Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:19.0.0
Analysis ID:289272
Start time:15:37:15
Joe Sandbox Product:Cloud
Start date:09.06.2017
Overall analysis duration:0h 6m 58s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:g8F53.tmp.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 x64 (Office 2003 SP3, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 41, Firefox 36)
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • VBA Instrumentation enabled
Detection:MAL
Classification:mal60.evad.adwa.winEXE@1/4@1/2
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 43
  • Number of non-executed functions: 39
EGA Information:
  • Successful, ratio: 100%
Cookbook Comments:
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): WmiApSrv.exe, dllhost.exe


Detection

StrategyScoreRangeReportingDetection
Threshold600 - 100Report FP / FNmalicious


Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample sleeps for a long time, analyze it with the 'Bypass long sleeps' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, update the analysis machine



Signature Overview

Click to jump to signature section


Spam, unwanted Advertisements and Ransom Demands:

barindex
Modifies the hosts fileShow sources
Source: C:\g8F53.tmp.exeFile written: C:\Windows\System32\drivers\etc\hosts

Networking:

barindex
Contains functionality to download additional files from the internetShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC44890 LoadLibraryA,LoadLibraryA,GetProcAddress,URLDownloadToFileA,_fread_nolock,DeleteFileA,0_2_000000013FC44890
Downloads filesShow sources
Source: C:\g8F53.tmp.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GOPT6FQ2
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /iavs9x/servers.def HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: files.avast.comConnection: Keep-Alive
Found strings which match to known social media urlsShow sources
Source: g8F53.tmp.exeString found in binary or memory: login.yahoo.com equals www.yahoo.com (Yahoo)
Source: g8F53.tmp.exeString found in binary or memory: login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: g8F53.tmp.exeString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: files.avast.com
Urls found in memory or binary dataShow sources
Source: g8F53.tmp.exeString found in binary or memory: file:///c:/users/user/appdata/local/microsoft/windows/temporary%20internet%20files/content.ie5/
Source: g8F53.tmp.exeString found in binary or memory: http://cacerts.digicert.com/digicertassuredidcodesigningca-1.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://cacerts.digicert.com/digicertevcodesigningca-sha2.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://cacerts.digicert.com/digicertevcodesigningca.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://cacerts.digicert.com/digicerthighassurancecodesigningca-1.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://cacerts.digicert.com/digicertsha2assuredidcodesigningca.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://certificates.godaddy.com/repository/0
Source: g8F53.tmp.exeString found in binary or memory: http://certificates.godaddy.com/repository/gd_intermediate.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://certificates.godaddy.com/repository100.
Source: g8F53.tmp.exeString found in binary or memory: http://cj
Source: g8F53.tmp.exeString found in binary or memory: http://crl.com
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comn
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comodo.net/utn-useqr
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comodo.net/utn-userfirst-hardware.crl0q
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comodoca.com
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comodoca.com/comodocodesigningca2.crl0r
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comodoca.com/comodorsaextendedvalidationcodesigningca.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.comodoca.com/utn-userfirst-hardware.crl06
Source: g8F53.tmp.exeString found in binary or memory: http://crl.entrust.net/2048ca.c
Source: g8F53.tmp.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.globalsign.com/gs/gscodesignsha2g2.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.godaddy.com/gds5-16.crl0s
Source: g8F53.tmp.exeString found in binary or memory: http://crl.pkioverheid.nl/domorganisatielatestcrl-g2.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl.pkioverheid.nl/domovlatestcrl.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: g8F53.tmp.exeString found in binary or memory: http://crl3.digicert.com/evcodesigni
Source: g8F53.tmp.exeString found in binary or memory: http://crl3.digicert.com/evcodesigning-g1.crl03
Source: g8F53.tmp.exeString found in binary or memory: http://crl3.digicert.com/evcodesigningsha2-g1.crl07
Source: g8F53.tmp.exeString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: g8F53.tmp.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: g8F53.tmp.exeString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0l
Source: g8F53.tmp.exeString found in binary or memory: http://crl4.digicert.com/evcodesigning-g1.crl0k
Source: g8F53.tmp.exeString found in binary or memory: http://crl4.digicert.com/evcodesigningsha2-g1.crl0k
Source: g8F53.tmp.exeString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0l
Source: g8F53.tmp.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0b
Source: g8F53.tmp.exeString found in binary or memory: http://crt.como
Source: g8F53.tmp.exeString found in binary or memory: http://crt.comodoca.com/comodocodesigningca2.crt0$
Source: g8F53.tmp.exeString found in binary or memory: http://crt.comodoca.com/comodorsaextendedvalidationcodesigningca.crt0$
Source: g8F53.tmp.exeString found in binary or memory: http://crt.comodoca.com/utnaddt
Source: g8F53.tmp.exeString found in binary or memory: http://crt.comodoca.com/utnaddtrustserverca.crt0$
Source: g8F53.tmp.exeString found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0
Source: g8F53.tmp.exeString found in binary or memory: http://d0211227.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://d0211227.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://d0211227.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://d0211227.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://d0211227.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://d0211227.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://d3116203.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://d3116203.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://d3116203.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://d3116203.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://d3116203.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://d3116203.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://f5136535.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://f5136535.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://f5136535.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://f5136535.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://f5136535.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://f5136535.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://f6761140.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://f6761140.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://f6761140.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://f6761140.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://f6761140.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://f6761140.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://f7031642.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://f7031642.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://f7031642.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://f7031642.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://f7031642.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://f7031642.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://files.avast.com/iavs9x/servers.def
Source: g8F53.tmp.exeString found in binary or memory: http://files.avast.com/iavs9x/servers.def&
Source: g8F53.tmp.exeString found in binary or memory: http://files.avast.com/iavs9x/servers.def011
Source: g8F53.tmp.exeString found in binary or memory: http://files.avast.com/iavs9x/servers.defc:
Source: g8F53.tmp.exeString found in binary or memory: http://files.avast.com/iavs9x/servers.defppc:
Source: g8F53.tmp.exeString found in binary or memory: http://g0511470.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://g0511470.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://g0511470.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://g0511470.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://g0511470.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://g0511470.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://geoip.avast.com/geoip/geoip.php
Source: g8F53.tmp.exeString found in binary or memory: http://gf.tools.avast.com/tools/gf/
Source: g8F53.tmp.exeString found in binary or memory: http://h0637628.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://h0637628.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://h0637628.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://h0637628.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://h0637628.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://h0637628.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://h1874089.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://h1874089.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://h1874089.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://h1874089.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://h1874089.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://h1874089.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://j8087387.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://j8087387.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://j8087387.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://j8087387.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://j8087387.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://j8087387.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://k6375621.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://k6375621.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://k6375621.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://k6375621.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://k6375621.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://k6375621.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://l5978727.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://l5978727.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://l5978727.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://l5978727.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://l5978727.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://l5978727.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoc
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoca.com0%
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoca.com0-
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoca.com0.
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoca.com0/
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.comodoca.com05
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.digicert.com0c
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.digicert.com0h
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.digicert.com0l
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.digicert.com0n
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.digicert.com0p
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.entrust.net03
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.entrust.net0d
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp.godaddy.com/0j
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g20
Source: g8F53.tmp.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30v
Source: g8F53.tmp.exeString found in binary or memory: http://p3713387.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://p3713387.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://p3713387.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://p3713387.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://p3713387.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://p3713387.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://p4085325.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://p4085325.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://p4085325.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://p4085325.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://p4085325.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://p4085325.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://r5525652.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://r5525652.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://r5525652.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://r5525652.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://r5525652.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://r5525652.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://s
Source: g8F53.tmp.exeString found in binary or memory: http://s4705686.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://s4705686.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://s4705686.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://s4705686.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://s4705686.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://s4705686.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://s7284151.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://s7284151.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://s7284151.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://s7284151.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://s7284151.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://s7284151.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
Source: g8F53.tmp.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g2.crt08
Source: g8F53.tmp.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: g8F53.tmp.exeString found in binary or memory: http://sf.symcb.com/sf.crl0a
Source: g8F53.tmp.exeString found in binary or memory: http://sf.symcb.com/sf.crl0f
Source: g8F53.tmp.exeString found in binary or memory: http://sf.symcb.com/sf.crl0w
Source: g8F53.tmp.exeString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://sf.symcd.com0&
Source: g8F53.tmp.exeString found in binary or memory: http://sm00.avast.com/cgi-bin/iavsup2.cgi
Source: g8F53.tmp.exeString found in binary or memory: http://submit5.avast.com/cgi-bin/submit50.cgi
Source: g8F53.tmp.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: g8F53.tmp.exeString found in binary or memory: http://sv.symcb.com/sv.crl0f
Source: g8F53.tmp.exeString found in binary or memory: http://sv.symcb.com/sv.crl0w
Source: g8F53.tmp.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://sv.symcd.com0&
Source: g8F53.tmp.exeString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://sw.symcb.com/sw.crl0f
Source: g8F53.tmp.exeString found in binary or memory: http://sw.symcd.com0
Source: g8F53.tmp.exeString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: g8F53.tmp.exeString found in binary or memory: http://t3036159.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://t3036159.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://t3036159.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://t3036159.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://t3036159.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://t3036159.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://t5730298.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://t5730298.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://t5730298.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://t5730298.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://t5730298.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://t5730298.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://v4618535.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://v4618535.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://v4618535.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://v4618535.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://v4618535.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://v4618535.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://v6834318.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://v6834318.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://v6834318.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://v6834318.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://v6834318.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://v6834318.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://v7.stats.avast.com/cgi-bin/iavs4stats.cgi
Source: g8F53.tmp.exeString found in binary or memory: http://v7630928.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://v7630928.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://v7630928.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://v7630928.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://v7630928.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://v7630928.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi
Source: g8F53.tmp.exeString found in binary or memory: http://w6607332.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://w6607332.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://w6607332.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://w6607332.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://w6607332.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://w6607332.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://w9448963.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://w9448963.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://w9448963.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://w9448963.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://w9448963.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://w9448963.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://ww
Source: g8F53.tmp.exeString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: g8F53.tmp.exeString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: g8F53.tmp.exeString found in binary or memory: http://www.public-trust.com/cgi-bin/crl/2018/cdp.crl0
Source: g8F53.tmp.exeString found in binary or memory: http://www.public-trust.com/cgi-bin/crl/2018/cdz
Source: g8F53.tmp.exeString found in binary or memory: http://www.public-trust.com/cps/omniroot.html0
Source: g8F53.tmp.exeString found in binary or memory: http://www.usertrust.com1
Source: g8F53.tmp.exeString found in binary or memory: http://x6055396.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://x6055396.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://x6055396.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://x6055396.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://x6055396.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://x6055396.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://y9663457.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://y9663457.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://y9663457.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://y9663457.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://y9663457.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://y9663457.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://z2217299.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://z2217299.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://z2217299.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://z2217299.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://z2217299.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://z2217299.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://z2461313.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://z2461313.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://z2461313.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://z2461313.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://z2461313.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://z2461313.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://z9743321.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://z9743321.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://z9743321.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://z9743321.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://z9743321.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://z9743321.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: http://z9820048.iavs5x.u.avast.com/iavs5x
Source: g8F53.tmp.exeString found in binary or memory: http://z9820048.iavs9x.u.avast.com/iavs9x
Source: g8F53.tmp.exeString found in binary or memory: http://z9820048.ivps9tiny.u.avast.com/ivps9tiny
Source: g8F53.tmp.exeString found in binary or memory: http://z9820048.ivps9x.u.avast.com/ivps9x
Source: g8F53.tmp.exeString found in binary or memory: http://z9820048.vpsnitro.u.avast.com/vpsnitro
Source: g8F53.tmp.exeString found in binary or memory: http://z9820048.vpsnitrotiny.u.avast.com/vpsnitrotiny
Source: g8F53.tmp.exeString found in binary or memory: https://d.symcb
Source: g8F53.tmp.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: g8F53.tmp.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: g8F53.tmp.exeString found in binary or memory: https://d1o
Source: g8F53.tmp.exeString found in binary or memory: https://id.avast.com/inavastium
Source: g8F53.tmp.exeString found in binary or memory: https://ipm-provider.ff.avast.com/
Source: g8F53.tmp.exeString found in binary or memory: https://pair.ff.avast.com
Source: g8F53.tmp.exeString found in binary or memory: https://secure.comodo.com/cps0
Source: g8F53.tmp.exeString found in binary or memory: https://secure.comodo.com/cps0u
Source: g8F53.tmp.exeString found in binary or memory: https://secure.comodo.net/cps0a
Source: g8F53.tmp.exeString found in binary or memory: https://www.digicert.com/cps0
Source: g8F53.tmp.exeString found in binary or memory: https://www.globalsign.com/repository/0
Uses a known web browser user agent for HTTP communicationShow sources
Source: global trafficHTTP traffic detected: GET /iavs9x/servers.def HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: files.avast.comConnection: Keep-Alive

Boot Survival:

barindex
Creates an autostart registry keyShow sources
Source: C:\g8F53.tmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 760639
Source: C:\g8F53.tmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 760639
Source: C:\g8F53.tmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 760639
Source: C:\g8F53.tmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 760639
Creates autostart registry keys with suspicious namesShow sources
Source: C:\g8F53.tmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 760639

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC44890 LoadLibraryA,LoadLibraryA,GetProcAddress,URLDownloadToFileA,_fread_nolock,DeleteFileA,0_2_000000013FC44890
PE file contains an invalid checksumShow sources
Source: g8F53.tmp.exeStatic PE information: real checksum: 0x0 should be: 0x4c4d6

Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC62DA8 FindFirstFileExA,0_2_000000013FC62DA8
Source: C:\g8F53.tmp.exeCode function: 0_1_000000013FC62DA8 FindFirstFileExA,0_1_000000013FC62DA8

System Summary:

barindex
PE file has a high image base, often used for DLLsShow sources
Source: g8F53.tmp.exeStatic PE information: Image base 0x140000000L > 0x60000000
PE file contains a mix of data directories often seen in goodwareShow sources
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: g8F53.tmp.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
PE file contains a debug data directoryShow sources
Source: g8F53.tmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
PE file contains a valid data directory to section mappingShow sources
Source: g8F53.tmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: g8F53.tmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: g8F53.tmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: g8F53.tmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: g8F53.tmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Classification labelShow sources
Source: classification engineClassification label: mal60.evad.adwa.winEXE@1/4@1/2
Contains functionality to enum processes or threadsShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC42DC0 LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle,0_2_000000013FC42DC0
Creates temporary filesShow sources
Source: C:\g8F53.tmp.exeFile created: C:\Users\HANSPE~1\AppData\Local\Temp\s284.0
PE file has an executable .text section and no other executable sectionShow sources
Source: g8F53.tmp.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Reads software policiesShow sources
Source: C:\g8F53.tmp.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Uses an in-process (OLE) Automation serverShow sources
Source: C:\g8F53.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\InProcServer32
Contains functionality to call native functionsShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC42DC0 LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle,0_2_000000013FC42DC0
Source: C:\g8F53.tmp.exeCode function: 0_1_000000013FC42DC0 LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle,0_1_000000013FC42DC0
Found potential string decryption / allocating functionsShow sources
Source: C:\g8F53.tmp.exeCode function: String function: 000000013FC5B61C appears 34 times
Reads the hosts fileShow sources
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\g8F53.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
Sample file is different than original file name gathered from version infoShow sources
Source: g8F53.tmp.exeBinary or memory string: OriginalFilenamewshtcpip.dll.muij% vs g8F53.tmp.exe
Source: g8F53.tmp.exeBinary or memory string: OriginalFilenamewship6.dll.muij% vs g8F53.tmp.exe
Tries to load missing DLLsShow sources
Source: C:\g8F53.tmp.exeSection loaded: api-ms-win-core-synch-l1-2-0.dll
Source: C:\g8F53.tmp.exeSection loaded: api-ms-win-core-fibers-l1-1-1.dll
Source: C:\g8F53.tmp.exeSection loaded: api-ms-win-core-synch-l1-2-0.dll
Source: C:\g8F53.tmp.exeSection loaded: api-ms-win-core-fibers-l1-1-1.dll
Source: C:\g8F53.tmp.exeSection loaded: api-ms-win-core-localization-l1-2-1.dll
Source: C:\g8F53.tmp.exeSection loaded: api-ms-win-core-sysinfo-l1-2-1.dll

