaleref 8 API calls 5461->5462 5463 9a6447 5462->5463 5463->5460 5470 9a6240 5463->5470 5728 9a7252 LeaveCriticalSection 5467->5728 5469 9a64e5 5469->5438 5471 9a6251 InterlockedDecrement 5470->5471 5472 9a62d4 5470->5472 5473 9a6269 5471->5473 5474 9a6266 InterlockedDecrement 5471->5474 5472->5460 5484 9a62d9 5472->5484 5475 9a6273 InterlockedDecrement 5473->5475 5476 9a6276 5473->5476 5474->5473 5475->5476 5477 9a6283 5476->5477 5478 9a6280 InterlockedDecrement 5476->5478 5479 9a628d InterlockedDecrement 5477->5479 5481 9a6290 5477->5481 5478->5477 5479->5481 5480 9a62a9 InterlockedDecrement 5480->5481 5481->5480 5482 9a62b9 InterlockedDecrement 5481->5482 5483 9a62c4 InterlockedDecrement 5481->5483 5482->5481 5483->5472 5485 9a635d 5484->5485 5488 9a62f0 5484->5488 5486 9a7bb7 _free 66 API calls 5485->5486 5487 9a63aa 5485->5487 5490 9a637e 5486->5490 5498 9a63d3 5487->5498 5554 9a8506 5487->5554 5488->5485 5494 9a7bb7 _free 66 API calls 5488->5494 5510 9a6324 5488->5510 5492 9a7bb7 _free 66 API calls 5490->5492 5496 9a6391 5492->5496 5493 9a7bb7 _free 66 API calls 5493->5498 5499 9a6319 5494->5499 5495 9a6418 5500 9a7bb7 _free 66 API calls 5495->5500 5502 9a7bb7 _free 66 API calls 5496->5502 5497 9a7bb7 _free 66 API calls 5503 9a6352 5497->5503 5498->5495 5509 9a7bb7 66 API calls _free 5498->5509 5514 9a88e6 5499->5514 5506 9a641e 5500->5506 5501 9a7bb7 _free 66 API calls 5507 9a633a 5501->5507 5508 9a639f 5502->5508 5504 9a7bb7 _free 66 API calls 5503->5504 5504->5485 5506->5460 5542 9a887d 5507->5542 5512 9a7bb7 _free 66 API calls 5508->5512 5509->5498 5510->5501 5513 9a6345 5510->5513 5512->5487 5513->5497 5515 9a89e0 5514->5515 5516 9a88f7 5514->5516 5515->5510 5517 9a8908 5516->5517 5518 9a7bb7 _free 66 API calls 5516->5518 5519 9a891a 5517->5519 5520 9a7bb7 _free 66 API calls 5517->5520 5518->5517 5521 9a892c 5519->5521 5522 9a7bb7 _free 66 API calls 5519->5522 5520->5519 5523 9a893e 5521->5523 5524 9a7bb7 _free 66 API calls 5521->5524 5522->5521 5525 9a8950 5523->5525 5526 9a7bb7 _free 66 API calls 5523->5526 5524->5523 5527 9a8962 5525->5527 5528 9a7bb7 _free 66 API calls 5525->5528 5526->5525 5529 9a8974 5527->5529 5530 9a7bb7 _free 66 API calls 5527->5530 5528->5527 5531 9a8986 5529->5531 5532 9a7bb7 _free 66 API calls 5529->5532 5530->5529 5533 9a8998 5531->5533 5534 9a7bb7 _free 66 API calls 5531->5534 5532->5531 5535 9a89aa 5533->5535 5536 9a7bb7 _free 66 API calls 5533->5536 5534->5533 5537 9a89bc 5535->5537 5538 9a7bb7 _free 66 API calls 5535->5538 5536->5535 5539 9a89ce 5537->5539 5540 9a7bb7 _free 66 API calls 5537->5540 5538->5537 5539->5515 5541 9a7bb7 _free 66 API calls 5539->5541 5540->5539 5541->5515 5543 9a888a 5542->5543 5553 9a88e2 5542->5553 5544 9a889a 5543->5544 5545 9a7bb7 _free 66 API calls 5543->5545 5546 9a88ac 5544->5546 5547 9a7bb7 _free 66 API calls 5544->5547 5545->5544 5548 9a88be 5546->5548 5549 9a7bb7 _free 66 API calls 5546->5549 5547->5546 5550 9a88d0 5548->5550 5551 9a7bb7 _free 66 API calls 5548->5551 5549->5548 5552 9a7bb7 _free 66 API calls 5550->5552 5550->5553 5551->5550 5552->5553 5553->5513 5555 9a63c8 5554->5555 5556 9a8517 5554->5556 5555->5493 5557 9a7bb7 _free 66 API calls 5556->5557 5558 9a851f 5557->5558 5559 9a7bb7 _free 66 API calls 5558->5559 5560 9a8527 5559->5560 5561 9a7bb7 _free 66 API calls 5560->5561 5562 9a852f 5561->5562 5563 9a7bb7 _free 66 API calls 5562->5563 5564 9a8537 5563->5564 5565 9a7bb7 _free 66 API calls 5564->5565 5566 9a853f 5565->5566 5567 9a7bb7 _free 66 API calls 5566->5567 5568 9a8547 5567->5568 5569 9a7bb7 _free 66 API calls 5568->5569 5570 9a854e 5569->5570 5571 9a7bb7 _free 66 API calls 5570->5571 5572 9a8556 5571->5572 5573 9a7bb7 _free 66 API calls 5572->5573 5574 9a855e 5573->5574 5575 9a7bb7 _free 66 API calls 5574->5575 5576 9a8566 5575->5576 5577 9a7bb7 _free 66 API calls 5576->5577 5578 9a856e 5577->5578 5579 9a7bb7 _free 66 API calls 5578->5579 5580 9a8576 5579->5580 5581 9a7bb7 _free 66 API calls 5580->5581 5582 9a857e 5581->5582 5583 9a7bb7 _free 66 API calls 5582->5583 5584 9a8586 5583->5584 5585 9a7bb7 _free 66 API calls 5584->5585 5586 9a858e 5585->5586 5587 9a7bb7 _free 66 API calls 5586->5587 5588 9a8596 5587->5588 5589 9a7bb7 _free 66 API calls 5588->5589 5590 9a85a1 5589->5590 5591 9a7bb7 _free 66 API calls 5590->5591 5592 9a85a9 5591->5592 5593 9a7bb7 _free 66 API calls 5592->5593 5594 9a85b1 5593->5594 5595 9a7bb7 _free 66 API calls 5594->5595 5596 9a85b9 5595->5596 5597 9a7bb7 _free 66 API calls 5596->5597 5598 9a85c1 5597->5598 5599 9a7bb7 _free 66 API calls 5598->5599 5600 9a85c9 5599->5600 5601 9a7bb7 _free 66 API calls 5600->5601 5602 9a85d1 5601->5602 5603 9a7bb7 _free 66 API calls 5602->5603 5604 9a85d9 5603->5604 5605 9a7bb7 _free 66 API calls 5604->5605 5606 9a85e1 5605->5606 5607 9a7bb7 _free 66 API calls 5606->5607 5608 9a85e9 5607->5608 5609 9a7bb7 _free 66 API calls 5608->5609 5610 9a85f1 5609->5610 5611 9a7bb7 _free 66 API calls 5610->5611 5612 9a85f9 5611->5612 5613 9a7bb7 _free 66 API calls 5612->5613 5614 9a8601 5613->5614 5615 9a7bb7 _free 66 API calls 5614->5615 5616 9a8609 5615->5616 5617 9a7bb7 _free 66 API calls 5616->5617 5618 9a8611 5617->5618 5619 9a7bb7 _free 66 API calls 5618->5619 5620 9a8619 5619->5620 5621 9a7bb7 _free 66 API calls 5620->5621 5622 9a8627 5621->5622 5623 9a7bb7 _free 66 API calls 5622->5623 5624 9a8632 5623->5624 5625 9a7bb7 _free 66 API calls 5624->5625 5626 9a863d 5625->5626 5627 9a7bb7 _free 66 API calls 5626->5627 5628 9a8648 5627->5628 5629 9a7bb7 _free 66 API calls 5628->5629 5630 9a8653 5629->5630 5631 9a7bb7 _free 66 API calls 5630->5631 5632 9a865e 5631->5632 5633 9a7bb7 _free 66 API calls 5632->5633 5634 9a8669 5633->5634 5635 9a7bb7 _free 66 API calls 5634->5635 5636 9a8674 5635->5636 5637 9a7bb7 _free 66 API calls 5636->5637 5638 9a867f 5637->5638 5639 9a7bb7 _free 66 API calls 5638->5639 5640 9a868a 5639->5640 5641 9a7bb7 _free 66 API calls 5640->5641 5642 9a8695 5641->5642 5643 9a7bb7 _free 66 API calls 5642->5643 5644 9a86a0 5643->5644 5645 9a7bb7 _free 66 API calls 5644->5645 5646 9a86ab 5645->5646 5647 9a7bb7 _free 66 API calls 5646->5647 5648 9a86b6 5647->5648 5649 9a7bb7 _free 66 API calls 5648->5649 5650 9a86c1 5649->5650 5651 9a7bb7 _free 66 API calls 5650->5651 5652 9a86cc 5651->5652 5653 9a7bb7 _free 66 API calls 5652->5653 5654 9a86da 5653->5654 5655 9a7bb7 _free 66 API calls 5654->5655 5656 9a86e5 5655->5656 5657 9a7bb7 _free 66 API calls 5656->5657 5658 9a86f0 5657->5658 5659 9a7bb7 _free 66 API calls 5658->5659 5660 9a86fb 5659->5660 5661 9a7bb7 _free 66 API calls 5660->5661 5662 9a8706 5661->5662 5663 9a7bb7 _free 66 API calls 5662->5663 5664 9a8711 5663->5664 5665 9a7bb7 _free 66 API calls 5664->5665 5666 9a871c 5665->5666 5667 9a7bb7 _free 66 API calls 5666->5667 5668 9a8727 5667->5668 5669 9a7bb7 _free 66 API calls 5668->5669 5670 9a8732 5669->5670 5671 9a7bb7 _free 66 API calls 5670->5671 5672 9a873d 5671->5672 5673 9a7bb7 _free 66 API calls 5672->5673 5674 9a8748 5673->5674 5675 9a7bb7 _free 66 API calls 5674->5675 5676 9a8753 5675->5676 5677 9a7bb7 _free 66 API calls 5676->5677 5678 9a875e 5677->5678 5679 9a7bb7 _free 66 API calls 5678->5679 5680 9a8769 5679->5680 5681 9a7bb7 _free 66 API calls 5680->5681 5682 9a8774 5681->5682 5683 9a7bb7 _free 66 API calls 5682->5683 5684 9a877f 5683->5684 5685 9a7bb7 _free 66 API calls 5684->5685 5686 9a878d 5685->5686 5687 9a7bb7 _free 66 API