Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8082-x86.dll

Overview

General Information

Sample Name:8082-x86.dll
Analysis ID:780200
MD5:8d72fc6ff9cb0971df587d20dda5e8c8
SHA1:d6031029133084901392b856fe66f00f438d95d9
SHA256:0b7d19cf030839c3df481069772c7a32b5a3be4c41ce6b436ab69015fa90d98a
Tags:45139105143CobaltStrikedllopendir
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected CobaltStrike
C2 URLs / IPs found in malware configuration
Uses known network protocols on non-standard ports
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5560 cmdline: loaddll32.exe "C:\Users\user\Desktop\8082-x86.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5604 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5624 cmdline: rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 5612 cmdline: regsvr32.exe /s C:\Users\user\Desktop\8082-x86.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
    • rundll32.exe (PID: 5632 cmdline: rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllGetClassObject MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5676 cmdline: rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllMain MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5696 cmdline: rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
{"BeaconType": ["HTTP"], "Port": 8082, "SleepTime": 38500, "MaxGetSize": 1399607, "Jitter": 27, "C2Server": "20.104.209.69,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "SpawnTo": "16nKFaB/gr/TtjAg2jiqFg==", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 1670873463, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16700, "ProcInject_PrependAppend_x86": ["kJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQ", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
8082-x86.dllCobaltStrike_Resources_Artifact32_v3_14_to_v4_xCobalt Strike\'s resources/artifact32{.dll,.exe,big.exe,big.dll,bigsvc.exe} signature for versions 3.14 to 4.x and resources/artifact32svc.exe for 3.14 to 4.x and resources/artifact32uac.dll for v3.14 and v4.0gssincla@google.com
  • 0xacb:$pushFmtStr: C7 44 24 28 5C 00 00 00 C7 44 24 24 65 00 00 00 C7 44 24 20 70 00 00 00 C7 44 24 1C 69 00 00 00 C7 44 24 18 70 00 00 00 F7 F1 C7 44 24 14 5C 00 00 00 C7 44 24 10 2E 00 00 00 C7 44 24 0C 5C 00 ...
  • 0x44624:$fmtStr: %c%c%c%c%c%c%c%c%cMSSE-%d-server
8082-x86.dllJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmpCobaltStrike_Sleeve_Beacon_Dll_v4_3_v4_4_v4_5_and_v4_6Cobalt Strike\'s sleeve/beacon.dll Versions 4.3 and 4.4gssincla@google.com
    • 0x72da:$version_sig: 48 57 8B F2 83 F8 65 0F 87 47 03 00 00 FF 24
    • 0x96c3:$decoder: 80 B0 20 10 98 00 2E 40 3D 00 10 00 00 7C F1
    00000000.00000003.435119690.00000000012D8000.00000004.00000800.00020000.00000000.sdmpSUSP_PS1_FromBase64String_Content_IndicatorDetects suspicious base64 encoded PowerShell expressionsFlorian Roth
    • 0x1bb8:$: ::FromBase64String("H4s
    • 0x1bb8:$: ::FromBase64String("H4sIA
    00000000.00000003.435119690.00000000012D8000.00000004.00000800.00020000.00000000.sdmpCobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_xCobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.xgssincla@google.com
    • 0x1b90:$ps1: $s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(
    • 0x2aa99:$ps2: ));IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s,[IO.Compression.CompressionMode]::Decompress))).ReadToEnd();
    00000000.00000003.436145653.00000000012D8000.00000004.00000800.00020000.00000000.sdmpSUSP_PS1_FromBase64String_Content_IndicatorDetects suspicious base64 encoded PowerShell expressionsFlorian Roth
    • 0x1bb8:$: ::FromBase64String("H4s
    • 0x1bb8:$: ::FromBase64String("H4sIA
    00000000.00000003.436145653.00000000012D8000.00000004.00000800.00020000.00000000.sdmpCobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_xCobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.xgssincla@google.com
    • 0x1b90:$ps1: $s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(
    • 0x2aa99:$ps2: ));IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s,[IO.Compression.CompressionMode]::Decompress))).ReadToEnd();
    Click to see the 21 entries
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 8082-x86.dllAvira: detected
    Source: 8082-x86.dllReversingLabs: Detection: 87%
    Source: 8082-x86.dllVirustotal: Detection: 70%Perma Link
    Source: 8082-x86.dllJoe Sandbox ML: detected
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTP"], "Port": 8082, "SleepTime": 38500, "MaxGetSize": 1399607, "Jitter": 27, "C2Server": "20.104.209.69,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "SpawnTo": "16nKFaB/gr/TtjAg2jiqFg==", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 1670873463, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16700, "ProcInject_PrependAppend_x86": ["kJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQ", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
    Source: 8082-x86.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL

    Networking

    barindex
    Source: Malware configuration extractorURLs: 20.104.209.69
    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49685
    Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49686
    Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49687
    Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49688
    Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49689
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /1/events/com.amazon.csm.csa.prod HTTP/1.1Accept: */*Origin: https://www.amazon.comx-amz-rid: MTI4NDQwODUyNAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Content-Length: 14246Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficTCP traffic: 192.168.2.4:49685 -> 20.104.209.69:8082
    Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: loaddll32.exe, 00000000.00000002.620161836.0000000000E2E000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.620169392.0000000000E58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8
    Source: unknownHTTP traffic detected: POST /1/events/com.amazon.csm.csa.prod HTTP/1.1Accept: */*Origin: https://www.amazon.comx-amz-rid: MTI4NDQwODUyNAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Content-Length: 14246Connection: Keep-AliveCache-Control: no-cache
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00951449 _memset,__snprintf,__snprintf,__snprintf,HttpOpenRequestA,InternetQueryDataAvailable,InternetReadFile,InternetCloseHandle,0_2_00951449
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache

    System Summary

    barindex
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: FireEye
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
    Source: 8082-x86.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
    Source: 8082-x86.dll, type: SAMPLEMatched rule: CobaltStrike_Resources_Artifact32_v3_14_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/artifact32{.dll,.exe,big.exe,big.dll,bigsvc.exe} signature for versions 3.14 to 4.x and resources/artifact32svc.exe for 3.14 to 4.x and resources/artifact32uac.dll for v3.14 and v4.0, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 888bae8d89c03c1d529b04f9e4a051140ce3d7b39bc9ea021ad9fc7c9f467719
    Source: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Sleeve_Beacon_Dll_v4_3_v4_4_v4_5_and_v4_6 date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s sleeve/beacon.dll Versions 4.3 and 4.4, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, rs2 = 78a6fbefa677eeee29d1af4a294ee57319221b329a2fe254442f5708858b37dc, hash = 51490c01c72c821f476727c26fbbc85bdbc41464f95b28cdc577e5701790845f
    Source: 00000000.00000003.435119690.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000003.435119690.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000003.436145653.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000003.436145653.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000003.435087941.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000003.435087941.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000003.581071660.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000003.581071660.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000003.511799758.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000003.511799758.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000002.620198943.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000002.620198943.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Sleeve_BeaconLoader_VA_x86_o_v4_3_v4_4_v4_5_and_v4_6 date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s sleeve/BeaconLoader.VA.x86.o (VirtualAlloc) Versions 4.3 through at least 4.6, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 94d1b993a9d5786e0a9b44ea1c0dc27e225c9eb7960154881715c47f9af78cc1
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date = 2020-12-02, author = FireEye, reference = https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html, modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_C2_Encoded_XOR_Config_Indicator date = 2021-07-08, author = yara@s3c.za.net, description = Detects CobaltStrike C2 encoded profile configuration
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
    Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
    Source: Process Memory Space: loaddll32.exe PID: 5560, type: MEMORYSTRMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: Process Memory Space: loaddll32.exe PID: 5560, type: MEMORYSTRMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: Process Memory Space: loaddll32.exe PID: 5560, type: MEMORYSTRMatched rule: CobaltStrike_C2_Encoded_XOR_Config_Indicator date = 2021-07-08, author = yara@s3c.za.net, description = Detects CobaltStrike C2 encoded profile configuration
    Source: C:\Windows\System32\loaddll32.exeSection loaded: wwanmm.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009534100_2_00953410
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009702D80_2_009702D8
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009614EB0_2_009614EB
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009665140_2_00966514
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009735500_2_00973550
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009535410_2_00953541
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00973B200_2_00973B20
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00972CD00_2_00972CD0
    Source: C:\Windows\System32\loaddll32.exeCode function: String function: 00966ADC appears 37 times
    Source: 8082-x86.dllReversingLabs: Detection: 87%
    Source: 8082-x86.dllVirustotal: Detection: 70%
    Source: 8082-x86.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009578FB _memset,CreateToolhelp32Snapshot,Process32First,ProcessIdToSessionId,FindCloseChangeNotification,0_2_009578FB
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\8082-x86.dll"
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\8082-x86.dll
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllGetClassObject
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllMain
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllRegisterServer
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\8082-x86.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllGetClassObjectJump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllMainJump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllRegisterServerJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_01
    Source: classification engineClassification label: mal100.troj.winDLL@14/0@0/1
    Source: 8082-x86.dllStatic PE information: Image base 0x6bac0000 > 0x60000000
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE71FA push ss; ret 0_3_00CE720F
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE13E7 push FFFFFFC0h; ret 0_3_00CE13F3
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CEB4DA push esi; ret 0_3_00CEB4DD
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CEB59F push esi; retf 0_3_00CEB59E
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CEB59F push esi; iretd 0_3_00CEB5FE
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CEB556 push esi; retf 0_3_00CEB59E
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0527 push FFFFFF99h; ret 0_3_00CE0533
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE06D9 push eax; ret 0_3_00CE06E6
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE166C pushfd ; ret 0_3_00CE1672
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE4668 push edi; ret 0_3_00CE4677
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0634 push eax; ret 0_3_00CE063D
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE07CD push ecx; ret 0_3_00CE07D4
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE07C4 push ecx; ret 0_3_00CE07CB
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE17DE push edx; ret 0_3_00CE17EF
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE078D push ecx; ret 0_3_00CE0797
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE179A pushfd ; ret 0_3_00CE17B3
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE07BB push ecx; ret 0_3_00CE07C2
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0756 push ecx; ret 0_3_00CE0764
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0766 push ecx; ret 0_3_00CE0770
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0774 push ecx; ret 0_3_00CE077F
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE68E7 push esp; ret 0_3_00CE68EF
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE18A6 push FFFFFFC2h; ret 0_3_00CE1891
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE1867 push FFFFFFC2h; ret 0_3_00CE1891
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE087E push edx; ret 0_3_00CE0887
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0834 push edx; ret 0_3_00CE0853
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0972 push ebx; ret 0_3_00CE0978
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE0917 push edx; ret 0_3_00CE091D
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE9ADA push FFFFFFC3h; ret 0_3_00CE9AF9
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE1A91 pushad ; iretd 0_3_00CE1A93
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE1A7D pushad ; retf 0_3_00CE1A86
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE4B84 push ebx; ret 0_3_00CE4B85
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\8082-x86.dll

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49685
    Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49686
    Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49687
    Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49688
    Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49689
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\loaddll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-18003
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 31329Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 34974Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 31989Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE9004 mov eax, dword ptr fs:[00000030h]0_3_00CE9004
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00CE8374 mov eax, dword ptr fs:[00000030h]0_3_00CE8374
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009558DD GetUserNameA,_strrchr,__snprintf,0_2_009558DD

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5560, type: MEMORYSTR
    Source: Yara matchFile source: 8082-x86.dll, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    Virtualization/Sandbox Evasion
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory2
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    Account Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
    Obfuscated Files or Information
    NTDS1
    System Owner/User Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer2
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Regsvr32
    LSA Secrets2
    System Information Discovery
    SSHKeyloggingData Transfer Size Limits112
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Rundll32
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 780200 Sample: 8082-x86.dll Startdate: 08/01/2023 Architecture: WINDOWS Score: 100 22 Malicious sample detected (through community Yara rule) 2->22 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 4 other signatures 2->28 7 loaddll32.exe 13 2->7         started        process3 dnsIp4 20 20.104.209.69, 49685, 49686, 49687 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->20 10 cmd.exe 1 7->10         started        12 regsvr32.exe 7->12         started        14 rundll32.exe 7->14         started        16 3 other processes 7->16 process5 process6 18 rundll32.exe 10->18         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    8082-x86.dll88%ReversingLabsWin32.Trojan.CobaltStrike
    8082-x86.dll70%VirustotalBrowse
    8082-x86.dll100%AviraHEUR/AGEN.1235510
    8082-x86.dll100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://20.104.209.69:8082/broadcast0%Avira URL Cloudsafe
    http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod0%Avira URL Cloudsafe
    20.104.209.690%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://20.104.209.69:8082/broadcasttrue
    • Avira URL Cloud: safe
    unknown
    20.104.209.69true
    • Avira URL Cloud: safe
    unknown
    http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prodtrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8loaddll32.exe, 00000000.00000002.620161836.0000000000E2E000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.620169392.0000000000E58000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      20.104.209.69
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
      Joe Sandbox Version:36.0.0 Rainbow Opal
      Analysis ID:780200
      Start date and time:2023-01-08 16:02:07 +01:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 19s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:8082-x86.dll
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:13
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.winDLL@14/0@0/1
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 98%
      • Number of executed functions: 34
      • Number of non-executed functions: 21
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      20.104.209.698082-x86.exeGet hashmaliciousBrowse
      • 20.104.209.69:8082/broadcast
      8082-x64.ps1Get hashmaliciousBrowse
      • 20.104.209.69:8082/broadcast
      8082-x64.exeGet hashmaliciousBrowse
      • 20.104.209.69:8082/broadcast
      8082-x86.ps1Get hashmaliciousBrowse
      • 20.104.209.69:8082/broadcast
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      MICROSOFT-CORP-MSN-AS-BLOCKUS8082-x86.exeGet hashmaliciousBrowse
      • 20.104.209.69
      8082-x64.ps1Get hashmaliciousBrowse
      • 20.104.209.69
      8082-x64.exeGet hashmaliciousBrowse
      • 20.104.209.69
      8082-x86.ps1Get hashmaliciousBrowse
      • 20.104.209.69
      YhfJ5sKIz3.elfGet hashmaliciousBrowse
      • 20.124.38.248
      file.exeGet hashmaliciousBrowse
      • 40.93.207.2
      XsP344f0F0.elfGet hashmaliciousBrowse
      • 40.91.21.6
      file.exeGet hashmaliciousBrowse
      • 40.93.207.0
      41bV0jyqt6.elfGet hashmaliciousBrowse
      • 40.65.177.74
      file.exeGet hashmaliciousBrowse
      • 40.93.207.2
      file.exeGet hashmaliciousBrowse
      • 104.47.54.36
      JzKeM0GpxV.elfGet hashmaliciousBrowse
      • 20.182.19.237
      file.exeGet hashmaliciousBrowse
      • 40.93.207.2
      file.exeGet hashmaliciousBrowse
      • 40.93.207.1
      12OMRfKxvu.elfGet hashmaliciousBrowse
      • 51.125.192.211
      7JE8iEYd60.elfGet hashmaliciousBrowse
      • 40.96.50.119
      U1lnaOUMhH.elfGet hashmaliciousBrowse
      • 20.208.28.125
      AP7H3dk8Ul.elfGet hashmaliciousBrowse
      • 20.223.104.8
      8jK7X0Nc8M.elfGet hashmaliciousBrowse
      • 20.84.217.81
      1UpEPaCgSt.elfGet hashmaliciousBrowse
      • 13.90.15.241
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
      Entropy (8bit):6.6495124481937875
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • VXD Driver (31/22) 0.00%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:8082-x86.dll
      File size:285184
      MD5:8d72fc6ff9cb0971df587d20dda5e8c8
      SHA1:d6031029133084901392b856fe66f00f438d95d9
      SHA256:0b7d19cf030839c3df481069772c7a32b5a3be4c41ce6b436ab69015fa90d98a
      SHA512:9c2074e9e68676ce41346f9bce266fb1155d75fc4f1efc6f40bbcb7871ab6a2f7eda724c4381dd288d817929117fbea9bd3a6d0c977f3db5a55fad1bb35e294d
      SSDEEP:3072:GjXnzH5O+xdKYgC2F/bHnOdisDmtam6SBSZge2x7WBNvjxDld7JOwy6t7bAl+dBj:mNaYn+HNtaJD7VUwl7Y+T
      TLSH:1154CFE5B1DC6B67F844BABA93E1EA0A32A93CD88214E511B3FDDFF6210145CB8D44C5
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^...........#.........V...... ........0.....k................................4......... ............................
      Icon Hash:74f0e4ecccdce0e4
      Entrypoint:0x6bac1420
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x6bac0000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
      DLL Characteristics:
      Time Stamp:0x5EDED50C [Tue Jun 9 00:17:16 2020 UTC]
      TLS Callbacks:0x6bac1a50, 0x6bac1a00
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:e1dcffde169ed8b947dc63acdb78aeca
      Instruction
      sub esp, 1Ch
      mov edx, dword ptr [esp+24h]
      mov dword ptr [6BB07018h], 00000000h
      cmp edx, 01h
      je 00007FBA3CA7FA6Ch
      mov ecx, dword ptr [esp+28h]
      mov eax, dword ptr [esp+20h]
      call 00007FBA3CA7F872h
      add esp, 1Ch
      retn 000Ch
      lea esi, dword ptr [esi+00000000h]
      mov dword ptr [esp+0Ch], edx
      call 00007FBA3CA807ECh
      mov edx, dword ptr [esp+0Ch]
      jmp 00007FBA3CA7FA29h
      nop
      push ebp
      mov ebp, esp
      sub esp, 18h
      mov eax, dword ptr [6BB05418h]
      test eax, eax
      je 00007FBA3CA7FA8Eh
      mov dword ptr [esp], 6BB06000h
      call dword ptr [6BB09138h]
      mov edx, 00000000h
      sub esp, 04h
      test eax, eax
      je 00007FBA3CA7FA68h
      mov dword ptr [esp+04h], 6BB0600Eh
      mov dword ptr [esp], eax
      call dword ptr [6BB0913Ch]
      sub esp, 08h
      mov edx, eax
      test edx, edx
      je 00007FBA3CA7FA5Bh
      mov dword ptr [esp], 6BB05418h
      call edx
      leave
      ret
      lea esi, dword ptr [esi+00h]
      push ebp
      mov ebp, esp
      pop ebp
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      push ebp
      mov ebp, esp
      push edi
      push esi
      push ebx
      sub esp, 4Ch
      mov edi, dword ptr [ebp+08h]
      mov esi, dword ptr [ebp+0Ch]
      mov dword ptr [ebp-1Ch], 00000000h
      mov dword ptr [esp+1Ch], 00000000h
      mov dword ptr [esp+18h], 00000000h
      mov dword ptr [eax+eax+00h], 00000000h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x480000xb0.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x490000x5bc.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c0000x4ac.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x4b0000x18.tls
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x491080xcc.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x1a840x1c00False0.5262276785714286data5.9055220621274644IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x30000x4241c0x42600False0.5397871056967984data6.6586521702558805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x460000x1a00x200False0.529296875data4.462802731767267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
      .bss0x470000x4180x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .edata0x480000xb00x200False0.2734375data1.9817948694706844IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
      .idata0x490000x5bc0x600False0.4296875data4.870768861754693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .CRT0x4a0000x2c0x200False0.052734375data0.18120187678200297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x4b0000x200x200False0.0546875data0.2797047950073886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x4c0000x4ac0x600False0.7005208333333334data5.557340256736937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateThread, DeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, QueryPerformanceCounter, ReadFile, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WriteFile
      msvcrt.dll__dllonexit, _amsg_exit, _initterm, _iob, _lock, _onexit, _unlock, _winmajor, abort, calloc, free, fwrite, malloc, memcpy, sprintf, strlen, strncmp, vfprintf
      NameOrdinalAddress
      DllGetClassObject10x6bac17ee
      DllMain20x6bac178b
      DllRegisterServer30x6bac17e0
      DllUnregisterServer40x6bac17e7
      StartW50x6bac1803
      TimestampSource PortDest PortSource IPDest IP
      Jan 8, 2023 16:03:30.432375908 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.547492981 CET80824968520.104.209.69192.168.2.4
      Jan 8, 2023 16:03:30.547652960 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.574161053 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.690412045 CET80824968520.104.209.69192.168.2.4
      Jan 8, 2023 16:03:30.692807913 CET80824968520.104.209.69192.168.2.4
      Jan 8, 2023 16:03:30.692890882 CET80824968520.104.209.69192.168.2.4
      Jan 8, 2023 16:03:30.692893028 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.692970037 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.692990065 CET80824968520.104.209.69192.168.2.4
      Jan 8, 2023 16:03:30.693047047 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.694236040 CET496858082192.168.2.420.104.209.69
      Jan 8, 2023 16:03:30.809875965 CET80824968520.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.041449070 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.155930996 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.156147957 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.156966925 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.270982027 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285484076 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285547018 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285581112 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285617113 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285650969 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285684109 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285711050 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.285716057 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285751104 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285788059 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285801888 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.285828114 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.285830975 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.285868883 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400144100 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400207043 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400235891 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400262117 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400286913 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400311947 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400336981 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400366068 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400386095 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400424004 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400440931 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400471926 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400480986 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400501966 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400507927 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400528908 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400530100 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400547981 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400557041 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400567055 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400584936 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400602102 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400613070 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400628090 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400638103 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400662899 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400680065 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400741100 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400769949 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400798082 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400813103 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400819063 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400845051 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.400854111 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.400887966 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.515465975 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515511036 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515531063 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515554905 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515674114 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.515723944 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515738010 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.515748978 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515769958 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515774012 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.515791893 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.515799046 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.515832901 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516217947 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516247034 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516267061 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516287088 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516295910 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516344070 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516704082 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516726017 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516746044 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516767025 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516777992 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516788006 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516823053 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516834974 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516855955 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516875982 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.516885996 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516904116 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.516952038 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517013073 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517034054 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517060995 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517067909 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517091036 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517096043 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517117977 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517151117 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517215014 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517239094 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517260075 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517266035 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517281055 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517285109 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517302990 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517323971 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517338037 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517343998 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517348051 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517384052 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517398119 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517426968 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517446041 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517456055 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517467976 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517488956 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517493963 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517509937 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517529964 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517534018 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517550945 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517558098 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517571926 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.517596006 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.517635107 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630100965 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630146027 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630168915 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630192041 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630214930 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630234957 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630258083 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630281925 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630302906 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630307913 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630326033 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630351067 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630373001 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630398035 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630407095 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630422115 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630435944 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630451918 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630467892 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630475044 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630497932 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630511045 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630520105 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630541086 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630552053 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630564928 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630580902 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630588055 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630609989 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630616903 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630634069 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630656004 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630664110 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630680084 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630723000 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630723000 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630732059 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630755901 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630764961 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630779982 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630781889 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630801916 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630810022 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630827904 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630848885 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630868912 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630873919 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630891085 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630913019 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630917072 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630937099 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630940914 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.630959034 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630980015 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.630983114 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631002903 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631006956 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631023884 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631040096 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631047010 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631067991 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631076097 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631088972 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631109953 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631122112 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631131887 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631153107 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631155014 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631175041 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631196022 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631201982 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631217957 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631223917 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631239891 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631249905 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631263971 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631284952 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631306887 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631313086 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631330013 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631339073 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631354094 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631365061 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631376982 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631412983 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631462097 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631484032 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631485939 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631505966 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631526947 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631546974 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631550074 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631588936 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631618977 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631668091 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631691933 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631711960 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631731033 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631736040 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631758928 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631761074 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631781101 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631788015 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631804943 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631814957 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631829023 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631850958 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631854057 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631872892 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631886959 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631913900 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631920099 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631937027 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631958008 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.631959915 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.631983042 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632004023 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632014036 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.632025957 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632038116 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.632049084 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632070065 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632076025 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.632091045 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632098913 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.632112026 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.632136106 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.632172108 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.745404959 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.745446920 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.745467901 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.745570898 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.745640039 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.745683908 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.747332096 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.747487068 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.747505903 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.747560024 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.747658014 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.747716904 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.747987032 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748064995 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748140097 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748188019 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748300076 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748404026 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748467922 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748490095 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748514891 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748547077 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748564005 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748584032 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748605013 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748606920 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748625994 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748631001 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748646975 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748653889 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748667955 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748678923 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748689890 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748702049 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748709917 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748730898 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748732090 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748753071 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748774052 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748785973 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748794079 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748811960 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748820066 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748842001 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748845100 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748866081 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748878956 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748887062 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748905897 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748908043 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748929977 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748938084 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748951912 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748972893 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.748975039 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.748992920 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.749011040 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:02.749011040 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.749034882 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.749073029 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.749463081 CET496868082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:02.863251925 CET80824968620.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.032263041 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.146584034 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.146877050 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.147871971 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.148056030 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.261693001 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261727095 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261744022 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261753082 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261774063 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261789083 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261826038 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.261975050 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.376238108 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.380633116 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.380666971 CET80824968720.104.209.69192.168.2.4
      Jan 8, 2023 16:04:03.380811930 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.381032944 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:03.381078005 CET496878082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.445864916 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.560574055 CET80824968820.104.209.69192.168.2.4
      Jan 8, 2023 16:04:38.560714960 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.561438084 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.675760984 CET80824968820.104.209.69192.168.2.4
      Jan 8, 2023 16:04:38.681183100 CET80824968820.104.209.69192.168.2.4
      Jan 8, 2023 16:04:38.681255102 CET80824968820.104.209.69192.168.2.4
      Jan 8, 2023 16:04:38.681268930 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.681324959 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.681638002 CET80824968820.104.209.69192.168.2.4
      Jan 8, 2023 16:04:38.681715965 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.713166952 CET496888082192.168.2.420.104.209.69
      Jan 8, 2023 16:04:38.827778101 CET80824968820.104.209.69192.168.2.4
      Jan 8, 2023 16:05:10.735661030 CET496898082192.168.2.420.104.209.69
      Jan 8, 2023 16:05:10.850111008 CET80824968920.104.209.69192.168.2.4
      Jan 8, 2023 16:05:10.884565115 CET496898082192.168.2.420.104.209.69
      Jan 8, 2023 16:05:10.885616064 CET496898082192.168.2.420.104.209.69
      Jan 8, 2023 16:05:10.999473095 CET80824968920.104.209.69192.168.2.4
      Jan 8, 2023 16:05:11.002820015 CET80824968920.104.209.69192.168.2.4
      Jan 8, 2023 16:05:11.002854109 CET80824968920.104.209.69192.168.2.4
      Jan 8, 2023 16:05:11.002892971 CET80824968920.104.209.69192.168.2.4
      Jan 8, 2023 16:05:11.003046989 CET496898082192.168.2.420.104.209.69
      Jan 8, 2023 16:05:11.192933083 CET496898082192.168.2.420.104.209.69
      Jan 8, 2023 16:05:11.307514906 CET80824968920.104.209.69192.168.2.4
      • https:
        • 20.104.209.69:8082
      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.44968520.104.209.698082C:\Windows\System32\loaddll32.exe
      TimestampkBytes transferredDirectionData
      Jan 8, 2023 16:03:30.574161053 CET92OUTGET /broadcast HTTP/1.1
      Accept: application/json, text/plain, */*
      Accept-Language: en-US,en;q=0.5
      Origin: https://www.amazon.com
      Referer: https://www.amazon.com
      Sec-Fetch-Dest: empty
      Sec-Fetch-Mode: cors
      Sec-Fetch-Site: cross-site
      Te: trailers
      x-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: 20.104.209.69:8082
      Connection: Keep-Alive
      Cache-Control: no-cache
      Jan 8, 2023 16:03:30.692807913 CET92INHTTP/1.1 200 OK
      Date: Sun, 8 Jan 2023 15:03:21 GMT
      Content-Type: application/json
      Access-Control-Allow-Origin: https://www.amazon.com
      Access-Control-Allow-Methods: GET
      Access-Control-Allow-Credentials: true
      X-Amz-Version-Id: null
      Server: AmazonS3
      X-Cache: Hit from cloudfront
      Content-Length: 1611