HIPS / PFW / Operating System Protection Evasion:

barindex
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: g8F53.tmp.exeBinary or memory string: Progman
Source: g8F53.tmp.exeBinary or memory string: Program Manager
Source: g8F53.tmp.exeBinary or memory string: Shell_TrayWnd
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)Show sources
Source: C:\g8F53.tmp.exeCode function: LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle, c:\windows\explorer.exe0_2_000000013FC42DC0
Source: C:\g8F53.tmp.exeCode function: LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle, :\windows\explorer.exe0_2_000000013FC42DC0
Changes memory attributes in foreign processes to executable or writableShow sources
Source: C:\g8F53.tmp.exeMemory protected: unknown base: 7FFFFFDF000 protect: page read and write
Source: C:\g8F53.tmp.exeMemory protected: unknown base: 2C1DC0 protect: page read and write
Creates new 'disallowed' certificate (very likely to block AV)Show sources
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\9132E8B079D080E01D52631690BE18EBC2347C1E Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\AD4C5429E10F4FF6C01840C20ABA344D7401209F Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\DB77E5CFEC34459146748B667C97B185619251BA Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\AB7E760DA2485EA9EF5A6EEE7647748D4BA6B947 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\E513EAB8610CFFD7C87E00BCA15C23AAB407FCEF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\3D496FA682E65FC122351EC29B55AB94F3BB03FC Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\A1F8DCB086E461E2ABB4B46ADCFA0B48C58B6E99 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\ED841A61C0F76025598421BC1B00E24189E68D54 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\18DEA4EFA93B06AE997D234411F3FD72A677EECE Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\76A9295EF4343E12DFC5FE05DC57227C1AB00D29 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\A5341949ABE1407DD7BF7DFE75460D9608FBC309 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\5240AB5B05D11B37900AC7712A3C6AE42F377C8C Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\872CD334B7E7B3C3D1C6114CD6B221026D505EAB Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\03D22C9C66915D58C88912B64C1F984B8344EF09 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\FFFA650F2CB2ABC0D80527B524DD3F9FC172C138 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\4420C99742DF11DD0795BC15B7B0ABF090DC84DF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\5DD3D41810F28B2A13E9A004E6412061E28FA48D Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\4C0AF5719009B7C9D85C5EAEDFA3B7F090FE5FFF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\F83099622B4A9F72CB5081F742164AD1B8D048C9 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\A59CC32724DD07A6FC33F7806945481A2D13CA2F Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\9E3F95577B37C74CA2F70C1E1859E798B7FC6B13 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\1667908C9E22EFBD0590E088715CC74BE4C60884 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\0F684EC1163281085C6AF20528878103ACEFCAAB Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\2026D13756EB0DB753DF26CB3B7EEBE3E70BB2CF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\42727E052C0C2E1B35AB53E1005FD9EDC9DE8F01 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\7457A3793086DBB58B3858D6476889E3311E550E Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\3850EDD77CC74EC9F4829AE406BBF9C21E0DA87F Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\D3F78D747E7C5D6D3AE8ABFDDA7522BFB4CBD598 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\249BDA38A611CD746A132FA2AF995A2D3C941264 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\B8EBF0E696AF77F51C96DB4D044586E2F4F8FD84 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\775B373B33B9D15B58BC02B184704332B97C3CAF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\88AD5DFE24126872B33175D1778687B642323ACF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\FBB42F089AF2D570F2BF6F493D107A3255A9BB1A Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\4243A03DB4C3C15149CEA8B38EEA1DA4F26BD159 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\982D98951CF3C0CA2A02814D474A976CBFF6BDB1 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\373C33726722D3A5D1EDD1F1585D5D25B39BEA1A Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\AD96BB64BA36379D2E354660780C2067B81DA2E0 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\31AC96A6C17C425222C46D55C3CCA6BA12E54DAF Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\E22240E837B52E691C71DF248F12D27F96441C00 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\331E2046A1CCA7BFEF766724394BE6112B4CA3F7 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\CDC37C22FE9272D8F2610206AD397A45040326B8 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\DB303C9B61282DE525DC754A535CA2D6A9BD3D87 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\9C43F665E690AB4D486D4717B456C5554D4BCEB5 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\9A08641F7C5F2CCA0888388BE3E5DBDDAAA3B361 Blob
Source: C:\g8F53.tmp.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\3353EA609334A9F23A701B9159E30CB6C22D4C59 Blob
Modifies the hosts fileShow sources
Source: C:\g8F53.tmp.exeFile written: C:\Windows\System32\drivers\etc\hosts

Anti Debugging:

barindex
Contains functionality to register its own exception handlerShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC46028 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000013FC46028
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC5C06C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013FC5C06C
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC4649C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013FC4649C
Source: C:\g8F53.tmp.exeCode function: 0_1_000000013FC46028 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_1_000000013FC46028
Source: C:\g8F53.tmp.exeCode function: 0_1_000000013FC5C06C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_1_000000013FC5C06C
Source: C:\g8F53.tmp.exeCode function: 0_1_000000013FC4649C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_1_000000013FC4649C
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\g8F53.tmp.exeSystem information queried: KernelDebuggerInformation
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC5C06C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013FC5C06C
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)Show sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC42DC0 LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle,0_2_000000013FC42DC0
Contains functionality to dynamically determine API callsShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC44890 LoadLibraryA,LoadLibraryA,GetProcAddress,URLDownloadToFileA,_fread_nolock,DeleteFileA,0_2_000000013FC44890
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC641FC GetProcessHeap,0_2_000000013FC641FC

Malware Analysis System Evasion:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC62DA8 FindFirstFileExA,0_2_000000013FC62DA8
Source: C:\g8F53.tmp.exeCode function: 0_1_000000013FC62DA8 FindFirstFileExA,0_1_000000013FC62DA8
Queries a list of all running processesShow sources
Source: C:\g8F53.tmp.exeProcess information queried: ProcessInformation
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)Show sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC42DC0 LoadLibraryA,GetProcAddress,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,NtQueryInformationProcess,VirtualProtectEx,ReadProcessMemory,VirtualProtectEx,ReadProcessMemory,ReadProcessMemory,CommandLineToArgvW,WideCharToMultiByte,LocalFree,CloseHandle,0_2_000000013FC42DC0
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\g8F53.tmp.exe TID: 3012Thread sleep time: -100s >= -60s
Source: C:\g8F53.tmp.exe TID: 2616Thread sleep time: -60000s >= -60s

Hooking and other Techniques for Hiding and Protection:

barindex
Uses an obfuscated file name to hide its real file extension (double extension)Show sources
Source: Possible double extension: tmp.exeStatic PE information: g8F53.tmp.exe

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Modifies the hosts fileShow sources
Source: C:\g8F53.tmp.exeFile written: C:\Windows\System32\drivers\etc\hosts

Language, Device and Operating System Detection:

barindex
Contains functionality to query local / system timeShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC5BBA8 GetSystemTimeAsFileTime,0_2_000000013FC5BBA8
Contains functionality to query time zone informationShow sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC60BFC GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_000000013FC60BFC
Queries the cryptographic machine GUIDShow sources
Source: C:\g8F53.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Contains functionality locales information (e.g. system language)Show sources
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000000013FC67760
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,0_2_000000013FC67338
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_000000013FC67948
Source: C:\g8F53.tmp.exeCode function: TranslateName,TranslateName,IsValidCodePage,wcschr,wcschr,GetLocaleInfoW,0_2_000000013FC66F5C
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,0_2_000000013FC67810
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,0_2_000000013FC5BB10
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,0_2_000000013FC5B584
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,0_2_000000013FC67614
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_000000013FC673D0
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,0_2_000000013FC67268
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_1_000000013FC67760
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,0_1_000000013FC67338
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_1_000000013FC67948
Source: C:\g8F53.tmp.exeCode function: TranslateName,TranslateName,IsValidCodePage,wcschr,wcschr,GetLocaleInfoW,0_1_000000013FC66F5C
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,0_1_000000013FC67810
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,0_1_000000013FC5BB10
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,0_1_000000013FC5B584
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,0_1_000000013FC67614
Source: C:\g8F53.tmp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_1_000000013FC673D0
Source: C:\g8F53.tmp.exeCode function: EnumSystemLocalesW,0_1_000000013FC67268
Contains functionality to query CPU information (cpuid)Show sources
Source: C:\g8F53.tmp.exeCode function: 0_2_000000013FC69F60 cpuid 0_2_000000013FC69F60

Behavior Graph

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behavior_graph main Behavior Graph ID: 289272 Sample:  g8F53.tmp.exe Startdate:  09/06/2017 Architecture:  WINDOWS Score:  60 0 g8F53.tmp.exe 46 13 main->0      started     630sig Changes memory attributes in foreign processes to executable or writable 5500sig Creates autostart registry keys with suspicious names 9770sig Creates new 'disallowed' certificate (very likely to block AV) d1e118233 files.avast.com 2.17.214.122, 80 AkamaiTechnologiesInc European Union d1e117146 files.avast.com 0->630sig 0->5500sig 0->9770sig 0->d1e118233 0->d1e117146 process0 dnsIp0 signatures0 fileCreated0

Yara Overview

No Yara matches

Startup

  • system is w7x64
  • g8F53.tmp.exe (PID: 2884 cmdline: 'C:\g8F53.tmp.exe' MD5: 679A54233089BD649B01BC70905E22CD)
  • cleanup

Created / dropped Files

File PathType and HashesMalicious
C:\760639
  • Type: data
  • MD5: CF5BB3B4D6A3ADE6041C1D333FA8C273
  • SHA: BD4B5146484AB02E926C61E161C1E6093B892BD7
  • SHA-256: 7063BCCF89B09F51EE70A47B6170AE07914DCA26648B7441C2F9EB7BD6A04397
  • SHA-512: F7A7475133880CB5E79ADA4999D5E9037841509A2C03EC726094F18A2AD0132009B7F3A5C585B31B52C0CCDF7C9C1F080628669B5F2DB7A694B9DCB3DD34E072
false
C:\Users\HANSPE~1\AppData\Local\Temp\s284.0
  • Type: ASCII text, with CRLF line terminators
  • MD5: 195CDCAAED78D2B59ABC94F8C0D441F5
  • SHA: 3D9C75B738762E574B072163661C0F1B9A7C962D
  • SHA-256: 6DB1CBEFDC21B46405E404C868B4E76383AB1B34B81AE29BAE8CF06FD81587CF
  • SHA-512: 4F5FE41184D923C09C3202D29C35E9B74FEE579D1E668C076F6BE9251109183C303CF3C6C2C35D5EFAE80B21CC3215605A4087D70B1813A7E006925E5C0E127B
false
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GOPT6FQ2\servers[1].def
  • Type: ASCII text, with CRLF line terminators
  • MD5: 195CDCAAED78D2B59ABC94F8C0D441F5
  • SHA: 3D9C75B738762E574B072163661C0F1B9A7C962D
  • SHA-256: 6DB1CBEFDC21B46405E404C868B4E76383AB1B34B81AE29BAE8CF06FD81587CF
  • SHA-512: 4F5FE41184D923C09C3202D29C35E9B74FEE579D1E668C076F6BE9251109183C303CF3C6C2C35D5EFAE80B21CC3215605A4087D70B1813A7E006925E5C0E127B
false
C:\Windows\System32\drivers\etc\hosts
  • Type: ASCII text, with CRLF line terminators
  • MD5: C93D6BDCE002C97896DAC3FFA6544683
  • SHA: EF35EC9D4BB99A09854DA521A48F3412DB1717E1
  • SHA-256: 374A299BEF7E31243B9D9F8F19E9832293567B265F44066917CF8F20AD29BA65
  • SHA-512: B3E55F7C8A3BF731F6AF35AE718391E1C85790D49FDBA562E9592960D11717CC59471363A91E1732D52DF563B111D39BF1C34BC2355E0C25A999D050DC1FA27B
true

Contacted Domains/Contacted IPs

Contacted Domains

NameIPActiveMalicious
files.avast.com2.17.214.122truefalse

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPCountryFlagASNASN NameMalicious
8.8.8.8United States
15169GoogleIncfalse
2.17.214.122European Union
16625AkamaiTechnologiesIncfalse

Static File Info

General

File type:PE32+ executable for MS Windows (GUI) Mono/.Net assembly
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:g8F53.tmp.exe
File size:307200
MD5:679a54233089bd649b01bc70905e22cd
SHA1:a66197a6fdf6cde046a02ec10eb417bf125a63b1
SHA256:b529ca4dd148fdfcee0c1f267bc6821cc5168c121363fa690536a72e0f447c19
SHA512:f954b54a96caf2711ae79ca2bc76b633832ec1f504a3b7c3bf1c168e02df63cf206899bf483b5f400e1dacdd7281ac28b847346fcf33fcb89908dbadab563076
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(..;I.R;I.R;I.R..;R2I.R..9R.I.R..8R4I.R...R:I.R.).S3I.R.).S'I.R.).S/I.R21YR6I.R;I.R.I.R.(.S:I.R.(5R:I.R.(.S:I.RRich;I.R.......

File Icon

Static PE Info

General

Entrypoint:0x140006014L
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000L
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0x59370A51 [Tue Jun 06 20:02:25 2017 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:ca74f2c2225045446ef176b0c9d468b6

Entrypoint Preview

Instruction
dec eax
sub esp, 28h
call 100C484Ch
dec eax
add esp, 28h
jmp 100C4027h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00025237h]
dec eax
mov ecx, ebx
call dword ptr [00025236h]
call dword ptr [00025220h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00025204h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call 100E85ECh
test eax, eax
je 100C41A9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [000437BFh]
call 100C436Fh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [000438A6h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00043836h], eax
dec eax
mov eax, dword ptr [0004388Fh]
dec eax
mov dword ptr [00043700h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00043804h], eax
mov dword ptr [000436DAh], C0000409h
mov dword ptr [000436D4h], 00000001h
mov dword ptr [000436DEh], 00000001h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x36f1c0x8c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4b0000x1ea8.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000x758.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x34fa00x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34fc00xa0.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x760.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeEntropyXored PEZLIB ComplexityFile TypeCharacteristics
.text0x10000x29f000x2a000False0.534923735119ump; data6.50640221128IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x2b0000xd82e0xda00False0.444309059633ump; data5.15782030144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x390000x11d700x10800False0.480513139205f&#212;&#255;&#255;2&#162;&#223;-7.27336022663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.pdata0x4b0000x1ea80x2000False0.471923828125ump; PEX Binary Archive5.34032237763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x4d0000x1e00x200False0.53125ump; data4.71377258295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x4e0000x7580x800False0.55908203125ump; data5.2503088955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_MANIFEST0x4d0600x17dump; XML document textEnglishUnited States

Imports

DLLImport
CRYPT32.dllCertOpenStore, CertCloseStore, CertAddCertificateContextToStore, CertFreeCertificateContext, CertCreateCertificateContext
KERNEL32.dllRaiseException, FlushFileBuffers, GetFileType, ReadConsoleW, GetConsoleMode, SetFilePointerEx, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, HeapAlloc, HeapFree, GetACP, WriteFile, GetStdHandle, GetTempPathW, MultiByteToWideChar, GetStringTypeW, GetModuleHandleExW, ExitProcess, LoadLibraryExW, FreeLibrary, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, SetLastError, RtlUnwindEx, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, GetModuleHandleW, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, DeleteFileW, HeapReAlloc, GetTimeZoneInformation, GetCPInfo, MoveFileExW, GetFileAttributesExW, CreateFileW, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, GetProcessHeap, CreateEventA, WideCharToMultiByte, GetCurrentProcessId, LocalFree, Beep, GetProcAddress, CloseHandle, DeleteFileA, LoadLibraryA, GetSystemDirectoryA, SetEvent, GetLastError, Sleep, GetModuleHandleA, GetCurrentThreadId, RegisterWaitForSingleObject, GetModuleFileNameA, ReadFile, SetStdHandle, HeapSize, SetEndOfFile, WriteConsoleW, GetConsoleCP
USER32.dllBeginPaint, CheckDlgButton, BroadcastSystemMessageA, ChildWindowFromPoint, ChangeMenuA, DefDlgProcA, CascadeWindows, CharLowerA, CreateMenu, PostQuitMessage, CharNextA, CharLowerBuffA, DeferWindowPos, CloseWindow, AdjustWindowRectEx, GetMessageA, CheckMenuRadioItem, CreateIconFromResourceEx, DispatchMessageA, LoadCursorA, DeregisterShellHookWindow, CloseWindowStation, CheckRadioButton, CopyImage, CopyIcon, CharPrevA, DeleteMenu, CreateWindowStationA, CallNextHookEx, ArrangeIconicWindows, CreatePopupMenu, ChildWindowFromPointEx, DestroyCursor, AnyPopup, BeginDeferWindowPos, CloseDesktop, SetTimer, CopyAcceleratorTableA, PostThreadMessageA, ChangeClipboardChain, CopyRect, CreateIconIndirect, ClientToScreen, FindWindowExA, CallWindowProcA, DestroyAcceleratorTable, DefMDIChildProcA, CharUpperBuffA, CreateAcceleratorTableA, CreateCaret, CountClipboardFormats, CharToOemBuffA, CreateCursor, AttachThreadInput, CreateIconFromResource, DefFrameProcA, CreateIcon, CharToOemA, AdjustWindowRect, RegisterClassA, DefWindowProcA, DestroyMenu, CreateWindowExA, BringWindowToTop, TranslateMessage, ClipCursor, SendMessageA, DestroyCaret, CallMsgFilterA, CreateDialogParamA, LoadIconA, CharUpperA, CreateDialogIndirectParamA, AppendMenuA, CheckMenuItem, CreateMDIWindowA, ActivateKeyboardLayout, DestroyIcon
ADVAPI32.dllRegReplaceKeyA, RegSaveKeyA, IsValidAcl, RegConnectRegistryA, RegDeleteValueA, RegRestoreKeyA, RegCreateKeyA, RegNotifyChangeKeyValue, RegEnumKeyA, RegGetKeySecurity, RegCloseKey, RegOpenKeyA, RegEnumValueA, RegSetValueA, RegDeleteKeyA, RegQueryValueExA, RegQueryMultipleValuesA, RegCreateKeyExA, RegFlushKey, RegQueryValueA, RegUnLoadKeyA, RegSetKeySecurity, RegSetValueExA, IsValidSecurityDescriptor, RegLoadKeyA, RegQueryInfoKeyA, RegOpenKeyExA, RegEnumKeyExA
SHELL32.dllCommandLineToArgvW
ole32.dllCoRegisterMessageFilter, CoFileTimeNow, CoRevokeClassObject, CoDisconnectObject, CoInitializeEx, CoGetStdMarshalEx, CLSIDFromString, CoMarshalHresult, CoDosDateTimeToFileTime, CoFreeLibrary, CoTaskMemRealloc, CoFreeUnusedLibraries, IIDFromString, CoRegisterMallocSpy, CoLockObjectExternal, CoFreeAllLibraries, CoLoadLibrary, CoUnmarshalHresult, CoGetMalloc, CoFileTimeToDosDateTime, CoReleaseMarshalData, CLSIDFromProgID, CoCreateFreeThreadedMarshaler, CoCreateGuid, CoTaskMemAlloc, CoIsHandlerConnected, CoRevokeMallocSpy, CoGetCurrentProcess, CoTaskMemFree