calls 5686->5687 5688 9a8798 5687->5688 5689 9a7bb7 _free 66 API calls 5688->5689 5690 9a87a3 5689->5690 5691 9a7bb7 _free 66 API calls 5690->5691 5692 9a87ae 5691->5692 5693 9a7bb7 _free 66 API calls 5692->5693 5694 9a87b9 5693->5694 5695 9a7bb7 _free 66 API calls 5694->5695 5696 9a87c4 5695->5696 5697 9a7bb7 _free 66 API calls 5696->5697 5698 9a87cf 5697->5698 5699 9a7bb7 _free 66 API calls 5698->5699 5700 9a87da 5699->5700 5701 9a7bb7 _free 66 API calls 5700->5701 5702 9a87e5 5701->5702 5703 9a7bb7 _free 66 API calls 5702->5703 5704 9a87f0 5703->5704 5705 9a7bb7 _free 66 API calls 5704->5705 5706 9a87fb 5705->5706 5707 9a7bb7 _free 66 API calls 5706->5707 5708 9a8806 5707->5708 5709 9a7bb7 _free 66 API calls 5708->5709 5710 9a8811 5709->5710 5711 9a7bb7 _free 66 API calls 5710->5711 5712 9a881c 5711->5712 5713 9a7bb7 _free 66 API calls 5712->5713 5714 9a8827 5713->5714 5715 9a7bb7 _free 66 API calls 5714->5715 5716 9a8832 5715->5716 5717 9a7bb7 _free 66 API calls 5716->5717 5718 9a8840 5717->5718 5719 9a7bb7 _free 66 API calls 5718->5719 5720 9a884b 5719->5720 5721 9a7bb7 _free 66 API calls 5720->5721 5722 9a8856 5721->5722 5723 9a7bb7 _free 66 API calls 5722->5723 5724 9a8861 5723->5724 5725 9a7bb7 _free 66 API calls 5724->5725 5726 9a886c 5725->5726 5727 9a7bb7 _free 66 API calls 5726->5727 5727->5555 5728->5469 5732 9a7252 LeaveCriticalSection 5729->5732 5731 9a5d92 5731->5455 5732->5731 5734 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5733->5734 5735 9a84d9 5734->5735 5743 9a83df 5735->5743 5738 9a8399 5739 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5738->5739 5740 9a83ac 5739->5740 5760 9a81b2 5740->5760 5744 9a8408 MultiByteToWideChar 5743->5744 5745 9a83fd 5743->5745 5746 9a8435 5744->5746 5755 9a8431 5744->5755 5745->5744 5750 9aac01 _malloc 66 API calls 5746->5750 5754 9a844a _memset __crtGetStringTypeA_stat 5746->5754 5747 9a6fee __NMSG_WRITE 5 API calls 5748 9a5c03 5747->5748 5748->5738 5749 9a8483 MultiByteToWideChar 5751 9a84aa 5749->5751 5752 9a8499 GetStringTypeW 5749->5752 5750->5754 5756 9a8192 5751->5756 5752->5751 5754->5749 5754->5755 5755->5747 5757 9a819e 5756->5757 5758 9a81af 5756->5758 5757->5758 5759 9a7bb7 _free 66 API calls 5757->5759 5758->5755 5759->5758 5762 9a81d0 MultiByteToWideChar 5760->5762 5763 9a822e 5762->5763 5767 9a8235 5762->5767 5764 9a6fee __NMSG_WRITE 5 API calls 5763->5764 5766 9a5c23 5764->5766 5765 9a8282 MultiByteToWideChar 5768 9a829b LCMapStringW 5765->5768 5783 9a837a 5765->5783 5766->5419 5769 9aac01 _malloc 66 API calls 5767->5769 5773 9a824e __crtGetStringTypeA_stat 5767->5773 5771 9a82ba 5768->5771 5768->5783 5769->5773 5770 9a8192 __freea 66 API calls 5770->5763 5772 9a82c4 5771->5772 5774 9a82ed 5771->5774 5775 9a82d8 LCMapStringW 5772->5775 5772->5783 5773->5763 5773->5765 5777 9a8308 __crtGetStringTypeA_stat 5774->5777 5778 9aac01 _malloc 66 API calls 5774->5778 5775->5783 5776 9a833c LCMapStringW 5779 9a8352 WideCharToMultiByte 5776->5779 5780 9a8374 5776->5780 5777->5776 5777->5783 5778->5777 5779->5780 5781 9a8192 __freea 66 API calls 5780->5781 5781->5783 5783->5770 5920 9a80d0 5921 9a80e2 5920->5921 5923 9a80f0 @_EH4_CallFilterFunc@8 5920->5923 5922 9a6fee __NMSG_WRITE 5 API calls 5921->5922 5922->5923 5924 9aadd0 RtlUnwind 5925 9a32d6 5928 9a31aa 5925->5928 5929 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5928->5929 5930 9a31be 5929->5930 5784 9a328a 5787 9a3248 5784->5787 5788 9a325b 5787->5788 5789 9a3274 5787->5789 5793 9a6844 5788->5793 5802 9a68ec 5789->5802 5792 9a3264 5794 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5793->5794 5795 9a686a 5794->5795 5811 9a957e 5795->5811 5800 9a6fee __NMSG_WRITE 5 API calls 5801 9a68ea 5800->5801 5801->5792 5803 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5802->5803 5804 9a6912 5803->5804 5805 9a957e ___strgtold12_l 66 API calls 5804->5805 5806 9a692a 5805->5806 5823 9a902d 5806->5823 5809 9a6fee __NMSG_WRITE 5 API calls 5810 9a6992 5809->5810 5810->5792 5812 9a95c6 5811->5812 5818 9a95d6 ___strgtold12_l 5811->5818 5813 9a511c __cftof_l 66 API calls 5812->5813 5814 9a95cb 5813->5814 5815 9a6674 __cftof_l 11 API calls 5814->5815 5815->5818 5816 9a6fee __NMSG_WRITE 5 API calls 5817 9a6882 5816->5817 5819 9a8adc 5817->5819 5818->5816 5822 9a8b31 5819->5822 5820 9a6fee __NMSG_WRITE 5 API calls 5821 9a688f 5820->5821 5821->5800 5822->5820 5826 9a9082 5823->5826 5824 9a6fee __NMSG_WRITE 5 API calls 5825 9a6937 5824->5825 5825->5809 5826->5824 5827 9a718b 5828 9a718e 5827->5828 5829 9aab9b _abort 68 API calls 5828->5829 5830 9a719a _doexit 5829->5830 5932 9a32c3 5935 9a3136 5932->5935 5936 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5935->5936 5937 9a314a 5936->5937 5944 9a6818 5937->5944 5939 9a3156 5940 9a316a 5939->5940 5948 9a66d5 5939->5948 5941 9a6818 __forcdecpt_l 85 API calls 5940->5941 5943 9a3173 5941->5943 5945 9a6836 5944->5945 5947 9a6826 5944->5947 5953 9a6703 5945->5953 5947->5939 5949 9a66e3 5948->5949 5950 9a66f5 5948->5950 5949->5939 5975 9a6684 5950->5975 5954 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5953->5954 5955 9a6718 5954->5955 5956 9a6778 5955->5956 5957 9a6724 5955->5957 5958 9a679d 5956->5958 5972 9a8aa4 5956->5972 5962 9a673c 5957->5962 5965 9a89ec 5957->5965 5960 9a511c __cftof_l 66 API calls 5958->5960 5963 9a67a3 5958->5963 5960->5963 5962->5947 5964 9a8399 ___crtLCMapStringA 82 API calls 5963->5964 5964->5962 5966 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5965->5966 5967 9a8a00 5966->5967 5968 9a8a0d 5967->5968 5969 9a8aa4 __isleadbyte_l 76 API calls 5967->5969 5968->5962 5970 9a8a35 5969->5970 5971 9a84c6 ___crtGetStringTypeA 79 API calls 5970->5971 5971->5968 5973 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5972->5973 5974 9a8ab7 5973->5974 5974->5958 5976 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 5975->5976 5977 9a6697 5976->5977 5978 9a66b1 5977->5978 5979 9a89ec __isctype_l 79 API calls 5977->5979 5978->5939 5979->5978 5980 9a49c3 TlsAlloc 5831 9a1000 wsprintfW WritePrivateProfileStringW 5981 9a2cc7 5982 9a2cdc 5981->5982 5983 9a2cd6 5981->5983 5987 9a4026 5982->5987 5984 9a4001 __amsg_exit 66 API calls 5983->5984 5984->5982 5986 9a2ce1 _doexit 5988 9a3eab _doexit 66 API calls 5987->5988 5989 9a4031 5988->5989 5989->5986 5990 9a2fc7 IsProcessorFeaturePresent 5075 9a2b84 5113 9a4e50 5075->5113 5077 9a2b90 GetStartupInfoW 5078 9a2ba4 HeapSetInformation 5077->5078 5080 9a2baf 5077->5080 5078->5080 5114 9a4e2e HeapCreate 5080->5114 5081 9a2bfd 5082 9a2c08 5081->5082 5209 9a2b5b 5081->5209 5115 9a4cb3 GetModuleHandleW 5082->5115 5085 9a2c0e 5086 9a2c19 __RTC_Initialize 5085->5086 5087 9a2b5b _fast_error_exit 66 API calls 5085->5087 5140 9a4729 GetStartupInfoW 5086->5140 5087->5086 5090 9a2c33 GetCommandLineW 5153 9a46d1 GetEnvironmentStringsW 5090->5153 5091 9a4035 __amsg_exit 66 API calls 5093 9a2c32 5091->5093 5093->5090 5094 9a2c43 5160 9a4623 GetModuleFileNameW 5094->5160 5096 9a2c58 5166 9a43f1 5096->5166 5098 9a4035 __amsg_exit 66 API calls 5098->5096 5100 9a2c5e 5101 9a2c69 5100->5101 5102 9a4035 __amsg_exit 66 API calls 5100->5102 5180 9a3e14 5101->5180 5102->5101 5104 9a2c71 5105 9a4035 __amsg_exit 66 API calls 5104->5105 5106 9a2c7c __wwincmdln 5104->5106 5105->5106 5186 9a2502 5106->5186 5109 9a2cac 5220 9a4017 5109->5220 5112 9a2cb1 _doexit 5113->5077 5114->5081 5116 9a4cd0 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 