      Session IDSource IPSource PortDestination IPDestination PortProcess
      1192.168.2.44968620.104.209.698082C:\Windows\System32\loaddll32.exe
      TimestampkBytes transferredDirectionData
      Jan 8, 2023 16:04:02.156966925 CET95OUTGET /broadcast HTTP/1.1
      Accept: application/json, text/plain, */*
      Accept-Language: en-US,en;q=0.5
      Origin: https://www.amazon.com
      Referer: https://www.amazon.com
      Sec-Fetch-Dest: empty
      Sec-Fetch-Mode: cors
      Sec-Fetch-Site: cross-site
      Te: trailers
      x-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: 20.104.209.69:8082
      Connection: Keep-Alive
      Cache-Control: no-cache
      Jan 8, 2023 16:04:02.285484076 CET96INHTTP/1.1 200 OK
      Date: Sun, 8 Jan 2023 15:03:53 GMT
      Content-Type: application/json
      Access-Control-Allow-Origin: https://www.amazon.com
      Access-Control-Allow-Methods: GET
      Access-Control-Allow-Credentials: true
      X-Amz-Version-Id: null
      Server: AmazonS3
      X-Cache: Hit from cloudfront
      Content-Length: 234807


      Session IDSource IPSource PortDestination IPDestination PortProcess
      2192.168.2.44968720.104.209.698082C:\Windows\System32\loaddll32.exe
      TimestampkBytes transferredDirectionData
      Jan 8, 2023 16:04:03.147871971 CET342OUTPOST /1/events/com.amazon.csm.csa.prod HTTP/1.1
      Accept: */*
      Origin: https://www.amazon.com
      x-amz-rid: MTI4NDQwODUyNA
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: 20.104.209.69:8082
      Content-Length: 14246
      Connection: Keep-Alive
      Cache-Control: no-cache
      Jan 8, 2023 16:04:03.380633116 CET357INHTTP/1.1 200 OK
      Date: Sun, 8 Jan 2023 15:03:54 GMT
      Server: Server
      Content-Type: application/json
      Connection: close
      Access-Control-Allow-Origin: https://www.amazon.com
      Access-Control-Expose-Headers: x-amzn-RequestId,x-amzn-ErrorType,x-amzn-ErrorMessage,Date
      Access-Control-Allow-Credentials: true
      Vary: Origin,Content-Type,Accept-Encoding,X-Amzn-CDN-Cache,X-Amzn-AX-Treatment,User-Agent
      Permissions-Policy: interest-cohort=()
      Content-Length: 86


      Session IDSource IPSource PortDestination IPDestination PortProcess
      3192.168.2.44968820.104.209.698082C:\Windows\System32\loaddll32.exe
      TimestampkBytes transferredDirectionData
      Jan 8, 2023 16:04:38.561438084 CET359OUTGET /broadcast HTTP/1.1
      Accept: application/json, text/plain, */*
      Accept-Language: en-US,en;q=0.5
      Origin: https://www.amazon.com
      Referer: https://www.amazon.com
      Sec-Fetch-Dest: empty
      Sec-Fetch-Mode: cors
      Sec-Fetch-Site: cross-site
      Te: trailers
      x-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: 20.104.209.69:8082
      Connection: Keep-Alive
      Cache-Control: no-cache
      Jan 8, 2023 16:04:38.681183100 CET359INHTTP/1.1 200 OK
      Date: Sun, 8 Jan 2023 15:04:29 GMT
      Content-Type: application/json
      Access-Control-Allow-Origin: https://www.amazon.com
      Access-Control-Allow-Methods: GET
      Access-Control-Allow-Credentials: true
      X-Amz-Version-Id: null
      Server: AmazonS3
      X-Cache: Hit from cloudfront
      Content-Length: 1611


      Session IDSource IPSource PortDestination IPDestination PortProcess
      4192.168.2.44968920.104.209.698082C:\Windows\System32\loaddll32.exe
      TimestampkBytes transferredDirectionData
      Jan 8, 2023 16:05:10.885616064 CET362OUTGET /broadcast HTTP/1.1
      Accept: application/json, text/plain, */*
      Accept-Language: en-US,en;q=0.5
      Origin: https://www.amazon.com
      Referer: https://www.amazon.com
      Sec-Fetch-Dest: empty
      Sec-Fetch-Mode: cors
      Sec-Fetch-Site: cross-site
      Te: trailers
      x-amzn-RequestId: r1+LKI+U+qsTG/S16NjtFpg7cAwjMocPtkvat6tAYwjHqmlGU2emV8Y1lcR09lFCYMc3e/2RPM9832YnRBnrlczEfASqRi1t67GCC61QvdadrQyZZZnmhHuznJl25Bvzanuao77KXJlOWgkmVJTy+plseuTcyuIUt+jek18kyws=
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: 20.104.209.69:8082
      Connection: Keep-Alive
      Cache-Control: no-cache
      Jan 8, 2023 16:05:11.002820015 CET363INHTTP/1.1 200 OK
      Date: Sun, 8 Jan 2023 15:05:02 GMT
      Content-Type: application/json
      Access-Control-Allow-Origin: https://www.amazon.com
      Access-Control-Allow-Methods: GET
      Access-Control-Allow-Credentials: true
      X-Amz-Version-Id: null
      Server: AmazonS3
      X-Cache: Hit from cloudfront
      Content-Length: 1591


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:16:03:18
      Start date:08/01/2023
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\8082-x86.dll"
      Imagebase:0x13d0000
      File size:116736 bytes
      MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: CobaltStrike_Sleeve_Beacon_Dll_v4_3_v4_4_v4_5_and_v4_6, Description: Cobalt Strike\'s sleeve/beacon.dll Versions 4.3 and 4.4, Source: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000003.435119690.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000003.435119690.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000003.436145653.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000003.436145653.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000003.435087941.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000003.435087941.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000003.581071660.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000003.581071660.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000003.511799758.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000003.511799758.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000002.620198943.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000002.620198943.00000000012D8000.00000004.00000800.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: CobaltStrike_Sleeve_BeaconLoader_VA_x86_o_v4_3_v4_4_v4_5_and_v4_6, Description: Cobalt Strike\'s sleeve/BeaconLoader.VA.x86.o (VirtualAlloc) Versions 4.3 through at least 4.6, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: gssincla@google.com
      • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: FireEye
      • Rule: CobaltStrike_C2_Encoded_XOR_Config_Indicator, Description: Detects CobaltStrike C2 encoded profile configuration, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
      • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
      • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
      Reputation:high

      Target ID:1
      Start time:16:03:18
      Start date:08/01/2023
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7c72c0000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:2
      Start time:16:03:18
      Start date:08/01/2023
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
      Imagebase:0xd90000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:3
      Start time:16:03:18
      Start date:08/01/2023
      Path:C:\Windows\SysWOW64\regsvr32.exe
      Wow64 process (32bit):true
      Commandline:regsvr32.exe /s C:\Users\user\Desktop\8082-x86.dll
      Imagebase:0x2a0000
      File size:20992 bytes
      MD5 hash:426E7499F6A7346F0410DEAD0805586B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:4
      Start time:16:03:18
      Start date:08/01/2023
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
      Imagebase:0x200000
      File size:61952 bytes
      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:5
      Start time:16:03:18
      Start date:08/01/2023
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllGetClassObject
      Imagebase:0x200000
      File size:61952 bytes
      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:6
      Start time:16:03:22
      Start date:08/01/2023
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllMain
      Imagebase:0x200000
      File size:61952 bytes
      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:7
      Start time:16:03:25
      Start date:08/01/2023
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllRegisterServer
      Imagebase:0x200000
      File size:61952 bytes
      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Reset < >