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Jun 9, 2017 15:40:08.834712029 MESZ5390853192.168.1.138.8.8.8
Jun 9, 2017 15:40:09.292851925 MESZ53539088.8.8.8192.168.1.13
Jun 9, 2017 15:40:09.324213028 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.324254036 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.324376106 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.325232983 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.325249910 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.665602922 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.665976048 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.678288937 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.678308010 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.678334951 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.678390980 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.680398941 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.680412054 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.680449963 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.680536985 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.684830904 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.684849977 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.684875965 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.684973955 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.696362019 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.696468115 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.699193954 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.699223042 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.699230909 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.699306011 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.702703953 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.702785969 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.713334084 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.713362932 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.713375092 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.716732979 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.723906994 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.724067926 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.726281881 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.726310968 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.726325989 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.726592064 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:40:09.730989933 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.731014967 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:40:09.732007027 MESZ4923580192.168.1.132.17.214.122
Jun 9, 2017 15:41:12.149789095 MESZ80492352.17.214.122192.168.1.13
Jun 9, 2017 15:41:12.149885893 MESZ4923580192.168.1.132.17.214.122

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Jun 9, 2017 15:40:08.834712029 MESZ5390853192.168.1.138.8.8.8
Jun 9, 2017 15:40:09.292851925 MESZ53539088.8.8.8192.168.1.13

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Jun 9, 2017 15:40:08.834712029 MESZ192.168.1.138.8.8.80xaa62Standard query (0)files.avast.comA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
Jun 9, 2017 15:40:09.292851925 MESZ8.8.8.8192.168.1.130xaa62No error (0)files.avast.com2.17.214.122A (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • files.avast.com

HTTP Packets

TimestampSource PortDest PortSource IPDest IPHeaderTotal Bytes Transfered (KB)
Jun 9, 2017 15:40:09.325232983 MESZ4923580192.168.1.132.17.214.122GET /iavs9x/servers.def HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: files.avast.com
Connection: Keep-Alive
0
Jun 9, 2017 15:40:09.665602922 MESZ80492352.17.214.122192.168.1.13HTTP/1.1 200 OK
Last-Modified: Thu, 20 Apr 2017 07:39:25 GMT
ETag: "58f865ad-6183"
Server: nginx
Content-Type: text/plain
Content-Length: 24963
Accept-Ranges: bytes
Cache-Control: max-age=56
Expires: Fri, 09 Jun 2017 13:41:05 GMT
Date: Fri, 09 Jun 2017 13:40:09 GMT
Connection: keep-alive
Data Raw: 5b 73 65 72 76 65 72 73 5d 0d 0a 63 6f 75 6e 74 3d 32 39 0d 0a 52 65 70 6f 49 44 3d 69 61 76 73 39 78 0d 0a 4c 61 74 65 73 74 50 72 6f 67 72 61 6d 56 65 72 73 69 6f 6e 3d 31 36 37 39 36 38 37 36 38 0d 0a 4c 61 74 65 73 74 42 75 73 69 6e 65 73 73 56 65 72 73 69 6f 6e 3d 31 36 37 39 36 38 37 36 38 0d 0a 53 65 6e 64 53 74 61 74 73 46 69 6c 74 65 72 3d 32 0d 0a 53 65 6e 64 44 72 6f 70 70 65 72 46 69 6c 74 65 72 3d 38 0d 0a 53 65 6e 64 44 72 6f 70 70 65 72 46 69 6c 74 65 72 32 3d 38 0d 0a 53 65 6e 64 43 72 61 73 68 64 75 6d 70 46 69 6c 74 65 72 3d 33 32 0d 0a 57 72 63 54 72 61 66 66 69
Data Ascii: [servers]count=29RepoID=iavs9xLatestProgramVersion=167968768LatestBusinessVersion=167968768SendStatsFilter=2SendDropperFilter=8SendDropperFilter2=8SendCrashdumpFilter=32WrcTraffi
1
Jun 9, 2017 15:40:09.678288937 MESZ80492352.17.214.122192.168.1.13Data Raw: 63 54 6f 3d 30 0d 0a 53 68 65 70 68 65 72 64 55 72 6c 3d 73 68 65 70 68 65 72 64 2e 66 66 2e 61 76 61 73 74 2e 63 6f 6d 0d 0a 50 72 6f 67 55 70 64 61 74 65 43 6f 6e 63 65 61 6c 48 6f 75 72 73 3d 31 36 38 0d 0a 56 36 5f 50 72 6f 67 55 70 64 61 74
Data Ascii: cTo=0ShepherdUrl=shepherd.ff.avast.comProgUpdateConcealHours=168V6_ProgUpdateConcealHours=168V7_ProgUpdateConcealHours=168V8_ProgUpdateConcealHours=168V9_ProgUpdateConcealHours=168V10_ProgUpdateConcealHours=168V5_UpdateScreenEl
3
Jun 9, 2017 15:40:09.678308010 MESZ80492352.17.214.122192.168.1.13Data Raw: 31 32 2c 31 3b 2d 33 2c 31 32 2c 31 3b 2d 37 2c 32 34 2c 31 3b 2d 38 2c 32 34 2c 31 3b 2d 39 2c 32 34 2c 31 3b 2d 31 32 2c 32 34 2c 31 0d 0a 53 4c 45 78 70 54 6f 61 73 74 65 72 54 69 6d 69 6e 67 59 65 61 72 4c 69 63 3d 33 30 2c 32 34 2c 30 3b 32
Data Ascii: 12,1;-3,12,1;-7,24,1;-8,24,1;-9,24,1;-12,24,1SLExpToasterTimingYearLic=30,24,0;23,12,0;15,12,0;12,12,1;9,12,1;7,12,1;6,12,1;5,12,1;4,12,1;3,6,1;2,6,1;1,6,1;0,6,1;-1,6,1;-2,6,1;-3,6,1;-4,6,1;-5,6,1;-6,6,1;-7,6,1;-8,12,1;-9,12,1;-10,12,1;-11,1
4
Jun 9, 2017 15:40:09.678334951 MESZ80492352.17.214.122192.168.1.13Data Raw: 31 34 34 30 0d 0a 49 70 6d 50 72 6f 74 6f 63 6f 6c 48 74 74 70 32 30 31 35 3d 0d 0a 45 78 70 54 6f 61 73 74 65 72 54 69 6d 69 6e 67 54 72 69 61 6c 53 75 62 5f 74 34 39 33 6f 66 66 62 3d 37 2c 32 34 2c 31 3b 36 2c 32 34 2c 31 3b 35 2c 32 34 2c 31
Data Ascii: 1440IpmProtocolHttp2015=ExpToasterTimingTrialSub_t493offb=7,24,1;6,24,1;5,24,1;4,12,1;3,12,1;2,12,1;1,6,1;0,6,1;-1,6,1;-2,6,1;-3,6,1;-4,6,1;-5,6,1;-6,6,1;-7,24,1ExpToasterTimingTrialSub_t493onb=7,24,1;6,24,1;5,24,1;4,12,1;3,12,1;2,12,1;1
5
Jun 9, 2017 15:40:09.680398941 MESZ80492352.17.214.122192.168.1.13Data Raw: 3b 36 2c 32 34 2c 31 3b 35 2c 32 34 2c 31 3b 34 2c 31 32 2c 31 3b 33 2c 31 32 2c 31 3b 32 2c 31 32 2c 31 3b 31 2c 31 32 2c 31 3b 30 2c 31 32 2c 31 3b 2d 31 2c 31 32 2c 31 3b 2d 32 2c 31 32 2c 31 3b 2d 33 2c 31 32 2c 31 3b 2d 37 2c 32 34 2c 31 3b
Data Ascii: ;6,24,1;5,24,1;4,12,1;3,12,1;2,12,1;1,12,1;0,12,1;-1,12,1;-2,12,1;-3,12,1;-7,24,1;-8,24,1;-9,24,1;-12,24,1[server0]name=Download v4618535 AVAST9 Serverurlpgm=http://v4618535.iavs9x.u.avast.com/iavs9xurlvps=http://v4618535.ivps9x.u.av
6
Jun 9, 2017 15:40:09.680412054 MESZ80492352.17.214.122192.168.1.13Data Raw: 3a 2f 2f 73 75 62 6d 69 74 35 2e 61 76 61 73 74 2e 63 6f 6d 2f 63 67 69 2d 62 69 6e 2f 73 75 62 6d 69 74 35 30 2e 63 67 69 0d 0a 67 65 6f 49 50 3d 68 74 74 70 3a 2f 2f 67 65 6f 69 70 2e 61 76 61 73 74 2e 63 6f 6d 2f 67 65 6f 69 70 2f 67 65 6f 69
Data Ascii: ://submit5.avast.com/cgi-bin/submit50.cgigeoIP=http://geoip.avast.com/geoip/geoip.phpweight=20[server2]name=Download v7630928 AVAST9 Serverurlpgm=http://v7630928.iavs9x.u.avast.com/iavs9xurlvps=http://v7630928.ivps9x.u.avast.com/
8
Jun 9, 2017 15:40:09.680449963 MESZ80492352.17.214.122192.168.1.13Data Raw: 74 35 2e 61 76 61 73 74 2e 63 6f 6d 2f 63 67 69 2d 62 69 6e 2f 73 75 62 6d 69 74 35 30 2e 63 67 69 0d 0a 67 65 6f 49 50 3d 68 74 74 70 3a 2f 2f 67 65 6f 69 70 2e 61 76 61 73 74 2e 63 6f 6d 2f 67 65 6f 69 70 2f 67 65 6f 69 70 2e 70 68 70 0d 0a 77
Data Ascii: t5.avast.com/cgi-bin/submit50.cgigeoIP=http://geoip.avast.com/geoip/geoip.phpweight=20[server4]name=Download z9743321 AVAST9 Serverurlpgm=http://z9743321.iavs9x.u.avast.com/iavs9xurlvps=http://z9743321.ivps9x.u.avast.com/ivps9x
8
Jun 9, 2017 15:40:09.684830904 MESZ80492352.17.214.122192.168.1.13Data Raw: 3a 2f 2f 7a 39 37 34 33 33 32 31 2e 76 70 73 6e 69 74 72 6f 74 69 6e 79 2e 75 2e 61 76 61 73 74 2e 63 6f 6d 2f 76 70 73 6e 69 74 72 6f 74 69 6e 79 0d 0a 75 72 6c 3d 68 74 74 70 3a 2f 2f 7a 39 37 34 33 33 32 31 2e 69 61 76 73 35 78 2e 75 2e 61 76
Data Ascii: ://z9743321.vpsnitrotiny.u.avast.com/vpsnitrotinyurl=http://z9743321.iavs5x.u.avast.com/iavs5xstats=http://v7.stats.avast.com/cgi-bin/iavs4stats.cgistats2=http://v7.stats.avast.com/cgi-bin/iavs4stats.cgistats10=http://v7event.stats.ava
10
Jun 9, 2017 15:40:09.684849977 MESZ80492352.17.214.122192.168.1.13Data Raw: 31 35 39 2e 76 70 73 6e 69 74 72 6f 74 69 6e 79 2e 75 2e 61 76 61 73 74 2e 63 6f 6d 2f 76 70 73 6e 69 74 72 6f 74 69 6e 79 0d 0a 75 72 6c 3d 68 74 74 70 3a 2f 2f 74 33 30 33 36 31 35 39 2e 69 61 76 73 35 78 2e 75 2e 61 76 61 73 74 2e 63 6f 6d 2f
Data Ascii: 159.vpsnitrotiny.u.avast.com/vpsnitrotinyurl=http://t3036159.iavs5x.u.avast.com/iavs5xstats=http://v7.stats.avast.com/cgi-bin/iavs4stats.cgistats2=http://v7.stats.avast.com/cgi-bin/iavs4stats.cgistats10=http://v7event.stats.avast.com/c
11
Jun 9, 2017 15:40:09.684875965 MESZ80492352.17.214.122192.168.1.13Data Raw: 69 74 72 6f 74 69 6e 79 2e 75 2e 61 76 61 73 74 2e 63 6f 6d 2f 76 70 73 6e 69 74 72 6f 74 69 6e 79 0d 0a 75 72 6c 3d 68 74 74 70 3a 2f 2f 70 34 30 38 35 33 32 35 2e 69 61 76 73 35 78 2e 75 2e 61 76 61 73 74 2e 63 6f 6d 2f 69 61 76 73 35 78 0d 0a
Data Ascii: itrotiny.u.avast.com/vpsnitrotinyurl=http://p4085325.iavs5x.u.avast.com/iavs5xstats=http://v7.stats.avast.com/cgi-bin/iavs4stats.cgistats2=http://v7.stats.avast.com/cgi-bin/iavs4stats.cgistats10=http://v7event.stats.avast.com/cgi-bin/i
12
Jun 9, 2017 15:40:09.696362019 MESZ80492352.17.214.122192.168.1.13Data Raw: 65 76 65 6e 74 73 2e 63 67 69 0d 0a 73 75 62 6d 69 74 3d 68 74 74 70 3a 2f 2f 73 6d 30 30 2e 61 76 61 73 74 2e 63 6f 6d 2f 63 67 69 2d 62 69 6e 2f 69 61 76 73 75 70 32 2e 63 67 69 0d 0a 73 75 62 6d 69 74 35 3d 68 74 74 70 3a 2f 2f 73 75 62 6d 69
Data Ascii: events.cgisubmit=http://sm00.avast.com/cgi-bin/iavsup2.cgisubmit5=http://submit5.avast.com/cgi-bin/submit50.cgigeoIP=http://geoip.avast.com/geoip/geoip.phpweight=20[server10]name=Download k6375621 AVAST9 Serverurlpgm=http://k63
13

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

System Behavior

General

Start time:15:39:31
Start date:09/06/2017
Path:C:\g8F53.tmp.exe
Wow64 process (32bit):false
Commandline:'C:\g8F53.tmp.exe'
Imagebase:0x13fc40000
File size:307200 bytes
MD5 hash:679A54233089BD649B01BC70905E22CD
Programmed in:C, C++ or other language

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:10.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:3.9%
    Total number of Nodes:1143
    Total number of Limit Nodes:69