5115->5116 5117 9a4cc7 5115->5117 5121 9a4d1a TlsAlloc 5116->5121 5223 9a4a00 5117->5223 5122 9a4d68 TlsSetValue 5121->5122 5123 9a4e29 5121->5123 5122->5123 5124 9a4d79 5122->5124 5123->5085 5233 9a3dbd 5124->5233 5129 9a4dc1 DecodePointer 5132 9a4dd6 5129->5132 5130 9a4e24 5131 9a4a00 __mtterm 70 API calls 5130->5131 5131->5123 5132->5130 5133 9a7c36 __calloc_crt 66 API calls 5132->5133 5134 9a4dec 5133->5134 5134->5130 5135 9a4df4 DecodePointer 5134->5135 5136 9a4e05 5135->5136 5136->5130 5137 9a4e09 5136->5137 5138 9a4a3d __getptd_noexit 66 API calls 5137->5138 5139 9a4e11 GetCurrentThreadId 5138->5139 5139->5123 5141 9a7c36 __calloc_crt 66 API calls 5140->5141 5147 9a4747 5141->5147 5142 9a48f2 GetStdHandle 5148 9a48bc 5142->5148 5143 9a4956 SetHandleCount 5152 9a2c27 5143->5152 5144 9a7c36 __calloc_crt 66 API calls 5144->5147 5145 9a4904 GetFileType 5145->5148 5146 9a483c 5146->5148 5149 9a4868 GetFileType 5146->5149 5150 9a4873 InitializeCriticalSectionAndSpinCount 5146->5150 5147->5144 5147->5146 5147->5148 5147->5152 5148->5142 5148->5143 5148->5145 5151 9a492a InitializeCriticalSectionAndSpinCount 5148->5151 5149->5146 5149->5150 5150->5146 5150->5152 5151->5148 5151->5152 5152->5090 5152->5091 5154 9a46e2 5153->5154 5156 9a46e6 5153->5156 5154->5094 5155 9a46fb 5157 9a7bf1 __malloc_crt 66 API calls 5155->5157 5156->5155 5156->5156 5158 9a4708 _memmove 5157->5158 5159 9a470f FreeEnvironmentStringsW 5158->5159 5159->5094 5161 9a4658 _wparse_cmdline 5160->5161 5162 9a2c4d 5161->5162 5163 9a4695 5161->5163 5162->5096 5162->5098 5164 9a7bf1 __malloc_crt 66 API calls 5163->5164 5165 9a469b _wparse_cmdline 5164->5165 5165->5162 5167 9a4409 _wcslen 5166->5167 5171 9a4401 5166->5171 5168 9a7c36 __calloc_crt 66 API calls 5167->5168 5173 9a442d _wcslen 5168->5173 5169 9a4483 5170 9a7bb7 _free 66 API calls 5169->5170 5170->5171 5171->5100 5172 9a7c36 __calloc_crt 66 API calls 5172->5173 5173->5169 5173->5171 5173->5172 5174 9a44a9 5173->5174 5176 9a7b15 __NMSG_WRITE 66 API calls 5173->5176 5177 9a44c0 5173->5177 5175 9a7bb7 _free 66 API calls 5174->5175 5175->5171 5176->5173 5178 9a6622 __invoke_watson 10 API calls 5177->5178 5179 9a44cc 5178->5179 5179->5100 5181 9a3e22 __IsNonwritableInCurrentImage 5180->5181 5244 9a3c03 5181->5244 5183 9a3e40 __initterm_e 5185 9a3e61 __IsNonwritableInCurrentImage 5183->5185 5247 9a76db 5183->5247 5185->5104 5321 9a2b30 5186->5321 5189 9a27a7 5189->5109 5217 9a3feb 5189->5217 5190 9a252f GetModuleFileNameW 5191 9a254e lstrcpyW lstrcatW lstrcpyW lstrcatW 5190->5191 5323 9a11a5 21 API calls 5191->5323 5195 9a1173 3 API calls 5196 9a25ba lstrcpyW lstrcatW 5195->5196 5197 9a1173 3 API calls 5196->5197 5198 9a25e7 lstrcpyW lstrcatW 5197->5198 5199 9a1173 3 API calls 5198->5199 5200 9a2614 lstrcpyW lstrcatW 5199->5200 5201 9a1173 3 API calls 5200->5201 5202 9a2641 lstrcpyW lstrcatW 5201->5202 5203 9a1173 3 API calls 5202->5203 5204 9a266e GetModuleHandleW RegisterClassExW GetModuleHandleW CreateWindowExW 5203->5204 5205 9a2ab0 _memset 5204->5205 5206 9a26f4 6 API calls 5205->5206 5207 9a27a3 5206->5207 5207->5189 5208 9a2786 TranslateMessage DispatchMessageW GetMessageW 5207->5208 5208->5207 5210 9a2b69 5209->5210 5211 9a2b6e 5209->5211 5213 9a4228 __FF_MSGBANNER 66 API calls 5210->5213 5212 9a4079 __NMSG_WRITE 66 API calls 5211->5212 5214 9a2b76 5212->5214 5213->5211 5215 9a3d93 _doexit 3 API calls 5214->5215 5216 9a2b80 5215->5216 5216->5082 5218 9a3eab _doexit 66 API calls 5217->5218 5219 9a3ffc 5218->5219 5219->5109 5221 9a3eab _doexit 66 API calls 5220->5221 5222 9a4022 5221->5222 5222->5112 5224 9a4a0a DecodePointer 5223->5224 5225 9a4a19 5223->5225 5224->5225 5226 9a4a2a TlsFree 5225->5226 5227 9a4a38 5225->5227 5226->5227 5228 9a722f 5227->5228 5229 9a7217 DeleteCriticalSection 5227->5229 5231 9a7241 DeleteCriticalSection 5228->5231 5232 9a4ccc 5228->5232 5230 9a7bb7 _free 66 API calls 5229->5230 5230->5227 5231->5228 5232->5085 5242 9a49ba EncodePointer 5233->5242 5235 9a3dc5 __init_pointers __initp_misc_winsig 5243 9a71a0 EncodePointer 5235->5243 5237 9a3deb EncodePointer EncodePointer EncodePointer EncodePointer 5238 9a71b1 5237->5238 5239 9a71bc 5238->5239 5240 9a71c6 InitializeCriticalSectionAndSpinCount 5239->5240 5241 9a4dbd 5239->5241 5240->5239 5240->5241 5241->5129 5241->5130 5242->5235 5243->5237 5245 9a3c09 EncodePointer 5244->5245 5245->5245 5246 9a3c23 5245->5246 5246->5183 5250 9a769f 5247->5250 5249 9a76e8 5249->5185 5251 9a76ab _doexit 5250->5251 5258 9a3dab 5251->5258 5257 9a76cc _doexit 5257->5249 5259 9a732b __lock 66 API calls 5258->5259 5260 9a3db2 5259->5260 5261 9a75b8 DecodePointer DecodePointer 5260->5261 5262 9a75e6 5261->5262 5263 9a7667 5261->5263 5262->5263 5275 9aabce 5262->5275 5272 9a76d5 5263->5272 5265 9a764a EncodePointer EncodePointer 5265->5263 5266 9a75f8 5266->5265 5267 9a761c 5266->5267 5282 9a7c82 5266->5282 5267->5263 5269 9a7c82 __realloc_crt 70 API calls 5267->5269 5270 9a7638 EncodePointer 5267->5270 5271 9a7632 5269->5271 5270->5265 5271->5263 5271->5270 5317 9a3db4 5272->5317 5276 9aabd9 5275->5276 5277 9aabee HeapSize 5275->5277 5278 9a511c __cftof_l 66 API calls 5276->5278 5277->5266 5279 9aabde 5278->5279 5287 9a6674 5279->5287 5286 9a7c8b 5282->5286 5284 9a7cca 5284->5267 5285 9a7cab Sleep 5285->5286 5286->5284 5286->5285 5296 9aad17 5286->5296 5290 9a6647 DecodePointer 5287->5290 5291 9a665c 5290->5291 5292 9a6622 __invoke_watson 10 API calls 5291->5292 5293 9a6673 5292->5293 5294 9a6647 __cftof_l 10 API calls 5293->5294 5295 9a6680 5294->5295 5295->5266 5297 9aad2d 5296->5297 5298 9aad22 5296->5298 5300 9aad35 5297->5300 5308 9aad42 5297->5308 5299 9aac01 _malloc 66 API calls 5298->5299 5301 9aad2a 5299->5301 5302 9a7bb7 _free 66 API calls 5300->5302 5301->5286 5312 9aad3d _free 5302->5312 5303 9aad7a 5305 9a7590 _malloc DecodePointer 5303->5305 5304 9aad4a HeapReAlloc 5304->5308 5304->5312 5306 9aad80 5305->5306 5309 9a511c __cftof_l 66 API calls 5306->5309 5307 9aadaa 5311 9a511c __cftof_l 66 API calls 5307->5311 5308->5303 5308->5304 5308->5307 5310 9a7590 _malloc DecodePointer 5308->5310 5314 9aad92 5308->5314 5309->5312 5310->5308 5313 9aadaf GetLastError 5311->5313 5312->5286 5313->5312 5315 9a511c __cftof_l 66 API calls 5314->5315 5316 9aad97 GetLastError 5315->5316 5316->5312 5320 9a7252 LeaveCriticalSection 5317->5320 5319 9a3dbb 5319->5257 5320->5319 5322 9a250f CreateMutexW GetLastError 5321->5322 5322->5189 5322->5190 5324 9a1368 5323->5324 5325 9a136e GetPrivateProfileIntW 5323->5325 5324->5325 5326 9a1381 5325->5326 5327 9a1387 GetPrivateProfileIntW 5325->5327 5326->5327 5328 9a139a 5327->5328 5329 9a13a0 GetPrivateProfileIntW 5327->5329 5328->5329 5330 9a13b9 GetPrivateProfileIntW 5329->5330 5331 9a13b3 5329->5331 5332 9a13cc 5330->5332 5333 9a13d2 GetPrivateProfileIntW 5330->5333 5331->5330 5332->5333 5334 9a13f7 lstrcpyW lstrcatW 5333->5334 5334->5195 5832 9a4b84 5834 9a4b90 _doexit 5832->5834 5833 9a4ba8 5836 9a4bb6 5833->5836 5838 9a7bb7 _free 66 API calls 5833->5838 5834->5833 5835 9a7bb7 _free 66 API calls 5834->5835 5837 9a4c92 _doexit 5834->5837 5835->5833 5839 9a4bc4 5836->5839 5841 9a7bb7 _free 66 API calls 5836->5841 5838->5836 5840 9a4bd2 5839->5840 5842 9a7bb7 _free 66 API calls 5839->5842 5843 9a4be0 5840->5843 5844 9a7bb7 _free 66 API calls 5840->5844 5841->5839 5842->5840 5845 9a7bb7 _free 66 API calls 5843->5845 5847 9a4bee 5843->5847 