        Execution Graph

        Execution Coverage:7.6%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:2.2%
        Total number of Nodes:2000
        Total number of Limit Nodes:70
        execution_graph 16298 965d15 16299 965d20 ___security_init_cookie 16298->16299 16302 965c1f 16299->16302 16301 965d33 16303 965c2b _flsall 16302->16303 16304 965cc8 _flsall 16303->16304 16308 965c78 16303->16308 16314 965aea 16303->16314 16304->16301 16308->16304 16347 957c14 16308->16347 16309 965ca8 16309->16304 16310 965aea __CRT_INIT@12 6 API calls 16309->16310 16310->16304 16311 957c14 ___DllMainCRTStartup 23 API calls 16312 965c9f 16311->16312 16313 965aea __CRT_INIT@12 6 API calls 16312->16313 16313->16309 16315 965b75 16314->16315 16316 965af9 16314->16316 16317 965bac 16315->16317 16318 965b7b 16315->16318 16355 965dc3 HeapCreate 16316->16355 16320 965bb1 ___set_flsgetvalue 16317->16320 16321 965c0a 16317->16321 16323 965b96 16318->16323 16329 965b04 __heap_term __mtterm 16318->16329 16423 9648da 16318->16423 16426 96c1dd 16320->16426 16321->16329 16444 96917e 16321->16444 16328 96b9e2 __ioterm 4 API calls 16323->16328 16323->16329 16328->16329 16329->16308 16330 965b10 __RTC_Initialize 16330->16329 16373 96c5fc 16330->16373 16331 965bc2 __decode_pointer 16331->16329 16333 965be7 16331->16333 16334 965bfe 16331->16334 16430 968ed5 16333->16430 16436 9640ea 16334->16436 16335 965b30 16382 96b78e 16335->16382 16339 965b3a 16339->16329 16390 96c541 16339->16390 16342 965b5e 16342->16329 16419 96b9e2 16342->16419 16348 957cb2 16347->16348 16352 957c24 ___DllMainCRTStartup 16347->16352 16934 959684 16348->16934 16351 957caf 16351->16309 16351->16311 16352->16351 16353 957c7b VirtualFree 16352->16353 16354 957c6a 16352->16354 16353->16354 16890 95031c 16354->16890 16356 965aff 16355->16356 16356->16329 16357 9691ec 16356->16357 16359 9691fc __crt_waiting_on_module_handle 16357->16359 16358 96935c __mtterm 16358->16330 16359->16358 16448 9648e9 16359->16448 16364 968d6e __encode_pointer RtlEncodePointer 16365 9692d9 16364->16365 16366 968d6e __encode_pointer RtlEncodePointer 16365->16366 16367 9692e9 16366->16367 16368 968d6e __encode_pointer RtlEncodePointer 16367->16368 16369 9692f9 __mtinit __decode_pointer 16368->16369 16369->16358 16370 96c1dd __calloc_crt 4 API calls 16369->16370 16371 969333 __decode_pointer 16370->16371 16371->16358 16372 968ed5 __initptd 4 API calls 16371->16372 16372->16358 16374 96c61a 16373->16374 16375 96c6d2 16374->16375 16376 96c622 16374->16376 16378 96c198 __malloc_crt 4 API calls 16375->16378 16379 96c65d 16375->16379 16376->16379 16465 96c198 16376->16465 16378->16379 16379->16335 16381 9640ea __putenv_helper 4 API calls 16381->16379 16383 96b79a _flsall 16382->16383 16384 96c1dd __calloc_crt 4 API calls 16383->16384 16388 96b7bb 16384->16388 16385 96b9bb _flsall 16385->16339 16386 96c1dd __calloc_crt 4 API calls 16386->16388 16387 96b968 GetFileType 16389 96b8a3 __getstream 16387->16389 16388->16385 16388->16386 16388->16389 16389->16385 16389->16387 16391 96c556 16390->16391 16393 96c55b 16390->16393 16600 96d680 16391->16600 16594 96c3a7 16393->16594 16395 965b4a 16395->16342 16400 96c2c9 16395->16400 16397 96c198 __malloc_crt 4 API calls 16398 96c5c4 16397->16398 16398->16395 16399 96c3a7 _parse_cmdline 4 API calls 16398->16399 16399->16395 16401 96c2d2 16400->16401 16404 96c2d7 _strlen 16400->16404 16402 96d680 ___initmbctable 4 API calls 16401->16402 16402->16404 16403 965b53 16403->16342 16413 9646fd 16403->16413 16404->16403 16405 96c1dd __calloc_crt 4 API calls 16404->16405 16408 96c30c __invoke_watson _strlen 16405->16408 16406 96c36a 16407 9640ea __putenv_helper 4 API calls 16406->16407 16407->16403 16408->16403 16408->16406 16409 96c1dd __calloc_crt 4 API calls 16408->16409 16410 96c390 16408->16410 16412 96ce5b _strcpy_s 4 API calls 16408->16412 16409->16408 16411 9640ea __putenv_helper 4 API calls 16410->16411 16411->16403 16412->16408 16414 96470b __IsNonwritableInCurrentImage 16413->16414 16785 969503 16414->16785 16416 964729 __initterm_e 16418 964748 __IsNonwritableInCurrentImage __initterm 16416->16418 16789 9694a0 16416->16789 16418->16342 16421 96b9eb 16419->16421 16420 96ba2d 16420->16329 16421->16420 16422 9640ea __putenv_helper 4 API calls 16421->16422 16422->16421 16848 964782 16423->16848 16425 9648e5 16425->16323 16429 96c1e6 16426->16429 16428 96c223 16428->16331 16429->16428 16854 96f7a0 16429->16854 16431 968ee1 _flsall __crt_waiting_on_module_handle 16430->16431 16432 965fe3 __lock 4 API calls 16431->16432 16433 968f52 __initptd 16432->16433 16434 965fe3 __lock 4 API calls 16433->16434 16435 968f73 _flsall ___addlocaleref __initptd 16434->16435 16435->16329 16437 9640f6 _flsall 16436->16437 16438 965fe3 __lock 3 API calls 16437->16438 16439 964161 _flsall _realloc 16437->16439 16443 96410d ___sbh_free_block __putenv_helper ___sbh_find_block 16437->16443 16438->16443 16439->16329 16440 96414a RtlFreeHeap 16440->16439 16441 96415c 16440->16441 16442 965d7a _malloc 3 API calls 16441->16442 16442->16439 16443->16439 16443->16440 16445 9691d7 16444->16445 16446 96918c __decode_pointer 16444->16446 16445->16329 16862 96904f 16446->16862 16459 968de0 16448->16459 16450 9648f1 __init_pointers __initp_misc_winsig 16462 9696b6 16450->16462 16453 968d6e __encode_pointer RtlEncodePointer 16454 96492d 16453->16454 16455 968d6e 16454->16455 16456 968d82 __crt_waiting_on_module_handle 16455->16456 16457 968dda 16456->16457 16458 968dd2 RtlEncodePointer 16456->16458 16457->16364 16458->16457 16460 968d6e __encode_pointer RtlEncodePointer 16459->16460 16461 968de7 16460->16461 16461->16450 16463 968d6e __encode_pointer RtlEncodePointer 16462->16463 16464 964923 16463->16464 16464->16453 16468 96c1a1 16465->16468 16467 96c1d7 16467->16379 16467->16381 16468->16467 16469 9641c7 16468->16469 16470 96427a _malloc 16469->16470 16475 9641d9 _malloc 16469->16475 16472 965d7a _malloc 3 API calls 16470->16472 16473 964272 16472->16473 16473->16468 16475->16473 16477 964236 RtlAllocateHeap 16475->16477 16478 964266 16475->16478 16480 96426b 16475->16480 16482 966e77 16475->16482 16491 966ccc 16475->16491 16509 964178 16475->16509 16477->16475 16513 965d7a 16478->16513 16481 965d7a _malloc 3 API calls 16480->16481 16481->16473 16516 96cec3 16482->16516 16484 966e7e 16485 966e8b 16484->16485 16486 96cec3 __set_error_mode 4 API calls 16484->16486 16487 966ccc __NMSG_WRITE 4 API calls 16485->16487 16489 966ead 16485->16489 16486->16485 16488 966ea3 16487->16488 16490 966ccc __NMSG_WRITE 4 API calls 16488->16490 16489->16475 16490->16489 16492 966ce0 16491->16492 16493 966e3b _strlen 16492->16493 16494 96cec3 __set_error_mode 4 API calls 16492->16494 16493->16475 16495 966d02 16494->16495 16495->16493 16496 96cec3 __set_error_mode 4 API calls 16495->16496 16497 966d13 16496->16497 16497->16493 16520 96ce5b 16497->16520 16499 966d47 __invoke_watson 16500 96ce5b _strcpy_s 4 API calls 16499->16500 16501 966d89 __invoke_watson _strlen 16499->16501 16500->16501 16506 966dcc __invoke_watson 16501->16506 16527 96cd12 16501->16527 16503 966df2 __invoke_watson 16505 96cc9e _strcat_s 4 API calls 16503->16505 16507 966e17 __invoke_watson 16505->16507 16534 96cc9e 16506->16534 16541 96cb35 16507->16541 16510 964184 _flsall 16509->16510 16512 96419a ___sbh_alloc_block _flsall _malloc 16510->16512 16554 965fe3 16510->16554 16512->16475 16585 968fbc 16513->16585 16517 96ced2 16516->16517 16518 965d7a _malloc 4 API calls 16517->16518 16519 96cedc __putenv_helper 16517->16519 16518->16519 16519->16484 16521 96ce73 16520->16521 16522 96ce6c 16520->16522 16523 965d7a _malloc 4 API calls 16521->16523 16522->16521 16525 96ce99 16522->16525 16524 96ce78 __putenv_helper 16523->16524 16524->16499 16525->16524 16526 965d7a _malloc 4 API calls 16525->16526 16526->16524 16531 96cd24 16527->16531 16528 96cd28 16529 96cd2d __putenv_helper 16528->16529 16530 965d7a _malloc 4 API calls 16528->16530 16529->16506 16530->16529 16531->16528 16531->16529 16532 96cd6e 16531->16532 16532->16529 16533 965d7a _malloc 4 API calls 16532->16533 16533->16529 16535 96ccb6 16534->16535 16536 96ccaf 16534->16536 16537 965d7a _malloc 4 API calls 16535->16537 16536->16535 16538 96ccea 16536->16538 16539 96ccbb __putenv_helper 16537->16539 16538->16539 16540 965d7a _malloc 4 API calls 16538->16540 16539->16503 16540->16539 16542 968de0 ___crtMessageBoxW RtlEncodePointer 16541->16542 16543 96cb45 16542->16543 16544 96cbe0 __decode_pointer 16543->16544 16545 968d6e __encode_pointer RtlEncodePointer 16543->16545 16544->16493 16546 96cb89 16545->16546 16547 968d6e __encode_pointer RtlEncodePointer 16546->16547 16548 96cb9e 16547->16548 16549 968d6e __encode_pointer RtlEncodePointer 16548->16549 16550 96cbb3 16549->16550 16551 968d6e __encode_pointer RtlEncodePointer 16550->16551 16552 96cbc8 16551->16552 16552->16544 16553 968d6e __encode_pointer RtlEncodePointer 16552->16553 16553->16544 16555 96600a 16554->16555 16556 965ff8 16554->16556 16555->16512 16560 965f20 16556->16560 16558 965ffe 16558->16555 16580 96463e 16558->16580 16561 965f2c _flsall 16560->16561 16562 966e77 __FF_MSGBANNER 4 API calls 16561->16562 16568 965f48 _malloc 16561->16568 16563 965f41 16562->16563 16565 966ccc __NMSG_WRITE 4 API calls 16563->16565 16564 96c198 __malloc_crt 4 API calls 16566 965f6d 16564->16566 16565->16568 16569 965f74 16566->16569 16570 965f83 16566->16570 16567 965f62 _flsall __mtinitlocknum 16567->16558 16568->16564 16568->16567 16572 965d7a _malloc 4 API calls 16569->16572 16571 965fe3 __lock 4 API calls 16570->16571 16573 965f8a 16571->16573 16572->16567 16574 965fbe 16573->16574 16576 965f92 __getstream 16573->16576 16575 9640ea __putenv_helper 4 API calls 16574->16575 16575->16567 16576->16567 16577 9640ea __putenv_helper 4 API calls 16576->16577 16578 965fa9 16577->16578 16579 965d7a _malloc 4 API calls 16578->16579 16579->16567 16581 966e77 __FF_MSGBANNER 4 API calls 16580->16581 16582 964648 16581->16582 16583 966ccc __NMSG_WRITE 4 API calls 16582->16583 16584 964650 __decode_pointer 16583->16584 16584->16555 16586 968fc6 ___set_flsgetvalue 16585->16586 16587 965d7f 16586->16587 16588 96c1dd __calloc_crt 4 API calls 16586->16588 16587->16480 16589 968fe7 __decode_pointer 16588->16589 16589->16587 16590 969020 16589->16590 16591 969008 16589->16591 16592 9640ea __putenv_helper 4 API calls 16590->16592 16593 968ed5 __initptd 4 API calls 16591->16593 16592->16587 16593->16587 16596 96c3c6 16594->16596 16598 96c433 16596->16598 16604 96f98c 16596->16604 16597 96c531 16597->16395 16597->16397 16598->16597 16599 96f98c RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap _parse_cmdline 16598->16599 16599->16598 16601 96d689 16600->16601 16603 96d690 16600->16603 16680 96d4e6 16601->16680 16603->16393 16607 96f939 16604->16607 16610 967122 16607->16610 16611 967135 16610->16611 16615 967182 16610->16615 16618 969035 16611->16618 16615->16596 16616 967162 16616->16615 16636 96d1e1 16616->16636 16619 968fbc __getptd_noexit 4 API calls 16618->16619 16620 96903d 16619->16620 16621 96463e __amsg_exit 4 API calls 16620->16621 16622 96713a 16620->16622 16621->16622 16622->16616 16623 96d94d 16622->16623 16624 96d959 _flsall 16623->16624 16625 969035 __getptd 4 API calls 16624->16625 16626 96d95e 16625->16626 16627 96d98c 16626->16627 16629 96d970 16626->16629 16628 965fe3 __lock 4 API calls 16627->16628 16630 96d993 16628->16630 16631 969035 __getptd 4 API calls 16629->16631 16646 96d90f 16630->16646 16633 96d975 _LocaleUpdate::_LocaleUpdate 16631->16633 16634 96d983 _flsall 16633->16634 16635 96463e __amsg_exit 4 API calls 16633->16635 16634->16616 16635->16634 16637 96d1ed _flsall 16636->16637 16638 969035 __getptd 4 API calls 16637->16638 16639 96d1f2 16638->16639 16640 965fe3 __lock 4 API calls 16639->16640 16644 96d204 _LocaleUpdate::_LocaleUpdate 16639->16644 16641 96d222 16640->16641 16641->16644 16645 9640ea __putenv_helper 4 API calls 16641->16645 16642 96d212 _flsall 16642->16615 16643 96463e __amsg_exit 4 API calls 16643->16642 16644->16642 16644->16643 16645->16644 16647 96d913 ___addlocaleref ___removelocaleref 16646->16647 16648 96d945 16646->16648 16647->16648 16650 96d69e 16647->16650 16648->16633 16651 96d722 16650->16651 16657 96d6b5 16650->16657 16652 96d76f 16651->16652 16653 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16651->16653 16655 96ff8a ___free_lc_time RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16652->16655 16665 96d796 16652->16665 16656 96d743 16653->16656 16654 96d6e9 16659 96d70a 16654->16659 16670 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16654->16670 16658 96d78f 16655->16658 16660 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16656->16660 16657->16651 16657->16654 16663 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16657->16663 16664 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16658->16664 16661 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16659->16661 16666 96d756 16660->16666 16667 96d717 16661->16667 16662 96d7db 16668 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16662->16668 16669 96d6de 16663->16669 16664->16665 16665->16662 16671 9640ea RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap __putenv_helper 16665->16671 16672 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16666->16672 16675 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16667->16675 16676 96d7e1 16668->16676 16677 970164 ___free_lconv_mon RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16669->16677 16673 96d6ff 16670->16673 16671->16665 16674 96d764 16672->16674 16678 97011f ___free_lconv_num RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16673->16678 16679 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16674->16679 16675->16651 16676->16648 16677->16654 16678->16659 16679->16652 16681 96d4f2 _flsall 16680->16681 16682 969035 __getptd 4 API calls 16681->16682 16683 96d4fb 16682->16683 16684 96d1e1 _LocaleUpdate::_LocaleUpdate 4 API calls 16683->16684 16685 96d505 16684->16685 16703 96d285 16685->16703 16688 96c198 __malloc_crt 4 API calls 16689 96d526 16688->16689 16690 96d62f _flsall __setmbcp 16689->16690 16706 96d301 16689->16706 16690->16603 16692 96d549 16693 96d652 16692->16693 16697 96d556 16692->16697 16693->16690 16694 96d665 16693->16694 16695 9640ea __putenv_helper 4 API calls 16693->16695 16696 965d7a _malloc 4 API calls 16694->16696 16695->16694 16696->16690 16698 9640ea __putenv_helper 4 API calls 16697->16698 16699 96d576 16697->16699 16698->16699 16699->16690 16700 965fe3 __lock 4 API calls 16699->16700 16701 96d5a1 16700->16701 16701->16690 16702 9640ea __putenv_helper 4 API calls 16701->16702 16702->16690 16704 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 16703->16704 16705 96d299 16704->16705 16705->16688 16705->16690 16707 96d285 getSystemCP 4 API calls 16706->16707 16710 96d321 _memset __setmbcp_nolock 16707->16710 16708 96d32c setSBCS __crtLCMapStringA_stat 16708->16692 16710->16708 16711 96d04e 16710->16711 16714 96d075 _memset 16711->16714 16718 96d134 __crtLCMapStringA_stat 16714->16718 16719 96ff48 16714->16719 16717 96fd49 ___crtLCMapStringA 4 API calls 16717->16718 16718->16710 16720 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 16719->16720 16721 96ff5b 16720->16721 16729 96fd8e 16721->16729 16723 96d0ef 16724 96fd49 16723->16724 16725 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 16724->16725 16726 96fd5c 16725->16726 16760 96f9a4 16726->16760 16728 96d10f 16728->16717 16730 96fdaf 16729->16730 16731 96fec1 16730->16731 16736 96fdc7 16730->16736 16746 971e2d 16731->16746 16733 96fee5 16734 96ff06 16733->16734 16739 96febb __crtLCMapStringA_stat 16733->16739 16750 971e76 16733->16750 16738 9640ea __putenv_helper 4 API calls 16734->16738 16734->16739 16737 9641c7 _malloc 4 API calls 16736->16737 16736->16739 16741 96fe55 _memset 16736->16741 16737->16741 16738->16739 16739->16723 16741->16739 16742 96df07 16741->16742 16743 96df24 16742->16743 16744 96df13 16742->16744 16743->16739 16744->16743 16745 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16744->16745 16745->16743 16747 971e57 16746->16747 16748 9645b9 ___ansicp RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16747->16748 16749 971e5b __crtLCMapStringA_stat 16747->16749 16748->16749 16749->16733 16751 971f40 __crtLCMapStringA_stat 16750->16751 16752 971eb6 _strlen 16750->16752 16751->16734 16752->16751 16753 9641c7 _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16752->16753 16755 971f18 _memset 16752->16755 16753->16755 16754 971f94 16756 96df07 __crtLCMapStringA_stat RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16754->16756 16755->16751 16755->16754 16757 96c1dd __calloc_crt RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16755->16757 16756->16751 16758 971fd8 16757->16758 16758->16754 16759 9640ea __putenv_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 16758->16759 16759->16754 16761 96f9c5 16760->16761 16762 96fbde 16761->16762 16767 96fa3a 16761->16767 16763 971e2d ___ansicp 4 API calls 16762->16763 16764 96fc06 16763->16764 16765 96fbd5 __crtLCMapStringA_stat 16764->16765 16766 971e76 ___convertcp 4 API calls 16764->16766 16769 96fc56 16764->16769 16765->16728 16775 96fc31 16766->16775 16767->16765 16770 9641c7 _malloc 4 API calls 16767->16770 16777 96fa99 16767->16777 16768 96fd21 16768->16765 16774 9640ea __putenv_helper 4 API calls 16768->16774 16769->16768 16771 9640ea __putenv_helper 4 API calls 16769->16771 16770->16777 16771->16768 16772 96fb14 16773 96df07 __crtLCMapStringA_stat 4 API calls 16772->16773 16773->16765 16774->16765 16775->16765 16775->16769 16776 9641c7 _malloc 4 API calls 16775->16776 16779 96fc6e _memset 16775->16779 16776->16779 16777->16765 16777->16772 16778 9641c7 _malloc 4 API calls 16777->16778 16784 96fb58 16777->16784 16778->16784 16779->16769 16780 96fcc8 16779->16780 16781 971e76 ___convertcp 4 API calls 16779->16781 16782 96df07 __crtLCMapStringA_stat 4 API calls 16780->16782 16781->16780 16782->16769 16783 96df07 __crtLCMapStringA_stat 4 API calls 16783->16772 16784->16772 16784->16783 16786 969509 16785->16786 16787 968d6e __encode_pointer RtlEncodePointer 16786->16787 16788 969521 16786->16788 16787->16786 16788->16416 16792 969464 16789->16792 16791 9694ad 16791->16418 16793 969470 _flsall 16792->16793 16798 9646aa 16793->16798 16797 969481 _flsall __cinit 16797->16791 16799 965fe3 __lock 4 API calls 16798->16799 16800 9646b1 16799->16800 16801 969379 16800->16801 16802 96938d __decode_pointer 16801->16802 16803 969420 16802->16803 16815 96dd44 16802->16815 16803->16797 16805 968d6e __encode_pointer RtlEncodePointer 16806 969415 16805->16806 16809 968d6e __encode_pointer RtlEncodePointer 16806->16809 16807 9693bb 16808 9693df 16807->16808 16814 969407 16807->16814 16822 96c229 16807->16822 16808->16803 16811 96c229 __realloc_crt 4 API calls 16808->16811 16812 9693f5 16808->16812 16809->16803 16811->16812 16812->16803 16813 968d6e __encode_pointer RtlEncodePointer 16812->16813 16813->16814 16814->16805 16816 96dd50 _flsall 16815->16816 16817 96dd60 16816->16817 16819 96dd7d 16816->16819 16818 965d7a _malloc 4 API calls 16817->16818 16821 96dd65 _flsall __msize ___sbh_find_block __putenv_helper 16818->16821 16820 965fe3 __lock 4 API calls 16819->16820 16819->16821 16820->16821 16821->16807 16824 96c232 16822->16824 16825 96c271 16824->16825 16826 9658cf 16824->16826 16825->16808 16827 9658db _flsall 16826->16827 16828 9658e2 16827->16828 16829 9658f0 16827->16829 16830 9641c7 _malloc 4 API calls 16828->16830 16831 9658f7 16829->16831 16832 965903 16829->16832 16837 9658ea _flsall _realloc 16830->16837 16833 9640ea __putenv_helper 4 API calls 16831->16833 16834 965910 6 library calls 16832->16834 16835 965a75 _malloc 16832->16835 16833->16837 16836 965aa8 _malloc 16834->16836 16834->16837 16838 965fe3 __lock 4 API calls 16834->16838 16844 965a5b 16834->16844 16846 965a3e 16834->16846 16835->16836 16835->16837 16840 965acc 16835->16840 16842 965ac2 16835->16842 16839 965d7a _malloc 4 API calls 16836->16839 16837->16824 16838->16834 16839->16837 16840->16837 16841 965d7a _malloc 4 API calls 16840->16841 16841->16837 16843 965d7a _malloc 4 API calls 16842->16843 16843->16837 16844->16837 16845 965d7a _malloc 4 API calls 16844->16845 16845->16837 16847 965d7a _malloc 4 API calls 16846->16847 16847->16837 16849 96478e _flsall 16848->16849 16850 965fe3 __lock 4 API calls 16849->16850 16853 964795 __decode_pointer 16850->16853 16851 96484e _doexit _flsall _malloc __initterm 16851->16425 16852 968de0 RtlEncodePointer ___crtMessageBoxW 16852->16853 16853->16851 16853->16852 16855 96f7ac _flsall 16854->16855 16856 96f7c4 16855->16856 16861 96f7e3 _memset ___sbh_alloc_block _malloc __calloc_impl 16855->16861 16857 965d7a _malloc 3 API calls 16856->16857 16860 96f7c9 _flsall __putenv_helper 16857->16860 16858 96f855 RtlAllocateHeap 16858->16861 16859 965fe3 __lock 3 API calls 16859->16861 16860->16429 16861->16858 16861->16859 16861->16860 16863 96905b _flsall 16862->16863 16864 9640ea __putenv_helper 4 API calls 16863->16864 16865 96915d _flsall 16863->16865 16866 969073 16863->16866 16864->16866 16865->16445 16867 9640ea __putenv_helper 4 API calls 16866->16867 