    Graph

    %3 18640 13fc54ce0 18641 13fc54ce8 18640->18641 18642 13fc54d20 18641->18642 18643 13fc54d0b 18641->18643 18659 13fc53ff0 EnterCriticalSection 18642->18659 18644 13fc5c398 setbuf 15 API calls 18643->18644 18646 13fc54d10 18644->18646 18648 13fc5c278 _invalid_parameter_noinfo 31 API calls 18646->18648 18655 13fc54d1c 18648->18655 18682 13fc6ab5a 18685 13fc53ffc LeaveCriticalSection 18682->18685 18797 13fc5ef78 18798 13fc5f017 18797->18798 18799 13fc5efa4 18797->18799 18802 13fc5c774 _fread_nolock 31 API calls 18798->18802 18828 13fc5f00d 18798->18828 18800 13fc5c774 _fread_nolock 31 API calls 18799->18800 18801 13fc5efa9 18800->18801 18804 13fc5efd2 18801->18804 18805 13fc5c774 _fread_nolock 31 API calls 18801->18805 18803 13fc5f02e 18802->18803 18806 13fc5c774 _fread_nolock 31 API calls 18803->18806 18821 13fc5f057 18803->18821 18804->18798 18815 13fc5efe8 18804->18815 18808 13fc5efb6 18805->18808 18807 13fc5f03b 18806->18807 18813 13fc5c774 _fread_nolock 31 API calls 18807->18813 18807->18821 18808->18804 18810 13fc5c774 _fread_nolock 31 API calls 18808->18810 18809 13fc55ab4 31 API calls 18812 13fc5f072 18809->18812 18814 13fc5efc3 18810->18814 18818 13fc5e95c setbuf 35 API calls 18812->18818 18812->18828 18816 13fc5f048 18813->18816 18817 13fc5c774 _fread_nolock 31 API calls 18814->18817 18815->18828 18829 13fc55ab4 18815->18829 18819 13fc5c774 _fread_nolock 31 API calls 18816->18819 18817->18804 18820 13fc5f080 18818->18820 18819->18821 18822 13fc55ab4 31 API calls 18820->18822 18825 13fc5f0b1 setbuf 18820->18825 18821->18809 18821->18828 18823 13fc5f098 18822->18823 18824 13fc5f09d 18823->18824 18823->18825 18835 13fc586dc 18824->18835 18827 13fc5c398 setbuf 15 API calls 18825->18827 18825->18828 18827->18828 18830 13fc55a70 18829->18830 18831 13fc5c398 setbuf 15 API calls 18830->18831 18832 13fc55a8c 18830->18832 18833 13fc55a81 18831->18833 18832->18815 18834 13fc5c278 _invalid_parameter_noinfo 31 API calls 18833->18834 18834->18832 18836 13fc586fc 18835->18836 18837 13fc58711 18835->18837 18838 13fc5c398 setbuf 15 API calls 18836->18838 18847 13fc53ff0 EnterCriticalSection 18837->18847 18840 13fc58701 18838->18840 18843 13fc5c278 _invalid_parameter_noinfo 31 API calls 18840->18843 18845 13fc5870c 18843->18845 18845->18828 18954 13fc6ad1a 18955 13fc6ad2c 18954->18955 18957 13fc6ad36 18954->18957 18958 13fc5b524 LeaveCriticalSection 18955->18958 16388 13fc45110 16389 13fc45140 16388->16389 16397 13fc58220 16389->16397 16392 13fc58220 32 API calls 16396 13fc45187 16392->16396 16393 13fc451ab 16394 13fc45190 Sleep 16395 13fc58220 32 API calls 16394->16395 16395->16396 16396->16393 16396->16394 16400 13fc58188 16397->16400 16401 13fc58196 16400->16401 16402 13fc581aa 16400->16402 16403 13fc5c398 setbuf 15 API calls 16401->16403 16404 13fc4517d 16402->16404 16408 13fc5bba8 16402->16408 16406 13fc5819b 16403->16406 16404->16392 16407 13fc5c278 _invalid_parameter_noinfo 31 API calls 16406->16407 16407->16404 16409 13fc5b61c setbuf 5 API calls 16408->16409 16410 13fc5bbd4 16409->16410 16411 13fc5bbec GetSystemTimeAsFileTime 16410->16411 16412 13fc5bbdc 16410->16412 16411->16412 16412->16404 18959 13fc48390 18962 13fc48258 18959->18962 18963 13fc48299 18962->18963 18964 13fc48281 18962->18964 18966 13fc482a2 18963->18966 18969 13fc482b5 18963->18969 18965 13fc5c398 setbuf 15 API calls 18964->18965 18967 13fc48286 18965->18967 18968 13fc5c398 setbuf 15 API calls 18966->18968 18970 13fc5c278 _invalid_parameter_noinfo 31 API calls 18967->18970 18971 13fc48292 18968->18971 18969->18964 18972 13fc482cd 18969->18972 18970->18971 18973 13fc482e0 18972->18973 18974 13fc482d2 18972->18974 18985 13fc53ff0 EnterCriticalSection 18973->18985 18975 13fc5c398 setbuf 15 API calls 18974->18975 18975->18971 16441 13fc451fd 16442 13fc4523c 16441->16442 16442->16442 16443 13fc4547a CreateWindowExA 16442->16443 16444 13fc45a90 16443->16444 16449 13fc455d4 16443->16449 16445 13fc45ae0 _wcstombs_s_l 8 API calls 16444->16445 16446 13fc45ab1 16445->16446 16447 13fc4576e RegisterWaitForSingleObject 16448 13fc45824 GetProcAddress 16447->16448 16448->16444 16451 13fc4592e 16448->16451 16449->16444 16449->16447 16465 13fc440c0 16451->16465 16454 13fc4596a 16501 13fc429d0 16454->16501 16464 13fc45a30 TranslateMessage DispatchMessageA GetMessageA 16464->16444 16464->16464 16466 13fc44100 16465->16466 16530 13fc43d90 16466->16530 16469 13fc45ae0 _wcstombs_s_l 8 API calls 16470 13fc443b9 16469->16470 16470->16454 16473 13fc42dc0 16470->16473 16471 13fc44188 16471->16469 16471->16471 16474 13fc42de1 setbuf 16473->16474 16474->16474 16477 13fc4329d CreateToolhelp32Snapshot 16474->16477 16488 13fc432c9 16474->16488 16475 13fc45ae0 _wcstombs_s_l 8 API calls 16476 13fc43d6c 16475->16476 16476->16444 16489 13fc443d0 16476->16489 16478 13fc432af Process32First 16477->16478 16477->16488 16479 13fc432d0 16478->16479 16478->16488 16480 13fc43317 Process32Next 16479->16480 16481 13fc4332f 16479->16481 16480->16479 16480->16488 16481->16481 16482 13fc434af OpenProcess 16481->16482 16481->16488 16483 13fc434c8 16482->16483 16482->16488 16484 13fc43940 NtQueryInformationProcess VirtualProtectEx ReadProcessMemory 16483->16484 16483->16488 16485 13fc439b5 VirtualProtectEx ReadProcessMemory 16484->16485 16484->16488 16486 13fc43a00 _fread_nolock 16485->16486 16485->16488 16487 13fc43a14 ReadProcessMemory 16486->16487 16487->16488 16488->16475 16488->16488 16490 13fc4441c 16489->16490 16491 13fc43d90 9 API calls 16490->16491 16492 13fc4445d 16491->16492 16498 13fc48fb8 96 API calls 16492->16498 16493 13fc4466d 16494 13fc45ae0 _wcstombs_s_l 8 API calls 16493->16494 16495 13fc4467c 16494->16495 16495->16454 16496 13fc444a9 16496->16493 16988 13fc56ab0 16496->16988 16498->16496 16502 13fc42a4f RegCreateKeyExA 16501->16502 16504 13fc42d97 16502->16504 16506 13fc42d3a 16502->16506 16505 13fc45ae0 _wcstombs_s_l 8 API calls 16504->16505 16508 13fc42da6 16505->16508 16506->16506 16507 13fc42d4f RegSetValueExA 16506->16507 16507->16504 16509 13fc446a0 CertOpenStore 16508->16509 16510 13fc44764 16509->16510 16511 13fc446d2 16509->16511 16516 13fc44e20 16510->16516 16512 13fc44754 CertCloseStore 16511->16512 16513 13fc44700 CertCreateCertificateContext 16511->16513 16515 13fc44745 16511->16515 16512->16510 16513->16511 16514 13fc44723 CertAddCertificateContextToStore CertFreeCertificateContext 16513->16514 16514->16511 16515->16512 17018 13fc6a630 16516->17018 16519 13fc44e88 16520 13fc48fb8 96 API calls 16519->16520 16524 13fc44f4d 16520->16524 16521 13fc4504b 16522 13fc45ae0 _wcstombs_s_l 8 API calls 16521->16522 16523 13fc4505a 16522->16523 16523->16444 16523->16464 16524->16521 17020 13fc58ba8 16524->17020 16529 13fc54c74 60 API calls 16529->16521 16531 13fc43dfc GetComputerNameA 16530->16531 16533 13fc4405e 16531->16533 16533->16533 16534 13fc45ae0 _wcstombs_s_l 8 API calls 16533->16534 16535 13fc4409e 16534->16535 16536 13fc48fb8 16535->16536 16539 13fc48ee8 16536->16539 16537 13fc48f0c 16538 13fc5c398 setbuf 15 API calls 16537->16538 16540 13fc48f11 16538->16540 16539->16537 16541 13fc48f3a 16539->16541 16544 13fc5c278 _invalid_parameter_noinfo 31 API calls 16540->16544 16542 13fc48f4c 16541->16542 16543 13fc48f3f 16541->16543 16555 13fc5eb04 16542->16555 16546 13fc5c398 setbuf 15 API calls 16543->16546 16554 13fc48f1c 16544->16554 16546->16554 16548 13fc48f60 16550 13fc5c398 setbuf 15 API calls 16548->16550 16549 13fc48f6d 16562 13fc5e174 16549->16562 16550->16554 16552 13fc48f81 tmpfile 16567 13fc53ffc LeaveCriticalSection 16552->16567 16554->16471 16568 13fc5b4d0 EnterCriticalSection 16555->16568 16557 13fc5eb1b 16558 13fc5eba4 tmpfile 18 API calls 16557->16558 16559 13fc5eb26 16558->16559 16560 13fc5b524 tmpfile LeaveCriticalSection 16559->16560 16561 13fc48f56 16560->16561 16561->16548 16561->16549 16569 13fc5ded8 16562->16569 16564 13fc5e1ce 16564->16552 16570 13fc5df0a 16569->16570 16570->16570 16580 13fc5e095 16570->16580 16584 13fc68238 16570->16584 16571 13fc5c398 setbuf 15 API calls 16572 13fc5e15a 16571->16572 16573 13fc5c278 _invalid_parameter_noinfo 31 API calls 16572->16573 16574 13fc5e09e 16573->16574 16574->16564 16581 13fc62468 16574->16581 16576 13fc5e0f4 16577 13fc68238 43 API calls 16576->16577 16576->16580 16578 13fc5e117 16577->16578 16579 13fc68238 43 API calls 16578->16579 16578->16580 16579->16580 16580->16571 16580->16574 16601 13fc61d94 16581->16601 16586 13fc68273 16584->16586 16589 13fc68246 16584->16589 16585 13fc6824b 16588 13fc5c398 setbuf 15 API calls 16585->16588 16587 13fc682de 16586->16587 16591 13fc4867c _mbstowcs_s_l 35 API calls 16586->16591 16587->16576 16590 13fc68250 16588->16590 16589->16585 16589->16586 16592 13fc5c278 _invalid_parameter_noinfo 31 API calls 16590->16592 16595 13fc682ba 16591->16595 16594 13fc6825b 16592->16594 16593 13fc682ce 16596 13fc5c398 setbuf 15 API calls 16593->16596 16594->16576 16595->16593 16600 13fc682e0 16595->16600 16597 13fc682d3 16596->16597 16598 13fc5c278 _invalid_parameter_noinfo 31 API calls 16597->16598 16598->16587 16599 13fc67c28 43 API calls 16599->16600 16600->16587 16600->16599 16602 13fc61dd0 16601->16602 16603 13fc61db8 16601->16603 16602->16603 16606 13fc61dfd 16602->16606 16604 13fc5c398 setbuf 15 API calls 16603->16604 16605 13fc61dbd 16604->16605 16608 13fc5c278 _invalid_parameter_noinfo 31 API calls 16605->16608 16612 13fc623d8 16606->16612 16609 13fc61dc9 16608->16609 16609->16564 16620 13fc602f8 16612->16620 16614 13fc61e25 16614->16609 16619 13fc6476c LeaveCriticalSection 16614->16619 16618 13fc5b28c _Mtx_destroy 15 API calls 16618->16614 16621 13fc6031d 16620->16621 16622 13fc60334 16620->16622 16623 13fc5c398 setbuf 15 API calls 16621->16623 16622->16621 16624 13fc60339 16622->16624 16625 13fc60322 16623->16625 16682 13fc5b7bc 16624->16682 16627 13fc5c278 _invalid_parameter_noinfo 31 API calls 16625->16627 16629 13fc6032d 16627->16629 16629->16614 16640 13fc6249c 16629->16640 16630 13fc6036c GetLastError 16685 13fc5c328 16630->16685 16631 13fc6037b 16633 13fc5b2cc setbuf 16 API calls 16631->16633 16634 13fc60386 16633->16634 16635 13fc6038e MultiByteToWideChar 16634->16635 16639 13fc603bb 16634->16639 16637 13fc603ae GetLastError 16635->16637 16635->16639 16636 13fc5b28c _Mtx_destroy 15 API calls 16636->16629 16638 13fc5c328 _fread_nolock 15 API calls 16637->16638 16638->16639 16639->16636 16690 13fc62108 16640->16690 16643 13fc62527 16710 13fc64790 16643->16710 16644 13fc62510 16645 13fc5c378 tmpfile 15 API calls 16644->16645 16648 13fc62515 16645->16648 16651 13fc5c398 setbuf 15 API calls 16648->16651 16675 13fc62446 16651->16675 16672 13fc62740 16759 13fc6023c 16672->16759 16673 13fc62752 16673->16675 16676 13fc627d5 CloseHandle CreateFileW 16673->16676 16675->16618 16677 13fc6281f GetLastError 16676->16677 16678 13fc6284d 16676->16678 16679 13fc5c328 _fread_nolock 15 API calls 16677->16679 16678->16675 16680 13fc6282c 16679->16680 16774 13fc648c0 16680->16774 16683 13fc5b61c setbuf 5 API calls 16682->16683 16684 13fc5b7de MultiByteToWideChar 16683->16684 16684->16630 16684->16631 16686 13fc5d8bc setbuf 15 API calls 16685->16686 16687 13fc5c339 16686->16687 16688 13fc5d8bc setbuf 15 API calls 16687->16688 16689 13fc5c352 _Mtx_destroy 16688->16689 16689->16629 16691 13fc62134 16690->16691 16692 13fc6214e 16690->16692 16691->16692 16694 13fc5c398 setbuf 15 API calls 16691->16694 16693 13fc621cb 16692->16693 16702 13fc5c398 setbuf 15 API calls 16692->16702 16697 13fc6221c 16693->16697 16699 13fc5c398 setbuf 15 API calls 16693->16699 16695 13fc62143 16694->16695 16696 13fc5c278 _invalid_parameter_noinfo 31 API calls 16695->16696 16696->16692 16698 13fc6227c 16697->16698 16783 13fc59d54 16697->16783 16698->16643 16698->16644 16703 13fc62211 16699->16703 16706 13fc621c0 16702->16706 16705 13fc5c278 _invalid_parameter_noinfo 31 API calls 16703->16705 16704 13fc622fb 16708 13fc5c298 _invalid_parameter_noinfo 16 API calls 16704->16708 16705->16697 16707 13fc5c278 _invalid_parameter_noinfo 31 API calls 16706->16707 16707->16693 16709 13fc62310 16708->16709 16789 13fc5b4d0 EnterCriticalSection 16710->16789 16743 13fc6201b 16743->16672 16743->16673 16751 13fc62016 16752 13fc5c398 setbuf 15 API calls 16751->16752 16752->16743 16756 13fc61fe9 16756->16743 16756->16751 16963 13fc5fb84 16756->16963 16760 13fc6497c tmpfile 31 API calls 16759->16760 16761 13fc60250 16760->16761 16762 13fc60256 16761->16762 16765 13fc6497c tmpfile 31 API calls 16761->16765 16773 13fc60290 16761->16773 16763 13fc648c0 tmpfile 16 API calls 16762->16763 16767 13fc602b8 16763->16767 16764 13fc6497c tmpfile 31 API calls 16766 13fc6029c CloseHandle 16764->16766 16768 13fc60283 16765->16768 16766->16762 16769 13fc602a9 GetLastError 16766->16769 16770 13fc602e4 16767->16770 16771 13fc5c328 _fread_nolock 15 API calls 16767->16771 16772 13fc6497c tmpfile 31 API calls 16768->16772 16769->16762 16770->16675 16771->16770 16772->16773 16773->16762 16773->16764 16775 13fc6494e 16774->16775 16776 13fc648dc 16774->16776 16777 13fc5c398 setbuf 15 API calls 16775->16777 16776->16775 16780 13fc6490f tmpfile 16776->16780 16778 13fc64953 16777->16778 16779 13fc5c378 tmpfile 15 API calls 16778->16779 16781 13fc64940 16779->16781 16780->16781 16782 13fc64938 SetStdHandle 16780->16782 16781->16678 16782->16781 16784 13fc59d5d 16783->16784 16785 13fc59d6d 16783->16785 16786 13fc5c398 setbuf 15 API calls 16784->16786 16785->16698 16785->16704 16787 13fc59d62 16786->16787 16788 13fc5c278 _invalid_parameter_noinfo 31 API calls 16787->16788 16788->16785 16964 13fc5fbad 16963->16964 16967 13fc5fbc5 16963->16967 16966 13fc5c378 tmpfile 15 API calls 16964->16966 16965 13fc5fc3d 16968 13fc5c378 tmpfile 15 API calls 16965->16968 16969 13fc5fbb2 16966->16969 16967->16965 16971 13fc5fbf8 16967->16971 16970 13fc5fc42 16968->16970 16972 13fc5c398 setbuf 15 API calls 16969->16972 16974 13fc5c398 setbuf 15 API calls 16970->16974 16987 13fc64688 EnterCriticalSection 16971->16987 16975 13fc5fbba 16972->16975 16976 13fc5fc4a 16974->16976 16975->16756 16980 13fc5c278 _invalid_parameter_noinfo 31 API calls 16976->16980 16977 13fc5fbff 16978 13fc5fc0e 16977->16978 16979 13fc5fc23 16977->16979 16981 13fc5c398 setbuf 15 API calls 16978->16981 16982 13fc5fc70 setbuf 53 API calls 16979->16982 16980->16975 16983 13fc5fc13 16981->16983 16984 13fc5fc1e 16982->16984 16985 13fc5c378 tmpfile 15 API calls 16983->16985 16986 13fc6476c setbuf LeaveCriticalSection 16984->16986 16985->16984 16986->16975 16989 13fc56ad0 16988->16989 16990 13fc4465f 16988->16990 16989->16990 16991 13fc56af2 16989->16991 16992 13fc56ada 16989->16992 16997 13fc54c74 16990->16997 17009 13fc56870 16991->17009 16993 13fc5c398 setbuf 15 API calls 16992->16993 16995 13fc56adf 16993->16995 16996 13fc5c278 _invalid_parameter_noinfo 31 API calls 16995->16996 16996->16990 16998 13fc54c92 16997->16998 16999 13fc54ca7 16997->16999 17000 13fc5c398 setbuf 15 API calls 16998->17000 17002 13fc54ca2 tmpfile 16999->17002 17017 13fc53ff0 EnterCriticalSection 16999->17017 17001 13fc54c97 17000->17001 17004 13fc5c278 _invalid_parameter_noinfo 31 API calls 17001->17004 17002->16493 17004->17002 17005 13fc54cbd 17006 13fc54bf0 58 API calls 17005->17006 17007 13fc54cc6 17006->17007 17008 13fc53ffc setbuf LeaveCriticalSection 17007->17008 17008->17002 17016 13fc53ff0 EnterCriticalSection 17009->17016 17011 13fc5688d 17012 13fc568b0 56 API calls 