5844->5843 5845->5847 5846 9a4bfc 5849 9a7bb7 _free 66 API calls 5846->5849 5851 9a4c0d 5846->5851 5847->5846 5848 9a7bb7 _free 66 API calls 5847->5848 5848->5846 5849->5851 5850 9a732b __lock 66 API calls 5852 9a4c15 5850->5852 5851->5850 5853 9a4c3a 5852->5853 5854 9a4c21 InterlockedDecrement 5852->5854 5868 9a4c9e 5853->5868 5854->5853 5855 9a4c2c 5854->5855 5855->5853 5858 9a7bb7 _free 66 API calls 5855->5858 5858->5853 5859 9a732b __lock 66 API calls 5860 9a4c4e 5859->5860 5861 9a4c7f 5860->5861 5862 9a6240 ___removelocaleref 8 API calls 5860->5862 5871 9a4caa 5861->5871 5866 9a4c63 5862->5866 5865 9a7bb7 _free 66 API calls 5865->5837 5866->5861 5867 9a62d9 ___freetlocinfo 66 API calls 5866->5867 5867->5861 5874 9a7252 LeaveCriticalSection 5868->5874 5870 9a4c47 5870->5859 5875 9a7252 LeaveCriticalSection 5871->5875 5873 9a4c8c 5873->5865 5874->5870 5875->5873 5991 9a70ff 5992 9a4035 __amsg_exit 66 API calls 5991->5992 5993 9a7106 5992->5993 5876 9a2cb3 5879 9a4261 5876->5879 5880 9a4af1 __getptd_noexit 66 API calls 5879->5880 5881 9a2cc4 5880->5881 5882 9a4eb0 5883 9a4ee9 5882->5883 5884 9a4edc 5882->5884 5886 9a6fee __NMSG_WRITE 5 API calls 5883->5886 5885 9a6fee __NMSG_WRITE 5 API calls 5884->5885 5885->5883 5892 9a4ef9 __except_handler4 __IsNonwritableInCurrentImage 5886->5892 5887 9a4f7c 5888 9a4f52 __except_handler4 5888->5887 5889 9a4f6c 5888->5889 5890 9a6fee __NMSG_WRITE 5 API calls 5888->5890 5891 9a6fee __NMSG_WRITE 5 API calls 5889->5891 5890->5889 5891->5887 5892->5887 5892->5888 5898 9a8162 RtlUnwind 5892->5898 5894 9a5002 5895 9a6fee __NMSG_WRITE 5 API calls 5894->5895 5895->5888 5896 9a4fce __except_handler4 5896->5894 5897 9a6fee __NMSG_WRITE 5 API calls 5896->5897 5897->5894 5899 9a8176 5898->5899 5899->5896 5998 9a2cf1 6001 9a503f 5998->6001 6000 9a2cf6 6000->6000 6002 9a5071 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6001->6002 6003 9a5064 6001->6003 6004 9a5068 6002->6004 6003->6002 6003->6004 6004->6000 6005 9a766e 6006 9a7c36 __calloc_crt 66 API calls 6005->6006 6007 9a767a EncodePointer 6006->6007 6008 9a7693 6007->6008 5900 9a292d 5901 9a2937 __cfltcvt_init 5900->5901 5902 9a2942 5901->5902 5904 9a3c26 5901->5904 5909 9a7108 5904->5909 5906 9a3c4c 5906->5902 5907 9a3c3b 5907->5906 5908 9a6622 __invoke_watson 10 API calls 5907->5908 5908->5906 5910 9a7126 __control87 5909->5910 5914 9a7146 __control87 5909->5914 5911 9a511c __cftof_l 66 API calls 5910->5911 5912 9a713c 5911->5912 5913 9a6674 __cftof_l 11 API calls 5912->5913 5913->5914 5914->5907 6009 9a3be0 6012 9a3b58 6009->6012 6011 9a3bfe 6013 9a3bc4 6012->6013 6014 9a3b65 6012->6014 6072 9a344a 6013->6072 6014->6013 6016 9a3b6a 6014->6016 6017 9a3b6f 6016->6017 6020 9a3b88 6016->6020 6026 9a39aa 6017->6026 6019 9a3bab 6059 9a3531 6019->6059 6020->6019 6023 9a3b92 6020->6023 6045 9a3a6b 6023->6045 6024 9a3ba9 6024->6011 6084 9a6f60 6026->6084 6029 9a39f1 6032 9a3a09 6029->6032 6033 9a39f9 6029->6033 6030 9a39e1 6031 9a511c __cftof_l 66 API calls 6030->6031 6034 9a39e6 6031->6034 6096 9a6dfa 6032->6096 6035 9a511c __cftof_l 66 API calls 6033->6035 6037 9a6674 __cftof_l 11 API calls 6034->6037 6038 9a39fe 6035->6038 6041 9a39ed 6037->6041 6040 9a6674 __cftof_l 11 API calls 6038->6040 6039 9a3a3c 6039->6041 6105 9a38a7 6039->6105 6040->6041 6043 9a6fee __NMSG_WRITE 5 API calls 6041->6043 6044 9a3a69 6043->6044 6044->6011 6046 9a6f60 __fltout2 66 API calls 6045->6046 6047 9a3a9b 6046->6047 6048 9a3aa2 6047->6048 6050 9a3abc 6047->6050 6049 9a511c __cftof_l 66 API calls 6048->6049 6051 9a3aa7 6049->6051 6053 9a6dfa __fptostr 66 API calls 6050->6053 6052 9a6674 __cftof_l 11 API calls 6051->6052 6057 9a3aae 6052->6057 6056 9a3ae6 6053->6056 6054 9a6fee __NMSG_WRITE 5 API calls 6055 9a3b56 6054->6055 6055->6024 6056->6057 6058 9a38a7 __cftof2_l 76 API calls 6056->6058 6057->6054 6058->6057 6060 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 6059->6060 6061 9a3556 6060->6061 6062 9a3565 6061->6062 6064 9a358d 6061->6064 6063 9a511c __cftof_l 66 API calls 6062->6063 6065 9a356a 6063->6065 6066 9a359b 6064->6066 6070 9a35a4 6064->6070 6069 9a6674 __cftof_l 11 API calls 6065->6069 6068 9a511c __cftof_l 66 API calls 6066->6068 6067 9a3574 _memset __alldvrm __cftoa_l _strrchr 6067->6024 6068->6065 6069->6067 6070->6067 6129 9a3511 6070->6129 6073 9a6f60 __fltout2 66 API calls 6072->6073 6074 9a347e 6073->6074 6075 9a3485 6074->6075 6076 9a349c 6074->6076 6077 9a511c __cftof_l 66 API calls 6075->6077 6080 9a6dfa __fptostr 66 API calls 6076->6080 6078 9a348a 6077->6078 6079 9a6674 __cftof_l 11 API calls 6078->6079 6081 9a3491 6079->6081 6080->6081 6082 9a6fee __NMSG_WRITE 5 API calls 6081->6082 6083 9a350f 6082->6083 6083->6024 6085 9a6f8b ___dtold 6084->6085 6112 9a9d5d 6085->6112 6090 9a6fcd 6092 9a6fee __NMSG_WRITE 5 API calls 6090->6092 6091 9a6fe1 6093 9a6622 __invoke_watson 10 API calls 6091->6093 6094 9a39da 6092->6094 6095 9a6fed 6093->6095 6094->6029 6094->6030 6097 9a6e10 6096->6097 6098 9a6e26 6096->6098 6100 9a511c __cftof_l 66 API calls 6097->6100 6098->6097 6099 9a6e2b 6098->6099 6103 9a511c __cftof_l 66 API calls 6099->6103 6104 9a6e1f _memmove _strlen 6099->6104 6101 9a6e15 6100->6101 6102 9a6674 __cftof_l 11 API calls 6101->6102 6102->6104 6103->6101 6104->6039 6106 9a30af _LocaleUpdate::_LocaleUpdate 76 API calls 6105->6106 6107 9a38c5 6106->6107 6108 9a38d8 _memset __shift _memmove _strlen 6107->6108 6109 9a511c __cftof_l 66 API calls 6107->6109 6108->6041 6110 9a38ce 6109->6110 6111 9a6674 __cftof_l 11 API calls 6110->6111 6111->6108 6113 9a9db2 6112->6113 6115 9a6d9b 66 API calls _strcpy_s 6113->6115 6117 9a6622 __invoke_watson 10 API calls 6113->6117 6119 9a9dc7 6113->6119 6114 9a6fee __NMSG_WRITE 5 API calls 6116 9a6fa6 6114->6116 6115->6113 6120 9a6d9b 6116->6120 6117->6113 6118 9aa629 6119->6114 6119->6118 6121 9a6da9 6120->6121 6122 9a6db0 6120->6122 6121->6122 6127 9a6dce 6121->6127 6123 9a511c __cftof_l 66 API calls 6122->6123 6124 9a6db5 6123->6124 6125 9a6674 __cftof_l 11 API calls 6124->6125 6126 9a6dbf 6125->6126 6126->6090 6126->6091 6127->6126 6128 9a511c __cftof_l 66 API calls 6127->6128 6128->6124 6130 9a344a __cftoe_l 66 API calls 6129->6130 6131 9a352c 6130->6131 6131->6067

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 9a16dc-9a16f2 call 9a2b30 3 9a1706-9a170c 0->3 4 9a16f4-9a1701 Shell_NotifyIconW 0->4 6 9a1739-9a1741 3->6 7 9a170e-9a1734 RegisterWindowMessageW call 9a1410 SetTimer 3->7 5 9a24ec-9a24ff DefWindowProcW 4->5 9 9a1768-9a176b 6->9 10 9a1743-9a1763 KillTimer call 9a1410 SetTimer 6->10 15 9a24eb 7->15 13 9a1789-9a178f 9->13 14 9a176d-9a1771 9->14 17 9a24ea 10->17 19 9a1c73-9a1c78 13->19 20 9a1795-9a179e 13->20 14->17 18 9a1777-9a1784 Shell_NotifyIconW 14->18 15->5 17->15 18->17 21 9a1c7e-9a1c89 19->21 22 9a2487-9a248a 19->22 23 9a1c50-9a1c59 20->23 24 9a17a4-9a1824 call 9a1410 CreatePopupMenu call 9a2ab0 lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW 20->24 27 9a1c8b-9a1c92 call 9a1602 21->27 28 9a1c97-9a1c9f 21->28 25 9a24e9 22->25 30 9a248c-9a2496 KillTimer 22->30 23->25 26 9a1c5f-9a1c67 23->26 51 9a1836-9a18a7 CreatePopupMenu lstrlenW InsertMenuItemW CreatePopupMenu lstrlenW InsertMenuItemW 24->51 52 9a1826-9a1830 EnableMenuItem 24->52 25->17 32 9a1c69-9a1c6e call 9a1602 26->32 33 9a1ca3-9a1caf 26->33 49 9a234d-9a234f 27->49 35 9a1ca1 28->35 36 9a1cb4-9a1cbc 28->36 31 9a2498-9a24e3 Shell_NotifyIconW DestroyIcon * 5 DestroyWindow PostQuitMessage 30->31 31->25 32->49 43 9a2465-9a2471 ShellExecuteW 33->43 35->33 38 9a1cbe-9a1ccb 36->38 39 9a1ccd-9a1cd5 36->39 44 9a1ce5-9a1cea 38->44 46 9a1cef-9a1cf7 39->46 47 9a1cd7-9a1ce4 39->47 43->25 53 9a1d93-9a1da0 call 9a1001 44->53 54 9a1d18-9a1d20 46->54 55 9a1cf9-9a1d16 46->55 47->44 50 9a2350-9a2359 PostMessageW 49->50 50->25 56 9a18a9 51->56 57 9a18b0-9a18da lstrlenW InsertMenuItemW 51->57 52->51 53->25 58 9a1d22-9a1d3f 54->58 59 9a1d41-9a1d49 54->59 55->53 56->57 61 9a18dc 57->61 62 9a18e3-9a1946 lstrlenW InsertMenuItemW CreatePopupMenu lstrlenW InsertMenuItemW 57->62 58->53 63 9a1d6a-9a1d72 59->63 64 9a1d4b-9a1d68 59->64 61->62 66 9a1948 62->66 67 9a194f-9a1979 lstrlenW InsertMenuItemW 62->67 68 9a1d74-9a1d8e 63->68 69 9a1da5-9a1dad 63->69 64->53 66->67 72 9a197b 67->72 73 9a1982-9a19ad lstrlenW InsertMenuItemW 67->73 68->53 70 9a1f5e-9a1f66 69->70 71 9a1db3-9a1dce MessageBoxW 69->71 77 9a2028-9a2030 70->77 78 9a1f6c-9a1fc9 call 9a2ab0 GetOpenFileNameW 70->78 71->25 74 9a1dd4-9a1f59 lstrcpyW lstrcatW DeleteFileW DestroyIcon call 9a1173 lstrcpyW lstrcatW DeleteFileW DestroyIcon call 9a1173 lstrcpyW lstrcatW DeleteFileW DestroyIcon call 9a1173 lstrcpyW lstrcatW DeleteFileW DestroyIcon call 9a1173 lstrcpyW lstrcatW DeleteFileW DestroyIcon call 9a1173 71->74 72->73 75 9a19af 73->75 76 9a19b6-9a1a19 lstrlenW InsertMenuItemW CreatePopupMenu lstrlenW InsertMenuItemW 73->76 74->50 75->76 82 9a1a1b 76->82 83 9a1a22-9a1ad8 lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW 76->83 80 9a20f2-9a20fa 77->80 81 9a2036-9a2093 call 9a2ab0 GetOpenFileNameW 77->81 78->25 92 9a1fcf-9a2023 lstrcpyW lstrcatW CopyFileW DestroyIcon call 9a1173 78->92 89 9a21bc-9a21c4 80->89 90 9a2100-9a215d call 9a2ab0 GetOpenFileNameW 80->90 81->25 102 9a2099-9a20ed lstrcpyW lstrcatW CopyFileW DestroyIcon call 9a1173 81->102 82->83 85 9a1b0a-9a1c4b lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW lstrlenW InsertMenuItemW * 6 SetForegroundWindow GetCursorPos TrackPopupMenu PostMessageW DestroyMenu * 5 83->85 86 9a1ada-9a1b04 EnableMenuItem * 3 83->86 93 9a2483-9a2485 MessageBoxW 85->93 86->85 94 9a21ca-9a2227 call 9a2ab0 GetOpenFileNameW 89->94 95 9a2286-9a228e 89->95 90->25 113 9a2163-9a21b7 lstrcpyW lstrcatW CopyFileW DestroyIcon call 9a1173 90->113 114 9a234b-9a234c 92->114 93->25 94->25 116 9a222d-9a2281 lstrcpyW lstrcatW CopyFileW DestroyIcon call 9a1173 94->116 103 9a235e-9a2366 95->103 104 9a2294-9a22f1 call 9a2ab0 GetOpenFileNameW 95->104 102->114 107 9a2398-9a23a0 103->107 108 9a2368-9a2383 MessageBoxW 103->108 104->25 126 9a22f7-9a2346 lstrcpyW lstrcatW CopyFileW DestroyIcon call 9a1173 104->126 107->25 117 9a23a6-9a244e lstrcpyW lstrcatW StrFormatByteSizeW lstrcatW * 5 MessageBoxW 107->117 108->25 115 9a2389-9a2393 KillTimer 108->115 113->114 114->49 115->31 116->114 117->25 124 9a2454-9a245b call 9a1034 117->124 134 9a245d-9a2460 124->134 135 9a2473-9a2482 124->135 126->114 134->43 135->93
    APIs
    • Shell_NotifyIconW.SHELL32(00000000,009B7110), ref: 009A16FB
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009A1713
    • SetTimer.USER32(?,00000001,000007D0,00000000), ref: 009A172E
    • DefWindowProcW.USER32(?,?,?,?), ref: 009A24F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Window$IconMessageNotifyProcRegisterShell_Timer
    • String ID: AMF @ $www.e-sushi.net$/$25%$50%$75%$::{645FF040-5081-101B-9F08-00AA002F954E}$About$Allow Progress Window$Allow Sound$C:\Users\user\Desktop\$C:\Users\user\Desktop\minibin.ini$Change Icons$Check for updates?$Configure$Confirm Recycling$DblClickOpen$Double-Click Action$Empty$Exit$Full$Icon Files$IconsTwoStates$MiniBin 6.1.1.1$No update available.$Only use empty/full icons$Open$RecycleConfirm$RecycleProgress$RecycleSound$Reset Icons$System Integration$TaskbarCreated$X$\25.ico$\50.ico$\75.ico$\empty.ico$\full.ico$b$explorer.exe$http://www.e-sushi.net/minibin/$open
    • API String ID: 1455230564-301504438
    • Opcode ID: 1c8f810a63b363bf5081b38f10ebe8b933588da45e1026d1c7ab516c20710fcb
    • Instruction ID: 2a36b7d9a9036183b49735cd7ea755152b02cf2d9ae453cf7c41041fae2727da
    • Opcode Fuzzy Hash: 1c8f810a63b363bf5081b38f10ebe8b933588da45e1026d1c7ab516c20710fcb
    • Instruction Fuzzy Hash: E0824BB1D18218AFDF209FE4DD49ADEBBB9FF4A314F004526F105AA1A0DBB54A44DF90
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 137 9a11a5-9a1366 GetPrivateProfileStringW * 20 GetPrivateProfileIntW 138 9a1368 137->138 139 9a136e-9a137f GetPrivateProfileIntW 137->139 138->139 140 9a1381 139->140 141 9a1387-9a1398 GetPrivateProfileIntW 139->141 140->141 142 9a139a 141->142 143 9a13a0-9a13b1 GetPrivateProfileIntW 141->143 142->143 144 9a13b9-9a13ca GetPrivateProfileIntW 143->144 145 9a13b3 143->145 146 9a13cc 144->146 147 9a13d2-9a13f5 GetPrivateProfileIntW 144->147 145->144 146->147 148 9a140f 147->148 149 9a13f7-9a13fc 147->149 150 9a13fe-9a1400 149->150 151 9a1402-9a1409 149->151 150->148 150->151 151->148
    APIs
    • GetPrivateProfileStringW.KERNEL32(Translate,Open,Open,Open,00000080,009B5008), ref: 009A11CD
    • GetPrivateProfileStringW.KERNEL32(Translate,Empty,Empty,Empty,00000080,009B5008), ref: 009A11DE
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure,Configure,009B4E08,00000080,009B5008), ref: 009A11EF
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_About,About,About,00000080,009B5008), ref: 009A1203
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_DoubleClick,Double-Click Action,Double-Click Action,00000080,009B5008), ref: 009A1217
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_System,System Integration,System Integration,00000080,009B5008), ref: 009A122B
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_System_Confirm,Confirm Recycling,Confirm Recycling,00000080,009B5008), ref: 009A123F
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_System_Sound,Allow Sound,Allow Sound,00000080,009B5008), ref: 009A1253
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_System_Progress,Allow Progress Window,Allow Progress Window,00000080,009B5008), ref: 009A1267
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons,Change Icons,Change Icons,00000080,009B5008), ref: 009A127B
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons_TwoState,Only use empty/full icons,Only use empty/full icons,00000080,009B5008), ref: 009A128F
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons_Empty,Empty,009B4F08,00000080,009B5008), ref: 009A12A3
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons_25,25%,25%,00000080,009B5008), ref: 009A12B7
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons_50,50%,50%,00000080,009B5008), ref: 009A12CB
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons_75,75%,75%,00000080,009B5008), ref: 009A12DF
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Icons_Full,Full,Full,00000080,009B5008), ref: 009A12F3
    • GetPrivateProfileStringW.KERNEL32(Translate,Configure_Reset_Icons,Reset Icons,Reset Icons,00000080,009B5008), ref: 009A1307
    • GetPrivateProfileStringW.KERNEL32(Translate,Exit,Exit,Exit,00000080,009B5008), ref: 009A1318
    • GetPrivateProfileStringW.KERNEL32(Translate,About_CheckForUpdates,Check for updates?,Check for updates?,00000080,009B5008), ref: 009A132C
    • GetPrivateProfileStringW.KERNEL32(Translate,About_NoUpdateAvailable,No update available.,No update available.,00000080,009B5008), ref: 009A1340