16869 969081 16866->16869 16867->16869 16868 96908f 16871 96909d 16868->16871 16872 9640ea __putenv_helper 4 API calls 16868->16872 16869->16868 16870 9640ea __putenv_helper 4 API calls 16869->16870 16870->16868 16873 9690ab 16871->16873 16874 9640ea __putenv_helper 4 API calls 16871->16874 16872->16871 16875 9690b9 16873->16875 16876 9640ea __putenv_helper 4 API calls 16873->16876 16874->16873 16877 9690c7 16875->16877 16878 9640ea __putenv_helper 4 API calls 16875->16878 16876->16875 16879 9690d8 16877->16879 16880 9640ea __putenv_helper 4 API calls 16877->16880 16878->16877 16881 965fe3 __lock 4 API calls 16879->16881 16880->16879 16884 9690e0 16881->16884 16882 969105 __freefls@4 16883 965fe3 __lock 4 API calls 16882->16883 16888 969119 ___removelocaleref 16883->16888 16884->16882 16885 9640ea __putenv_helper 4 API calls 16884->16885 16885->16882 16886 96914a __freefls@4 16887 9640ea __putenv_helper 4 API calls 16886->16887 16887->16865 16888->16886 16889 96d69e ___freetlocinfo 4 API calls 16888->16889 16889->16886 16942 955b90 16890->16942 16892 950332 ___DllMainCRTStartup 16893 9641c7 _malloc 4 API calls 16892->16893 16894 9503a9 ___DllMainCRTStartup 16893->16894 16949 95a583 16894->16949 16896 9503f2 16897 95a583 ___DllMainCRTStartup 4 API calls 16896->16897 16898 950404 ___DllMainCRTStartup 16897->16898 16901 950415 ___DllMainCRTStartup 16898->16901 17051 959f20 16898->17051 16900 950423 16956 95201f 16900->16956 16901->16900 16902 959f20 ___DllMainCRTStartup 4 API calls 16901->16902 16902->16900 16905 959f20 ___DllMainCRTStartup 4 API calls 16906 950431 ___DllMainCRTStartup 16905->16906 16907 9641c7 _malloc 4 API calls 16906->16907 16908 950458 16907->16908 16909 950468 ___DllMainCRTStartup 16908->16909 16910 959f20 ___DllMainCRTStartup 4 API calls 16908->16910 16911 95a583 ___DllMainCRTStartup 4 API calls 16909->16911 16910->16909 16912 95047b ___DllMainCRTStartup 16911->16912 16962 955a34 16912->16962 16914 950653 16915 9640ea __putenv_helper 4 API calls 16914->16915 16916 95065c 16915->16916 16918 959f20 ___DllMainCRTStartup 4 API calls 16916->16918 16917 959dae RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap ___DllMainCRTStartup 16931 95048d ___DllMainCRTStartup 16917->16931 16919 950662 16918->16919 16919->16351 16920 964326 RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap __snprintf 16920->16931 16927 959f20 RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap ___DllMainCRTStartup 16927->16931 16931->16914 16931->16917 16931->16920 16931->16927 16932 950fe6 InternetOpenA InternetConnectA ___DllMainCRTStartup 16931->16932 16972 951612 16931->16972 16976 9590c6 16931->16976 16992 9577cc 16931->16992 16996 956595 16931->16996 17003 952ecb 16931->17003 17011 955224 16931->17011 17015 954b3f 16931->17015 17023 951207 16931->17023 17042 953716 16931->17042 17055 95175f 16931->17055 16932->16931 16935 9641c7 _malloc 4 API calls 16934->16935 16936 9596a0 _memset 16935->16936 16937 95a583 ___DllMainCRTStartup 4 API calls 16936->16937 16940 9596be ___DllMainCRTStartup 16937->16940 16938 9597ad _memset 16938->16351 16939 9641c7 _malloc 4 API calls 16939->16940 16940->16938 16940->16939 16941 95a583 ___DllMainCRTStartup 4 API calls 16940->16941 16941->16940 16943 9641c7 _malloc 4 API calls 16942->16943 16944 955b9b 16943->16944 16945 9641c7 _malloc 4 API calls 16944->16945 16948 955bb8 _memset ___DllMainCRTStartup 16944->16948 16946 955bab 16945->16946 16947 9640ea __putenv_helper 4 API calls 16946->16947 16946->16948 16947->16948 16948->16892 16950 95a59c 16949->16950 16955 95a5af _memset 16949->16955 16951 95a5a5 16950->16951 16952 95a5b1 16950->16952 16954 9641c7 _malloc 4 API calls 16951->16954 16953 9658cf _realloc 4 API calls 16952->16953 16953->16955 16954->16955 16955->16896 16957 95202a ___DllMainCRTStartup 16956->16957 16961 950428 16957->16961 17058 9594c2 16957->17058 16959 952058 17062 9594e4 16959->17062 16961->16905 16961->16906 16963 955a43 ___DllMainCRTStartup 16962->16963 17262 9592d0 16963->17262 16967 955a88 ___DllMainCRTStartup 17271 9558dd 16967->17271 16969 955b30 _memset ___DllMainCRTStartup 17282 959361 16969->17282 16971 955b7b _memset 16971->16931 16973 95161b ___DllMainCRTStartup 16972->16973 17353 951449 16973->17353 16975 951629 ___DllMainCRTStartup 16975->16931 16977 9590e2 16976->16977 16991 9590db 16976->16991 16978 9641c7 _malloc 4 API calls 16977->16978 16979 9590eb 16978->16979 16980 959100 16979->16980 17395 95ce63 16979->17395 16982 9640ea __putenv_helper 4 API calls 16980->16982 16982->16991 16983 9648ae ___DllMainCRTStartup 4 API calls 16988 95911b ___DllMainCRTStartup 16983->16988 16984 9591cd 16985 9640ea __putenv_helper 4 API calls 16984->16985 16986 9591d5 16985->16986 17405 950fc5 16986->17405 16988->16980 16988->16983 16988->16984 16989 959214 ___DllMainCRTStartup 16988->16989 16990 9640ea __putenv_helper 4 API calls 16989->16990 16990->16991 16991->16931 16993 9577db 16992->16993 16994 95780f _memset 16992->16994 16993->16994 17499 9572d8 16993->17499 16994->16931 18800 9561bc 16996->18800 16999 95659d 17000 9565bc 16999->17000 18808 9564b9 16999->18808 18814 956430 17000->18814 17004 952edd 17003->17004 17006 952f20 17003->17006 17007 952ef4 17004->17007 18820 952de6 17004->18820 17006->16931 17007->17006 17008 952f22 17007->17008 17009 9640ea __putenv_helper 4 API calls 17007->17009 17010 9640ea __putenv_helper 4 API calls 17008->17010 17009->17007 17010->17006 17013 955239 17011->17013 17012 955274 17012->16931 17013->17012 17014 9502d0 ___DllMainCRTStartup 6 API calls 17013->17014 17014->17013 17016 954b4e 17015->17016 17022 954bda 17015->17022 17017 9641c7 _malloc 4 API calls 17016->17017 17018 954b5a ___DllMainCRTStartup 17017->17018 17019 9502d0 ___DllMainCRTStartup 6 API calls 17018->17019 17020 954bc8 _memset 17018->17020 17019->17018 17021 9640ea __putenv_helper 4 API calls 17020->17021 17021->17022 17022->16931 17024 951237 _memset 17023->17024 17025 9513b2 ___DllMainCRTStartup 17024->17025 17026 957251 ___DllMainCRTStartup 4 API calls 17024->17026 17025->16931 17027 951271 17026->17027 17028 964326 __snprintf 4 API calls 17027->17028 17029 95128a 17028->17029 17030 964326 __snprintf 4 API calls 17029->17030 17031 9512a6 ___DllMainCRTStartup 17030->17031 17032 95130b 17031->17032 17033 9512fb 17031->17033 17035 964326 __snprintf 4 API calls 17032->17035 17034 964326 __snprintf 4 API calls 17033->17034 17038 951306 ___DllMainCRTStartup 17034->17038 17035->17038 17036 951371 HttpSendRequestA 17037 9511c0 ___DllMainCRTStartup 4 API calls 17036->17037 17037->17038 17038->17036 17039 9513a8 InternetCloseHandle 17038->17039 17040 9513a6 17038->17040 17039->17040 17041 9572ce ___DllMainCRTStartup 4 API calls 17040->17041 17041->17025 17044 953721 ___DllMainCRTStartup 17042->17044 17043 95375a 17043->16931 17044->17043 18964 953711 17044->18964 17046 953734 18970 95a6e0 17046->18970 17052 959f2a ___DllMainCRTStartup 17051->17052 18980 95a629 17052->18980 17056 9502d0 ___DllMainCRTStartup 6 API calls 17055->17056 17057 95176f 17056->17057 17057->16931 17059 9594d3 17058->17059 17061 9594cf ___DllMainCRTStartup 17058->17061 17069 959461 17059->17069 17061->16959 17063 964326 __snprintf 4 API calls 17062->17063 17064 959532 17063->17064 17065 964326 __snprintf 4 API calls 17064->17065 17067 959544 ___DllMainCRTStartup 17065->17067 17068 95960e _strncmp 17067->17068 17259 9648ae 17067->17259 17068->16961 17076 964326 17069->17076 17071 95947a 17072 964326 __snprintf 4 API calls 17071->17072 17073 9594b4 17072->17073 17087 9645cf 17073->17087 17077 964336 17076->17077 17078 964353 17076->17078 17079 965d7a _malloc 4 API calls 17077->17079 17080 96437f 17078->17080 17081 964362 17078->17081 17085 96433b __putenv_helper 17079->17085 17090 9671a9 17080->17090 17083 965d7a _malloc 4 API calls 17081->17083 17083->17085 17084 9643ad 17084->17085 17105 966fbe 17084->17105 17085->17071 17088 9645b9 17087->17088 17238 968d43 17088->17238 17091 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 17090->17091 17092 967210 17091->17092 17093 967214 17092->17093 17104 967255 __output_l __decode_pointer __aulldvrm _strlen 17092->17104 17126 96a9fe 17092->17126 17094 965d7a _malloc 4 API calls 17093->17094 17096 967219 __crtLCMapStringA_stat __putenv_helper 17094->17096 17096->17084 17098 967e9e RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap __output_l 17098->17104 17099 9640ea __putenv_helper 4 API calls 17099->17104 17100 967ef7 RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap _write_string 17100->17104 17101 96c198 __malloc_crt 4 API calls 17101->17104 17102 967ed1 RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap _write_multi_char 17102->17104 17103 96db45 RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap __cftof 17103->17104 17104->17093 17104->17096 17104->17098 17104->17099 17104->17100 17104->17101 17104->17102 17104->17103 17130 96db62 17104->17130 17106 96a9fe __fileno 4 API calls 17105->17106 17107 966fce 17106->17107 17108 966ff0 17107->17108 17109 966fd9 17107->17109 17111 966ff4 17108->17111 17119 967001 __flsbuf 17108->17119 17110 965d7a _malloc 4 API calls 17109->17110 17121 966fde 17110->17121 17112 965d7a _malloc 4 API calls 17111->17112 17112->17121 17113 967062 17114 9670f1 17113->17114 17115 967071 17113->17115 17116 96a922 __locking 4 API calls 17114->17116 17117 967088 17115->17117 17122 9670a5 17115->17122 17116->17121 17143 96a922 17117->17143 17119->17113 17119->17121 17123 967057 17119->17123 17133 96cf57 17119->17133 17121->17085 17122->17121 17164 96bab5 17122->17164 17123->17113 17140 96cf0e 17123->17140 17127 96aa0d 17126->17127 17129 96aa12 __putenv_helper 17126->17129 17128 965d7a _malloc 4 API calls 17127->17128 17128->17129 17129->17104 17131 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 17130->17131 17132 96db75 17131->17132 17132->17104 17134 96cf64 17133->17134 17135 96cf73 17133->17135 17136 965d7a _malloc 4 API calls 17134->17136 17138 965d7a _malloc 4 API calls 17135->17138 17139 96cf87 __putenv_helper 17135->17139 17137 96cf69 17136->17137 17137->17123 17138->17139 17139->17123 17141 96c198 __malloc_crt 4 API calls 17140->17141 17142 96cf23 17141->17142 17142->17113 17144 96a92e _flsall 17143->17144 17145 96a936 17144->17145 17146 96a951 17144->17146 17190 965d8d 17145->17190 17148 96a95f 17146->17148 17151 96a9a0 17146->17151 17150 965d8d __tsopen_nolock 4 API calls 17148->17150 17153 96a964 17150->17153 17193 96f049 17151->17193 17152 965d7a _malloc 4 API calls 17161 96a943 __locking _flsall __putenv_helper 17152->17161 17155 965d7a _malloc 4 API calls 17153->17155 17155->17161 17156 96a9a6 17157 96a9b3 17156->17157 17158 96a9c9 17156->17158 17197 96a1ef 17157->17197 17160 965d7a _malloc 4 API calls 17158->17160 17162 96a9ce 17160->17162 17161->17121 17163 965d8d __tsopen_nolock 4 API calls 17162->17163 17163->17161 17165 96bac1 _flsall 17164->17165 17166 96bad2 17165->17166 17167 96baee 17165->17167 17169 965d8d __tsopen_nolock 4 API calls 17166->17169 17168 96bafc 17167->17168 17170 96bb1d 17167->17170 17171 965d8d __tsopen_nolock 4 API calls 17168->17171 17172 96bad7 17169->17172 17175 96bb63 17170->17175 17176 96bb3d 17170->17176 17174 96bb01 17171->17174 17173 965d7a _malloc 4 API calls 17172->17173 17185 96badf _flsall __putenv_helper __lseeki64 17173->17185 17178 965d7a _malloc 4 API calls 17174->17178 17177 96f049 ___lock_fhandle 4 API calls 17175->17177 17179 965d8d __tsopen_nolock 4 API calls 17176->17179 17180 96bb69 17177->17180 17178->17185 17181 96bb42 17179->17181 17183 96bb76 17180->17183 17184 96bb92 17180->17184 17182 965d7a _malloc 4 API calls 17181->17182 17182->17185 17230 96ba30 17183->17230 17187 965d7a _malloc 4 API calls 17184->17187 17185->17121 17188 96bb97 17187->17188 17189 965d8d __tsopen_nolock 4 API calls 17188->17189 17189->17185 17191 968fbc __getptd_noexit RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17190->17191 17192 965d92 17191->17192 17192->17152 17194 96f055 _flsall 17193->17194 17195 965fe3 __lock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17194->17195 17196 96f081 ___lock_fhandle _flsall __getstream 17194->17196 17195->17196 17196->17156 17198 96a1fe __ftelli64_nolock 17197->17198 17199 96a257 17198->17199 17200 96a230 17198->17200 17214 96a225 __crtLCMapStringA_stat __putenv_helper 17198->17214 17203 96a2bf 17199->17203 17204 96a299 17199->17204 17201 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17200->17201 17202 96a235 17201->17202 17206 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17202->17206 17205 96a2d3 17203->17205 17208 96ba30 __lseeki64_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17203->17208 17207 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17204->17207 17209 96cf57 __write_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17205->17209 17206->17214 17210 96a29e 17207->17210 17208->17205 17212 96a2de 17209->17212 17211 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17210->17211 17211->17214 17213 969035 __getptd RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17212->17213 17222 96a566 17212->17222 17229 96a2f9 __putwch_nolock 17213->17229 17214->17161 17215 96a8d1 17215->17214 17216 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17215->17216 17217 96a8f4 17216->17217 17219 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17217->17219 17218 96a8a4 17220 96a8c3 17218->17220 17221 96a8af 17218->17221 17219->17214 17224 965da0 __dosmaperr RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17220->17224 17223 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17221->17223 17222->17214 17222->17215 17222->17218 17225 96a8b4 17223->17225 17224->17214 17226 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17225->17226 17226->17214 17227 96db9a __write_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17227->17229 17228 96eeaf RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap __fassign 17228->17229 17229->17222 17229->17227 17229->17228 17231 96efd2 __commit RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17230->17231 17232 96ba4e 17231->17232 17233 96ba56 17232->17233 17236 96ba67 17232->17236 17234 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17233->17234 17235 96ba5b 17234->17235 17235->17185 17236->17235 17237 965da0 __dosmaperr RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17236->17237 17237->17235 17239 968d5c 17238->17239 17242 968b14 17239->17242 17241 968d69 17243 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 17242->17243 17245 968b29 17243->17245 17244 968b3b 17246 965d7a _malloc 4 API calls 17244->17246 17245->17244 17248 968b78 17245->17248 17251 968b40 __putenv_helper 17246->17251 17249 968bbd 17248->17249 17252 96dc4d 17248->17252 17250 965d7a _malloc 4 API calls 17249->17250 17249->17251 17250->17251 17251->17241 17253 967122 _LocaleUpdate::_LocaleUpdate RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17252->17253 17254 96dc61 17253->17254 17255 96db62 __isleadbyte_l RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17254->17255 17258 96dc6e 17254->17258 17256 96dc96 17255->17256 17257 96ff48 ___crtGetStringTypeA RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 17256->17257 17257->17258 17258->17248 17260 964782 _doexit 4 API calls 17259->17260 17261 9648bf 17260->17261 17261->17067 17263 9592e2 ___DllMainCRTStartup 17262->17263 17288 95cd6f 17263->17288 17265 9648ae ___DllMainCRTStartup 4 API calls 17266 9592fe ___DllMainCRTStartup 17265->17266 17266->17265 17267 955a6d 17266->17267 17268 9645da 17267->17268 17269 969035 __getptd 4 API calls 17268->17269 17270 9645e4 17269->17270 17270->16967 17272 955b90 ___DllMainCRTStartup 4 API calls 17271->17272 17273 9558f0 ___DllMainCRTStartup 17272->17273 17274 955932 GetUserNameA 17273->17274 17275 955958 17274->17275 17294 9516c7 17275->17294 17277 95595d ___DllMainCRTStartup _strrchr 17278 964326 __snprintf 4 API calls 17277->17278 17279 955a01 ___DllMainCRTStartup 17278->17279 17301 955bdb 17279->17301 17283 959372 ___DllMainCRTStartup 17282->17283 17311 95c7d5 17283->17311 17285 95939e ___DllMainCRTStartup 17286 9648ae ___DllMainCRTStartup 4 API calls 17285->17286 17287 9593c9 17285->17287 17286->17285 17287->16971 17290 95cd7a ___DllMainCRTStartup 17288->17290 17289 95cd8e 17289->17266 17290->17289 17291 9641c7 _malloc 4 API calls 17290->17291 17292 95cd9d 17291->17292 17292->17289 17293 9640ea __putenv_helper 4 API calls 17292->17293 17293->17289 17307 951638 17294->17307 17296 9516df WSASocketA 17297 9516f4 17296->17297 17298 9516f8 WSAIoctl 17296->17298 17297->17277 17299 95171c closesocket 17298->17299 17299->17297 17302 955be9 ___DllMainCRTStartup 17301->17302 17303 9640ea __putenv_helper 4 API calls 17302->17303 17304 955bf0 17303->17304 17305 9640ea __putenv_helper 4 API calls 17304->17305 17306 955a2e 17305->17306 17306->16969 17308 95164a 17307->17308 17310 95166d ___DllMainCRTStartup 17307->17310 17309 9648ae ___DllMainCRTStartup 4 API calls 17308->17309 17308->17310 17309->17310 17310->17296 17333 95d49d 17311->17333 17315 95c83c ___DllMainCRTStartup 17316 95c963 17315->17316 17317 95c8df 17315->17317 17332 95c845 ___DllMainCRTStartup 17315->17332 17318 9640ea __putenv_helper 4 API calls 17316->17318 17344 95d972 17317->17344 17319 95c96b 17318->17319 17321 95d972 ___DllMainCRTStartup 4 API calls 17319->17321 17322 95c981 17321->17322 17328 95ca35 17322->17328 17329 95c9a2 17322->17329 17322->17332 17324 95c955 17327 9640ea __putenv_helper 4 API calls 17324->17327 17325 95c94a 17326 9640ea __putenv_helper 4 API calls 17325->17326 17326->17332 17327->17332 17330 95d972 ___DllMainCRTStartup 4 API calls 17328->17330 17328->17332 17331 95d972 ___DllMainCRTStartup 4 API calls 17329->17331 17329->17332 17330->17332 17331->17332 17332->17285 17334 95d4ab 17333->17334 17335 95c825 17333->17335 17334->17335 17350 95f9f9 17334->17350 17335->17332 17337 972340 17335->17337 17338 96f7a0 __calloc_impl 4 API calls 17337->17338 17339 97235a 17338->17339 17340 965d7a _malloc 4 API calls 17339->17340 17343 972376 17339->17343 17341 97236d 17340->17341 17342 965d7a _malloc 4 API calls 17341->17342 17341->17343 17342->17343 17343->17315 17345 95c93d 17344->17345 17346 95d983 17344->17346 17345->17324 17345->17325 17346->17345 17347 972340 _calloc 4 API calls 17346->17347 17348 95d9b4 ___DllMainCRTStartup 17347->17348 17348->17345 17349 9640ea __putenv_helper 4 API calls 17348->17349 17349->17345 17351 9641c7 _malloc 4 API calls 17350->17351 17352 95fa05 17351->17352 17352->17334 17354 95148f _memset 17353->17354 17378 957251 17354->17378 17356 95149f 17357 964326 __snprintf 4 API calls 17356->17357 17358 9514b6 ___DllMainCRTStartup 17357->17358 17359 951502 17358->17359 17360 9514f2 17358->17360 17362 964326 __snprintf 4 API calls 17359->17362 17361 964326 __snprintf 4 API calls 17360->17361 17363 9514fd ___DllMainCRTStartup 17361->17363 17362->17363 17364 951537 HttpOpenRequestA 17363->17364 17365 95154c ___DllMainCRTStartup 17364->17365 17382 9572ce 17365->17382 17369 95157b 17370 95158e InternetQueryDataAvailable 17369->17370 17377 951580 17369->17377 17373 95159f 17370->17373 17370->17377 17371 9515b0 InternetReadFile 17372 9515dd 17371->17372 17371->17373 17374 9515e2 InternetCloseHandle 17372->17374 17372->17377 17373->17371 17373->17372 17373->17377 17377->16975 17379 957260 17378->17379 17380 955b90 ___DllMainCRTStartup 4 API calls 17379->17380 17381 957277 ___DllMainCRTStartup 17380->17381 17381->17356 17383 955bdb ___DllMainCRTStartup 4 API calls 17382->17383 17384 951575 17383->17384 17385 9511c0 17384->17385 17386 9511e8 17385->17386 17387 9511ec 17386->17387 17388 9645cf ___DllMainCRTStartup 4 API calls 17386->17388 17387->17369 17389 9511fa 17388->17389 17389->17369 17397 95ce74 ___DllMainCRTStartup 17395->17397 17396 95ce8b 17396->16988 17397->17396 17398 9641c7 _malloc 4 API calls 17397->17398 17399 95ceb0 17398->17399 17399->17396 17409 95dcaf 17399->17409 17401 95cec3 ___DllMainCRTStartup 17404 95ceec 17401->17404 17421 95db6c 17401->17421 17402 9640ea __putenv_helper 4 API calls 17402->17396 17404->17402 17406 950fd1 17405->17406 17438 9502d0 17406->17438 17410 95dcbd ___DllMainCRTStartup 17409->17410 17411 9641c7 _malloc 4 API calls 17410->17411 17418 95dce6 17410->17418 17412 95dcde 17411->17412 17413 9641c7 _malloc 4 API calls 17412->17413 17412->17418 17414 95dcf8 17413->17414 17415 95dd03 17414->17415 17417 95cd6f ___DllMainCRTStartup 4 API calls 17414->17417 17420 95dd34 ___DllMainCRTStartup 17414->17420 17416 9640ea __putenv_helper 4 API calls 17415->17416 17416->17418 17417->17420 17418->17401 17419 9640ea __putenv_helper 4 API calls 17419->17415 17420->17415 17420->17419 17420->17420 17422 95db7d ___DllMainCRTStartup 17421->17422 17423 9641c7 _malloc 4 API calls 17422->17423 17431 95dc8d 17422->17431 17424 95db9d 17423->17424 17425 9641c7 _malloc 4 API calls 17424->17425 17426 95dba6 17425->17426 17427 95dc9c 17426->17427 17428 95dc94 17426->17428 17437 95dbbf 17426->17437 17430 9640ea __putenv_helper 4 API calls 17427->17430 17427->17431 17429 9640ea __putenv_helper 4 API calls 17428->17429 17429->17427 17430->17431 17431->17404 17432 9640ea __putenv_helper 4 API calls 17433 95dc7d 17432->17433 17434 9640ea __putenv_helper 4 API calls 17433->17434 17435 95dc85 17434->17435 17436 9640ea __putenv_helper 4 API calls 17435->17436 17436->17431 17437->17432 17439 9502dd ___DllMainCRTStartup 17438->17439 17440 9502fb 17438->17440 17439->17440 17443 9502e9 17439->17443 17445 950288 17440->17445 17442 9502f7 17442->16991 17452 950e4f 17443->17452 17459 950d24 17445->17459 17449 9640ea __putenv_helper 4 API calls 17451 9502cb 17449->17451 17450 9502c3 17450->17449 17451->17442 17453 950e5e ___DllMainCRTStartup 17452->17453 17454 950e71 17453->17454 17455 950e62 17453->17455 17457 950288 ___DllMainCRTStartup 6 API calls 17454->17457 17482 950d92 17455->17482 17458 950e6d 17457->17458 17458->17442 17460 9641c7 _malloc 4 API calls 17459->17460 17461 950d38 ___DllMainCRTStartup 17460->17461 17462 950d82 17461->17462 17463 950d79 17461->17463 17466 9502a5 17461->17466 17477 95923f 17462->17477 17464 9640ea __putenv_helper 4 API calls 17463->17464 17464->17466 17466->17450 17466->17451 17467 9513c2 17466->17467 17468 9513d5 17467->17468 17472 9513ee 17467->17472 17469 9641c7 _malloc 4 API calls 17468->17469 17471 9513db 17469->17471 17470 951445 17470->17450 17473 95a583 ___DllMainCRTStartup 4 API calls 17471->17473 17472->17470 17474 951207 ___DllMainCRTStartup 6 API calls 17472->17474 17475 95140a 17472->17475 17473->17472 17474->17475 17475->17470 17476 951207 ___DllMainCRTStartup 6 API calls 17475->17476 17476->17470 17479 959253 ___DllMainCRTStartup 17477->17479 17478 95ce63 ___DllMainCRTStartup 4 API calls 17478->17479 17479->17478 17480 9648ae ___DllMainCRTStartup 4 API calls 17479->17480 17481 9592ca 17479->17481 17480->17479 17481->17466 17483 950da5 ___DllMainCRTStartup 17482->17483 17492 950669 17483->17492 17485 950db5 ___DllMainCRTStartup 17486 950288 ___DllMainCRTStartup 6 API calls 17485->17486 17487 950e0f 17486->17487 17495 95074b 17487->17495 17493 9641c7 _malloc 4 API calls 17492->17493 17494 950674 _memset 17493->17494 17494->17485 17500 9572e7 17499->17500 17578 9572f9 ___DllMainCRTStartup 17499->17578 17501 957497 17500->17501 17502 95738c 17500->17502 17503 957591 17500->17503 17504 95759d 17500->17504 17505 95741c 17500->17505 17506 95746c 17500->17506 17507 957404 17500->17507 17508 95734c 17500->17508 17509 957585 17500->17509 17510 957380 17500->17510 17511 95750c 17500->17511 17512 95760c 17500->17512 17513 9575fd 17500->17513 17514 95748b 17500->17514 17515 9572ee 17500->17515 17516 957531 17500->17516 17517 9572fe 17500->17517 17518 9575aa 17500->17518 17519 95753d 17500->17519 17520 95733b 17500->17520 17521 9574bb 17500->17521 17522 957526 17500->17522 17523 9574a3 17500->17523 17524 9574af 17500->17524 17525 95732a 17500->17525 17526 957555 17500->17526 17527 957441 17500->17527 17528 9573d3 17500->17528 17529 9574d3 17500->17529 17530 9573df 17500->17530 17531 957344 17500->17531 17532 9574c7 17500->17532 17533 9573c6 17500->17533 17534 957549 17500->17534 17535 95747f 17500->17535 17536 957579 17500->17536 17537 9575ee 17500->17537 17538 95736e 17500->17538 17539 9573f8 17500->17539 17540 9574fa 17500->17540 17541 957561 17500->17541 17542 957460 17500->17542 17543 95756d 17500->17543 17544 9573eb 17500->17544 17500->17578 17590 9573be 17500->17590 17592 9573a2 17500->17592 17809 953058 17501->17809 17718 95512b 17502->17718 17623 950092 17503->17623 17932 95013a 17504->17932 17762 954f6d 17505->17762 17977 9565f2 17506->17977 17758 954df3 17507->17758 17699 9597c8 17508->17699 17923 956663 17509->17923 17712 953b01 17510->17712 17855 953c95 17511->17855 17964 950a44 17512->17964 17958 953950 17513->17958 17785 95319b 17514->17785 17630 9538ab 17515->17630 17868 95308b 17516->17868 17636 9537f4 17517->17636 17937 95582b 17518->17937 17875 953114 17519->17875 17662 952c43 17520->17662 17840 951e96 17521->17840 17862 9517ae 17522->17862 17817 952f32 17523->17817 17827 953009 17524->17827 17646 951c4e 17525->17646 17882 9518af 17526->17882 17766 953b51 17527->17766 17604 9578fb 17528->17604 17848 9521d3 17529->17848 17738 957821 17530->17738 17695 95181c 17531->17695 17844 95a92b 17532->17844 17727 95a1b7 17533->17727 17617 956a86 17534->17617 17779 951dda 17535->17779 17919 956761 17536->17919 17946 953a0f 17537->17946 17703 955f08 17538->17703 17748 9519ac 17539->17748 17852 95547f 17540->17852 17890 95231b 17541->17890 17772 95a3fe 17542->17772 17905 951b4f 17543->17905 17742 956728 17544->17742 17578->16993 17591 959ff8 17590->17591 17593 955bdb ___DllMainCRTStartup 4 API calls 17590->17593 17591->16993 17594 95a178 17592->17594 17597 95a18c 17592->17597 17593->17591 17986 95a0c8 17594->17986 17598 95a195 ___DllMainCRTStartup 17597->17598 17599 95a1ad 17597->17599 17602 95a0c8 ___DllMainCRTStartup 7 API calls 17598->17602 17993 950f77 17599->17993 17603 95a1a5 ___DllMainCRTStartup 17602->17603 17603->16993 17605 957922 _memset ___DllMainCRTStartup 17604->17605 17606 950669 ___DllMainCRTStartup 4 API calls 17605->17606 17614 95794b ___DllMainCRTStartup 17606->17614 17607 9579c0 17608 95074b ___DllMainCRTStartup 4 API calls 17607->17608 17609 957add 17608->17609 17609->17578 17610 95070c RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap ___DllMainCRTStartup 17610->17614 17612 957a93 FindCloseChangeNotification 17612->17614 17613 957a39 ProcessIdToSessionId 17613->17614 17614->17607 17614->17610 17614->17612 17614->17613 17615 957aab ___DllMainCRTStartup 17614->17615 17996 95788e 17614->17996 17616 9502d0 ___DllMainCRTStartup 6 API calls 17615->17616 17616->17607 17618 956a9b ___DllMainCRTStartup 17617->17618 17619 956ac7 17618->17619 18007 956a47 ProcessIdToSessionId 17618->18007 17619->17578 17624 955b90 ___DllMainCRTStartup 4 API calls 17623->17624 17625 9500a5 ___DllMainCRTStartup 17624->17625 18019 950000 17625->18019 17627 950107 ___DllMainCRTStartup 17628 955bdb ___DllMainCRTStartup 4 API calls 17627->17628 17629 950132 17628->17629 17629->17578 17631 9538b9 _memset 17630->17631 18023 959960 17631->18023 17635 953911 ___DllMainCRTStartup 17635->17578 17637 95380b ___DllMainCRTStartup 17636->17637 17638 95383b 17637->17638 17639 95384f ___DllMainCRTStartup 17637->17639 17640 950f5f ___DllMainCRTStartup 6 API calls 17638->17640 17642 953860 17639->17642 17644 953875 ___DllMainCRTStartup 17639->17644 17641 95384a 17640->17641 17641->17578 17643 950f19 ___DllMainCRTStartup 6 API calls 17642->17643 17643->17641 17645 953fd4 ___DllMainCRTStartup 6 API calls 17644->17645 17645->17641 17647 9641c7 _malloc 4 API calls 17646->17647 17648 951c61 ___DllMainCRTStartup 17647->17648 17651 951c94 17648->17651 17661 951c8e 17648->17661 18115 964be8 17648->18115 17649 9640ea __putenv_helper 4 API calls 17649->17651 17651->17578 17653 951cd5 17654 9640ea __putenv_helper 4 API calls 17653->17654 17655 951cdb 17654->17655 17657 950f19 ___DllMainCRTStartup 6 API calls 17655->17657 17656 951cac ___DllMainCRTStartup 18118 964d61 17656->18118 17657->17651 17659 951cca 18127 964e5a 17659->18127 17661->17649 17663 955b90 ___DllMainCRTStartup 4 API calls 17662->17663 17664 952c56 ___DllMainCRTStartup 17663->17664 17665 964be8 ___DllMainCRTStartup 4 API calls 17664->17665 17666 952c9f 17665->17666 17667 952dce 17666->17667 17668 952cb4 17666->17668 17669 950f30 ___DllMainCRTStartup 6 API calls 17667->17669 18264 9655b3 17668->18264 17670 952dd8 17669->17670 17672 955bdb ___DllMainCRTStartup 4 API calls 17670->17672 17674 952da7 17672->17674 17673 952cbe 18273 965222 17673->18273 17674->17578 17696 951837 _memset _strncpy 17695->17696 17697 956acb ___DllMainCRTStartup 6 API calls 17696->17697 17698 95189f ___DllMainCRTStartup 17696->17698 17697->17698 17698->17578 17700 9597df 17699->17700 17701 955b90 ___DllMainCRTStartup 4 API calls 17700->17701 17702 9597f3 _memset ___DllMainCRTStartup 17700->17702 17701->17702 17702->17578 17704 955f19 ___DllMainCRTStartup 17703->17704 18357 955e84 17704->18357 17706 955f36 17707 955f4f 17706->17707 17708 955f3e 17706->17708 18360 955e08 17707->18360 17709 9502d0 ___DllMainCRTStartup 6 API calls 17708->17709 17711 955f4a 17709->17711 17711->17578 17713 953b13 17712->17713 17714 9538ab ___DllMainCRTStartup 6 API calls 17713->17714 17715 953b2c 17714->17715 17716 9502d0 ___DllMainCRTStartup 6 API calls 17715->17716 17717 953b48 17716->17717 17717->17578 17719 955138 ___DllMainCRTStartup 17718->17719 17722 955146 ___DllMainCRTStartup 17718->17722 17720 9641c7 _malloc 4 API calls 17719->17720 17720->17722 17721 955214 17721->17578 17722->17721 17723 955216 17722->17723 17725 9502d0 ___DllMainCRTStartup 6 API calls 17722->17725 18363 955287 17722->18363 17724 955287 ___DllMainCRTStartup 6 API calls 17723->17724 17724->17721 17725->17722 17728 95a1fd 17727->17728 17729 95a1d1 17727->17729 17728->17578 17732 95a1ee 17729->17732 18367 959fcb 17729->18367 17730 950f5f ___DllMainCRTStartup 6 API calls 17730->17728 17732->17730 17734 95a286 17735 95a007 ___DllMainCRTStartup 5 API calls 17734->17735 17736 95a2b1 17735->17736 17736->17728 17737 9502d0 ___DllMainCRTStartup 6 API calls 17736->17737 17737->17728 17739 957844 ___DllMainCRTStartup 17738->17739 17740 957880 17739->17740 17741 950f5f ___DllMainCRTStartup 6 API calls 17739->17741 17740->17578 17741->17740 17743 956734 17742->17743 17744 95673a 17742->17744 17745 9640ea __putenv_helper 4 API calls 17743->17745 17746 9641c7 _malloc 4 API calls 17744->17746 17745->17744 17747 956745 17746->17747 17747->17578 17749 955b90 ___DllMainCRTStartup 4 API calls 17748->17749 17750 9519bf ___DllMainCRTStartup 17749->17750 17751 951a18 17750->17751 17753 951a5d ___DllMainCRTStartup 17750->17753 17752 955bdb ___DllMainCRTStartup 4 API calls 17751->17752 17757 951a1e ___DllMainCRTStartup 17752->17757 18371 952af0 17753->18371 17755 951a77 ___DllMainCRTStartup 17756 955bdb ___DllMainCRTStartup 4 API calls 17755->17756 17756->17757 17757->17578 17760 954e12 _memset ___DllMainCRTStartup 17758->17760 17759 954ed2 ___DllMainCRTStartup 17759->17578 17760->17759 17761 950f19 ___DllMainCRTStartup 6 API calls 17760->17761 17761->17759 17763 954f89 ___DllMainCRTStartup 17762->17763 18397 954aa4 17763->18397 17767 953b61 17766->17767 17768 9537f4 ___DllMainCRTStartup 6 API calls 17767->17768 17769 953b77 17768->17769 17770 9502d0 ___DllMainCRTStartup 6 API calls 17769->17770 17771 953b93 17770->17771 17771->17578 17773 955b90 ___DllMainCRTStartup 4 API calls 17772->17773 17774 95a411 ___DllMainCRTStartup 17773->17774 17778 95a496 17774->17778 18401 95a2e0 17774->18401 17777 955bdb ___DllMainCRTStartup 4 API calls 17777->17778 17778->17578 17780 951dee ___DllMainCRTStartup 17779->17780 17781 951638 ___DllMainCRTStartup 4 API calls 17780->17781 17782 951e41 ___DllMainCRTStartup 17781->17782 17783 950f77 ___DllMainCRTStartup 6 API calls 17782->17783 17784 951e6f 17782->17784 17783->17784 17784->17578 17786 9641c7 _malloc 4 API calls 17785->17786 17787 9531b2 _memset ___DllMainCRTStartup 17786->17787 17788 950669 ___DllMainCRTStartup 4 API calls 17787->17788 17791 9531f7 ___DllMainCRTStartup _strncmp 17788->17791 17789 95322a 18420 95070c 17789->18420 17791->17789 18413 964937 17791->18413 17794 953254 18425 950f47 17794->18425 17795 95328e 17796 9640ea __putenv_helper 4 API calls 17795->17796 17801 953294 17796->17801 17798 953263 ___DllMainCRTStartup 17800 9502d0 ___DllMainCRTStartup 6 API calls 17798->17800 17799 95070c RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap ___DllMainCRTStartup 17799->17801 17802 95327f 17800->17802 17801->17799 17807 953351 ___DllMainCRTStartup 17801->17807 17803 9640ea __putenv_helper 4 API calls 17802->17803 17804 953288 17803->17804 17805 95074b ___DllMainCRTStartup 4 API calls 17804->17805 17806 95337d 17805->17806 17806->17578 17808 9502d0 ___DllMainCRTStartup 6 API calls 17807->17808 17808->17804 17810 95306e ___DllMainCRTStartup 17809->17810 18435 955d13 17810->18435 17812 953077 18438 965728 17812->18438 17814 95307f 17815 9640ea __putenv_helper 4 API calls 17814->17815 17816 953085 17815->17816 17816->17578 17818 952f47 ___DllMainCRTStartup 17817->17818 17819 950669 ___DllMainCRTStartup 4 API calls 17818->17819 17820 952f55 ___DllMainCRTStartup 17819->17820 17821 95070c ___DllMainCRTStartup 4 API calls 17820->17821 17822 952f80 ___DllMainCRTStartup 17821->17822 17823 9502d0 ___DllMainCRTStartup 6 API calls 17822->17823 17824 952f9c 17823->17824 17825 95074b ___DllMainCRTStartup 4 API calls 17824->17825 17826 952fa5 17825->17826 17826->17578 17828 95301f ___DllMainCRTStartup 17827->17828 17829 955d13 ___DllMainCRTStartup 4 API calls 17828->17829 17830 95302b ___DllMainCRTStartup 17829->17830 17831 953048 17830->17831 17832 95303a 17830->17832 18456 9656f8 17831->18456 18448 957bf2 17832->18448 17835 953046 17837 9640ea __putenv_helper 4 API calls 17835->17837 17839 953054 17837->17839 17839->17578 17841 951eae ___DllMainCRTStartup 17840->17841 17842 951f43 17841->17842 17843 950f47 ___DllMainCRTStartup 6 API calls 17841->17843 17842->17578 17843->17842 17845 95a941 ___DllMainCRTStartup 17844->17845 18482 95a8ae 17845->18482 17847 95a96e 17847->17578 17849 952241 17848->17849 17850 9521e5 17848->17850 17849->17578 17850->17849 17851 959eef ___DllMainCRTStartup 6 API calls 17850->17851 17851->17849 18509 95537d 17852->18509 17856 955b90 ___DllMainCRTStartup 4 API calls 17855->17856 17857 953ca5 ___DllMainCRTStartup 17856->17857 18531 953b9a 17857->18531 17859 953d42 17860 955bdb ___DllMainCRTStartup 4 API calls 17859->17860 17861 953d4b 17860->17861 17861->17578 17863 9746c6 _flsall 17862->17863 17864 965fe3 __lock 4 API calls 17863->17864 17865 9746d9 17864->17865 18544 9744b4 17865->18544 17867 9746e8 _flsall ___DllMainCRTStartup 17867->17578 17869 955b90 ___DllMainCRTStartup 4 API calls 17868->17869 17870 95309e ___DllMainCRTStartup 17869->17870 17871 953106 17870->17871 17874 950f19 ___DllMainCRTStartup 6 API calls 17870->17874 17872 955bdb ___DllMainCRTStartup 4 API calls 17871->17872 17873 95310e 17872->17873 17873->17578 17874->17871 17876 955b90 ___DllMainCRTStartup 4 API calls 17875->17876 17877 953127 ___DllMainCRTStartup 17876->17877 17878 95318d 17877->17878 17881 950f19 ___DllMainCRTStartup 6 API calls 17877->17881 17879 955bdb ___DllMainCRTStartup 4 API calls 17878->17879 17880 953195 17879->17880 17880->17578 17881->17878 17883 9518c8 _memset 17882->17883 17884 955b90 ___DllMainCRTStartup 4 API calls 17883->17884 17885 951902 ___DllMainCRTStartup 17884->17885 17885->17885 17886 956945 ___DllMainCRTStartup 6 API calls 17885->17886 17887 951959 17886->17887 17888 955bdb ___DllMainCRTStartup 4 API calls 17887->17888 17889 95195f ___DllMainCRTStartup 17888->17889 17889->17578 17891 950669 ___DllMainCRTStartup 4 API calls 17890->17891 17892 95232f 17891->17892 17893 95235e 17892->17893 17894 95233a ___DllMainCRTStartup 17892->17894 17896 952395 17893->17896 17897 952375 17893->17897 18773 952123 17894->18773 17899 950f77 ___DllMainCRTStartup 6 API calls 17896->17899 17898 952123 ___DllMainCRTStartup 4 API calls 17897->17898 17901 952354 ___DllMainCRTStartup 17898->17901 17899->17901 17900 9523ba 17902 95074b ___DllMainCRTStartup 4 API calls 17900->17902 17901->17900 17904 9502d0 ___DllMainCRTStartup 6 API calls 17901->17904 17903 9523c6 17902->17903 17903->17578 17904->17900 17906 955b90 ___DllMainCRTStartup 4 API calls 17905->17906 17907 951b62 ___DllMainCRTStartup 17906->17907 17908 964937 ___DllMainCRTStartup 4 API calls 17907->17908 17909 951be8 17908->17909 17910 964937 ___DllMainCRTStartup 4 API calls 17909->17910 17911 951bf3 17910->17911 17912 951c28 17911->17912 17913 951bfb ___DllMainCRTStartup 17911->17913 17914 951a94 ___DllMainCRTStartup 6 API calls 17912->17914 17913->17913 18777 951a94 17913->18777 17917 951c1b ___DllMainCRTStartup 17914->17917 17916 955bdb ___DllMainCRTStartup 4 API calls 17918 951c48 17916->17918 17917->17916 17918->17578 17920 9567af 17919->17920 17921 956773 ___DllMainCRTStartup 17919->17921 17920->17578 17922 95a8ae ___DllMainCRTStartup 6 API calls 17921->17922 17922->17920 17924 95667a ___DllMainCRTStartup 17923->17924 17925 955e84 ___DllMainCRTStartup 4 API calls 17924->17925 17926 956697 17925->17926 17927 9566ba 17926->17927 17929 9566a1 ___DllMainCRTStartup 17926->17929 17928 950f19 ___DllMainCRTStartup 6 API calls 17927->17928 17930 9566b5 17928->17930 17931 955e08 ___DllMainCRTStartup 4 API calls 17929->17931 17930->17578 17931->17930 17933 9641c7 _malloc 4 API calls 17932->17933 17936 950154 _memset ___DllMainCRTStartup 17933->17936 17934 9640ea __putenv_helper 4 API calls 17935 9501d7 17934->17935 17935->17578 17936->17934 17938 95583c ___DllMainCRTStartup 17937->17938 17939 951638 ___DllMainCRTStartup 4 API calls 17938->17939 17940 955873 ___DllMainCRTStartup 17939->17940 17941 955896 17940->17941 17943 9558a8 ___DllMainCRTStartup 17940->17943 17942 950f19 ___DllMainCRTStartup 6 API calls 17941->17942 17944 9558a4 17942->17944 17945 954fb4 ___DllMainCRTStartup 6 API calls 17943->17945 17944->17578 17945->17944 17947 955b90 ___DllMainCRTStartup 4 API calls 17946->17947 17951 953a22 ___DllMainCRTStartup 17947->17951 17948 953a6c 17949 955bdb ___DllMainCRTStartup 4 API calls 17948->17949 17950 953a72 ___DllMainCRTStartup 17949->17950 17950->17578 17951->17948 17952 953a9d 17951->17952 18786 9599a5 17952->18786 17954 953ae8 17955 955bdb ___DllMainCRTStartup 4 API calls 17954->17955 17955->17950 17956 953ab0 ___DllMainCRTStartup 17956->17954 17957 953fd4 ___DllMainCRTStartup 6 API calls 17956->17957 17957->17954 17959 953968 _memset ___DllMainCRTStartup 17958->17959 18791 9599da 17959->18791 17961 9539c7 ___DllMainCRTStartup 17962 953fd4 ___DllMainCRTStartup 6 API calls 17961->17962 17963 9539fd ___DllMainCRTStartup 17961->17963 17962->17963 17963->17578 17965 9641c7 _malloc 4 API calls 17964->17965 17966 950a57 ___DllMainCRTStartup 17965->17966 17969 950bd9 _memset 17966->17969 17972 950c37 17966->17972 17974 950c4a 17966->17974 17976 950c04 17966->17976 18796 9509f7 17966->18796 17967 9640ea __putenv_helper 4 API calls 17968 950c31 17967->17968 17968->17578 17971 954696 ___DllMainCRTStartup 6 API calls 17969->17971 17971->17976 17973 950f8c ___DllMainCRTStartup 6 API calls 17972->17973 17973->17976 17975 950f77 ___DllMainCRTStartup 6 API calls 17974->17975 17975->17976 17976->17967 17978 956609 ___DllMainCRTStartup 17977->17978 17979 956650 17978->17979 17980 955e84 ___DllMainCRTStartup 4 API calls 17978->17980 17979->17578 17981 956632 17980->17981 17982 956655 17981->17982 17983 95663c ___DllMainCRTStartup 17981->17983 17984 950f19 ___DllMainCRTStartup 6 API calls 17982->17984 17985 955e08 ___DllMainCRTStartup 4 API calls 17983->17985 17984->17979 17985->17979 17987 95a007 ___DllMainCRTStartup 5 API calls 17986->17987 17988 95a0e6 ___DllMainCRTStartup 17987->17988 17989 964326 __snprintf 4 API calls 17988->17989 17992 95a13e 17988->17992 17990 95a11a 17989->17990 17991 9502d0 ___DllMainCRTStartup 6 API calls 17990->17991 17991->17992 17992->16993 17994 950e86 ___DllMainCRTStartup 6 API calls 17993->17994 17995 950f87 17994->17995 17995->16993 17997 9578a1 17996->17997 17998 9578a5 17997->17998 18001 95a007 17997->18001 17998->17614 18002 95a014 _memset __ftelli64_nolock 18001->18002 18003 95a04c GetTokenInformation 18002->18003 18004 95a072 18003->18004 18006 9578b9 FindCloseChangeNotification 18003->18006 18005 964326 __snprintf 4 API calls 18004->18005 18004->18006 18005->18006 18006->17614 18008 956a63 18007->18008 18008->17619 18009 950f19 18008->18009 18012 950e86 18009->18012 18013 950669 ___DllMainCRTStartup 4 API calls 18012->18013 18014 950e9d ___DllMainCRTStartup 18013->18014 18015 9502d0 ___DllMainCRTStartup 6 API calls 18014->18015 18016 950f08 18015->18016 18017 95074b ___DllMainCRTStartup 4 API calls 18016->18017 18018 950f14 18017->18018 18018->17619 18020 950011 18019->18020 18021 95006e _memset 18020->18021 18022 9641c7 _malloc 4 API calls 18020->18022 18021->17627 18022->18021 18041 9598fd 18023->18041 18025 959978 18048 956acb 18025->18048 18028 953fd4 18029 953fed ___DllMainCRTStartup 18028->18029 18030 95406d 18029->18030 18065 9546ed 18029->18065 18032 954093 18030->18032 18033 95407c 18030->18033 18034 950669 ___DllMainCRTStartup 4 API calls 18032->18034 18072 953f31 18033->18072 18036 9540a8 ___DllMainCRTStartup 18034->18036 18044 95990d _memset ___DllMainCRTStartup 18041->18044 18042 959916 18051 959865 18042->18051 18044->18042 18045 959935 18044->18045 18046 959865 ___DllMainCRTStartup 4 API calls 18045->18046 18047 95991e ___DllMainCRTStartup 18046->18047 18047->18025 18055 956945 18048->18055 18052 959884 _memset ___DllMainCRTStartup 18051->18052 18053 964326 __snprintf 4 API calls 18052->18053 18054 9598e3 ___DllMainCRTStartup 18053->18054 18054->18047 18058 95684a 18055->18058 18057 95390a 18057->17635 18057->18028 18059 956861 ___DllMainCRTStartup 18058->18059 18060 956868 18059->18060 18063 956873 ___DllMainCRTStartup 18059->18063 18061 952a86 ___DllMainCRTStartup 6 API calls 18060->18061 18064 95686e ___DllMainCRTStartup 18061->18064 18062 952a86 ___DllMainCRTStartup 6 API calls 18062->18064 18063->18062 18063->18064 18064->18057 18066 9546fb ___DllMainCRTStartup 18065->18066 18067 954717 18066->18067 18069 954707 18066->18069 18086 95451c 18067->18086 18082 95444f 18069->18082 18073 953f41 18072->18073 18074 953f4a 18072->18074 