17011->17012 17013 13fc56896 17012->17013 17014 13fc53ffc setbuf LeaveCriticalSection 17013->17014 17015 13fc568a1 17014->17015 17015->16990 17019 13fc44e3d GetSystemDirectoryA 17018->17019 17019->16519 17040 13fc58bc8 17020->17040 17023 13fc44890 17024 13fc448ab setbuf 17023->17024 17025 13fc4496d LoadLibraryA 17024->17025 17026 13fc44a10 17025->17026 17027 13fc44de9 17026->17027 17028 13fc44a5d URLDownloadToFileA 17026->17028 17029 13fc45ae0 _wcstombs_s_l 8 API calls 17027->17029 17028->17027 17031 13fc44a81 17028->17031 17030 13fc44e06 17029->17030 17030->16529 17032 13fc48fb8 96 API calls 17031->17032 17033 13fc44ae0 17032->17033 17033->17027 17034 13fc58ba8 _fread_nolock 43 API calls 17033->17034 17035 13fc44b41 17034->17035 17036 13fc54c74 60 API calls 17035->17036 17037 13fc44b49 DeleteFileA 17036->17037 17038 13fc44b60 17037->17038 17038->17027 17039 13fc44770 58 API calls 17038->17039 17039->17038 17041 13fc58bf2 17040->17041 17042 13fc44fb3 17040->17042 17041->17042 17043 13fc58c01 _fread_nolock 17041->17043 17044 13fc58c23 17041->17044 17042->17023 17046 13fc5c398 setbuf 15 API calls 17043->17046 17053 13fc53ff0 EnterCriticalSection 17044->17053 17048 13fc58c16 17046->17048 17047 13fc58c2b 17049 13fc58928 _fread_nolock 41 API calls 17047->17049 17051 13fc5c278 _invalid_parameter_noinfo 31 API calls 17048->17051 17050 13fc58c42 17049->17050 17052 13fc53ffc setbuf LeaveCriticalSection 17050->17052 17051->17042 17052->17042 17068 13fc45ea8 17089 13fc45b40 17068->17089 17072 13fc45eca __scrt_acquire_startup_lock 17073 13fc4649c 7 API calls 17072->17073 17074 13fc45eef 17072->17074 17073->17074 17081 13fc45f31 17074->17081 17097 13fc59d08 17074->17097 17078 13fc45f14 17079 13fc45f9e 17106 13fc465e4 17079->17106 17081->17079 17121 13fc47938 17081->17121 17082 13fc45fa3 17109 13fc59c20 17082->17109 17085 13fc45fab 17126 13fc46620 GetModuleHandleW 17085->17126 17088 13fc45fc6 17128 13fc45d2c 17088->17128 17090 13fc45b62 17089->17090 17132 13fc46e80 17090->17132 17093 13fc45b6b 17093->17072 17114 13fc4649c IsProcessorFeaturePresent 17093->17114 17099 13fc59d20 17097->17099 17098 13fc45f10 17098->17078 17102 13fc59c90 17098->17102 17099->17098 17257 13fc53e60 17099->17257 17269 13fc45dc0 17099->17269 17103 13fc59ceb 17102->17103 17104 13fc59ccc 17102->17104 17103->17081 17104->17103 17363 13fc45e8c 17104->17363 17371 13fc46ce0 17106->17371 17110 13fc63830 48 API calls 17109->17110 17113 13fc59c2f 17110->17113 17111 13fc63c38 35 API calls 17111->17113 17112 13fc59c75 17112->17085 17113->17111 17113->17112 17115 13fc464c1 _fread_nolock 17114->17115 17116 13fc464dd RtlCaptureContext RtlLookupFunctionEntry 17115->17116 17117 13fc46506 RtlVirtualUnwind 17116->17117 17118 13fc46542 _fread_nolock 17116->17118 17117->17118 17119 13fc46574 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17118->17119 17120 13fc465c6 17119->17120 17120->17072 17122 13fc47976 17121->17122 17123 13fc47964 17121->17123 17373 13fc5b1ec 17122->17373 17123->17079 17127 13fc46634 17126->17127 17127->17088 17130 13fc45d3d 17128->17130 17129 13fc45d4f 17129->17078 17130->17129 17131 13fc46eb4 8 API calls 17130->17131 17131->17129 17133 13fc46e89 17132->17133 17155 13fc471cc 17133->17155 17137 13fc45b67 17137->17093 17140 13fc59b50 17137->17140 17141 13fc64224 17140->17141 17142 13fc45b74 17141->17142 17143 13fc63830 48 API calls 17141->17143 17205 13fc5d95c 17141->17205 17212 13fc5d434 17141->17212 17223 13fc5b488 17141->17223 17142->17093 17147 13fc46eb4 17142->17147 17143->17141 17148 13fc46ecd 17147->17148 17149 13fc46ebc 17147->17149 17148->17093 17150 13fc471a8 6 API calls 17149->17150 17151 13fc46ec1 17150->17151 17152 13fc47214 DeleteCriticalSection 17151->17152 17153 13fc46ec6 17152->17153 17253 13fc475f0 17153->17253 17156 13fc471d4 17155->17156 17158 13fc47205 17156->17158 17159 13fc46e93 17156->17159 17172 13fc47534 17156->17172 17160 13fc47214 DeleteCriticalSection 17158->17160 17159->17137 17161 13fc47168 17159->17161 17160->17159 17186 13fc47424 17161->17186 17163 13fc47178 17165 13fc46ea0 17163->17165 17191 13fc474cc 17163->17191 17165->17137 17168 13fc47214 17165->17168 17166 13fc47195 17166->17165 17196 13fc471a8 17166->17196 17169 13fc4723f 17168->17169 17170 13fc47222 DeleteCriticalSection 17169->17170 17171 13fc47243 17169->17171 17170->17169 17171->17137 17177 13fc4724c 17172->17177 17175 13fc4758b InitializeCriticalSectionAndSpinCount 17176 13fc47577 17175->17176 17176->17156 17178 13fc472a8 17177->17178 17183 13fc472ad 17177->17183 17179 13fc472dc LoadLibraryExW 17178->17179 17182 13fc47390 17178->17182 17178->17183 17184 13fc47375 FreeLibrary 17178->17184 17185 13fc47337 LoadLibraryExW 17178->17185 17179->17178 17180 13fc472fd GetLastError 17179->17180 17180->17178 17181 13fc4739e GetProcAddress 17181->17183 17182->17181 17182->17183 17183->17175 17183->17176 17184->17178 17185->17178 17187 13fc4724c 5 API calls 17186->17187 17188 13fc4744d 17187->17188 17189 13fc47455 17188->17189 17190 13fc47464 TlsAlloc 17188->17190 17189->17163 17190->17189 17192 13fc4724c 5 API calls 17191->17192 17193 13fc474ff 17192->17193 17194 13fc47518 TlsSetValue 17193->17194 17195 13fc47507 17193->17195 17194->17195 17195->17166 17197 13fc471b7 17196->17197 17199 13fc471bc 17196->17199 17200 13fc47478 17197->17200 17199->17165 17201 13fc4724c 5 API calls 17200->17201 17202 13fc474a3 17201->17202 17203 13fc474ab 17202->17203 17204 13fc474b9 TlsFree 17202->17204 17203->17199 17204->17203 17229 13fc5b9a0 17205->17229 17208 13fc5d8bc setbuf 15 API calls 17209 13fc5d980 17208->17209 17211 13fc5d977 17209->17211 17234 13fc5d998 17209->17234 17211->17141 17243 13fc5b4d0 EnterCriticalSection 17212->17243 17214 13fc5d444 17215 13fc645d0 32 API calls 17214->17215 17216 13fc5d44d 17215->17216 17217 13fc5d45b 17216->17217 17218 13fc5d24c 34 API calls 17216->17218 17219 13fc5b524 tmpfile LeaveCriticalSection 17217->17219 17220 13fc5d456 17218->17220 17221 13fc5d467 17219->17221 17222 13fc5d338 GetStdHandle GetFileType 17220->17222 17221->17141 17222->17217 17224 13fc5b490 17223->17224 17226 13fc5b4c1 17224->17226 17228 13fc5b4bd 17224->17228 17244 13fc5bc74 17224->17244 17249 13fc5b4ec 17226->17249 17228->17141 17230 13fc5b61c setbuf 5 API calls 17229->17230 17231 13fc5b9cc 17230->17231 17232 13fc5b9e4 TlsAlloc 17231->17232 17233 13fc5b9d4 17231->17233 17232->17233 17233->17208 17233->17211 17235 13fc5d9a7 17234->17235 17237 13fc5d9ac 17234->17237 17238 13fc5b9f8 17235->17238 17237->17211 17239 13fc5b61c setbuf 5 API calls 17238->17239 17240 13fc5ba23 17239->17240 17241 13fc5ba2b 17240->17241 17242 13fc5ba3a TlsFree 17240->17242 17241->17237 17242->17241 17245 13fc5b61c setbuf 5 API calls 17244->17245 17246 13fc5bcaf 17245->17246 17247 13fc5bcb7 17246->17247 17248 13fc5bccc InitializeCriticalSectionAndSpinCount 17246->17248 17247->17224 17248->17247 17250 13fc5b517 17249->17250 17251 13fc5b4fa DeleteCriticalSection 17250->17251 17252 13fc5b51b 17250->17252 17251->17250 17252->17228 17254 13fc47628 17253->17254 17255 13fc475f4 17253->17255 17254->17148 17255->17254 17256 13fc4760e FreeLibrary 17255->17256 17256->17255 17258 13fc53e8a 17257->17258 17259 13fc5b38c setbuf 15 API calls 17258->17259 17260 13fc53ea9 17259->17260 17261 13fc5b28c _Mtx_destroy 15 API calls 17260->17261 17262 13fc53eb7 17261->17262 17263 13fc53ee1 17262->17263 17264 13fc5b38c setbuf 15 API calls 17262->17264 17265 13fc5bc74 tmpfile 6 API calls 17263->17265 17268 13fc53eea 17263->17268 17266 13fc53ed3 17264->17266 17265->17263 17267 13fc5b28c _Mtx_destroy 15 API calls 17266->17267 17267->17263 17268->17099 17270 13fc45dd0 17269->17270 17290 13fc59d84 17270->17290 17272 13fc45ddc 17296 13fc45b8c 17272->17296 17274 13fc45df5 17275 13fc45e65 17274->17275 17277 13fc45df9 17274->17277 17276 13fc4649c 7 API calls 17275->17276 17278 13fc45e6f 17276->17278 17301 13fc45da8 17277->17301 17280 13fc4649c 7 API calls 17278->17280 17282 13fc45e7a 17280->17282 17281 13fc45e0a 17304 13fc590cc 17281->17304 17282->17099 17285 13fc45e1a 17331 13fc46778 InitializeSListHead 17285->17331 17287 13fc45e1f 17288 13fc5a3d4 35 API calls 17287->17288 17289 13fc45e4a 17288->17289 17289->17099 17291 13fc59d95 17290->17291 17292 13fc59d9d 17291->17292 17293 13fc5c398 setbuf 15 API calls 17291->17293 17292->17272 17294 13fc59dac 17293->17294 17295 13fc5c278 _invalid_parameter_noinfo 31 API calls 17294->17295 17295->17292 17297 13fc45ba8 17296->17297 17300 13fc45bb1 __scrt_acquire_startup_lock 17296->17300 17298 13fc4649c 7 API calls 17297->17298 17297->17300 17299 13fc45c6a 17298->17299 17300->17274 17332 13fc45d58 17301->17332 17303 13fc45db1 17303->17281 17305 13fc590ea 17304->17305 17306 13fc59100 17304->17306 17308 13fc5c398 setbuf 15 API calls 17305->17308 17307 13fc63830 48 API calls 17306->17307 17309 13fc59105 GetModuleFileNameA 17307->17309 17310 13fc590ef 17308->17310 17311 13fc59132 17309->17311 17312 13fc5c278 _invalid_parameter_noinfo 31 API calls 17310->17312 17347 13fc58eac 17311->17347 17313 13fc45e16 17312->17313 17313->17278 17313->17285 17318 13fc5917a 17320 13fc5c398 setbuf 15 API calls 17318->17320 17319 13fc5918b 17321 13fc58eac 35 API calls 17319->17321 17329 13fc5917f 17320->17329 17323 13fc591a7 17321->17323 17322 13fc5b28c _Mtx_destroy 15 API calls 17322->17313 17324 13fc591d7 17323->17324 17325 13fc591f0 17323->17325 17323->17329 17326 13fc5b28c _Mtx_destroy 15 API calls 17324->17326 17325->17325 17327 13fc5b28c _Mtx_destroy 15 API calls 17325->17327 17328 13fc591e0 17326->17328 17327->17329 17330 13fc5b28c _Mtx_destroy 15 API calls 17328->17330 17329->17322 17330->17313 17333 13fc45d7d 17332->17333 17334 13fc45d87 17332->17334 17333->17303 17336 13fc599d0 17334->17336 17339 13fc5958c 17336->17339 17346 13fc5b4d0 EnterCriticalSection 17339->17346 17348 13fc58eea 17347->17348 17351 13fc58f50 17348->17351 17359 13fc63c38 17348->17359 17350 13fc5903c 17353 13fc59068 17350->17353 17351->17350 17352 13fc63c38 35 API calls 17351->17352 17352->17351 17354 13fc59087 17353->17354 17358 13fc59083 17353->17358 17355 13fc5b38c setbuf 15 API calls 17354->17355 17354->17358 17356 13fc590b6 17355->17356 17357 13fc5b28c _Mtx_destroy 15 API calls 17356->17357 17357->17358 17358->17318 17358->17319 17360 13fc63bc0 17359->17360 17361 13fc4867c _mbstowcs_s_l 35 API calls 17360->17361 17362 13fc63be4 17361->17362 17362->17348 17370 13fc46674 SetUnhandledExceptionFilter 17363->17370 17372 13fc465fb GetStartupInfoW 17371->17372 17372->17082 17374 13fc5d828 _mbstowcs_s_l 35 API calls 17373->17374 17377 13fc5b1f7 17374->17377 17375 13fc48200 _mbstowcs_s_l 35 API calls 17376 13fc5b212 17375->17376 17377->17375 17378 13fc41f40 17380 13fc41f80 17378->17380 17379 13fc41fc5 FindWindowExA 17379->17380 17380->17379 17381 13fc420ca 17380->17381 19099 13fc47988 19100 13fc479b3 19099->19100 19101 13fc4799e 19099->19101 19113 13fc53ff0 EnterCriticalSection 19100->19113 19102 13fc5c398 setbuf 15 API calls 19101->19102 19104 13fc479a3 19102->19104 19106 13fc5c278 _invalid_parameter_noinfo 31 API calls 19104->19106 19112 13fc479ae 19106->19112 17869 13fc55240 17870 13fc55261 17869->17870 17871 13fc55276 17869->17871 17872 13fc5c398 setbuf 15 API calls 17870->17872 17871->17870 17873 13fc5527b 17871->17873 17874 13fc55266 17872->17874 17882 13fc53ff0 EnterCriticalSection 17873->17882 17876 13fc5c278 _invalid_parameter_noinfo 31 API calls 17874->17876 17879 13fc55271 17876->17879 17928 13fc54bd4 17930 13fc54bd9 17928->17930 17929 13fc600a4 17931 13fc5c398 setbuf 15 API calls 17929->17931 17930->17929 17933 13fc600df 17930->17933 17932 13fc600a9 17931->17932 17934 13fc5c278 _invalid_parameter_noinfo 31 API calls 17932->17934 17937 13fc5ff54 17933->17937 17936 13fc600b4 17934->17936 17944 13fc53ff0 EnterCriticalSection 17937->17944 17950 13fc412b0 17951 13fc5857c 17950->17951 17952 13fc55934 16 API calls 17951->17952 17953 13fc58593 17952->17953 17955 13fc585a8 17953->17955 17956 13fc58260 17953->17956 17957 13fc58276 17956->17957 17959 13fc58291 _fread_nolock 17956->17959 17958 13fc5c398 setbuf 15 API calls 17957->17958 17960 13fc5827b 17958->17960 17959->17957 17962 13fc582a6 17959->17962 17961 13fc5c278 _invalid_parameter_noinfo 31 API calls 17960->17961 17990 13fc58287 17961->17990 17963 13fc582ac 17962->17963 17964 13fc582c9 17962->17964 17965 13fc5c398 setbuf 15 API calls 17963->17965 17991 13fc60ed8 17964->17991 17965->17990 17971 13fc5c298 _invalid_parameter_noinfo 16 API calls 17972 13fc58578 17971->17972 17976 13fc55934 16 API calls 17972->17976 17974 13fc5c298 _invalid_parameter_noinfo 16 API calls 17977 13fc58562 17974->17977 17979 13fc58593 17976->17979 17977->17971 17982 13fc58260 55 API calls 17979->17982 17985 13fc585a8 17979->17985 17980 13fc58537 17983 13fc5c298 _invalid_parameter_noinfo 16 API calls 17980->17983 17981 13fc5830d 17986 13fc58386 17981->17986 17987 13fc58326 17981->17987 17982->17985 17984 13fc5854c 17983->17984 17984->17974 17985->17955 17989 13fc60f14 31 API calls 17986->17989 17986->17990 17987->17990 18017 13fc60f14 17987->18017 17989->17990 17990->17955 17992 13fc60ee6 17991->17992 17993 13fc582ce 17991->17993 18024 13fc5b4d0 EnterCriticalSection 17992->18024 17999 13fc5da0c 17993->17999 18000 13fc5da15 17999->18000 18001 13fc582e3 17999->18001 18002 13fc5c398 setbuf 15 API calls 18000->18002 18001->17977 18005 13fc5da3c 18001->18005 18003 13fc5da1a 18002->18003 18004 13fc5c278 _invalid_parameter_noinfo 31 API calls 18003->18004 18004->18001 18006 13fc5da45 18005->18006 18010 13fc582f4 18005->18010 18007 13fc5c398 setbuf 15 API calls 18006->18007 18008 13fc5da4a 18007->18008 18009 13fc5c278 _invalid_parameter_noinfo 31 API calls 18008->18009 18009->18010 18010->17984 18011 13fc5da6c 18010->18011 18012 13fc5da75 18011->18012 18016 13fc58305 18011->18016 18013 13fc5c398 setbuf 15 API calls 18012->18013 18014 13fc5da7a 18013->18014 18015 13fc5c278 _invalid_parameter_noinfo 31 API calls 18014->18015 18015->18016 18016->17980 18016->17981 18025 13fc5b4d0 EnterCriticalSection 18017->18025 18026 13fc5677c 18029 13fc56170 18026->18029 18045 13fc5b4d0 EnterCriticalSection 18029->18045 19128 13fc61550 19129 13fc61570 19128->19129 19130 13fc61598 19128->19130 19131 13fc5c398 setbuf 15 API calls 19129->19131 19134 13fc615e7 19130->19134 19139 13fc61580 19130->19139 19148 13fc62a40 19130->19148 19132 13fc61575 19131->19132 19133 13fc5c278 _invalid_parameter_noinfo 31 API calls 19132->19133 19133->19139 19135 13fc5c774 _fread_nolock 31 API calls 19134->19135 19137 13fc615fe 19135->19137 19153 13fc5cccc 19137->19153 19141 13fc5c774 _fread_nolock 31 API calls 19142 13fc6164f 19141->19142 19142->19139 19143 13fc5c774 _fread_nolock 31 API calls 19142->19143 19144 13fc6165d 19143->19144 19144->19139 19145 13fc5c774 _fread_nolock 31 API calls 19144->19145 19146 13fc6166e 19145->19146 19147 13fc5c774 _fread_nolock 31 API calls 19146->19147 19147->19139 19149 13fc5b2cc setbuf 16 API calls 19148->19149 19150 13fc62a59 19149->19150 19151 13fc5b28c _Mtx_destroy 15 API calls 19150->19151 19152 13fc62a64 19151->19152 19152->19134 19154 13fc5ccf0 19153->19154 19157 13fc5cd08 19153->19157 19156 13fc5c378 tmpfile 15 API calls 19154->19156 19155 13fc5cdb5 19158 13fc5c378 tmpfile 15 API calls 19155->19158 19159 13fc5ccf5 19156->19159 19157->19155 19160 13fc5cd44 19157->19160 19161 13fc5cdba 19158->19161 19162 13fc5c398 setbuf 15 API calls 19159->19162 19163 13fc5cd54 19160->19163 