    • GetPrivateProfileIntW.KERNEL32(Configure,DblClickOpen,00000001,C:\Users\user\Desktop\minibin.ini), ref: 009A135D
    • GetPrivateProfileIntW.KERNEL32(Configure,RecycleConfirm,00000001,C:\Users\user\Desktop\minibin.ini), ref: 009A1376
    • GetPrivateProfileIntW.KERNEL32(Configure,RecycleSound,00000001,C:\Users\user\Desktop\minibin.ini), ref: 009A138F
    • GetPrivateProfileIntW.KERNEL32(Configure,IconsTwoStates,00000001,C:\Users\user\Desktop\minibin.ini), ref: 009A13A8
    • GetPrivateProfileIntW.KERNEL32(Configure,RecycleProgress,00000001,C:\Users\user\Desktop\minibin.ini), ref: 009A13C1
    • GetPrivateProfileIntW.KERNEL32(History,MaxFillSizeMB,00000005,C:\Users\user\Desktop\minibin.ini), ref: 009A13DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: PrivateProfile$String
    • String ID: 25%$25%$50%$50%$75%$75%$About$About$About_CheckForUpdates$About_NoUpdateAvailable$Allow Progress Window$Allow Progress Window$Allow Sound$Allow Sound$C:\Users\user\Desktop\$C:\Users\user\Desktop\minibin.ini$Change Icons$Change Icons$Check for updates?$Check for updates?$Configure$Configure_About$Configure_DoubleClick$Configure_Icons$Configure_Icons_25$Configure_Icons_50$Configure_Icons_75$Configure_Icons_Empty$Configure_Icons_Full$Configure_Icons_TwoState$Configure_Reset_Icons$Configure_System$Configure_System_Confirm$Configure_System_Progress$Configure_System_Sound$Confirm Recycling$Confirm Recycling$DblClickOpen$Double-Click Action$Double-Click Action$Empty$Empty$Exit$Exit$Full$Full$History$IconsTwoStates$MaxFillSizeMB$No update available.$No update available.$Only use empty/full icons$Only use empty/full icons$Open$Open$RecycleConfirm$RecycleProgress$RecycleSound$Reset Icons$Reset Icons$System Integration$System Integration$Translate
    • API String ID: 83056003-2529001922
    • Opcode ID: d6b145b24e3110ce4545c0327697968dab7363f5f7b511d7cd838736e486fdad
    • Instruction ID: a638aaba9175c7ddd572b858723d7b0b10120857782e2e284d0bc452c79bf4ce
    • Opcode Fuzzy Hash: d6b145b24e3110ce4545c0327697968dab7363f5f7b511d7cd838736e486fdad
    • Instruction Fuzzy Hash: DC51BFE0BCC35C3E9121626A5D97E7B2DDCC9E7FEDB01411AB0447A1D18AC52C01AAF9
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • CreateMutexW.KERNELBASE(00000000,00000000,MiniBin), ref: 009A2518
    • GetLastError.KERNEL32 ref: 009A251E
    • GetModuleFileNameW.KERNEL32(?,C:\Users\user\Desktop\,00001000), ref: 009A253F
    • lstrcpyW.KERNEL32(C:\Users\user\Desktop\minibin.ini,C:\Users\user\Desktop\), ref: 009A256B
    • lstrcatW.KERNEL32(C:\Users\user\Desktop\minibin.ini,minibin.ini), ref: 009A2579
    • lstrcpyW.KERNEL32(009B5008,C:\Users\user\Desktop\), ref: 009A2581
    • lstrcatW.KERNEL32(009B5008,minibin-language.ini), ref: 009A258D
    • lstrcpyW.KERNEL32(?,C:\Users\user\Desktop\), ref: 009A259C
    • lstrcatW.KERNEL32(?,\empty.ico), ref: 009A25AA
    • lstrcpyW.KERNEL32(?,C:\Users\user\Desktop\), ref: 009A25C9
    • lstrcatW.KERNEL32(?,\25.ico), ref: 009A25D7
    • lstrcpyW.KERNEL32(?,C:\Users\user\Desktop\), ref: 009A25F6
    • lstrcatW.KERNEL32(?,\50.ico), ref: 009A2604
    • lstrcpyW.KERNEL32(?,C:\Users\user\Desktop\), ref: 009A2623
    • lstrcatW.KERNEL32(?,\75.ico), ref: 009A2631
    • lstrcpyW.KERNEL32(?,C:\Users\user\Desktop\), ref: 009A2650
    • lstrcatW.KERNEL32(?,\full.ico), ref: 009A265E
    • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 009A2693
    • RegisterClassExW.USER32(00000030), ref: 009A26B6
    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 009A26BE
    • CreateWindowExW.USER32(00000000,MiniBin_TrayIconClass,MiniBin,80000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009A26DB
    • _memset.LIBCMT ref: 009A26EF
    • lstrcpyW.KERNEL32(MiniBin 6.1.1.10 bytes,MiniBin 6.1.1.1), ref: 009A273B
    • lstrcatW.KERNEL32(MiniBin 6.1.1.10 bytes,009AC820), ref: 009A2748
    • StrFormatByteSizeW.SHLWAPI(00000000,00000000,?,00000080), ref: 009A2758
    • lstrcatW.KERNEL32(MiniBin 6.1.1.10 bytes,?), ref: 009A2766
    • Shell_NotifyIconW.SHELL32(00000000,009B7110), ref: 009A276E
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009A2781
    • TranslateMessage.USER32(?), ref: 009A278A
    • DispatchMessageW.USER32(?), ref: 009A2794
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009A27A1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: lstrcat$lstrcpy$Message$Module$CreateHandle$ByteClassDispatchErrorFileFormatIconLastMutexNameNotifyRegisterShell_SizeTranslateWindow_memset
    • String ID: 0$C:\Users\user\Desktop\$C:\Users\user\Desktop\minibin.ini$MiniBin$MiniBin 6.1.1.1$MiniBin 6.1.1.10 bytes$MiniBin_TrayIconClass$\25.ico$\50.ico$\75.ico$\empty.ico$\full.ico$minibin-language.ini$minibin.ini
    • API String ID: 3281556649-3453328190
    • Opcode ID: 9a9bb64c9309d62ebe6a6e9612eea24ca5bfe76b5859f447ace027e887c00b43
    • Instruction ID: 840e5280129fee237d6d0e943129c8ee9a16eb4a071a35360ee0a5cd4bb5bd07
    • Opcode Fuzzy Hash: 9a9bb64c9309d62ebe6a6e9612eea24ca5bfe76b5859f447ace027e887c00b43
    • Instruction Fuzzy Hash: 85615FB1D1821CABDB10EFA4DC89E9F7BBCEF86714F004566F208A6150D7749A449FE4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 177 9a1410-9a143c GetLogicalDrives 178 9a143d-9a1440 177->178 179 9a148e-9a1494 178->179 180 9a1442-9a146e wsprintfW SHQueryRecycleBinW 178->180 179->178 182 9a1496-9a14a8 179->182 180->179 181 9a1470-9a1474 180->181 181->179 183 9a1476 181->183 184 9a14aa-9a14e3 lstrcpyW lstrcatW StrFormatByteSizeW lstrcatW 182->184 185 9a14e8-9a1523 lstrcpyW lstrcatW StrFormatByteSizeW lstrcatW 182->185 186 9a1478-9a147c 183->186 187 9a147e-9a1487 183->187 188 9a15eb-9a1601 Shell_NotifyIconW 184->188 189 9a1529-9a158e call 9a29c0 call 9a2950 185->189 190 9a15e6 185->190 186->179 186->187 187->179 195 9a1590-9a1597 189->195 196 9a15a4-9a15b1 189->196 190->188 195->196 199 9a1599-9a15a2 195->199 197 9a15b3-9a15ba 196->197 198 9a15c7-9a15ce 196->198 197->198 200 9a15bc-9a15c5 197->200 201 9a15d0-9a15db 198->201 202 9a15e4 198->202 199->188 200->188 201->190 203 9a15dd-9a15e2 201->203 202->190 203->188
    APIs
    • GetLogicalDrives.KERNELBASE ref: 009A1431
    • wsprintfW.USER32 ref: 009A1452
    • SHQueryRecycleBinW.SHELL32(?,00000014), ref: 009A1466
    • lstrcpyW.KERNEL32(MiniBin 6.1.1.10 bytes,MiniBin 6.1.1.1), ref: 009A14AA
    • lstrcatW.KERNEL32(MiniBin 6.1.1.10 bytes,009AC820), ref: 009A14BC
    • StrFormatByteSizeW.SHLWAPI(00000000,00000000,?,00000080), ref: 009A14CE
    • lstrcatW.KERNEL32(MiniBin 6.1.1.10 bytes,?), ref: 009A14DC
    • lstrcpyW.KERNEL32(MiniBin 6.1.1.10 bytes,MiniBin 6.1.1.1), ref: 009A14E8
    • lstrcatW.KERNEL32(MiniBin 6.1.1.10 bytes,009AC820), ref: 009A14FA
    • StrFormatByteSizeW.SHLWAPI(00000000,?,?,00000080), ref: 009A150C
    • lstrcatW.KERNEL32(MiniBin 6.1.1.10 bytes,?), ref: 009A151A
    • __aulldiv.LIBCMT ref: 009A1550
    • Shell_NotifyIconW.SHELL32(00000001,009B7110), ref: 009A15F7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: lstrcat$ByteFormatSizelstrcpy$DrivesIconLogicalNotifyQueryRecycleShell___aulldivwsprintf
    • String ID: %c:\$MiniBin 6.1.1.1$MiniBin 6.1.1.10 bytes
    • API String ID: 3139760847-272349090
    • Opcode ID: 1e06013a950964253bfe1267f68283b398eb52ccd5f2cf2d3984d9f5fadb95d8
    • Instruction ID: 9cdc8c34239de28d2af70abc9ea18bb16375b817fc97b12a507eed127ed3b2d6
    • Opcode Fuzzy Hash: 1e06013a950964253bfe1267f68283b398eb52ccd5f2cf2d3984d9f5fadb95d8