18136 964b24 18115->18136 18117 951c9f 18117->17653 18117->17656 18119 964d6d _flsall 18118->18119 18120 964da5 18119->18120 18121 964d85 18119->18121 18126 964d8a _flsall ___DllMainCRTStartup __putenv_helper 18119->18126 18194 969bbd 18120->18194 18122 965d7a _malloc 4 API calls 18121->18122 18122->18126 18126->17659 18128 964e66 _flsall 18127->18128 18129 964e97 18128->18129 18130 964e7a 18128->18130 18132 969bbd __lock_file 4 API calls 18129->18132 18133 964e7f _flsall ___DllMainCRTStartup __putenv_helper 18129->18133 18131 965d7a _malloc 4 API calls 18130->18131 18131->18133 18134 964eaf 18132->18134 18133->17661 18214 964de3 18134->18214 18139 964b30 _flsall 18136->18139 18137 964b43 18138 965d7a _malloc 4 API calls 18137->18138 18150 964b48 _flsall __fsopen __putenv_helper @_EH4_CallFilterFunc@8 18138->18150 18139->18137 18140 964b78 18139->18140 18151 969f64 18140->18151 18142 964b7d 18143 964b84 18142->18143 18144 964b91 18142->18144 18147 965d7a _malloc 4 API calls 18143->18147 18145 964bb8 18144->18145 18146 964b98 18144->18146 18162 969c9b 18145->18162 18148 965d7a _malloc 4 API calls 18146->18148 18147->18150 18148->18150 18150->18117 18152 969f70 _flsall 18151->18152 18153 965fe3 __lock 4 API calls 18152->18153 18158 969f7e __getstream 18153->18158 18154 969ffa 18155 96c198 __malloc_crt 4 API calls 18154->18155 18159 96a004 __getstream 18155->18159 18156 965f20 __mtinitlocknum 4 API calls 18156->18158 18158->18154 18158->18156 18160 969ff3 _flsall __getstream 18158->18160 18180 969bfe 18158->18180 18159->18160 18161 9640ea __putenv_helper 4 API calls 18159->18161 18160->18142 18161->18160 18163 969cbd 18162->18163 18164 969cd1 18163->18164 18172 969cf0 18163->18172 18165 965d7a _malloc 4 API calls 18164->18165 18171 969cd6 __putenv_helper 18165->18171 18166 969ead 18167 969f03 18166->18167 18168 969f1d 18166->18168 18170 965d7a _malloc 4 API calls 18167->18170 18191 96e7b1 18168->18191 18170->18171 18171->18150 18172->18166 18172->18167 18185 96eb80 18172->18185 18181 969c21 18180->18181 18182 969c0b 18180->18182 18181->18158 18183 965fe3 __lock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18182->18183 18184 969c14 18183->18184 18184->18158 18186 96ea16 __mbsnbcmp_l RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18185->18186 18187 969e78 18186->18187 18187->18167 18188 96e9fc 18187->18188 18189 96e7d1 __mbsnbicmp_l RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18188->18189 18192 96e6e5 __sopen_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18191->18192 18195 964dad 18194->18195 18196 969bcf 18194->18196 18198 964bff 18195->18198 18196->18195 18197 965fe3 __lock 4 API calls 18196->18197 18197->18195 18200 964c11 18198->18200 18207 964c22 __putenv_helper 18198->18207 18199 964c1d 18201 965d7a _malloc 4 API calls 18199->18201 18200->18199 18205 964c50 18200->18205 18200->18207 18201->18207 18202 966fbe __flsbuf 4 API calls 18202->18205 18204 96a9fe __fileno 4 API calls 18204->18205 18205->18202 18205->18204 18206 96a922 __locking 4 API calls 18205->18206 18205->18207 18208 96aa30 18205->18208 18206->18205 18207->18126 18209 96aa49 18208->18209 18210 96aa6b 18208->18210 18209->18210 18211 96a9fe __fileno 4 API calls 18209->18211 18210->18205 18215 964df7 18214->18215 18217 964e13 18214->18217 18267 9655bf _flsall 18264->18267 18265 9655cd 18266 965d7a _malloc 4 API calls 18265->18266 18272 9655d2 _flsall _fseek __putenv_helper 18266->18272 18267->18265 18268 9655fb 18267->18268 18269 969bbd __lock_file 4 API calls 18268->18269 18270 965603 18269->18270 18282 965529 18270->18282 18272->17673 18274 96522e _flsall 18273->18274 18275 969bbd __lock_file 4 API calls 18274->18275 18276 965236 18275->18276 18338 964ed6 18276->18338 18283 965549 18282->18283 18284 965539 18282->18284 18286 96555b 18283->18286 18294 96bf8b 18283->18294 18285 965d7a _malloc 4 API calls 18284->18285 18287 96553e 18285->18287 18289 96aa30 __flush 4 API calls 18286->18289 18287->18272 18290 965569 18289->18290 18291 96a9fe __fileno 4 API calls 18290->18291 18292 96559b 18291->18292 18309 96beaf 18292->18309 18295 96bfbe 18294->18295 18296 96bf9e 18294->18296 18297 96a9fe __fileno 4 API calls 18295->18297 18298 965d7a _malloc 4 API calls 18296->18298 18299 96bfc4 18297->18299 18301 96bfa3 __putenv_helper 18298->18301 18300 96beaf __locking 4 API calls 18299->18300 18302 96bfd9 18300->18302 18301->18286 18302->18301 18303 96c04d 18302->18303 18305 96c008 18302->18305 18304 965d7a _malloc 4 API calls 18303->18304 18304->18301 18305->18301 18306 96beaf __locking 4 API calls 18305->18306 18307 96c0a8 18306->18307 18307->18301 18308 96beaf __locking 4 API calls 18307->18308 18308->18301 18310 96bebb _flsall 18309->18310 18311 96bec3 18310->18311 18312 96bede 18310->18312 18313 965d8d __tsopen_nolock 4 API calls 18311->18313 18314 96beec 18312->18314 18318 96bf2d 18312->18318 18316 96bec8 18313->18316 18315 965d8d __tsopen_nolock 4 API calls 18314->18315 18321 96f049 ___lock_fhandle 4 API calls 18318->18321 18339 964ee5 __ftelli64_nolock 18338->18339 18340 96a9fe __fileno 4 API calls 18339->18340 18341 964efb 18340->18341 18342 96bab5 __lseeki64 4 API calls 18341->18342 18343 964f18 18342->18343 18358 951638 ___DllMainCRTStartup 4 API calls 18357->18358 18359 955e97 18358->18359 18359->17706 18361 9641c7 _malloc 4 API calls 18360->18361 18362 955e14 18361->18362 18362->17711 18364 955295 18363->18364 18365 9502d0 ___DllMainCRTStartup 6 API calls 18364->18365 18366 9552aa 18364->18366 18365->18366 18366->17722 18369 959fd4 18367->18369 18368 959ff8 18368->17732 18368->17734 18369->18368 18370 955bdb ___DllMainCRTStartup 4 API calls 18369->18370 18370->18368 18372 955b90 ___DllMainCRTStartup 4 API calls 18371->18372 18373 952b07 _memset ___DllMainCRTStartup 18372->18373 18374 952c0f 18373->18374 18378 950f8c 18373->18378 18375 955bdb ___DllMainCRTStartup 4 API calls 18374->18375 18377 952c3b 18375->18377 18377->17755 18383 964529 18378->18383 18381 950e86 ___DllMainCRTStartup 6 API calls 18382 950fc0 18381->18382 18382->18374 18386 9644a1 18383->18386 18385 950fad 18385->18381 18387 9644ae 18386->18387 18388 9644cb 18386->18388 18390 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18387->18390 18389 9644d8 18388->18389 18391 9644e5 18388->18391 18392 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18389->18392 18395 9644b3 __putenv_helper 18390->18395 18393 9643d5 __vsnprintf_helper RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18391->18393 18392->18395 18394 9644fc 18393->18394 18394->18395 18396 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18394->18396 18395->18385 18396->18395 18400 954ab0 18397->18400 18398 954b3c 18398->17578 18399 9640ea RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap __putenv_helper 18399->18400 18400->18398 18400->18399 18402 959fcb ___DllMainCRTStartup 4 API calls 18401->18402 18403 95a2eb 18402->18403 18404 95a337 18403->18404 18405 95a307 18403->18405 18406 955b90 ___DllMainCRTStartup 4 API calls 18404->18406 18407 950f19 ___DllMainCRTStartup 6 API calls 18405->18407 18409 95a341 ___DllMainCRTStartup 18406->18409 18408 95a315 18407->18408 18408->17777 18410 95a007 ___DllMainCRTStartup 5 API calls 18409->18410 18411 95a3d6 18410->18411 18411->18408 18412 9502d0 ___DllMainCRTStartup 6 API calls 18411->18412 18412->18408 18417 96494b 18413->18417 18414 96494f 18415 964954 __putenv_helper 18414->18415 18416 965d7a _malloc 4 API calls 18414->18416 18415->17789 18416->18415 18417->18414 18418 96499e 18417->18418 18418->18415 18419 965d7a _malloc 4 API calls 18418->18419 18419->18415 18428 96459d 18420->18428 18423 95073f 18423->17794 18423->17795 18424 964529 _vswprintf_s 4 API calls 18424->18423 18426 950e86 ___DllMainCRTStartup 6 API calls 18425->18426 18427 950f5a 18426->18427 18427->17798 18431 964546 18428->18431 18430 95071b 18430->18423 18430->18424 18432 964556 18431->18432 18433 96455b __putenv_helper 18431->18433 18434 965d7a _malloc 4 API calls 18432->18434 18433->18430 18434->18433 18436 9641c7 _malloc 4 API calls 18435->18436 18437 955d23 ___DllMainCRTStartup 18436->18437 18437->17812 18440 965738 18438->18440 18439 965756 18439->17814 18440->18439 18443 965da0 18440->18443 18444 965d8d __tsopen_nolock 4 API calls 18443->18444 18445 965dab _realloc 18444->18445 18446 965d7a _malloc 4 API calls 18445->18446 18447 965750 18446->18447 18447->17814 18461 957b20 18448->18461 18451 96575a 18452 965768 18451->18452 18453 965786 18452->18453 18454 965da0 __dosmaperr 4 API calls 18452->18454 18453->17835 18455 965780 18454->18455 18455->17835 18458 965706 18456->18458 18457 965724 18457->17835 18458->18457 18459 965da0 __dosmaperr 4 API calls 18458->18459 18460 96571e 18459->18460 18460->17835 18462 9641c7 _malloc 4 API calls 18461->18462 18463 957b32 18462->18463 18464 964326 __snprintf 4 API calls 18463->18464 18465 957b43 18464->18465 18466 9640ea __putenv_helper 4 API calls 18465->18466 18471 957b5a 18466->18471 18467 95303f 18467->18451 18468 9641c7 _malloc 4 API calls 18468->18471 18469 964326 __snprintf 4 API calls 18469->18471 18471->18467 18471->18468 18471->18469 18472 9640ea __putenv_helper 4 API calls 18471->18472 18473 957ae3 18471->18473 18472->18471 18474 9641c7 _malloc 4 API calls 18473->18474 18475 957af3 18474->18475 18476 964326 __snprintf 4 API calls 18475->18476 18477 957b07 18476->18477 18478 957b20 ___DllMainCRTStartup 4 API calls 18477->18478 18479 957b13 18478->18479 18480 9640ea __putenv_helper 4 API calls 18479->18480 18481 957b19 18480->18481 18481->18471 18483 951638 ___DllMainCRTStartup 4 API calls 18482->18483 18484 95a8ba 18483->18484 18485 95a8cc 18484->18485 18489 95a76a 18484->18489 18485->17847 18490 9641c7 _malloc 4 API calls 18489->18490 18491 95a776 18490->18491 18492 9641c7 _malloc 4 API calls 18491->18492 18493 95a783 18492->18493 18494 9641c7 _malloc 4 API calls 18493->18494 18495 95a79e 18494->18495 18496 964326 __snprintf 4 API calls 18495->18496 18497 95a7b1 18496->18497 18498 9641c7 _malloc 4 API calls 18497->18498 18499 95a7d0 18498->18499 18500 959eef 18499->18500 18501 959e9a ___DllMainCRTStartup 18500->18501 18502 959f0c 18501->18502 18505 959e76 18501->18505 18502->18485 18506 959e80 18505->18506 18507 959e92 18505->18507 18508 954615 ___DllMainCRTStartup 6 API calls 18506->18508 18507->18485 18508->18507 18510 95538e 18509->18510 18511 9553f5 18510->18511 18512 955419 18510->18512 18515 955402 18511->18515 18516 95540b 18511->18516 18513 955445 ___DllMainCRTStartup 18512->18513 18514 955433 18512->18514 18522 954fb4 18513->18522 18518 950f19 ___DllMainCRTStartup 6 API calls 18514->18518 18517 950f77 ___DllMainCRTStartup 6 API calls 18515->18517 18520 950f19 ___DllMainCRTStartup 6 API calls 18516->18520 18521 955409 18517->18521 18518->18521 18520->18521 18521->17578 18524 954fda _memset 18522->18524 18523 955034 18523->18521 18524->18523 18525 95503c 18524->18525 18526 95502d 18524->18526 18528 9641c7 _malloc 4 API calls 18525->18528 18529 955077 ___DllMainCRTStartup 18525->18529 18527 950f77 ___DllMainCRTStartup 6 API calls 18526->18527 18527->18523 18528->18529 18530 9502d0 ___DllMainCRTStartup 6 API calls 18529->18530 18530->18523 18532 953baa _memset 18531->18532 18533 959960 ___DllMainCRTStartup 6 API calls 18532->18533 18534 953c29 18533->18534 18535 953c85 18534->18535 18536 953fd4 ___DllMainCRTStartup 6 API calls 18534->18536 18535->17859 18538 953c55 ___DllMainCRTStartup 18536->18538 18539 9549e7 18538->18539 18540 9641c7 _malloc 4 API calls 18539->18540 18541 9549f4 18540->18541 18542 964326 __snprintf 4 API calls 18541->18542 18543 954a3d ___DllMainCRTStartup 18542->18543 18543->18535 18545 9744d1 18544->18545 18560 9744c9 __putenv_helper 18544->18560 18546 9744f9 18545->18546 18547 9744d9 18545->18547 18549 9744ff 18546->18549 18551 974557 _strnlen 18546->18551 18548 965d7a _malloc 4 API calls 18547->18548 18548->18560 18579 972c6f 18549->18579 18553 974579 18551->18553 18557 974596 18551->18557 18552 974528 _strlen 18556 96c1dd __calloc_crt 4 API calls 18552->18556 18555 965d7a _malloc 4 API calls 18553->18555 18554 974507 _strnlen 18554->18552 18554->18553 18555->18560 18558 974539 18556->18558 18559 96c1dd __calloc_crt 4 API calls 18557->18559 18558->18560 18562 96ce5b _strcpy_s 4 API calls 18558->18562 18561 9745a2 18559->18561 18560->17867 18561->18560 18564 96ce5b _strcpy_s 4 API calls 18561->18564 18563 97454f 18562->18563 18582 972913 18563->18582 18565 9745b9 18564->18565 18566 96ce5b _strcpy_s 4 API calls 18565->18566 18566->18563 18568 9640ea __putenv_helper 4 API calls 18568->18560 18569 97468e 18570 965d7a _malloc 4 API calls 18569->18570 18570->18560 18571 96c1dd __calloc_crt 4 API calls 18577 97463e _wcslen 18571->18577 18572 9745e3 18572->18560 18572->18569 18572->18571 18578 9745e9 18572->18578 18577->18560 18578->18560 18578->18568 18672 972bb3 18579->18672 18581 972c81 18581->18554 18583 972945 18582->18583 18584 972928 18582->18584 18585 9729a3 18583->18585 18588 972c6f __putenv_helper 4 API calls 18583->18588 18586 965d7a _malloc 4 API calls 18584->18586 18587 965d7a _malloc 4 API calls 18585->18587 18589 97292d __putenv_helper 18586->18589 18587->18589 18590 972958 18588->18590 18589->18572 18590->18585 18591 972984 18590->18591 18677 9728b9 18590->18677 18593 9729e1 18591->18593 18594 9729b6 18591->18594 18596 97299a 18591->18596 18593->18589 18693 972867 18593->18693 18594->18589 18598 96c198 __malloc_crt 4 API calls 18594->18598 18685 9722a9 18596->18685 18673 967122 _LocaleUpdate::_LocaleUpdate 4 API calls 18672->18673 18674 972bc7 18673->18674 18675 965d7a _malloc 4 API calls 18674->18675 18676 972bd5 __mbschr_l __putenv_helper 18674->18676 18675->18676 18676->18581 18678 9728ca 18677->18678 18683 97290a 18677->18683 18679 96c1dd __calloc_crt 4 API calls 18678->18679 18683->18591 18694 972875 18693->18694 18775 952148 ___DllMainCRTStartup 18773->18775 18774 9521ce 18774->17901 18775->18774 18776 95070c ___DllMainCRTStartup 4 API calls 18775->18776 18776->18775 18778 951aac _memset 18777->18778 18779 956acb ___DllMainCRTStartup 6 API calls 18778->18779 18781 951b1c 18779->18781 18780 951b48 18780->17917 18781->18780 18783 9549b8 18781->18783 18784 9549e7 ___DllMainCRTStartup 4 API calls 18783->18784 18785 9549d9 18784->18785 18785->18780 18787 9598fd ___DllMainCRTStartup 4 API calls 18786->18787 18788 9599bd 18787->18788 18789 952af0 ___DllMainCRTStartup 6 API calls 18788->18789 18790 9599d4 18789->18790 18790->17956 18792 9598fd ___DllMainCRTStartup 4 API calls 18791->18792 18793 9599f2 18792->18793 18794 956945 ___DllMainCRTStartup 6 API calls 18793->18794 18795 959a1b 18794->18795 18795->17961 18797 950a16 18796->18797 18798 950a04 18796->18798 18797->18798 18799 950f19 ___DllMainCRTStartup 6 API calls 18797->18799 18798->17966 18799->18798 18801 956421 18800->18801 18802 9561e5 ___DllMainCRTStartup 18800->18802 18801->16999 18802->18801 18803 9502d0 6 API calls ___DllMainCRTStartup 18802->18803 18804 954fb4 ___DllMainCRTStartup 6 API calls 18802->18804 18805 955e08 ___DllMainCRTStartup 4 API calls 18802->18805 18806 950669 ___DllMainCRTStartup 4 API calls 18802->18806 18807 95074b ___DllMainCRTStartup 4 API calls 18802->18807 18803->18802 18804->18802 18805->18802 18806->18802 18807->18802 18809 9564da 18808->18809 18812 9564e4 ___DllMainCRTStartup 18808->18812 18810 9641c7 _malloc 4 API calls 18809->18810 18810->18812 18811 95658e 18811->16999 18812->18811 18813 9502d0 6 API calls ___DllMainCRTStartup 18812->18813 18813->18812 18815 95643e 18814->18815 18819 95645f 18814->18819 18816 9564aa 18815->18816 18817 9640ea __putenv_helper 4 API calls 18815->18817 18815->18819 18818 9640ea __putenv_helper 4 API calls 18816->18818 18817->18815 18818->18819 18819->16931 18821 952df8 18820->18821 18823 952e02 18820->18823 18822 9641c7 _malloc 4 API calls 18821->18822 18822->18823 18824 952e4b 18823->18824 18830 96550c 18823->18830 18826 9502d0 ___DllMainCRTStartup 6 API calls 18824->18826 18827 952e62 18826->18827 18833 952e6f 18827->18833 18839 965476 18830->18839 18832 965524 18832->18823 18834 952e79 18833->18834 18835 952e6a 18833->18835 18836 9502d0 ___DllMainCRTStartup 6 API calls 18834->18836 18835->17004 18837 952e90 18836->18837 18838 964e5a ___DllMainCRTStartup 4 API calls 18837->18838 18838->18835 18840 965482 _flsall 18839->18840 18841 965496 _memset 18840->18841 18842 9654cb 18840->18842 18843 9654b0 __fread_nolock _flsall __putenv_helper 18840->18843 18845 965d7a _malloc 4 API calls 18841->18845 18844 969bbd __lock_file 4 API calls 18842->18844 18843->18832 18846 9654d3 18844->18846 18845->18843 18848 96526c 18846->18848 18849 965298 __putenv_helper 18848->18849 18851 96528a _memset 18848->18851 18849->18843 18850 965293 18852 965d7a _malloc 4 API calls 18850->18852 18851->18849 18851->18850 18854 9652e7 18851->18854 18852->18849 18854->18849 18855 96a9fe __fileno 4 API calls 18854->18855 18859 965405 _memset 18854->18859 18861 965431 _memset 18854->18861 18862 96bd36 18854->18862 18869 96b691 18854->18869 18895 96bc0b 18854->18895 18855->18854 18857 965d7a _malloc 4 API calls 18857->18849 18858 965d7a _malloc 4 API calls 18858->18849 18859->18857 18861->18858 18864 96bd4a _memset 18862->18864 18867 96bd46 __putenv_helper 18862->18867 18863 96bd4f 18865 965d7a _malloc 4 API calls 18863->18865 18864->18863 18866 96bd99 18864->18866 18864->18867 18865->18867 18866->18867 18868 965d7a _malloc 4 API calls 18866->18868 18867->18854 18868->18867 18870 96b69d _flsall 18869->18870 18871 96b6a5 18870->18871 18872 96b6c0 18870->18872 18874 965d8d __tsopen_nolock 4 API calls 18871->18874 18873 96b6ce 18872->18873 18878 96b70f 18872->18878 18875 965d8d __tsopen_nolock 4 API calls 18873->18875 18876 96b6aa 18874->18876 18877 96b6d3 18875->18877 18879 965d7a _malloc 4 API calls 18876->18879 18880 965d7a _malloc 4 API calls 18877->18880 18881 96b730 18878->18881 18882 96b71c 18878->18882 18892 96b6b2 _flsall __putenv_helper __read 18879->18892 18880->18892 18883 96f049 ___lock_fhandle 4 API calls 18881->18883 18884 965d8d __tsopen_nolock 4 API calls 18882->18884 18885 96b736 18883->18885 18886 96b721 18884->18886 18887 96b743 18885->18887 18888 96b759 18885->18888 18889 965d7a _malloc 4 API calls 18886->18889 18913 96b0cf 18887->18913 18891 965d7a _malloc 4 API calls 18888->18891 18889->18892 18893 96b75e 18891->18893 18892->18854 18894 965d8d __tsopen_nolock 4 API calls 18893->18894 18894->18892 18896 96bc1b 18895->18896 18898 96bc38 18895->18898 18897 965d7a _malloc 4 API calls 18896->18897 18907 96bc20 __putenv_helper 18897->18907 18899 96bc6d 18898->18899 18900 96cf0e __getbuf 4 API calls 18898->18900 18898->18907 18901 96a9fe __fileno 4 API calls 18899->18901 18900->18899 18902 96bc81 18901->18902 18903 96b691 __read 4 API calls 18902->18903 18904 96bc88 18903->18904 18905 96a9fe __fileno 4 API calls 18904->18905 18904->18907 18906 96bcab 18905->18906 18906->18907 18908 96a9fe __fileno 4 API calls 18906->18908 18907->18854 18909 96bcb7 18908->18909 18909->18907 18910 96a9fe __fileno 4 API calls 18909->18910 18911 96bcc3 18910->18911 18912 96a9fe __fileno 4 API calls 18911->18912 18912->18907 18914 96b106 18913->18914 18915 96b0eb 18913->18915 18916 96b115 18914->18916 18919 96b13c 18914->18919 18917 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18915->18917 18920 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18916->18920 18918 96b0f0 18917->18918 18921 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18918->18921 18923 96b15b 18919->18923 18931 96b16f 18919->18931 18922 96b11a 18920->18922 18935 96b0f8 __putenv_helper 18921->18935 18925 965d7a _malloc RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18922->18925 18926 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18923->18926 18924 96b1c7 18927 965d8d __tsopen_nolock RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18924->18927 18925->18935 18928 96b160 18926->18928 18931->18924 18933 96b1a3 18931->18933 18934 96b1e8 18931->18934 18931->18935 18933->18924 18943 96b1ae 18933->18943 18936 96c198 __malloc_crt RtlFreeHeap RtlAllocateHeap RtlEncodePointer RtlAllocateHeap 18934->18936 18935->18892 18965 953765 18964->18965 18966 9641c7 _malloc 4 API calls 18965->18966 18969 953799 ___DllMainCRTStartup 18965->18969 18967 953786 18966->18967 18968 95a583 ___DllMainCRTStartup 4 API calls 18967->18968 18968->18969 18969->17046 18971 95a6f0 18970->18971 18972 9640ea __putenv_helper 4 API calls 18971->18972 18974 95a721 18971->18974 18975 95373f 18971->18975 18972->18974 18973 9641c7 _malloc 4 API calls 18973->18975 18974->18973 18976 953410 18975->18976 18977 95341d Sleep 18976->18977 18979 9534b9 18977->18979 18979->16931 18985 95a63b _memset 18980->18985 18986 95a6a5 18980->18986 18981 95a6b6 18983 9640ea __putenv_helper 4 API calls 18981->18983 18984 959f3d 18981->18984 18982 9640ea __putenv_helper 4 API calls 18982->18981 18983->18984 18984->16901 18985->18986 18987 9640ea __putenv_helper 4 API calls 18985->18987 18986->18981 18986->18982 18987->18985 18988 951cf0 18989 951d13 _memset 18988->18989 18990 951d3b 18989->18990 18991 9502d0 ___DllMainCRTStartup 6 API calls 18989->18991 18991->18990 18992 968de0 18993 968d6e __encode_pointer RtlEncodePointer 18992->18993 18994 968de7 18993->18994