19164 13fc5cd69 19160->19164 19165 13fc5c398 setbuf 15 API calls 19161->19165 19169 13fc5ccfd 19162->19169 19166 13fc5c378 tmpfile 15 API calls 19163->19166 19182 13fc64688 EnterCriticalSection 19164->19182 19168 13fc5cd61 19165->19168 19170 13fc5cd59 19166->19170 19175 13fc5c278 _invalid_parameter_noinfo 31 API calls 19168->19175 19169->19139 19169->19141 19172 13fc5c398 setbuf 15 API calls 19170->19172 19172->19168 19175->19169 17054 13fc45070 17055 13fc45081 17054->17055 17056 13fc45085 17055->17056 17057 13fc450b3 17055->17057 17062 13fc42130 17056->17062 17060 13fc43d90 9 API calls 17061 13fc4508f 17060->17061 17061->17057 17065 13fc421a7 17062->17065 17063 13fc45ae0 _wcstombs_s_l 8 API calls 17064 13fc429a8 17063->17064 17064->17060 17065->17065 17066 13fc4298b 17065->17066 17067 13fc42970 Sleep 17065->17067 17066->17063 17067->17065 19187 13fc53f94 19197 13fc540cc 19187->19197 19198 13fc540d8 19197->19198 19220 13fc5b4d0 EnterCriticalSection 19198->19220 19222 13fc5d6a8 19223 13fc5d6c2 19222->19223 19224 13fc5d6ad 19222->19224 19228 13fc5d6c8 19224->19228 19229 13fc5d70a 19228->19229 19230 13fc5d712 19228->19230 19232 13fc5b28c _Mtx_destroy 15 API calls 19229->19232 19231 13fc5b28c _Mtx_destroy 15 API calls 19230->19231 19233 13fc5d71f 19231->19233 19232->19230 19234 13fc5b28c _Mtx_destroy 15 API calls 19233->19234 19235 13fc5d72c 19234->19235 19236 13fc5b28c _Mtx_destroy 15 API calls 19235->19236 19237 13fc5d739 19236->19237 19238 13fc5b28c _Mtx_destroy 15 API calls 19237->19238 19239 13fc5d746 19238->19239 19240 13fc5b28c _Mtx_destroy 15 API calls 19239->19240 19241 13fc5d753 19240->19241 19242 13fc5b28c _Mtx_destroy 15 API calls 19241->19242 19243 13fc5d760 19242->19243 19244 13fc5b28c _Mtx_destroy 15 API calls 19243->19244 19245 13fc5d76d 19244->19245 19246 13fc5b28c _Mtx_destroy 15 API calls 19245->19246 19247 13fc5d77d 19246->19247 19248 13fc5b28c _Mtx_destroy 15 API calls 19247->19248 19249 13fc5d78d 19248->19249 19254 13fc5d4b0 19249->19254 19268 13fc5b4d0 EnterCriticalSection 19254->19268 16413 13fc5c4a4 16414 13fc5c4cd 16413->16414 16416 13fc5c4e5 16413->16416 16438 13fc5c378 16414->16438 16417 13fc5c560 16416->16417 16422 13fc5c518 16416->16422 16419 13fc5c378 tmpfile 15 API calls 16417->16419 16421 13fc5c565 16419->16421 16420 13fc5c398 setbuf 15 API calls 16425 13fc5c4da 16420->16425 16423 13fc5c398 setbuf 15 API calls 16421->16423 16437 13fc64688 EnterCriticalSection 16422->16437 16427 13fc5c56d 16423->16427 16426 13fc5c51f 16428 13fc5c52f 16426->16428 16429 13fc5c544 16426->16429 16430 13fc5c278 _invalid_parameter_noinfo 31 API calls 16427->16430 16432 13fc5c398 setbuf 15 API calls 16428->16432 16431 13fc5c610 33 API calls 16429->16431 16430->16425 16435 13fc5c53f 16431->16435 16433 13fc5c534 16432->16433 16434 13fc5c378 tmpfile 15 API calls 16433->16434 16434->16435 16436 13fc6476c setbuf LeaveCriticalSection 16435->16436 16436->16425 16439 13fc5d8bc setbuf 15 API calls 16438->16439 16440 13fc5c381 16439->16440 16440->16420 19432 13fc6aba9 19433 13fc6abb9 tmpfile 19432->19433 19436 13fc53ffc LeaveCriticalSection 19433->19436 18302 13fc41010 18303 13fc41036 18302->18303 18306 13fc53c04 18303->18306 18307 13fc53c3f 18306->18307 18308 13fc53c2a 18306->18308 18307->18308 18309 13fc53c44 18307->18309 18310 13fc5c398 setbuf 15 API calls 18308->18310 18315 13fc48fc4 18309->18315 18312 13fc53c2f 18310->18312 18313 13fc5c278 _invalid_parameter_noinfo 31 API calls 18312->18313 18314 13fc4104c 18313->18314 18322 13fc53ff0 EnterCriticalSection 18315->18322 19442 13fc5a130 19443 13fc5a146 19442->19443 19444 13fc5a171 19442->19444 19450 13fc5b4d0 EnterCriticalSection 19443->19450 15974 13fc59244 15975 13fc59258 15974->15975 15979 13fc59261 15974->15979 15975->15979 15980 13fc5928c 15975->15980 15981 13fc592a5 15980->15981 15983 13fc5926a 15980->15983 16001 13fc63830 15981->16001 15983->15979 15992 13fc59438 15983->15992 15988 13fc592b7 15989 13fc5b28c _Mtx_destroy 15 API calls 15988->15989 15989->15983 15993 13fc59457 15992->15993 16000 13fc5948e 15992->16000 15993->15979 15994 13fc5945f WideCharToMultiByte 15994->15993 15994->16000 15995 13fc5b38c setbuf 15 API calls 15995->16000 15996 13fc594fe 15998 13fc5b28c _Mtx_destroy 15 API calls 15996->15998 15997 13fc594a3 WideCharToMultiByte 15997->15996 15997->16000 15998->15993 15999 13fc5b28c _Mtx_destroy 15 API calls 15999->16000 16000->15993 16000->15994 16000->15995 16000->15996 16000->15997 16000->15999 16002 13fc6383d 16001->16002 16004 13fc592aa 16001->16004 16040 13fc63678 16002->16040 16005 13fc63c74 GetEnvironmentStringsW 16004->16005 16007 13fc63d46 16005->16007 16009 13fc63ca2 16005->16009 16006 13fc63cc7 WideCharToMultiByte 16006->16007 16008 13fc63cfc 16006->16008 16010 13fc63d50 FreeEnvironmentStringsW 16007->16010 16011 13fc592af 16007->16011 16012 13fc5b2cc setbuf 16 API calls 16008->16012 16009->16006 16009->16009 16010->16011 16011->15988 16017 13fc592f8 16011->16017 16013 13fc63d04 16012->16013 16014 13fc63d0c WideCharToMultiByte 16013->16014 16015 13fc63d33 16013->16015 16014->16015 16016 13fc5b28c _Mtx_destroy 15 API calls 16015->16016 16016->16007 16018 13fc59319 16017->16018 16019 13fc5b38c setbuf 15 API calls 16018->16019 16030 13fc59347 16019->16030 16020 13fc593b6 16021 13fc5b28c _Mtx_destroy 15 API calls 16020->16021 16022 13fc592c4 16021->16022 16034 13fc5b28c 16022->16034 16023 13fc5b38c setbuf 15 API calls 16023->16030 16024 13fc593a7 16382 13fc593f4 16024->16382 16028 13fc5b28c _Mtx_destroy 15 API calls 16028->16020 16029 13fc593de 16032 13fc5c298 _invalid_parameter_noinfo 16 API calls 16029->16032 16030->16020 16030->16023 16030->16024 16030->16029 16031 13fc5b28c _Mtx_destroy 15 API calls 16030->16031 16373 13fc5b32c 16030->16373 16031->16030 16033 13fc593f0 16032->16033 16035 13fc5b291 HeapFree 16034->16035 16037 13fc5b2c1 _Mtx_destroy 16034->16037 16036 13fc5b2ac 16035->16036 16035->16037 16038 13fc5c398 setbuf 13 API calls 16036->16038 16037->15988 16039 13fc5b2b1 GetLastError 16038->16039 16039->16037 16060 13fc5d828 GetLastError 16040->16060 16042 13fc63691 16080 13fc63858 16042->16080 16049 13fc63760 16050 13fc5b28c _Mtx_destroy 15 API calls 16049->16050 16052 13fc636b4 16050->16052 16052->16004 16054 13fc6375b 16115 13fc5c398 16054->16115 16056 13fc637bd 16056->16049 16118 13fc63134 16056->16118 16057 13fc63780 16057->16056 16058 13fc5b28c _Mtx_destroy 15 API calls 16057->16058 16058->16056 16061 13fc5d84a 16060->16061 16062 13fc5d845 16060->16062 16066 13fc5d893 16061->16066 16130 13fc5b38c 16061->16130 16125 13fc5ba50 16062->16125 16069 13fc5d8ae SetLastError 16066->16069 16070 13fc5d898 SetLastError 16066->16070 16067 13fc5d869 16071 13fc5b28c _Mtx_destroy 15 API calls 16067->16071 16147 13fc48200 16069->16147 16070->16042 16074 13fc5d870 16071->16074 16074->16069 16075 13fc5d887 16142 13fc5d5d8 16075->16142 16081 13fc5d828 _mbstowcs_s_l 35 API calls 16080->16081 16082 13fc63867 16081->16082 16084 13fc63882 16082->16084 16278 13fc5b4d0 EnterCriticalSection 16082->16278 16087 13fc48200 _mbstowcs_s_l 35 API calls 16084->16087 16089 13fc6369a 16084->16089 16087->16089 16091 13fc63384 16089->16091 16279 13fc4867c 16091->16279 16094 13fc633a4 GetOEMCP 16097 13fc633cb 16094->16097 16095 13fc633b6 16096 13fc633bb GetACP 16095->16096 16095->16097 16096->16097 16097->16052 16098 13fc5b2cc 16097->16098 16099 13fc5b317 16098->16099 16103 13fc5b2db setbuf 16098->16103 16101 13fc5c398 setbuf 15 API calls 16099->16101 16100 13fc5b2fe HeapAlloc 16102 13fc5b315 16100->16102 16100->16103 16101->16102 16102->16049 16105 13fc63918 16102->16105 16103->16099 16103->16100 16104 13fc64310 setbuf 2 API calls 16103->16104 16104->16103 16106 13fc63384 37 API calls 16105->16106 16107 13fc63945 16106->16107 16108 13fc6394d 16107->16108 16109 13fc6398f IsValidCodePage 16107->16109 16110 13fc639b5 _fread_nolock 16107->16110 16111 13fc45ae0 _wcstombs_s_l 8 API calls 16108->16111 16109->16108 16112 13fc639a0 GetCPInfo 16109->16112 16307 13fc63494 GetCPInfo 16110->16307 16113 13fc63754 16111->16113 16112->16108 16112->16110 16113->16054 16113->16057 16116 13fc5d8bc setbuf 15 API calls 16115->16116 16117 13fc5c3a1 16116->16117 16117->16049 16372 13fc5b4d0 EnterCriticalSection 16118->16372 16156 13fc5b61c 16125->16156 16128 13fc5ba92 TlsGetValue 16129 13fc5ba83 16128->16129 16129->16061 16136 13fc5b39d setbuf 16130->16136 16131 13fc5b3ee 16133 13fc5c398 setbuf 14 API calls 16131->16133 16132 13fc5b3d2 HeapAlloc 16134 13fc5b3ec 16132->16134 16132->16136 16133->16134 16134->16067 16137 13fc5baa8 16134->16137 16136->16131 16136->16132 16165 13fc64310 16136->16165 16138 13fc5b61c setbuf 5 API calls 16137->16138 16139 13fc5badb 16138->16139 16140 13fc5baf5 TlsSetValue 16139->16140 16141 13fc5bae3 16139->16141 16140->16141 16141->16067 16141->16075 16174 13fc5d558 16142->16174 16188 13fc5dbec 16147->16188 16157 13fc5b67d 16156->16157 16162 13fc5b678 16156->16162 16157->16128 16157->16129 16158 13fc5b72a 16158->16157 16160 13fc5b738 GetProcAddress 16158->16160 16159 13fc5b6a5 LoadLibraryExW 16161 13fc5b6c6 GetLastError 16159->16161 16159->16162 16160->16157 16161->16162 16163 13fc5b6d1 LoadLibraryExW 16161->16163 16162->16157 16162->16158 16162->16159 16164 13fc5b70f FreeLibrary 16162->16164 16163->16162 16164->16162 16168 13fc64350 16165->16168 16173 13fc5b4d0 EnterCriticalSection 16168->16173 16186 13fc5b4d0 EnterCriticalSection 16174->16186 16222 13fc5dba4 16188->16222 16227 13fc5b4d0 EnterCriticalSection 16222->16227 16280 13fc48697 16279->16280 16286 13fc48692 16279->16286 16281 13fc5d828 _mbstowcs_s_l 35 API calls 16280->16281 16280->16286 16282 13fc486b4 16281->16282 16287 13fc5ea9c 16282->16287 16286->16094 16286->16095 16288 13fc486d8 16287->16288 16289 13fc5eab1 16287->16289 16291 13fc5ead0 16288->16291 16289->16288 16295 13fc66618 16289->16295 16292 13fc5eae5 16291->16292 16294 13fc5eaf8 16291->16294 16293 13fc63858 _mbstowcs_s_l 35 API calls 16292->16293 16292->16294 16293->16294 16294->16286 16296 13fc5d828 _mbstowcs_s_l 35 API calls 16295->16296 16297 13fc66627 16296->16297 16305 13fc66679 16297->16305 16306 13fc5b4d0 EnterCriticalSection 16297->16306 16305->16288 16308 13fc635bd 16307->16308 16309 13fc634dd 16307->16309 16311 13fc45ae0 _wcstombs_s_l 8 API calls 16308->16311 16317 13fc66130 16309->16317 16313 13fc63661 16311->16313 16313->16108 16316 13fc68bb0 40 API calls 16316->16308 16318 13fc4867c _mbstowcs_s_l 35 API calls 16317->16318 16320 13fc66172 MultiByteToWideChar 16318->16320 16322 13fc661b0 16320->16322 16323 13fc661b7 16320->16323 16321 13fc661e5 setbuf _fread_nolock 16327 13fc66290 16321->16327 16328 13fc66255 MultiByteToWideChar 16321->16328 16324 13fc45ae0 _wcstombs_s_l 8 API calls 16322->16324 16323->16321 16325 13fc5b2cc setbuf 16 API calls 16323->16325 16326 13fc63551 16324->16326 16325->16321 16331 13fc68bb0 16326->16331 16327->16322 16330 13fc5b28c _Mtx_destroy 15 API calls 16327->16330 16328->16327 16329 13fc66276 GetStringTypeW 16328->16329 16329->16327 16330->16322 16332 13fc4867c _mbstowcs_s_l 35 API calls 16331->16332 16333 13fc68bd5 16332->16333 16336 13fc68854 16333->16336 16337 13fc68896 16336->16337 16338 13fc688ba MultiByteToWideChar 16337->16338 16339 13fc68b65 16338->16339 16343 13fc688ec 16338->16343 16340 13fc45ae0 _wcstombs_s_l 8 API calls 16339->16340 16342 13fc63584 16340->16342 16341 13fc68924 setbuf 16344 13fc68988 MultiByteToWideChar 16341->16344 16356 13fc68a39 16341->16356 16342->16316 16343->16341 16345 13fc5b2cc setbuf 16 API calls 16343->16345 16346 13fc689ae 16344->16346 16344->16356 16345->16341 16363 13fc5bde0 16346->16363 16348 13fc5b28c _Mtx_destroy 15 API calls 16348->16339 16350 13fc689f6 16353 13fc5bde0 TranslateName 6 API calls 16350->16353 16350->16356 16351 13fc68a48 16352 13fc5b2cc setbuf 16 API calls 16351->16352 16355 13fc68a73 setbuf 16351->16355 16352->16355 16353->16356 16354 13fc5bde0 TranslateName 6 API calls 16357 13fc68b06 16354->16357 16355->16354 16355->16356 16356->16339 16356->16348 16358 13fc68b3c 16357->16358 16360 13fc68b30 WideCharToMultiByte 16357->16360 16358->16356 16359 13fc5b28c _Mtx_destroy 15 API calls 16358->16359 16359->16356 16360->16358 16361 13fc68b9c 16360->16361 16361->16356 16362 13fc5b28c _Mtx_destroy 15 API calls 16361->16362 16362->16356 16364 13fc5b61c setbuf 5 API calls 16363->16364 16365 13fc5be23 16364->16365 16368 13fc5be2b 16365->16368 16369 13fc5bed0 16365->16369 16367 13fc5be8c LCMapStringW 16367->16368 16368->16350 16368->16351 16368->16356 16370 13fc5b61c setbuf 5 API calls 16369->16370 16371 13fc5bf03 TranslateName 16370->16371 16371->16367 16374 13fc5b343 16373->16374 16375 13fc5b339 16373->16375 16376 13fc5c398 setbuf 15 API calls 16374->16376 16375->16374 16377 13fc5b35e 16375->16377 16381 13fc5b34a 16376->16381 16379 13fc5b356 16377->16379 16380 13fc5c398 setbuf 15 API calls 16377->16380 16378 13fc5c278 _invalid_parameter_noinfo 31 API calls 16378->16379 16379->16030 16380->16381 16381->16378 16383 13fc593af 16382->16383 16387 13fc593f9 16382->16387 16383->16028 16384 13fc59422 16385 13fc5b28c _Mtx_destroy 15 API calls 16384->16385 16385->16383 16386 13fc5b28c _Mtx_destroy 15 API calls 16386->16387 16387->16384 16387->16386 18329 13fc476e0 18330 13fc47706 GetModuleHandleW 18329->18330 18331 13fc47750 18329->18331 18330->18331 18335 13fc47713 18330->18335 18351 13fc5b4d0 EnterCriticalSection 18331->18351 18335->18331 18346 13fc47898 GetModuleHandleExW 18335->18346 18347 13fc478c2 GetProcAddress 18346->18347 18350 13fc478dc 18346->18350 18347->18350 18348 13fc478f9 18348->18331 18349 13fc478f3 FreeLibrary 18349->18348 18350->18348 18350->18349 19478 13fc5c3b8 19479 13fc5c3e1 19478->19479 19481 13fc5c3f9 19478->19481 19480 13fc5c378 tmpfile 15 API calls 19479->19480 19483 13fc5c3e6 19480->19483 19482 13fc5c471 19481->19482 19485 13fc5c42c 19481->19485 19484 13fc5c378 tmpfile 15 API calls 19482->19484 19487 13fc5c398 setbuf 15 API calls 19483->19487 19486 13fc5c476 19484->19486 19502 13fc64688 EnterCriticalSection 19485->19502 19489 13fc5c398 setbuf 15 API calls 19486->19489 19492 13fc5c3ee 19487->19492 19491 13fc5c47e 19489->19491 19495 13fc5c278 _invalid_parameter_noinfo 31 API calls 19491->19495 19495->19492 18454 13fc567a4 18455 13fc567d7 18454->18455 18456 13fc567c2 18454->18456 18468 13fc5c774 18455->18468 18457 13fc5c398 setbuf 15 API calls 18456->18457 18459 13fc567c7 18457->18459 18461 13fc5c278 _invalid_parameter_noinfo 31 API calls 18459->18461 18464 13fc567d2 18461->18464 18469 13fc5c77d 18468->18469 18470 13fc567dc 18468->18470 18471 13fc5c398 setbuf 15 API calls 18469->18471 18474 13fc53ff0 EnterCriticalSection 18470->18474 18472 13fc5c782 18471->18472 18473 13fc5c278 _invalid_parameter_noinfo 31 API calls 18472->18473 18473->18470 18496 13fc541bc 18497 13fc541d3 18496->18497 18498 13fc541da 18496->18498 18506 13fc540d8 18497->18506 18515 13fc53ff0 EnterCriticalSection 18498->18515 18516 13fc5b4d0 EnterCriticalSection 18506->18516 19572 13fc6288c 19583 13fc566f8 19572->19583 19584 13fc56715 19583->19584 19585 13fc5b28c _Mtx_destroy 15 API calls 19584->19585 19586 13fc5672b 19584->19586 19585->19584 19587 13fc5b28c _Mtx_destroy 15 API calls 19586->19587 19588 13fc56748 19586->19588 19587->19586 19589 13fc5b4d0 EnterCriticalSection 19588->19589 18614 13fc47814 18615 13fc5b1ec 35 API calls 18614->18615 18616 13fc47819 18615->18616 18621 13fc5b524 LeaveCriticalSection 18616->18621