    • Instruction Fuzzy Hash: 425105B1E18218EBDB019FD8DE08BDA77F8FF8B355F104651E141A61A0D7349A40AFE0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 204 9a1173-9a118c LoadImageW 205 9a118e-9a11a1 GetModuleHandleW LoadImageW 204->205 206 9a11a3-9a11a4 204->206 205->206
    APIs
    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 009A1188
    • GetModuleHandleW.KERNEL32(00000000,?,00000001,00000010,00000010,00000000), ref: 009A119A
    • LoadImageW.USER32(00000000), ref: 009A11A1
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ImageLoad$HandleModule
    • String ID:
    • API String ID: 2156275154-0
    • Opcode ID: 9ebfe686e086abbd03636d40213da808fe1c0167960cb011594dd8765b8e7835
    • Instruction ID: 3d486dacca087141eb2225c5d2522bf8a7e8e2fd5f57de9cc0d9e63b69825555
    • Opcode Fuzzy Hash: 9ebfe686e086abbd03636d40213da808fe1c0167960cb011594dd8765b8e7835
    • Instruction Fuzzy Hash: 7EE0127179831979FD2016D06C06FD62A5D5B0DB40F000801B780BD0D2C1E264E167D4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 304 9a1034-9a1051 WSAStartup 305 9a105e-9a1073 socket 304->305 306 9a1053-9a105d WSACleanup 304->306 307 9a1080-9a1090 gethostbyname 305->307 308 9a1075-9a107b WSACleanup 305->308 310 9a10ad-9a10d9 htons connect 307->310 311 9a1092-9a10a8 WSACleanup shutdown closesocket 307->311 309 9a116d-9a1172 308->309 310->311 313 9a10db-9a10f4 lstrlenA send 310->313 312 9a116c 311->312 312->309 313->311 314 9a10f6-9a110d recv 313->314 315 9a110f-9a1114 314->315 316 9a1156-9a1166 shutdown closesocket WSACleanup 314->316 315->316 317 9a1116-9a111b 315->317 316->312 317->316 318 9a111d-9a1133 StrStrA 317->318 319 9a114f-9a1151 318->319 320 9a1135-9a1145 StrStrA 318->320 319->311 320->319 321 9a1147-9a114a 320->321 321->311
    APIs
    • WSAStartup.WS2_32(00000101,?), ref: 009A1049
    • WSACleanup.WS2_32 ref: 009A1053
    • socket.WS2_32(00000002,00000001,00000006), ref: 009A1066
    • WSACleanup.WS2_32 ref: 009A1075
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Cleanup$Startupsocket
    • String ID: 200 OK$GET /minibin/version.php HTTP/1.1Host: www.e-sushi.netUser-Agent: MiniBin 6.1.1.1$MiniBin 6.1.1.1$www.e-sushi.net
    • API String ID: 3412503511-2011565168
    • Opcode ID: db42378d922e8757c831f5840568eaca1b9cf9c50a797bda1b304f7fbc5fc577
    • Instruction ID: b5a4dd87ca4dffeef30b13db9a4b7b3d0c03c20fe09e83e1f4157824803ee547
    • Opcode Fuzzy Hash: db42378d922e8757c831f5840568eaca1b9cf9c50a797bda1b304f7fbc5fc577
    • Instruction Fuzzy Hash: A43184B175C214AFEB205BA49C8DFBE367CEF07B51F004425F615DA191DB648C41ABE1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 322 9a1602-9a166f call 9a2950 call 9a27b0 call 9a2a36 329 9a1671-9a1673 322->329 330 9a1674-9a16b8 call 9a1001 GetPrivateProfileIntW 322->330 329->330 333 9a16ba 330->333 334 9a16bb-9a16c1 330->334 333->334 335 9a16c3 334->335 336 9a16c6-9a16cc 334->336 335->336 337 9a16ce 336->337 338 9a16d1-9a16db SHEmptyRecycleBinW 336->338 337->338
    APIs
    • __aulldiv.LIBCMT ref: 009A162B
    • __floor_pentium4.LIBCMT ref: 009A1660
    • GetPrivateProfileIntW.KERNEL32(History,MaxFillSizeMB,00000005,C:\Users\user\Desktop\minibin.ini), ref: 009A1697
    • SHEmptyRecycleBinW.SHELL32(00000000,00000000,00000000), ref: 009A16D4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: EmptyPrivateProfileRecycle__aulldiv__floor_pentium4
    • String ID: C:\Users\user\Desktop\minibin.ini$History$MaxFillSizeMB
    • API String ID: 3006636384-3709813415
    • Opcode ID: ad8c7330f2578c0f380699392b11410ba0a50f431fb1035eb6b40846b39a4122
    • Instruction ID: 2d00261e04ff1018e11635a51d2260788af9a0d3c59548007fab26a5a7f79511
    • Opcode Fuzzy Hash: ad8c7330f2578c0f380699392b11410ba0a50f431fb1035eb6b40846b39a4122
    • Instruction Fuzzy Hash: 422138F2D1C6046FF714AB68EC06B6B7BECD783320F154619E001E2192D67499008BA0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • IsDebuggerPresent.KERNEL32 ref: 009AA710
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009AA725
    • UnhandledExceptionFilter.KERNEL32(009AE3D0), ref: 009AA730
    • GetCurrentProcess.KERNEL32(C0000409), ref: 009AA74C
    • TerminateProcess.KERNEL32(00000000), ref: 009AA753
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 37ac46f61561be34f6cb91608771cf21c3290c92d55fb963f27b038036810a8b
    • Instruction ID: c7c74e98fecca47ea07f54d3754a0e6137b94f06d524d27b45e32cf4a51098c5
    • Opcode Fuzzy Hash: 37ac46f61561be34f6cb91608771cf21c3290c92d55fb963f27b038036810a8b
    • Instruction Fuzzy Hash: EB21BFB4929304DFCB40DFA5FE496563BE8BB0DB68F50421AE40987261EBB05981EF85
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00003D18), ref: 009A3D5F
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 4adaa5dbf7b659df051e5b4905598e25bd6452034aed738ff1d8ec09446a050d
    • Instruction ID: 12ea2f39e525f3ab234331426498d451e6a78e2c8533074c36dde548daf4aa72
    • Opcode Fuzzy Hash: 4adaa5dbf7b659df051e5b4905598e25bd6452034aed738ff1d8ec09446a050d
    • Instruction Fuzzy Hash: 989002A02A5150DB8E1157745C09405A6919ECA60675284607005D8094DE604100A5E1
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: N@
    • API String ID: 0-1509896676
    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction ID: f7c7e1a0404f5e34aa44e2e66bb52196ff69a5026af025a982184b7f0eda901a
    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction Fuzzy Hash: 126158729043168FCB18CF48C4946AEBBF2FF85314F1AC5AED8195B262C7B19955CBC4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 274 9a4cb3-9a4cc5 GetModuleHandleW 275 9a4cd0-9a4d18 GetProcAddress * 4 274->275 276 9a4cc7-9a4ccf call 9a4a00 274->276 278 9a4d1a-9a4d21 275->278 279 9a4d30-9a4d4f 275->279 278->279 282 9a4d23-9a4d2a 278->282 280 9a4d54-9a4d62 TlsAlloc 279->280 283 9a4d68-9a4d73 TlsSetValue 280->283 284 9a4e29 280->284 282->279 285 9a4d2c-9a4d2e 282->285 283->284 286 9a4d79-9a4dbf call 9a3dbd EncodePointer * 4 call 9a71b1 283->286 287 9a4e2b-9a4e2d 284->287 285->279 285->280 292 9a4dc1-9a4dde DecodePointer 286->292 293 9a4e24 call 9a4a00 286->293 292->293 296 9a4de0-9a4df2 call 9a7c36 292->296 293->284 296->293 299 9a4df4-9a4e07 DecodePointer 296->299 299->293 301 9a4e09-9a4e22 call 9a4a3d GetCurrentThreadId 299->301 301->287
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,009A2C0E), ref: 009A4CBB
    • __mtterm.LIBCMT ref: 009A4CC7
      • Part of subcall function 009A4A00: DecodePointer.KERNEL32(00000005,009A4E29,?,009A2C0E), ref: 009A4A11
      • Part of subcall function 009A4A00: TlsFree.KERNEL32(00000013,009A4E29,?,009A2C0E), ref: 009A4A2B
      • Part of subcall function 009A4A00: DeleteCriticalSection.KERNEL32(00000000,00000000,77755810,?,009A4E29,?,009A2C0E), ref: 009A7218
      • Part of subcall function 009A4A00: _free.LIBCMT ref: 009A721B
      • Part of subcall function 009A4A00: DeleteCriticalSection.KERNEL32(00000013,77755810,?,009A4E29,?,009A2C0E), ref: 009A7242
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 009A4CDD
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 009A4CEA
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 009A4CF7
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 009A4D04
    • TlsAlloc.KERNEL32(?,009A2C0E), ref: 009A4D54
    • TlsSetValue.KERNEL32(00000000,?,009A2C0E), ref: 009A4D6F
    • __init_pointers.LIBCMT ref: 009A4D79
    • EncodePointer.KERNEL32(?,009A2C0E), ref: 009A4D8A
    • EncodePointer.KERNEL32(?,009A2C0E), ref: 009A4D97
    • EncodePointer.KERNEL32(?,009A2C0E), ref: 009A4DA4
    • EncodePointer.KERNEL32(?,009A2C0E), ref: 009A4DB1