        Control-flow Graph

        APIs
        • _memset.LIBCMT ref: 0095148A
        • __snprintf.LIBCMT ref: 009514B1
          • Part of subcall function 00956BFE: _memset.LIBCMT ref: 00956C1F
        • __snprintf.LIBCMT ref: 009514F8
        • __snprintf.LIBCMT ref: 0095150F
        • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,0097C530,00982C58), ref: 0095153E
        • InternetQueryDataAvailable.WININET(00000000,0095052A,00000000,00000000), ref: 00951595
        • InternetReadFile.WININET(00000000,?,00001000,?), ref: 009515C3
        • InternetCloseHandle.WININET(00000000), ref: 009515E3
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: Internet__snprintf$_memset$AvailableCloseDataFileHandleHttpOpenQueryReadRequest
        • String ID:
        • API String ID: 974953942-0
        • Opcode ID: 847400e14561d048305194cb0579304c386d65b0e7c6544cc920beca0a426042
        • Instruction ID: 5b16e795bb93dfe190fbe77987f5f52411a58a2328746e5053a31d077cf6e219
        • Opcode Fuzzy Hash: 847400e14561d048305194cb0579304c386d65b0e7c6544cc920beca0a426042
        • Instruction Fuzzy Hash: CC51BEB2904109BFDF11EFA6EC85EAE7BBCEF84312F104065F915E3261D7309A499B50
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 332 9578fb-957951 call 96bdc0 call 955c0b call 955c24 call 950669 341 957961-957970 call 9522e4 332->341 342 957953-957960 call 9506b9 332->342 348 957972-957979 341->348 349 95797b-957989 call 95cc80 341->349 342->341 350 957992-95799f call 9640d8 348->350 349->350 354 95798b 349->354 356 9579a5-9579be call 9640de 350->356 357 957ad4-957ad8 call 95074b 350->357 354->350 362 9579c0-9579c7 356->362 363 9579cc 356->363 360 957add-957ae2 357->360 362->357 364 9579d2-9579f8 call 9558d2 363->364 369 957a20-957a31 call 95788e 364->369 370 9579fa-957a1e call 95070c 364->370 376 957a33 369->376 377 957a39-957a4b ProcessIdToSessionId 369->377 375 957a93-957aa5 FindCloseChangeNotification call 9640e4 370->375 375->364 383 957aab-957ab5 375->383 376->377 379 957a51-957a5f call 9522e4 377->379 380 957a4d 377->380 385 957a64-957a90 call 95070c 379->385 386 957a61 379->386 380->379 390 957ab7-957ab9 383->390 391 957abb 383->391 385->375 386->385 392 957abd-957acc call 95076e call 95076b call 9502d0 390->392 391->392 398 957ad1 392->398 398->357
        APIs
        • _memset.LIBCMT ref: 0095791D
          • Part of subcall function 00950669: _malloc.LIBCMT ref: 0095066F
        • ProcessIdToSessionId.KERNELBASE(?,?), ref: 00957A43
        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00957A94
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: ChangeCloseFindNotificationProcessSession_malloc_memset
        • String ID:
        • API String ID: 1282648473-0
        • Opcode ID: 6c145d2a6dc79635de235600b62e417d1ff8a067b65ef9adb41ec0202285b371
        • Instruction ID: c6ab5f8f79512e4e7cd5703dc37398bd60a7388c7f65edd39d00f314df2abfc5
        • Opcode Fuzzy Hash: 6c145d2a6dc79635de235600b62e417d1ff8a067b65ef9adb41ec0202285b371
        • Instruction Fuzzy Hash: 99519BB280421DAADF11EBE1DC46FEFBBBCAF44315F104055FA09E2151EB349B999B60
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 399 9558dd-95596e call 955b90 call 955c92 * 5 GetUserNameA call 9516c7 416 955986 399->416 417 955970-95597e call 965790 399->417 419 95598d-955a07 call 950cc5 * 2 call 950ca5 call 950c88 * 4 call 964326 416->419 417->416 421 955980-955984 417->421 439 955a0a-955a0f 419->439 421->416 421->419 439->439 440 955a11-955a16 439->440 441 955a18-955a1a 440->441 442 955a1b-955a33 call 950cd7 call 955bdb 440->442 441->442
        APIs
          • Part of subcall function 00955B90: _malloc.LIBCMT ref: 00955B96
          • Part of subcall function 00955B90: _malloc.LIBCMT ref: 00955BA6
        • GetUserNameA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00955942
          • Part of subcall function 009516C7: WSASocketA.WS2_32(00000002,00000002,00000000,00000000,00000000,00000000,00000100,00000094,00000000), ref: 009516E7
        • _strrchr.LIBCMT ref: 00955975
        • __snprintf.LIBCMT ref: 009559FC
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc$NameSocketUser__snprintf_strrchr
        • String ID:
        • API String ID: 2022469247-0
        • Opcode ID: 674a01701a01fbd1ee52385cc2da891853d5060c52b0094cd44863cc7a4f7bf7
        • Instruction ID: 0f21490a595249f1eece91e77f43ce16e937b065d11758cea1caf116d258795a
        • Opcode Fuzzy Hash: 674a01701a01fbd1ee52385cc2da891853d5060c52b0094cd44863cc7a4f7bf7
        • Instruction Fuzzy Hash: BF41B471C00209EEDF01EFA2DD5AEBEBFB8EF85312F104459F844A6152DB359A48DB50
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: Sleep
        • String ID:
        • API String ID: 3472027048-0
        • Opcode ID: 7a0e62f61d2487343c68d546d0fed2b5e277ec55e342f27ca8efb465afa3f918
        • Instruction ID: a136575cc831b2205bfd7a0ce5e89a42bc4e1012cb315f1381d82b54182e1eef
        • Opcode Fuzzy Hash: 7a0e62f61d2487343c68d546d0fed2b5e277ec55e342f27ca8efb465afa3f918
        • Instruction Fuzzy Hash: 5E418335604645DFCB16CF1AC490969BBF2FF89395B25C06DE89A8B322D231EE45CF50
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: __snprintf$_memset$CloseHandleHttpInternetRequestSend__output_l
        • String ID:
        • API String ID: 4209480158-0
        • Opcode ID: 99d1604c2be465741a6c9526ec8f82e632b444e6c1ddd6caa2dda54f4c78a932
        • Instruction ID: 72a68a269a47e4cdba454dc27f6bd6964bdc9a0a1941f370311f8a6edf7336f0
        • Opcode Fuzzy Hash: 99d1604c2be465741a6c9526ec8f82e632b444e6c1ddd6caa2dda54f4c78a932
        • Instruction Fuzzy Hash: 0041DD72904208AEDF11EFA5DC85FEE7BBDEF48305F0400A5F905B6151E7369A4C9B61
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 99 95031c-95040e call 955b90 call 955c92 * 2 call 959661 call 959638 call 95964a call 959661 * 2 call 9641c7 call 95964a * 3 call 959638 call 959a21 call 95a583 * 2 call 951fc4 134 950415-95041c call 952007 99->134 135 950410 call 959f20 99->135 139 950423-95042a call 95201f 134->139 140 95041e call 959f20 134->140 135->134 144 950431-950461 call 959638 call 95964a call 9641c7 139->144 145 95042c call 959f20 139->145 140->139 153 950463 call 959f20 144->153 154 950468-950495 call 95964a call 95a583 call 95964a call 955a34 144->154 145->144 153->154 164 950653-950668 call 9640ea call 959f20 154->164 165 95049b-9504a0 154->165 167 9504a4-950533 call 959dae call 964326 call 959dae call 964326 * 2 call 950fe6 call 95964a call 951612 165->167 187 950535-950545 call 9590c6 167->187 188 950563-950568 167->188 196 950547-95054c call 9577cc 187->196 197 950556-95055b 187->197 190 9505cd 188->190 191 95056a-950579 call 956595 call 95964a 188->191 193 9505d5-9505e1 call 951119 call 951fc4 190->193 205 950582 191->205 206 95057b-950580 191->206 209 9505e3 call 959f20 193->209 210 9505e8-9505fc call 959dd8 193->210 203 950551-950554 196->203 197->188 203->188 208 950587-95059e call 952ecb call 955224 call 954b3f call 951fc4 205->208 206->208 237 9505a5-9505ab 208->237 238 9505a0 call 95175f 208->238 209->210 216 950603-95060b 210->216 217 9505fe call 959f20 210->217 216->164 220 95060d-950614 216->220 217->216 222 950616-950624 220->222 223 95063f-950640 call 953716 220->223 225 950637 222->225 226 950626 call 9517b7 222->226 229 950645-95064d 223->229 231 950639-95063b 225->231 234 95062b-950635 226->234 229->164 233 9504a2 229->233 231->223 235 95063d 231->235 233->167 234->231 235->223 237->193 239 9505ad-9505c6 call 951119 call 950fe6 call 951207 237->239 238->237 246 9505cb 239->246 246->193
        APIs
          • Part of subcall function 00955B90: _malloc.LIBCMT ref: 00955B96
          • Part of subcall function 00955B90: _malloc.LIBCMT ref: 00955BA6
        • _malloc.LIBCMT ref: 009503A4
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
          • Part of subcall function 0095A583: _malloc.LIBCMT ref: 0095A5AA
          • Part of subcall function 0095A583: _memset.LIBCMT ref: 0095A5D8
          • Part of subcall function 0095A583: _realloc.LIBCMT ref: 0095A5B9
        • _malloc.LIBCMT ref: 00950453
        • __snprintf.LIBCMT ref: 009504BC
        • __snprintf.LIBCMT ref: 009504DA
        • __snprintf.LIBCMT ref: 009504F8
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc$__snprintf$AllocateHeap_memset_realloc
        • String ID:
        • API String ID: 4273617250-0
        • Opcode ID: 8fc3dd14f3656030c8318f7b11c888ce7b2d26418093d251e742a2f8d2feeb7b
        • Instruction ID: b37ebf96c557675555ebd00bb7fbd76b436711b5c4b06ab88076ee52b5782816
        • Opcode Fuzzy Hash: 8fc3dd14f3656030c8318f7b11c888ce7b2d26418093d251e742a2f8d2feeb7b
        • Instruction Fuzzy Hash: 37810871508301AEE620FB779C43F2F76E8AFC4312F104929FE9496192EB75C94D9B52
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 247 95a007-95a06c call 96bbe0 call 96bdc0 * 3 GetTokenInformation 256 95a072-95a092 247->256 257 95a06e-95a070 247->257 259 95a099-95a09b 256->259 258 95a0c4-95a0c7 257->258 259->257 260 95a09d-95a0c3 call 964326 259->260 260->258
        APIs
        • _memset.LIBCMT ref: 0095A02B
        • _memset.LIBCMT ref: 0095A039
        • _memset.LIBCMT ref: 0095A047
        • GetTokenInformation.KERNELBASE(?,00000001,?,00001000,0095A0E6,?,?,?,?,?,0095A0E6,?,?), ref: 0095A064
        • __snprintf.LIBCMT ref: 0095A0B5
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset$InformationToken__snprintf
        • String ID:
        • API String ID: 846195061-0
        • Opcode ID: 33bf412df3de96999e3d4c8063e66a5f9c72fa4b35e860dcc41cc3f142021b6a
        • Instruction ID: 556dde2985a4886e6866479e738501f349d6fabaaf7d295b0965630d7aafdcd1
        • Opcode Fuzzy Hash: 33bf412df3de96999e3d4c8063e66a5f9c72fa4b35e860dcc41cc3f142021b6a
        • Instruction Fuzzy Hash: CA212CF291021CBADB11DAA1DC85EEF77BCFF44744F0444AABA15E2141E674ABC48B64
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        • _malloc.LIBCMT ref: 0095969B
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • _memset.LIBCMT ref: 009596AC
          • Part of subcall function 0095A583: _malloc.LIBCMT ref: 0095A5AA
          • Part of subcall function 0095A583: _memset.LIBCMT ref: 0095A5D8
        • _malloc.LIBCMT ref: 00959735
          • Part of subcall function 0095A583: _realloc.LIBCMT ref: 0095A5B9
        • _memset.LIBCMT ref: 009597B9
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc_memset$AllocateHeap_realloc
        • String ID:
        • API String ID: 3494230449-0
        • Opcode ID: 64eec32d2b91b2f28e81a66abc08dd65487a8aceb81c40b27b75f0678a56d23a
        • Instruction ID: 535e49885e3bfa18ac6107dd7cec7f559aa038fbb8e63810c755a65c5e4483b6
        • Opcode Fuzzy Hash: 64eec32d2b91b2f28e81a66abc08dd65487a8aceb81c40b27b75f0678a56d23a
        • Instruction Fuzzy Hash: C431387241474066E720EF6AEC82FAB73DCDBC8B11F14091FF980D71C2EB65A8888765
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 305 9640ea-9640fb call 966adc 308 964172-964177 call 966b21 305->308 309 9640fd-964104 305->309 310 964106-96411e call 965fe3 call 966016 309->310 311 964149 309->311 322 964120-964128 call 966046 310->322 323 964129-964139 call 964140 310->323 315 96414a-96415a RtlFreeHeap 311->315 315->308 316 96415c-964171 call 965d7a call 965d38 315->316 316->308 322->323 323->308 331 96413b-96413e 323->331 331->315
        APIs
        • __lock.LIBCMT ref: 00964108
          • Part of subcall function 00965FE3: __mtinitlocknum.LIBCMT ref: 00965FF9
          • Part of subcall function 00965FE3: __amsg_exit.LIBCMT ref: 00966005
        • ___sbh_find_block.LIBCMT ref: 00964113
        • ___sbh_free_block.LIBCMT ref: 00964122
        • RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: FreeHeap___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
        • String ID:
        • API String ID: 438813202-0
        • Opcode ID: cdf616f66e1c119cad5b8a44835be8ae233e238ff29a6a42ddb9483889117694
        • Instruction ID: e3fdf6fe38b7dfdec53b56f8f887254535c856b2bd4ec1aefb1add344f4bd6e0
        • Opcode Fuzzy Hash: cdf616f66e1c119cad5b8a44835be8ae233e238ff29a6a42ddb9483889117694
        • Instruction Fuzzy Hash: CE016D3291D605EADB306BF19C0AB5E3BA8AF63361F564118F104A61D1DB3899819A94
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 447 9516c7-9516f2 call 951638 WSASocketA 450 9516f4-9516f6 447->450 451 9516f8-95171a WSAIoctl 447->451 452 95175a-95175e 450->452 453 95171c-951726 451->453 454 951728-95172c 451->454 453->454 455 951750-951757 closesocket 454->455 456 95172e 454->456 455->452 457 951734-951739 456->457 458 951740-951746 457->458 459 95173b-95173e 457->459 458->457 461 951748 458->461 459->458 460 95174a-95174d 459->460 460->455 461->455
        APIs
        • WSASocketA.WS2_32(00000002,00000002,00000000,00000000,00000000,00000000,00000100,00000094,00000000), ref: 009516E7
        • WSAIoctl.WS2_32(00000000,4004747F,00000000,00000000,?,000005F0,?,00000000,00000000), ref: 00951712
        • closesocket.WS2_32(00000000), ref: 00951751
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: IoctlSocketclosesocket
        • String ID:
        • API String ID: 3445158922-0
        • Opcode ID: 6c2667ad27b877b37b29d417545c37299d88cf8ad9c1254b17a8b76e77cd25d5
        • Instruction ID: 6c621c788f2381ae8408b13296cbc1d0311555b6d1c42cdbdf64bc4ff62eccdc
        • Opcode Fuzzy Hash: 6c2667ad27b877b37b29d417545c37299d88cf8ad9c1254b17a8b76e77cd25d5
        • Instruction Fuzzy Hash: 2A11E9316025247BD720CA6A9C49FFF7FADEB897A2F104061FE19D3181D7748D458B60
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 462 955b90-955ba0 call 9641c7 465 955ba2-955ba6 call 9641c7 462->465 466 955bd8-955bda 462->466 468 955bab-955bb0 465->468 469 955bb2-955bbb call 9640ea 468->469 470 955bbd-955bd5 call 96bdc0 call 955c0b 468->470 475 955bd7 469->475 470->475 475->466
        APIs
        • _malloc.LIBCMT ref: 00955B96
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • _malloc.LIBCMT ref: 00955BA6
        • _memset.LIBCMT ref: 00955BC3
          • Part of subcall function 009640EA: __lock.LIBCMT ref: 00964108
          • Part of subcall function 009640EA: ___sbh_find_block.LIBCMT ref: 00964113
          • Part of subcall function 009640EA: ___sbh_free_block.LIBCMT ref: 00964122
          • Part of subcall function 009640EA: RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: Heap_malloc$AllocateFree___sbh_find_block___sbh_free_block__lock_memset
        • String ID:
        • API String ID: 1068809023-0
        • Opcode ID: 57ef8a621da0dce13d4a0f92b1ba4d442abba253126c43550226ad94ad5e9317
        • Instruction ID: 7c7a3a866000d2359f96c2409434822362667b37adb1d01748ed2ce200bb4928
        • Opcode Fuzzy Hash: 57ef8a621da0dce13d4a0f92b1ba4d442abba253126c43550226ad94ad5e9317
        • Instruction Fuzzy Hash: CBE0223B24491937CB2276A6DC12FEF2E1D8FD27B2F220435FE089A542EA55884053E0
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
          • Part of subcall function 009645DA: __getptd.LIBCMT ref: 009645DF
        • _memset.LIBCMT ref: 00955B44
        • _memset.LIBCMT ref: 00955B83
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset$__getptd
        • String ID:
        • API String ID: 2884234864-0
        • Opcode ID: c1c272e5b90634d025e55403de651fb10691064ca5e9acf0b95d427b2422f56c
        • Instruction ID: 35d43b97d03615d5b7d14bcc13e5a2948ff1f8066eba278f5c7359391742f922
        • Opcode Fuzzy Hash: c1c272e5b90634d025e55403de651fb10691064ca5e9acf0b95d427b2422f56c
        • Instruction Fuzzy Hash: CD31D972804208AADB10FBB6ED46F9E3B6C9FC5326F144116FD44E7183DA74C9889765
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 535 950fe6-951026 call 959f88 call 959638 * 2 542 951032-951043 call 959638 535->542 543 951028 535->543 546 951045-951046 542->546 547 951057-951062 call 959661 542->547 543->542 548 95104c-95104d 546->548 549 95110f-951114 546->549 551 951064-95106d InternetOpenA 547->551 552 951106-95110a 548->552 553 951053-951055 548->553 549->551 555 951072-9510c8 InternetConnectA call 959638 551->555 552->551 553->547 553->555 560 9510fd-951105 call 959fa9 555->560 561 9510ca-9510f5 call 959672 call 959661 call 959672 call 959661 555->561 561->560
        APIs
        • InternetOpenA.WININET(00950511,00000003,00000000,00000000,00000000,00000000,0097C524,?,?,00950511,?,?), ref: 00951067
        • InternetConnectA.WININET(?,?,00000000,00000000,00000003,00000000,00982C58,?,?,00950511,?,?), ref: 009510AE
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: Internet$ConnectOpen
        • String ID:
        • API String ID: 2790792615-0
        • Opcode ID: 237a1b5f1cfd8b9eafc8b85e0a22cd1b176e48fe0dcd0b653ba5b3b31018c65f
        • Instruction ID: 968231235aefb6e5714fffbc865643df889066d3251f4aa62e8863d7a82b58c2
        • Opcode Fuzzy Hash: 237a1b5f1cfd8b9eafc8b85e0a22cd1b176e48fe0dcd0b653ba5b3b31018c65f
        • Instruction Fuzzy Hash: FA31C876255745BAEA30A727AD4BFBF2F2CD7C1B12F504025FE00991E1C978498AE724
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • LoadLibraryExA.KERNELBASE(-0000003F,00000000,00000001), ref: 00CE8C7B
        • VirtualAlloc.KERNELBASE(00000000,?,00003000,?,MqtNqt), ref: 00CE8D0C
        Memory Dump Source
        • Source File: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_ce0000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: AllocLibraryLoadVirtual
        • String ID:
        • API String ID: 3550616410-0
        • Opcode ID: ab1574bfb117445310e7799441a9603d0f3f20793018a174e19dd5860c254bed
        • Instruction ID: fe8429f2a1abc52f84398afb4f48b7b0d1d24f144135182de7a06aad5cd65f86
        • Opcode Fuzzy Hash: ab1574bfb117445310e7799441a9603d0f3f20793018a174e19dd5860c254bed
        • Instruction Fuzzy Hash: E431EF71A00609AFDB08CF99C894BAEB7B5FF88310F10C599E9299B294D774EE44CF50
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 573 950000-95000f 574 950011-950014 573->574 575 95004d-950051 573->575 576 950016-950019 574->576 577 950043-95004b 574->577 578 950053-950056 575->578 579 950062-950069 call 9641c7 575->579 580 95001c-950020 576->580 577->574 577->575 581 95008e-950091 578->581 582 950058-950060 578->582 586 95006e-95008d call 96bdc0 579->586 584 950022-950024 580->584 585 95003a-95003c 580->585 582->578 582->579 587 950036-950038 584->587 588 950026-95002c 584->588 589 95003f-950041 585->589 586->581 587->589 588->585 592 95002e-950034 588->592 589->577 589->581 592->580 592->587
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc_memset
        • String ID:
        • API String ID: 4137368368-0
        • Opcode ID: 9c137e4dc65d881f3998a9ebf22c5e3b79cca52d332f885e4ae7ee4b9387def3
        • Instruction ID: 0618ff2eeebaca6fd57cfd846245e84aad42c1cd8c638e50c227410956b52e00
        • Opcode Fuzzy Hash: 9c137e4dc65d881f3998a9ebf22c5e3b79cca52d332f885e4ae7ee4b9387def3
        • Instruction Fuzzy Hash: 801148717522514BD7358A3A8C10BB1B79C9FD3B56F0C41AAEE849B2C2D322DC09C790
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 593 95c7d5-95c82a call 95d49d 596 95c830-95c837 call 972340 593->596 597 95c95f-95c962 593->597 599 95c83c-95c843 596->599 600 95c845-95c84c 599->600 601 95c851-95c8d9 call 95d50e 599->601 602 95ca7b-95caac call 95d4ec 600->602 607 95c963-95c989 call 9640ea call 95d972 601->607 608 95c8df-95c8eb 601->608 602->597 607->602 621 95c98f-95c99c 607->621 609 95c8ed-95c902 608->609 610 95c91f 608->610 613 95c904-95c90f 609->613 614 95c912-95c91b 609->614 612 95c922-95c948 call 95d972 610->612 622 95c955-95c95a call 9640ea 612->622 623 95c94a call 9640ea 612->623 613->614 614->609 617 95c91d 614->617 617->612 629 95ca35-95ca43 621->629 630 95c9a2-95c9b2 621->630 631 95c95b 622->631 627 95c94f-95c950 623->627 627->602 635 95ca45-95ca4c 629->635 636 95ca4e-95ca75 call 95d972 629->636 630->602 637 95c9b8-95ca16 call 95d972 630->637 632 95c95d 631->632 632->597 635->602 636->602 636->631 642 95ca23-95ca30 637->642 643 95ca18-95ca1e 637->643 642->632 643->627
        APIs
        • _calloc.LIBCMT ref: 0095C837
          • Part of subcall function 00972340: __calloc_impl.LIBCMT ref: 00972355
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: __calloc_impl_calloc
        • String ID:
        • API String ID: 2108883976-0
        • Opcode ID: aadc5e003488945b06771028266b66eaebe2b98cc45ca0f9333c1f9bcb874618
        • Instruction ID: e42287e56865183f64d852d244fa58a1f0e534d3127250198b1e6ee6451b8b23
        • Opcode Fuzzy Hash: aadc5e003488945b06771028266b66eaebe2b98cc45ca0f9333c1f9bcb874618
        • Instruction Fuzzy Hash: 38A116B1900208EFDB21CF95CC45EAEBBBAFF89301F204559E941AA261D3B15A54EF60
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 646 9590c6-9590d9 647 9590e2-9590e6 call 9641c7 646->647 648 9590db-9590dd 646->648 651 9590eb-9590f7 647->651 649 95923a-95923e 648->649 652 9590fe 651->652 653 9590f9-9590fd 651->653 654 959100 652->654 655 959109-959120 call 95ce63 652->655 653->652 656 959101 call 9640ea 654->656 661 959122 655->661 662 959129-959136 655->662 660 959106-959107 656->660 660->648 665 959124 call 9648ae 661->665 663 95913d-95913f 662->663 664 959138-95913a 662->664 666 959146-959152 663->666 667 959141-959144 663->667 664->663 665->662 669 959154-95916c call 95cd0f 666->669 670 95918c-959190 666->670 667->656 669->661 676 95916e-95917d call 95cb0f 669->676 670->661 671 959192-95919e call 96abd0 670->671 677 9591a1-9591cb call 955c0b call 955c24 671->677 676->661 682 95917f-959188 call 95cc83 676->682 687 9591cd-9591e4 call 9640ea call 950fc5 677->687 688 9591e9-9591f7 call 955c24 677->688 682->677 689 95918a 682->689 687->660 694 95920d-95920f 688->694 695 9591f9-9591fb 688->695 689->661 694->665 695->694 697 9591fd-95920b call 955c92 695->697 697->694 701 959214-959238 call 96abd0 call 955bfb call 9640ea 697->701 701->649
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc
        • String ID:
        • API String ID: 1579825452-0
        • Opcode ID: 153a2e24ce3526fe7f77a5de785094de474b1814627b0e2b2899f1ab749ca310
        • Instruction ID: ef6b024405d60aee71350421bd82fccedbea78000d66f5bfef27ee3743c09699
        • Opcode Fuzzy Hash: 153a2e24ce3526fe7f77a5de785094de474b1814627b0e2b2899f1ab749ca310
        • Instruction Fuzzy Hash: 3D412836D0462AABEF10FBB6DC45AEE777CEF44355F140922FC11E7182EA3499498790
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 00957114
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID:
        • API String ID: 501242067-0
        • Opcode ID: 6b8b3ed6cb5972614f8c4c7c06f4f707091cd7fd0611f5a4994f55a05dcff567
        • Instruction ID: 849038567d5597ef2b9b6c45c8ec7c6195663e1a7179335574a5c69fe1884768
        • Opcode Fuzzy Hash: 6b8b3ed6cb5972614f8c4c7c06f4f707091cd7fd0611f5a4994f55a05dcff567
        • Instruction Fuzzy Hash: FA31197290C91ABADB11EBFAAC85EBFBA6CDB51356F140056FD04D6141E9348F0893F1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • LoadLibraryA.KERNELBASE(?,?,?,?,?,?,?,?,00CE821A,MqtNqt,?,?,?,?), ref: 00CE8740
        Memory Dump Source
        • Source File: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_ce0000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 5b0a301958f9b14c3ed8f5414731aee123fd3e563d2c63ed9dfabb699d54c5f0
        • Instruction ID: 5d85e69c5f44e4a5e97756284246f80f8d0df528cdec1947a4e536d890d1086a
        • Opcode Fuzzy Hash: 5b0a301958f9b14c3ed8f5414731aee123fd3e563d2c63ed9dfabb699d54c5f0
        • Instruction Fuzzy Hash: 2351A575A00209DFCF08CF99C890AEEB7B2FF88314F148159E919AB395C734AA55CF94
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 009564DF
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID:
        • API String ID: 501242067-0
        • Opcode ID: 881399c16315aee80e1901387c95084612f5d09e0e457e887eb5e4a90b479059
        • Instruction ID: 9623dd0fd5e3834e0856c8c21e3f8f29719463a164d0cbb6fbe2bf045b548f90
        • Opcode Fuzzy Hash: 881399c16315aee80e1901387c95084612f5d09e0e457e887eb5e4a90b479059
        • Instruction Fuzzy Hash: 4121F376804204EFCB20DF90ED45A697775FB0032AF60026DFA11A76A1F3B06E5DEB00
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 00953781
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
          • Part of subcall function 0095A583: _malloc.LIBCMT ref: 0095A5AA