    Executed Functions

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNELBASE(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6B8
      • Part of subcall function 000000013FC5B61C: GetLastError.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6C6
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6D9
      • Part of subcall function 000000013FC5B61C: FreeLibrary.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B712
      • Part of subcall function 000000013FC5B61C: GetProcAddress.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B73E
    • GetSystemTimeAsFileTime.KERNEL32(?,?,?,000000013FC581C0,?,?,?,000000013FC5823D), ref: 000000013FC5BBEF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    • CreateWindowExA.USER32 ref: 000000013FC455C1
    • RegisterWaitForSingleObject.KERNEL32 ref: 000000013FC457F7
    • GetProcAddress.KERNEL32 ref: 000000013FC4591B
    • GetMessageA.USER32 ref: 000000013FC45A8A
      • Part of subcall function 000000013FC42DC0: CreateToolhelp32Snapshot.KERNEL32 ref: 000000013FC432A2
      • Part of subcall function 000000013FC42DC0: Process32First.KERNEL32 ref: 000000013FC432C3
      • Part of subcall function 000000013FC42DC0: Process32Next.KERNEL32 ref: 000000013FC43322
      • Part of subcall function 000000013FC42DC0: OpenProcess.KERNELBASE ref: 000000013FC434B9
      • Part of subcall function 000000013FC42DC0: NtQueryInformationProcess.NTDLL ref: 000000013FC4395F
      • Part of subcall function 000000013FC42DC0: VirtualProtectEx.KERNEL32 ref: 000000013FC43982
      • Part of subcall function 000000013FC42DC0: ReadProcessMemory.KERNEL32 ref: 000000013FC439A5
      • Part of subcall function 000000013FC42DC0: VirtualProtectEx.KERNEL32 ref: 000000013FC439CF
      • Part of subcall function 000000013FC42DC0: ReadProcessMemory.KERNEL32 ref: 000000013FC439F0
      • Part of subcall function 000000013FC42DC0: ReadProcessMemory.KERNEL32 ref: 000000013FC43A36
      • Part of subcall function 000000013FC429D0: RegCreateKeyExA.ADVAPI32 ref: 000000013FC42D34
      • Part of subcall function 000000013FC429D0: RegSetValueExA.ADVAPI32 ref: 000000013FC42D95
      • Part of subcall function 000000013FC446A0: CertOpenStore.CRYPT32 ref: 000000013FC446C0
      • Part of subcall function 000000013FC446A0: CertCreateCertificateContext.CRYPT32 ref: 000000013FC44712
      • Part of subcall function 000000013FC446A0: CertAddCertificateContextToStore.CRYPT32 ref: 000000013FC44730
      • Part of subcall function 000000013FC446A0: CertFreeCertificateContext.CRYPT32 ref: 000000013FC44739
      • Part of subcall function 000000013FC446A0: CertCloseStore.CRYPT32 ref: 000000013FC44759
      • Part of subcall function 000000013FC44E20: GetSystemDirectoryA.KERNEL32 ref: 000000013FC44E5A
      • Part of subcall function 000000013FC44E20: _fread_nolock.LIBCMT ref: 000000013FC44FAE
    • TranslateMessage.USER32 ref: 000000013FC45A45
    • DispatchMessageA.USER32 ref: 000000013FC45A5C
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • LoadLibraryExW.KERNELBASE(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC472EF
    • GetLastError.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC472FD
    • LoadLibraryExW.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC4733F
    • FreeLibrary.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC47378
    • GetProcAddress.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC473A4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • GetSystemDirectoryA.KERNEL32 ref: 000000013FC44E5A
      • Part of subcall function 000000013FC48FB8: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC48F17
    • _fread_nolock.LIBCMT ref: 000000013FC44FAE
      • Part of subcall function 000000013FC44890: LoadLibraryA.KERNEL32 ref: 000000013FC449C0
      • Part of subcall function 000000013FC44890: URLDownloadToFileA.URLMON ref: 000000013FC44A77
      • Part of subcall function 000000013FC44890: _fread_nolock.LIBCMT ref: 000000013FC44B3C
      • Part of subcall function 000000013FC44890: DeleteFileA.KERNELBASE ref: 000000013FC44B50
      • Part of subcall function 000000013FC54C74: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC54C9D
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5FCB5
      • Part of subcall function 000000013FC67F48: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC67F9B
    • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,00001000,?,00000000,000000013FC6862E), ref: 000000013FC5FEAA
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • GetConsoleMode.KERNEL32 ref: 000000013FC5FD78
    • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,00001000,?,00000000,000000013FC6862E), ref: 000000013FC5FDF3
      • Part of subcall function 000000013FC5F5E4: GetConsoleCP.KERNEL32 ref: 000000013FC5F641
      • Part of subcall function 000000013FC5F5E4: WideCharToMultiByte.KERNEL32 ref: 000000013FC5F71D
      • Part of subcall function 000000013FC5F5E4: WriteFile.KERNEL32 ref: 000000013FC5F743
      • Part of subcall function 000000013FC5F5E4: WriteFile.KERNEL32 ref: 000000013FC5F782
      • Part of subcall function 000000013FC5F5E4: GetLastError.KERNEL32 ref: 000000013FC5F7BA
      • Part of subcall function 000000013FC6837C: WriteConsoleW.KERNEL32 ref: 000000013FC683C1
      • Part of subcall function 000000013FC5FA10: WideCharToMultiByte.KERNEL32 ref: 000000013FC5FAF6
      • Part of subcall function 000000013FC5FA10: WriteFile.KERNEL32 ref: 000000013FC5FB29
      • Part of subcall function 000000013FC5FA10: GetLastError.KERNEL32 ref: 000000013FC5FB4B
      • Part of subcall function 000000013FC5F8F4: WriteFile.KERNEL32 ref: 000000013FC5F9C1
      • Part of subcall function 000000013FC5F8F4: GetLastError.KERNEL32 ref: 000000013FC5F9DD
      • Part of subcall function 000000013FC5F7EC: WriteFile.KERNEL32 ref: 000000013FC5F8A2
      • Part of subcall function 000000013FC5F7EC: GetLastError.KERNEL32 ref: 000000013FC5F8BE
    • WriteFile.KERNEL32 ref: 000000013FC5FEA0
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • LoadLibraryExW.KERNELBASE(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6B8
    • GetLastError.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6C6
    • LoadLibraryExW.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6D9
    • FreeLibrary.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B712
    • GetProcAddress.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B73E
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • GetEnvironmentStringsW.KERNELBASE(?,?,?,?,?,?,?,000000013FC592AF,?,?,?,000000013FC5926A), ref: 000000013FC63C8D
    • WideCharToMultiByte.KERNEL32 ref: 000000013FC63CEF
      • Part of subcall function 000000013FC5B2CC: HeapAlloc.KERNEL32 ref: 000000013FC5B30A
    • WideCharToMultiByte.KERNEL32 ref: 000000013FC63D29
      • Part of subcall function 000000013FC5B28C: HeapFree.KERNEL32 ref: 000000013FC5B2A2
      • Part of subcall function 000000013FC5B28C: GetLastError.KERNEL32(?,?,00000000,000000013FC5D90B,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B2B4
    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,000000013FC592AF,?,?,?,000000013FC5926A), ref: 000000013FC63D53
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    • MultiByteToWideChar.KERNEL32 ref: 000000013FC688DB
    • MultiByteToWideChar.KERNEL32 ref: 000000013FC689A0
      • Part of subcall function 000000013FC5BDE0: LCMapStringW.KERNEL32 ref: 000000013FC5BEAE
      • Part of subcall function 000000013FC5B2CC: HeapAlloc.KERNEL32 ref: 000000013FC5B30A
    • WideCharToMultiByte.KERNEL32 ref: 000000013FC68B30
      • Part of subcall function 000000013FC5B28C: HeapFree.KERNEL32 ref: 000000013FC5B2A2
      • Part of subcall function 000000013FC5B28C: GetLastError.KERNEL32(?,?,00000000,000000013FC5D90B,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B2B4
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • GetCPInfo.KERNEL32 ref: 000000013FC634CA
      • Part of subcall function 000000013FC66130: MultiByteToWideChar.KERNEL32 ref: 000000013FC661A3
      • Part of subcall function 000000013FC66130: MultiByteToWideChar.KERNEL32 ref: 000000013FC6626C
      • Part of subcall function 000000013FC66130: GetStringTypeW.KERNEL32 ref: 000000013FC66286
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNELBASE(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6B8
      • Part of subcall function 000000013FC5B61C: GetLastError.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6C6
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6D9
      • Part of subcall function 000000013FC5B61C: FreeLibrary.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B712
      • Part of subcall function 000000013FC5B61C: GetProcAddress.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B73E
    • LCMapStringW.KERNEL32 ref: 000000013FC5BEAE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNELBASE(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6B8
      • Part of subcall function 000000013FC5B61C: GetLastError.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6C6
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6D9
      • Part of subcall function 000000013FC5B61C: FreeLibrary.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B712
      • Part of subcall function 000000013FC5B61C: GetProcAddress.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B73E
    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00000030,000000013FC64533,?,?,?,000000013FC647E1,?,?,?,?,?,000000013FC6252C), ref: 000000013FC5BCD1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC4724C: LoadLibraryExW.KERNELBASE(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC472EF
      • Part of subcall function 000000013FC4724C: GetLastError.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC472FD
      • Part of subcall function 000000013FC4724C: LoadLibraryExW.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC4733F
      • Part of subcall function 000000013FC4724C: FreeLibrary.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC47378
      • Part of subcall function 000000013FC4724C: GetProcAddress.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC473A4
    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93,?,?,?,?,000000013FC45B67), ref: 000000013FC47590
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC4724C: LoadLibraryExW.KERNELBASE(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC472EF
      • Part of subcall function 000000013FC4724C: GetLastError.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC472FD
      • Part of subcall function 000000013FC4724C: LoadLibraryExW.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC4733F
      • Part of subcall function 000000013FC4724C: FreeLibrary.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC47378
      • Part of subcall function 000000013FC4724C: GetProcAddress.KERNEL32(?,?,?,000000013FC4756F,?,?,?,000000013FC471F0,?,?,00000001,000000013FC46E93), ref: 000000013FC473A4
    • TlsAlloc.KERNEL32(?,?,?,000000013FC47178,?,?,?,?,000000013FC46EA0,?,?,?,?,000000013FC45B67), ref: 000000013FC47464
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNELBASE(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6B8
      • Part of subcall function 000000013FC5B61C: GetLastError.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6C6
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6D9
      • Part of subcall function 000000013FC5B61C: FreeLibrary.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B712
      • Part of subcall function 000000013FC5B61C: GetProcAddress.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B73E
    • TlsAlloc.KERNEL32 ref: 000000013FC5B9E4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC58964
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC58A9A
      • Part of subcall function 000000013FC5C774: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5C788
      • Part of subcall function 000000013FC5CDE4: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5CF08
      • Part of subcall function 000000013FC5CDE4: GetConsoleMode.KERNEL32 ref: 000000013FC5D052
      • Part of subcall function 000000013FC5CDE4: ReadConsoleW.KERNEL32 ref: 000000013FC5D081
      • Part of subcall function 000000013FC5CDE4: GetLastError.KERNEL32 ref: 000000013FC5D08B
      • Part of subcall function 000000013FC5CDE4: ReadFile.KERNEL32 ref: 000000013FC5D0D3
      • Part of subcall function 000000013FC5CDE4: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000000,?,000000013FC62396), ref: 000000013FC5D1DD
      • Part of subcall function 000000013FC5CDE4: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5D229
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC63384: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013FC636A1,?,?,?,?,?,?,?,000000013FC63849), ref: 000000013FC633AE
      • Part of subcall function 000000013FC63384: GetACP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013FC636A1,?,?,?,?,?,?,?,000000013FC63849), ref: 000000013FC633C5
    • IsValidCodePage.KERNEL32(?,?,?,00000000,?,00000000,00000001,000000013FC63754,?,?,?,?,?,?,?,000000013FC63849), ref: 000000013FC63992
    • GetCPInfo.KERNEL32(?,?,?,00000000,?,00000000,00000001,000000013FC63754,?,?,?,?,?,?,?,000000013FC63849), ref: 000000013FC639A7
      • Part of subcall function 000000013FC63494: GetCPInfo.KERNEL32 ref: 000000013FC634CA
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • __scrt_acquire_startup_lock.LIBCMT ref: 000000013FC45ED3
      • Part of subcall function 000000013FC465E4: GetStartupInfoW.KERNEL32 ref: 000000013FC46600
    • __scrt_is_managed_app.LIBCMT ref: 000000013FC45FC1
      • Part of subcall function 000000013FC46620: GetModuleHandleW.KERNEL32(?,?,?,?,000000013FC45FC6), ref: 000000013FC46626
      • Part of subcall function 000000013FC4649C: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC464B8
      • Part of subcall function 000000013FC4649C: RtlCaptureContext.KERNEL32 ref: 000000013FC464E1
      • Part of subcall function 000000013FC4649C: RtlLookupFunctionEntry.KERNEL32 ref: 000000013FC464FB
      • Part of subcall function 000000013FC4649C: RtlVirtualUnwind.KERNEL32 ref: 000000013FC4653C
      • Part of subcall function 000000013FC4649C: IsDebuggerPresent.KERNEL32 ref: 000000013FC46590
      • Part of subcall function 000000013FC4649C: SetUnhandledExceptionFilter.KERNEL32 ref: 000000013FC465B1
      • Part of subcall function 000000013FC4649C: UnhandledExceptionFilter.KERNEL32 ref: 000000013FC465BC
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC56956
      • Part of subcall function 000000013FC5C774: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5C788
      • Part of subcall function 000000013FC5FB84: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5FC50
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5FC70: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5FCB5
      • Part of subcall function 000000013FC5FC70: GetConsoleMode.KERNEL32 ref: 000000013FC5FD78
      • Part of subcall function 000000013FC5FC70: GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,00001000,?,00000000,000000013FC6862E), ref: 000000013FC5FDF3
      • Part of subcall function 000000013FC5FC70: WriteFile.KERNEL32 ref: 000000013FC5FEA0
      • Part of subcall function 000000013FC5FC70: GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,00001000,?,00000000,000000013FC6862E), ref: 000000013FC5FEAA
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5FC50
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC58C1C
      • Part of subcall function 000000013FC58928: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC58964
      • Part of subcall function 000000013FC58928: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC58A9A
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC54C0D
      • Part of subcall function 000000013FC5C774: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5C788
      • Part of subcall function 000000013FC60198: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC6022C
      • Part of subcall function 000000013FC5B28C: HeapFree.KERNEL32 ref: 000000013FC5B2A2
      • Part of subcall function 000000013FC5B28C: GetLastError.KERNEL32(?,?,00000000,000000013FC5D90B,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B2B4
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC581A1
      • Part of subcall function 000000013FC5BBA8: GetSystemTimeAsFileTime.KERNEL32(?,?,?,000000013FC581C0,?,?,?,000000013FC5823D), ref: 000000013FC5BBEF
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • HeapAlloc.KERNEL32(?,?,00000000,000000013FC5D8FC,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B3E1
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd

    Non-executed Functions

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • TranslateName.LIBCMT ref: 000000013FC66FC6
    • TranslateName.LIBCMT ref: 000000013FC67001
      • Part of subcall function 000000013FC66DA4: GetACP.KERNEL32(?,?,000000A0,000000013FC67042,?,?,?,00000000,?,000000013FC5A6AC), ref: 000000013FC66E42
    • IsValidCodePage.KERNEL32(?,?,?,00000000,?,000000013FC5A6AC), ref: 000000013FC6705E
      • Part of subcall function 000000013FC64404: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC6442F
      • Part of subcall function 000000013FC5BB10: GetLocaleInfoW.KERNEL32(?,?,00000000,000000013FC5A733), ref: 000000013FC5BB87
    • wcschr.LIBVCRUNTIME ref: 000000013FC670F1
    • wcschr.LIBVCRUNTIME ref: 000000013FC67101
      • Part of subcall function 000000013FC5C298: GetCurrentProcess.KERNEL32(?,?,?,?,000000013FC5C276), ref: 000000013FC5C2C5
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC671E9
      • Part of subcall function 000000013FC69104: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC6912B
      • Part of subcall function 000000013FC69104: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC691C9
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
      • Part of subcall function 000000013FC67338: EnumSystemLocalesW.KERNEL32(?,?,?,000000013FC67A07,?,00000000,?,00000000,00000001,00000000,?,000000013FC5A6A5), ref: 000000013FC673B8
      • Part of subcall function 000000013FC67268: EnumSystemLocalesW.KERNEL32(?,?,?,000000013FC67A4B,?,00000000,?,00000000,00000001,00000000,?,000000013FC5A6A5), ref: 000000013FC67306
    • EnumSystemLocalesW.KERNEL32(?,00000000,?,00000000,00000001,00000000,?,000000013FC5A6A5), ref: 000000013FC67A9F
    • GetUserDefaultLCID.KERNEL32(?,00000000,?,00000000), ref: 000000013FC67AB8
    • IsValidCodePage.KERNEL32 ref: 000000013FC67B03
    • IsValidLocale.KERNEL32 ref: 000000013FC67B19
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC67B75
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC67B91
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
      • Part of subcall function 000000013FC67760: GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,000000013FC67AE7), ref: 000000013FC677B5
      • Part of subcall function 000000013FC67760: GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,000000013FC67AE7), ref: 000000013FC677E2
      • Part of subcall function 000000013FC67760: GetACP.KERNEL32(?,?,?,?,?,?,?,000000013FC67AE7), ref: 000000013FC677F8
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC6743D
      • Part of subcall function 000000013FC69104: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC6912B
      • Part of subcall function 000000013FC69104: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC691C9
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC6748F
      • Part of subcall function 000000013FC67FA8: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC67FD4
      • Part of subcall function 000000013FC67FA8: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC68085
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC67554
      • Part of subcall function 000000013FC67810: GetLocaleInfoW.KERNEL32(?,?,?,000000013FC675D0), ref: 000000013FC67847
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5B38C: HeapAlloc.KERNEL32(?,?,00000000,000000013FC5D8FC,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B3E1
      • Part of subcall function 000000013FC62AB4: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC62ADF
      • Part of subcall function 000000013FC5C298: GetCurrentProcess.KERNEL32(?,?,?,?,000000013FC5C276), ref: 000000013FC5C2C5
    • FindFirstFileExA.KERNEL32 ref: 000000013FC62F88
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNELBASE(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6B8
      • Part of subcall function 000000013FC5B61C: GetLastError.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6C6
      • Part of subcall function 000000013FC5B61C: LoadLibraryExW.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B6D9
      • Part of subcall function 000000013FC5B61C: FreeLibrary.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B712
      • Part of subcall function 000000013FC5B61C: GetProcAddress.KERNEL32(?,?,00000004,000000013FC5BADB,?,?,00000000,000000013FC5D91B,?,?,?,000000013FC5C3A1), ref: 000000013FC5B73E
    • GetLocaleInfoW.KERNEL32(?,?,00000000,000000013FC5A733), ref: 000000013FC5BB87
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • GetLocaleInfoW.KERNEL32 ref: 000000013FC6767D
      • Part of subcall function 000000013FC69104: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC6912B
      • Part of subcall function 000000013FC69104: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC691C9
      • Part of subcall function 000000013FC45AE0: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FC4606A
      • Part of subcall function 000000013FC67810: GetLocaleInfoW.KERNEL32(?,?,?,000000013FC675D0), ref: 000000013FC67847
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • EnumSystemLocalesW.KERNEL32(?,?,?,000000013FC67A4B,?,00000000,?,00000000,00000001,00000000,?,000000013FC5A6A5), ref: 000000013FC67306
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • GetLocaleInfoW.KERNEL32(?,?,?,000000013FC675D0), ref: 000000013FC67847
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • EnumSystemLocalesW.KERNEL32(?,?,?,000000013FC67A07,?,00000000,?,00000000,00000001,00000000,?,000000013FC5A6A5), ref: 000000013FC673B8
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    • EnumSystemLocalesW.KERNEL32(?,?,00000000,000000013FC5B989,?,?,?,?,?,?,00000000,000000013FC6683A), ref: 000000013FC5B5D8
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    Memory Dump Source
    • Source File: 00000000.00000002.2183454693.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000002.2183443066.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000002.2183469850.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000002.2183481721.000000013FC79000.00000004.sdmp
    • Associated: 00000000.00000002.2183491818.000000013FC7A000.00000008.sdmp
    • Associated: 00000000.00000002.2183500702.000000013FC89000.00000004.sdmp
    • Associated: 00000000.00000002.2183508841.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5797B
      • Part of subcall function 000000013FC54DEC: GetStringTypeW.KERNEL32(?,?,00000000,000000013FC4F0E0,?,?,00000000,000000013FC51E69,?,?,00000000,000000013FC4ED92), ref: 000000013FC54E3D
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC57D4C
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC57FED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC590F6
    • GetModuleFileNameA.KERNEL32(?,?,?,?,?,000000013FC45E16), ref: 000000013FC59117
      • Part of subcall function 000000013FC5B28C: HeapFree.KERNEL32 ref: 000000013FC5B2A2
      • Part of subcall function 000000013FC5B28C: GetLastError.KERNEL32(?,?,00000000,000000013FC5D90B,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B2B4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _Wcsftime.LIBCMT ref: 000000013FC48410
      • Part of subcall function 000000013FC5E51C: _mbstowcs_s_l.LIBCMT ref: 000000013FC5E530
    • _Wcsftime.LIBCMT ref: 000000013FC48449
      • Part of subcall function 000000013FC5A964: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5A98F
      • Part of subcall function 000000013FC5C298: GetCurrentProcess.KERNEL32(?,?,?,?,000000013FC5C276), ref: 000000013FC5C2C5
      • Part of subcall function 000000013FC5D828: GetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D832
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D89A
      • Part of subcall function 000000013FC5D828: SetLastError.KERNEL32(?,?,?,000000013FC486B4,?,?,?,000000013FC4ED1D), ref: 000000013FC5D8B0
    • _wcstombs_s_l.LIBCMT ref: 000000013FC4851E
      • Part of subcall function 000000013FC5E870: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC5E8FB
      • Part of subcall function 000000013FC5B2CC: HeapAlloc.KERNEL32 ref: 000000013FC5B30A
    • _wcstombs_s_l.LIBCMT ref: 000000013FC48570
      • Part of subcall function 000000013FC5B28C: HeapFree.KERNEL32 ref: 000000013FC5B2A2
      • Part of subcall function 000000013FC5B28C: GetLastError.KERNEL32(?,?,00000000,000000013FC5D90B,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B2B4
      • Part of subcall function 000000013FC5B38C: HeapAlloc.KERNEL32(?,?,00000000,000000013FC5D8FC,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B3E1
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 000000013FC62BCC
      • Part of subcall function 000000013FC62AB4: _invalid_parameter_noinfo.LIBCMT ref: 000000013FC62ADF
      • Part of subcall function 000000013FC5B28C: HeapFree.KERNEL32 ref: 000000013FC5B2A2
      • Part of subcall function 000000013FC5B28C: GetLastError.KERNEL32(?,?,00000000,000000013FC5D90B,?,?,?,000000013FC5C3A1,?,?,?,?,000000013FC53C2F), ref: 000000013FC5B2B4
      • Part of subcall function 000000013FC5C298: GetCurrentProcess.KERNEL32(?,?,?,?,000000013FC5C276), ref: 000000013FC5C2C5
      • Part of subcall function 000000013FC62DA8: FindFirstFileExA.KERNEL32 ref: 000000013FC62F88
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd
    APIs
      • Part of subcall function 000000013FC5BB10: GetLocaleInfoW.KERNEL32(?,?,00000000,000000013FC5A733), ref: 000000013FC5BB87
    • GetACP.KERNEL32(?,?,000000A0,000000013FC67042,?,?,?,00000000,?,000000013FC5A6AC), ref: 000000013FC66E42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000001.1876404701.000000013FC41000.00000020.sdmp, Offset: 000000013FC40000, based on PE: true
    • Associated: 00000000.00000001.1876396507.000000013FC40000.00000002.sdmp
    • Associated: 00000000.00000001.1876417269.000000013FC6B000.00000002.sdmp
    • Associated: 00000000.00000001.1876426795.000000013FC79000.00000008.sdmp
    • Associated: 00000000.00000001.1876552225.000000013FC8A000.00000004.sdmp
    • Associated: 00000000.00000001.1876556861.000000013FC8B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_1_13fc40000_g8F53.jbxd