    • DecodePointer.KERNEL32(009A4B84,?,009A2C0E), ref: 009A4DD2
    • __calloc_crt.LIBCMT ref: 009A4DE7
    • DecodePointer.KERNEL32(00000000,?,009A2C0E), ref: 009A4E01
    • GetCurrentThreadId.KERNEL32 ref: 009A4E13
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 3698121176-3819984048
    • Opcode ID: 134b5ce92cddfadf78fd0e92e77b7c625c94e0eae359549f2e20037e525c63a1
    • Instruction ID: 5163fb761e9bd039a8e018fd0b6678b14abf8ae0306ab6b069459996dc918510
    • Opcode Fuzzy Hash: 134b5ce92cddfadf78fd0e92e77b7c625c94e0eae359549f2e20037e525c63a1
    • Instruction Fuzzy Hash: E331557196D350DACB217F74BD496DB3BA8FB8A3B47150A1AE404961B0DF749408EFE0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,009AE480,00000008,009A4B45,00000000,00000000,?,?,009A5121,009A2F84), ref: 009A4A4E
    • __lock.LIBCMT ref: 009A4A82
      • Part of subcall function 009A732B: __mtinitlocknum.LIBCMT ref: 009A7341
      • Part of subcall function 009A732B: __amsg_exit.LIBCMT ref: 009A734D
      • Part of subcall function 009A732B: EnterCriticalSection.KERNEL32(?,?,?,009A4A87,0000000D), ref: 009A7355
    • InterlockedIncrement.KERNEL32(009AF340), ref: 009A4A8F
    • __lock.LIBCMT ref: 009A4AA3
    • ___addlocaleref.LIBCMT ref: 009A4AC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL
    • API String ID: 637971194-2576044830
    • Opcode ID: fba0d7fa6b7e30474a4b9cef71db690ebe33f23b1997d6d32efc3bfc8bf1a56d
    • Instruction ID: a95f88eee3e611f2505a980bf712e5cc990fe5ee0b3a984f70aae96cb5522337
    • Opcode Fuzzy Hash: fba0d7fa6b7e30474a4b9cef71db690ebe33f23b1997d6d32efc3bfc8bf1a56d
    • Instruction Fuzzy Hash: 1F0180B1544700DFDB20AFA5D80A74AFBE0EF92324F10490EE49A977A1CBB0A944DB95
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 356 9a5cf0-9a5d0b call 9a4e50 call 9a4b6a 361 9a5d2a-9a5d42 call 9a732b 356->361 362 9a5d0d-9a5d11 356->362 369 9a5d7a-9a5d86 call 9a5d8b 361->369 370 9a5d44-9a5d46 361->370 362->361 363 9a5d13 362->363 365 9a5d16-9a5d18 363->365 367 9a5d1a-9a5d21 call 9a4035 365->367 368 9a5d22-9a5d29 call 9a4e95 365->368 367->368 369->365 374 9a5d48-9a5d51 InterlockedDecrement 370->374 375 9a5d62-9a5d74 InterlockedIncrement 370->375 374->375 379 9a5d53-9a5d59 374->379 375->369 379->375 380 9a5d5b-9a5d61 call 9a7bb7 379->380 380->375
    APIs
    • __getptd.LIBCMT ref: 009A5CFC
      • Part of subcall function 009A4B6A: __getptd_noexit.LIBCMT ref: 009A4B6D
      • Part of subcall function 009A4B6A: __amsg_exit.LIBCMT ref: 009A4B7A
    • __amsg_exit.LIBCMT ref: 009A5D1C
    • __lock.LIBCMT ref: 009A5D2C
    • InterlockedDecrement.KERNEL32(?), ref: 009A5D49
    • _free.LIBCMT ref: 009A5D5C
    • InterlockedIncrement.KERNEL32(02382D68), ref: 009A5D74
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: 2e6b3b16e826097276f3a233ba18890b56b528dfee8eecaf00eb4339078f5342
    • Instruction ID: 1b8bba4d0c7183b2466592b9e3af664d84e6dda625d96b4f674f49ded105a6e0
    • Opcode Fuzzy Hash: 2e6b3b16e826097276f3a233ba18890b56b528dfee8eecaf00eb4339078f5342
    • Instruction Fuzzy Hash: C0018031A14F219BDF60ABA4980A75DB7A4FF87B20F164015F800AB2D0CB74AD42EBD1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 383 9aad17-9aad20 384 9aad2d-9aad33 383->384 385 9aad22 383->385 387 9aad42-9aad43 384->387 388 9aad35-9aad40 call 9a7bb7 384->388 386 9aad25 call 9aac01 385->386 390 9aad2a-9aad2c 386->390 389 9aad75-9aad78 387->389 398 9aad8f-9aad91 388->398 392 9aad7a-9aad86 call 9a7590 call 9a511c 389->392 393 9aad45-9aad47 389->393 411 9aad8c 392->411 395 9aad4a-9aad60 HeapReAlloc 393->395 396 9aad49 393->396 399 9aad62-9aad68 395->399 400 9aadc0-9aadc2 395->400 396->395 402 9aadaa-9aadbe call 9a511c GetLastError call 9a50da 399->402 403 9aad6a-9aad73 call 9a7590 399->403 404 9aad8e 400->404 402->400 403->389 412 9aad92-9aada8 call 9a511c GetLastError call 9a50da 403->412 404->398 411->404 412->411
    APIs
    • _malloc.LIBCMT ref: 009AAD25
      • Part of subcall function 009AAC01: __FF_MSGBANNER.LIBCMT ref: 009AAC1A
      • Part of subcall function 009AAC01: __NMSG_WRITE.LIBCMT ref: 009AAC21
      • Part of subcall function 009AAC01: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,009A7C02,00000000,00000001,00000000,?,009A72B6,00000018,009AE570,0000000C,009A7346), ref: 009AAC46
    • _free.LIBCMT ref: 009AAD38
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: AllocHeap_free_malloc
    • String ID:
    • API String ID: 2734353464-0
    • Opcode ID: b2b75b8f5e32834f5d787d6a99f884d87316efaa360239cd92f98a6a712a386a
    • Instruction ID: 12e6f4ff5f3fa13db21903b8e674d0aa13eca63511e6d96b34312249dae83e67
    • Opcode Fuzzy Hash: b2b75b8f5e32834f5d787d6a99f884d87316efaa360239cd92f98a6a712a386a
    • Instruction Fuzzy Hash: 10112732508615ABCB212B70AC0576A3798AF873B2F250929F8889B5D0DF34CC40D2D1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 429 9a6471-9a648c call 9a4e50 call 9a4b6a 434 9a648e-9a6492 429->434 435 9a64b0-9a64dc call 9a732b call 9a6424 call 9a64de 429->435 434->435 437 9a6494-9a6499 call 9a4b6a 434->437 443 9a649c-9a649e 435->443 437->443 445 9a64a8-9a64af call 9a4e95 443->445 446 9a64a0-9a64a7 call 9a4035 443->446 446->445
    APIs
    • __getptd.LIBCMT ref: 009A647D
      • Part of subcall function 009A4B6A: __getptd_noexit.LIBCMT ref: 009A4B6D
      • Part of subcall function 009A4B6A: __amsg_exit.LIBCMT ref: 009A4B7A
    • __getptd.LIBCMT ref: 009A6494
    • __amsg_exit.LIBCMT ref: 009A64A2
    • __lock.LIBCMT ref: 009A64B2
    • __updatetlocinfoEx_nolock.LIBCMT ref: 009A64C6
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: acaa45c88e217a63c85da718a4633d366b264130a81ce1e036bc422f18a54c72
    • Instruction ID: 052aba56ba1b5e4284656d82856beb4bc99042a49cd324c193a02d7d78348bf7
    • Opcode Fuzzy Hash: acaa45c88e217a63c85da718a4633d366b264130a81ce1e036bc422f18a54c72
    • Instruction Fuzzy Hash: F4F0BB329447109BDB217B74980774D77D0EFC7B25F158109F4106B1E2DBB45801ABD5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction ID: 82ca8fdb8de31ddecf7060a87fe2ce7848a206713c4399c422aee10c31d2935d
    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction Fuzzy Hash: 8E114B3240014AFBCF165E98CC52CEE3F67BB5A350B598915FE2859031C336CAB1AB91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetEnvironmentStringsW.KERNEL32(00000000,009A2C43), ref: 009A46D4
    • __malloc_crt.LIBCMT ref: 009A4703
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009A4710
    Memory Dump Source
    • Source File: 00000000.00000002.2594465865.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
    • Associated: 00000000.00000002.2594452696.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594481260.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009AF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594495017.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2594542975.00000000009B9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9a0000_SecuriteInfo.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free__malloc_crt
    • String ID:
    • API String ID: 237123855-0
    • Opcode ID: 161ea5a119a753a9bfbc775467c858eb0a93027658d4e6bf669cf10c6e1df101
    • Instruction ID: 6ba134b9a5c907351a1b27a96f7f4e17a0567a1eeb6ed8f3376bba39fc747cc3
    • Opcode Fuzzy Hash: 161ea5a119a753a9bfbc775467c858eb0a93027658d4e6bf669cf10c6e1df101
    • Instruction Fuzzy Hash: 4AF0A77B508121AA8F31B778BC4B897676CDFD376531A4825F441C3255FAA08D8182E1
    Uniqueness

    Uniqueness Score: -1.00%