          • Part of subcall function 0095A583: _memset.LIBCMT ref: 0095A5D8
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc$AllocateHeap_memset
        • String ID:
        • API String ID: 3655941445-0
        • Opcode ID: 1c088eab4facbf943462ba58458413e3756e96e0e62599ee15e4fa022353b743
        • Instruction ID: 509264f7fd48c1d51cd0a158e978e78865fbe24117df9b2ebf86b291dfb57a69
        • Opcode Fuzzy Hash: 1c088eab4facbf943462ba58458413e3756e96e0e62599ee15e4fa022353b743
        • Instruction Fuzzy Hash: F20104F1E043009FEB24EF3AAC06B2937A5AB98322F20C61EEA154F3D1E67595089744
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 009513D6
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
          • Part of subcall function 0095A583: _malloc.LIBCMT ref: 0095A5AA
          • Part of subcall function 0095A583: _memset.LIBCMT ref: 0095A5D8
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc$AllocateHeap_memset
        • String ID:
        • API String ID: 3655941445-0
        • Opcode ID: 25c4d652c8cd6cb2ebc280ab24ac96a65720f3d33de003b94062dc893d4ed22f
        • Instruction ID: 0f5fd8a9c3a8450e1634e8d6458e8ddb3eb0ce5795dbc179f77e6dab3fa876c1
        • Opcode Fuzzy Hash: 25c4d652c8cd6cb2ebc280ab24ac96a65720f3d33de003b94062dc893d4ed22f
        • Instruction Fuzzy Hash: AA01DF718142156BDB20EF16DC42F6A379CEB41715F004039FC28EB261E7B1A848CF96
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 00950D33
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID:
        • API String ID: 501242067-0
        • Opcode ID: c35cc7a4560c89a8956fe71e8a123893470b57a4c90d929bbdcd2ff211574565
        • Instruction ID: 250733314518c8fd43627039ce0e8630b663d370b2278b20cd8eacf38c582db1
        • Opcode Fuzzy Hash: c35cc7a4560c89a8956fe71e8a123893470b57a4c90d929bbdcd2ff211574565
        • Instruction Fuzzy Hash: 17F02D36600315ABD701FFEAEC43A9E33689FC1321F004635FC04BB241EA70AC1987A1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset
        • String ID:
        • API String ID: 2102423945-0
        • Opcode ID: 23ff309e8046e796af9dd13b083f41f431b164eabda20d9c4d7b55ebeddf9048
        • Instruction ID: 18202660b8f0b1f332a53b039dd5f892f9c2c482335d1a0eaf475bf465ee6f58
        • Opcode Fuzzy Hash: 23ff309e8046e796af9dd13b083f41f431b164eabda20d9c4d7b55ebeddf9048
        • Instruction Fuzzy Hash: 62F09071900618ABCB11FBA5E4C1A9EF7A8AB44389F008418F99967501D630EA858BE0
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • ProcessIdToSessionId.KERNELBASE(00986E64,?,?,?,?,?,00956AB6), ref: 00956A5D
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: ProcessSession
        • String ID:
        • API String ID: 3779259828-0
        • Opcode ID: 29c3f22be8384834254bc5a24040b08057b5a545b5b25e0ed00d6c08326046b2
        • Instruction ID: 92d24e693af16f237c0c240d1b980311658ab87d44be4ae8b478d6ed6a768ad6
        • Opcode Fuzzy Hash: 29c3f22be8384834254bc5a24040b08057b5a545b5b25e0ed00d6c08326046b2
        • Instruction Fuzzy Hash: F6E01272A24119FF9F00DBE6DD45C9B7BACDA043857804451E902E3100E770FE449BB0
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,00976150,?,?,00957A2D,00000000,00000000), ref: 009578C0
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: ChangeCloseFindNotification
        • String ID:
        • API String ID: 2591292051-0
        • Opcode ID: 5dee72ba5360306976497db3f5f683de985603d8572312bfad0942da5486fa19
        • Instruction ID: 1470bb800ddce9bfad5a4e95c4bd036095da949cfe7776f26b369368c4c60c18
        • Opcode Fuzzy Hash: 5dee72ba5360306976497db3f5f683de985603d8572312bfad0942da5486fa19
        • Instruction Fuzzy Hash: 53E01232604504BBDF115BA6EC09E9ABFADEB44665F104065F90591160E771DE04AB54
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 0095FA00
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID:
        • API String ID: 501242067-0
        • Opcode ID: debf3e481fdb8f6396b9837c79bb90d05f14ccda41c4c5dac5ab2216717bd9f7
        • Instruction ID: a5f6378700fc5df5cbf1cf09d93bade9b613545b671fdb829e45eb9676398173
        • Opcode Fuzzy Hash: debf3e481fdb8f6396b9837c79bb90d05f14ccda41c4c5dac5ab2216717bd9f7
        • Instruction Fuzzy Hash: A4E01A722086014FD728CE2DF850A06A7E19BD5330B21CA3EE4AAD7385E638A4818B04
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset
        • String ID:
        • API String ID: 2102423945-0
        • Opcode ID: ea62511e5b99a32abdabeabc6a7593a38c7ec296b597612a47b8b872f458f4b7
        • Instruction ID: 2c6f66ab4ec652584b9779712ddf118d769d6b784dd7e2df7a70f1bf92be4268
        • Opcode Fuzzy Hash: ea62511e5b99a32abdabeabc6a7593a38c7ec296b597612a47b8b872f458f4b7
        • Instruction Fuzzy Hash: 59E012B5E4420966E760E660AC06B9577AC6B04705F4440B0A948E51C2EAA4A64C4FD1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • VirtualProtect.KERNELBASE(00000000,00000000,00000020,00000004,00000000), ref: 00CE8D4E
        Memory Dump Source
        • Source File: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_ce0000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: c8269323ef5a83853f531880be9aa38fe7d1b7683f8a152e64d76accc3a7c159
        • Instruction ID: 3c2e3cf2c61270f0856e9a38ebadd5071b6b17c14710b6159caa586f64d0b1e9
        • Opcode Fuzzy Hash: c8269323ef5a83853f531880be9aa38fe7d1b7683f8a152e64d76accc3a7c159
        • Instruction Fuzzy Hash: 1AE01A3150024DEBDF18CF45DD44BAA33A8AB44711F00855AF928462D0DB71EF58CBA1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00965AFF,?), ref: 00965DD8
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: CreateHeap
        • String ID:
        • API String ID: 10892065-0
        • Opcode ID: f89f864ebe0ca9a067e93a5a9c3f2e90a37cedae73de392f466b4ae96e6d3aa4
        • Instruction ID: 478d6504e542e9a9ccf79ec42cbb093be6d0fb510ee26d004d145fed5b2b9901
        • Opcode Fuzzy Hash: f89f864ebe0ca9a067e93a5a9c3f2e90a37cedae73de392f466b4ae96e6d3aa4
        • Instruction Fuzzy Hash: C8D05E366687045EDB009FB0BC097223BDC9388395F158436B81DC62A0E671C580EA00
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _memset.LIBCMT ref: 00950759
          • Part of subcall function 009640EA: __lock.LIBCMT ref: 00964108
          • Part of subcall function 009640EA: ___sbh_find_block.LIBCMT ref: 00964113
          • Part of subcall function 009640EA: ___sbh_free_block.LIBCMT ref: 00964122
          • Part of subcall function 009640EA: RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: FreeHeap___sbh_find_block___sbh_free_block__lock_memset
        • String ID:
        • API String ID: 1456850174-0
        • Opcode ID: 15c1970eb93ddb1a3caa8f1eca5c6bda61fc0aae5aa39237ba1e882723eafb69
        • Instruction ID: d0bc7e77fdf3687caa7c28b39240b56e08fceebde10226b8beccc27fc2774bb1
        • Opcode Fuzzy Hash: 15c1970eb93ddb1a3caa8f1eca5c6bda61fc0aae5aa39237ba1e882723eafb69
        • Instruction Fuzzy Hash: 89C0127B400118BBDB113E84DC02F85BBADDF443A0F504865F68856161D66378705BC4
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 0095066F
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID:
        • API String ID: 501242067-0
        • Opcode ID: 9e7fa2cffc3bb24a1e6c49ee293ca53403134d5182beaa2c90c2b47ff901bd3e
        • Instruction ID: 01ddcc067e5203941195214bca77b4e42de23c860faec2d1137a7c0fb7bc2f53
        • Opcode Fuzzy Hash: 9e7fa2cffc3bb24a1e6c49ee293ca53403134d5182beaa2c90c2b47ff901bd3e
        • Instruction Fuzzy Hash: 25C08C3420800CEB8B00EE09E8419E83BD5DB88330B20C211F8188B201CB31E9108780
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • __encode_pointer.LIBCMT ref: 00968DE2
          • Part of subcall function 00968D6E: RtlEncodePointer.NTDLL(00000000,?,00968DE7,00000000,0096CB45,00982368,00000000,00000314,?,00966E3B,00982368,009768D8,00012010), ref: 00968DD5
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: EncodePointer__encode_pointer
        • String ID:
        • API String ID: 4150071819-0
        • Opcode ID: d29b32b9eab8e64a0bda7a974a2b381a4f79c11be675db21c4d5de063e3b153b
        • Instruction ID: 9ae6dc97731d3fb14e9205b51d61060dbc4f248d34ef3fda82de0adf7abfb80d
        • Opcode Fuzzy Hash: d29b32b9eab8e64a0bda7a974a2b381a4f79c11be675db21c4d5de063e3b153b
        • Instruction Fuzzy Hash:
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00957C8A
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: FreeVirtual
        • String ID:
        • API String ID: 1263568516-0
        • Opcode ID: c7f06918df19dc2d4c0117cbe0aa34a6c48908ae5dcd1c42117e8f9bf69a8362
        • Instruction ID: dc741233ce33791f44af4ea4f6a21c26bae044782bcad975a5c0e0bc8932b204
        • Opcode Fuzzy Hash: c7f06918df19dc2d4c0117cbe0aa34a6c48908ae5dcd1c42117e8f9bf69a8362
        • Instruction Fuzzy Hash: 8F11C431919516DADB20DBA7ED09FAEB76CAF50313F004025EC459B250C774DE89CB90
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: $<
        • API String ID: 0-428540627
        • Opcode ID: 4a6f916157f3da5f80178d3e441a16be348a6fb1c115ed379150304907fb6fe5
        • Instruction ID: 970c7e8c9aedbda0d8e947c173232e332abe48b7ea81f60ef837a51502037b07
        • Opcode Fuzzy Hash: 4a6f916157f3da5f80178d3e441a16be348a6fb1c115ed379150304907fb6fe5
        • Instruction Fuzzy Hash: 6C52E675A101598FDB08CF69C491AADBBF1FF8D300F14C16AE869AB352C234E951DFA4
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f9c8b86c6f0e0dab19f68a553a2793d1e67c4fd9ffb8b7c4239a43fe2d3ff925
        • Instruction ID: 1c28aabd61e6b79090ca608871ca72d42f8fa07c0cc144115f73a75028b24b22
        • Opcode Fuzzy Hash: f9c8b86c6f0e0dab19f68a553a2793d1e67c4fd9ffb8b7c4239a43fe2d3ff925
        • Instruction Fuzzy Hash: 6B1293329241598FDB04CF5DDC91ABDBBF1EF89301F04816EE45A9B386CA38EA51DB50
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ba2827441a2985acdda857e11d7a724694a3913d8208f2b2534b9cb1d1f917e9
        • Instruction ID: 7f5da0fca8ca30297a79da30ff387954528b2756220efec329bfa41d013569ef
        • Opcode Fuzzy Hash: ba2827441a2985acdda857e11d7a724694a3913d8208f2b2534b9cb1d1f917e9
        • Instruction Fuzzy Hash: 681270729241598FDB04CF5DD8919BDBBF1FF89300F44816EE45AAB382C638E651DBA0
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_ce0000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 66815fa4e515433c11deb6288a89f5de42c04bc31794f64a68d3cfb98a76f997
        • Instruction ID: d54acbd0041cb7c135afdd46b0c1833fd18c7db2e20e4d0c81eb0b5080d6b305
        • Opcode Fuzzy Hash: 66815fa4e515433c11deb6288a89f5de42c04bc31794f64a68d3cfb98a76f997
        • Instruction Fuzzy Hash: 5E91BD74E0024ADFCF08CF8AC5909AEBBB2FF89304F248159D911AB315D335AA81DF95
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000003.364898115.0000000000CE0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_ce0000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 66815fa4e515433c11deb6288a89f5de42c04bc31794f64a68d3cfb98a76f997
        • Instruction ID: 2385b6a33c30ee59305e86fb34b8a6509b016e5a60d670ff78424064b7576947
        • Opcode Fuzzy Hash: 66815fa4e515433c11deb6288a89f5de42c04bc31794f64a68d3cfb98a76f997
        • Instruction Fuzzy Hash: 4D91E2B4E0125ACFCF08CF8AC5909AEBBB1FF48304F249159D9256B355DB30AA81DF94
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7a0e62f61d2487343c68d546d0fed2b5e277ec55e342f27ca8efb465afa3f918
        • Instruction ID: c0658f7755aa43e4c952f04d92d50bfba0bbd6772f3d9885dd6b7fdb2db87bc2
        • Opcode Fuzzy Hash: 7a0e62f61d2487343c68d546d0fed2b5e277ec55e342f27ca8efb465afa3f918
        • Instruction Fuzzy Hash: A841B135600605EFCB29CF1AC881969BBF1FF99391B25C06DE89A8B312D231EE45CF50
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc
        • String ID:
        • API String ID: 1579825452-0
        • Opcode ID: 36e2f2970d59d14bb87350f8da8d52a4133872369c87b790d7f43cc734b49a18
        • Instruction ID: 59e4f34ab9e5c7847a70f461add3809fc938860921c49d708c3918aae56ad7ae
        • Opcode Fuzzy Hash: 36e2f2970d59d14bb87350f8da8d52a4133872369c87b790d7f43cc734b49a18
        • Instruction Fuzzy Hash: E8413C76E00209AFDB04DFA9C881AEEF7F5FF88310F198569E916E7345D634AA01CB50
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: __time64$_strtok$__aulldiv__getptd_malloc_strncpy
        • String ID:
        • API String ID: 3363204686-0
        • Opcode ID: 7b65f05cf34a9d0fc2407498d2a3910b1aadeee8d0f19b68bc424009feaf14aa
        • Instruction ID: 31c7516f57a7920370786e0a6a1c3e6d245a2cc8bc6c9be381f8c767b7a6508b
        • Opcode Fuzzy Hash: 7b65f05cf34a9d0fc2407498d2a3910b1aadeee8d0f19b68bc424009feaf14aa
        • Instruction Fuzzy Hash: 675135B4828244DFDB14DF6AED805687BB9F789312710813EF8998B3A5D7319985FF40
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
        • String ID:
        • API String ID: 3886058894-0
        • Opcode ID: f2748b9ac05738f6bab804d0fbd8377ff57ac150031be4a8a054e13d07a47c2c
        • Instruction ID: cb3ce234b2374afbc0fcc10ec540514b7b4e9fdd9df0fdca2444223986949383
        • Opcode Fuzzy Hash: f2748b9ac05738f6bab804d0fbd8377ff57ac150031be4a8a054e13d07a47c2c
        • Instruction Fuzzy Hash: B4513B70900A04EFCB209F69CC44A9EBB79FF81360F268659F835962E1E7708D91CF50
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 0095A771
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • _malloc.LIBCMT ref: 0095A77E
        • _malloc.LIBCMT ref: 0095A799
        • __snprintf.LIBCMT ref: 0095A7AC
        • _malloc.LIBCMT ref: 0095A7CB
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _malloc$AllocateHeap__snprintf
        • String ID:
        • API String ID: 3929630252-0
        • Opcode ID: 993604a9dc949f59d7f4c63abfcd3a106d42731049c70ffccc7d6fc596819893
        • Instruction ID: ec9907addf20d787abba3400cf6b70563cfd4139583cd873b77388967c319552
        • Opcode Fuzzy Hash: 993604a9dc949f59d7f4c63abfcd3a106d42731049c70ffccc7d6fc596819893
        • Instruction Fuzzy Hash: 640181719443056FD710AFB9DC85E97BFECEFA5750F00892AF499CB201DAB4E9448B90
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • __flush.LIBCMT ref: 00964CC3
        • __fileno.LIBCMT ref: 00964CE3
        • __locking.LIBCMT ref: 00964CEA
        • __flsbuf.LIBCMT ref: 00964D15
          • Part of subcall function 00965D7A: __getptd_noexit.LIBCMT ref: 00965D7A
          • Part of subcall function 00967E78: __decode_pointer.LIBCMT ref: 00967E83
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
        • String ID:
        • API String ID: 3240763771-0
        • Opcode ID: 4f33f4342aa81be682ee8529de8ddf7a9f1dcf969045443942705e403fed9378
        • Instruction ID: 6efee52ecca6b41e3ad79e62de3e245903b958f8f5952ad15ffdd7ac74e1f01c
        • Opcode Fuzzy Hash: 4f33f4342aa81be682ee8529de8ddf7a9f1dcf969045443942705e403fed9378
        • Instruction Fuzzy Hash: DB41F431A01608EFDB25DFE9C89059EB7BAEF81360F248529E4A597280D738EE41DF40
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset$_malloc
        • String ID:
        • API String ID: 3506388080-0
        • Opcode ID: 2f92d887f2d134bd95751f297887a598e42eebdff739c37b0882c938ca475765
        • Instruction ID: 9b82dbfa81a7887dfd0a17757585543602b309b3eb8402254f13ea71a8346be6
        • Opcode Fuzzy Hash: 2f92d887f2d134bd95751f297887a598e42eebdff739c37b0882c938ca475765
        • Instruction Fuzzy Hash: 51418BB6504108BEEB10ABA6DC46FBF77BCEF49746F000465FA04E5091EB35898ADB35
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 00957B2D
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • __snprintf.LIBCMT ref: 00957B3E
          • Part of subcall function 009640EA: __lock.LIBCMT ref: 00964108
          • Part of subcall function 009640EA: ___sbh_find_block.LIBCMT ref: 00964113
          • Part of subcall function 009640EA: ___sbh_free_block.LIBCMT ref: 00964122
          • Part of subcall function 009640EA: RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        • _malloc.LIBCMT ref: 00957B8A
        • __snprintf.LIBCMT ref: 00957B9F
          • Part of subcall function 00957AE3: _malloc.LIBCMT ref: 00957AEE
          • Part of subcall function 00957AE3: __snprintf.LIBCMT ref: 00957B02
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: __snprintf_malloc$Heap$AllocateFree___sbh_find_block___sbh_free_block__lock
        • String ID:
        • API String ID: 4161344415-0
        • Opcode ID: c8c6b3293334bb382d3faaf71b05c466dc3e49b72d67cfda6a27c0f61f07f4fc
        • Instruction ID: 43eb054e8e1e62d7e15f2e25e4f93c52962751b96a76ca9ec1c2c3dd0b3aaaf0
        • Opcode Fuzzy Hash: c8c6b3293334bb382d3faaf71b05c466dc3e49b72d67cfda6a27c0f61f07f4fc
        • Instruction Fuzzy Hash: C721C572504208BBDF209FA29C46FAF7B6DEF81365F148428FC0866151DB719E51AB60
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _malloc.LIBCMT ref: 0095014F
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • _memset.LIBCMT ref: 009501A4
        • _memset.LIBCMT ref: 009501B3
        • _memset.LIBCMT ref: 009501CA
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset$AllocateHeap_malloc
        • String ID:
        • API String ID: 1114209484-0
        • Opcode ID: 22f3c3891bce931a9dc319434fc9fc930d6ca07cbc7726e236a8a0b8d9551c46
        • Instruction ID: 294a340803925ada46f1e5e36d28e835b4021fde07c11cbe3444380eadf4955c
        • Opcode Fuzzy Hash: 22f3c3891bce931a9dc319434fc9fc930d6ca07cbc7726e236a8a0b8d9551c46
        • Instruction Fuzzy Hash: EF1138716085457AC7109A768CC1BBABB6EDFD3365F100464FC48C7242E3229D08C3A1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _strtok$__getptd_malloc_strncpy
        • String ID:
        • API String ID: 4272429445-0
        • Opcode ID: 0ace3528247c038aaf92b704caa31bf6923abbd2253e2e07697b6bb62e1c92e1
        • Instruction ID: 9d03904d7b484a5d2db95477eb27479817180d01ec65367daa7fad92342dcb81
        • Opcode Fuzzy Hash: 0ace3528247c038aaf92b704caa31bf6923abbd2253e2e07697b6bb62e1c92e1
        • Instruction Fuzzy Hash: FB11B435428601DFFB14DF75FC557623B68EB063A5F100129F8168B3A2EB72A419DB50
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _memset
        • String ID:
        • API String ID: 2102423945-0
        • Opcode ID: ed311939cc9a49e2de4e6a82aa761562895308bf8390fcf2868e974f03cadcdc
        • Instruction ID: e29ff51b236c585035f485837ada7b99b11c808eaedce3458ad1ff50d97287a4
        • Opcode Fuzzy Hash: ed311939cc9a49e2de4e6a82aa761562895308bf8390fcf2868e974f03cadcdc
        • Instruction Fuzzy Hash: 6301C8B1100204BADB10AB73DC85FAF3B6DEF863A1F014425FE099A143E7759854D7B1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _clock
        • String ID:
        • API String ID: 876827150-0
        • Opcode ID: c918077cbdba4abde34237b4b82c4e35b187e0ff10ad7a8b9c4aa903bd7d21b7
        • Instruction ID: 0043c882f19371fb376c5101d263bf2209c91e3074131e2f2adad7a02a0f3b3f
        • Opcode Fuzzy Hash: c918077cbdba4abde34237b4b82c4e35b187e0ff10ad7a8b9c4aa903bd7d21b7
        • Instruction Fuzzy Hash: D901B531D01218EF8F14DFEAD6C06ADBBB4EF40341F1085BAD801A7112E7704E48CBA2
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _strtok.LIBCMT ref: 00959A4F
          • Part of subcall function 009657BD: __getptd.LIBCMT ref: 009657DB
          • Part of subcall function 009640EA: __lock.LIBCMT ref: 00964108
          • Part of subcall function 009640EA: ___sbh_find_block.LIBCMT ref: 00964113
          • Part of subcall function 009640EA: ___sbh_free_block.LIBCMT ref: 00964122
          • Part of subcall function 009640EA: RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        • _malloc.LIBCMT ref: 00959A78
        • _strncpy.LIBCMT ref: 00959A98
        • _strtok.LIBCMT ref: 00959AA4
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: _strtok$FreeHeap___sbh_find_block___sbh_free_block__getptd__lock_malloc_strncpy
        • String ID:
        • API String ID: 1186450272-0
        • Opcode ID: f4931b00e1ed2066776054199b060665feacecb6eae59564b405c9a02be8afa7
        • Instruction ID: 72de12ce343a68ac3d57184614f8e2899fd6403087c373164ed968c07c1d9f45
        • Opcode Fuzzy Hash: f4931b00e1ed2066776054199b060665feacecb6eae59564b405c9a02be8afa7
        • Instruction Fuzzy Hash: 72017D3A108141EAEB19AFB9FC4EF723F7DCB82314F000119F9498B623DA6399198760
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _vwprintf.LIBCMT ref: 009507A0
          • Part of subcall function 0096459D: __vscwprintf_helper.LIBCMT ref: 009645AF
        • _malloc.LIBCMT ref: 009507B3
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • _vswprintf_s.LIBCMT ref: 009507C7
          • Part of subcall function 00964529: __vsprintf_s_l.LIBCMT ref: 0096453C
        • _memset.LIBCMT ref: 009507DA
          • Part of subcall function 009640EA: __lock.LIBCMT ref: 00964108
          • Part of subcall function 009640EA: ___sbh_find_block.LIBCMT ref: 00964113
          • Part of subcall function 009640EA: ___sbh_free_block.LIBCMT ref: 00964122
          • Part of subcall function 009640EA: RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: Heap$AllocateFree___sbh_find_block___sbh_free_block__lock__vscwprintf_helper__vsprintf_s_l_malloc_memset_vswprintf_s_vwprintf
        • String ID:
        • API String ID: 1977744246-0
        • Opcode ID: 96a5ed3c0dd55f7cfbfddd9eb4e8d96f2ba4d250db9e810305b68227fd5609e6
        • Instruction ID: 2c1a23ae733f73da75dffb79b0bd409ff5669852381029c396f22d25e7d84433
        • Opcode Fuzzy Hash: 96a5ed3c0dd55f7cfbfddd9eb4e8d96f2ba4d250db9e810305b68227fd5609e6
        • Instruction Fuzzy Hash: 8CF0BE7B0042197BDB11AEA4DC82FFF3B6CEFCA7A0F10051AF91995041EB21A91497B1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • _vwprintf.LIBCMT ref: 009507A0
          • Part of subcall function 0096459D: __vscwprintf_helper.LIBCMT ref: 009645AF
        • _malloc.LIBCMT ref: 009507B3
          • Part of subcall function 009641C7: __FF_MSGBANNER.LIBCMT ref: 009641EA
          • Part of subcall function 009641C7: __NMSG_WRITE.LIBCMT ref: 009641F1
          • Part of subcall function 009641C7: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,009865EC,?,0095006E,00004008), ref: 0096423E
        • _vswprintf_s.LIBCMT ref: 009507C7
          • Part of subcall function 00964529: __vsprintf_s_l.LIBCMT ref: 0096453C
        • _memset.LIBCMT ref: 009507DA
          • Part of subcall function 009640EA: __lock.LIBCMT ref: 00964108
          • Part of subcall function 009640EA: ___sbh_find_block.LIBCMT ref: 00964113
          • Part of subcall function 009640EA: ___sbh_free_block.LIBCMT ref: 00964122
          • Part of subcall function 009640EA: RtlFreeHeap.NTDLL(00000000,?,0097E5C8,0000000C,00965FC4,00000000,0097E728,0000000C,00965FFE,?,?,?,0096F821,00000004,0097EA88,0000000C), ref: 00964152
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: Heap$AllocateFree___sbh_find_block___sbh_free_block__lock__vscwprintf_helper__vsprintf_s_l_malloc_memset_vswprintf_s_vwprintf
        • String ID:
        • API String ID: 1977744246-0
        • Opcode ID: 7ee31a83bf9f20864b059d91c61b01c1c6536ebbba28342f5dae6b1c7adca133
        • Instruction ID: f5a7541e4a7d9200a49a54eaec1f38496a68b4d57203ac9e95216a4a7c884f11
        • Opcode Fuzzy Hash: 7ee31a83bf9f20864b059d91c61b01c1c6536ebbba28342f5dae6b1c7adca133
        • Instruction Fuzzy Hash: F1F09A7B0001197ADB21AEA4AC82FFF3B6CEFCA3A0F10051AF91995041DB21A91597A1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • __getptd.LIBCMT ref: 0096D959
          • Part of subcall function 00969035: __getptd_noexit.LIBCMT ref: 00969038
          • Part of subcall function 00969035: __amsg_exit.LIBCMT ref: 00969045
        • __getptd.LIBCMT ref: 0096D970
        • __amsg_exit.LIBCMT ref: 0096D97E
        • __lock.LIBCMT ref: 0096D98E
        Memory Dump Source
        • Source File: 00000000.00000002.620024884.0000000000950000.00000020.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_950000_loaddll32.jbxd
        Yara matches
        Similarity
        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
        • String ID:
        • API String ID: 3521780317-0
        • Opcode ID: a3383de9500bab577348895872582840ecbd2d2477fc8516d0add761e85874c3
        • Instruction ID: bc9002ee9289eb4d26e59fc83ee8e076795d956139040995cb847dc0adfb6a8a
        • Opcode Fuzzy Hash: a3383de9500bab577348895872582840ecbd2d2477fc8516d0add761e85874c3
        • Instruction Fuzzy Hash: 3FF0B432F167048BD760BFB4C40275D73A46F80714F404649E464A72D1CF346A019B51
        Uniqueness

        Uniqueness Score: -1.00%