Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7Y18r(212).exe

Overview

General Information

Sample name:7Y18r(212).exe
Analysis ID:1482712
MD5:694c32cb655bcdc5ee56749cb64124e8
SHA1:d9ca3ffeeb391cbdd034861f119f221daa817e31
SHA256:347b1528f270d85186eca01132cb9b6fdbb818d317d5a17ac4772f2381473095
Tags:exe
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to read the PEB
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • 7Y18r(212).exe (PID: 6276 cmdline: "C:\Users\user\Desktop\7Y18r(212).exe" MD5: 694C32CB655BCDC5EE56749CB64124E8)
    • nuwcjd.exe (PID: 2244 cmdline: C:\Users\user\AppData\Local\Temp\nuwcjd.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 5024 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1568 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6508 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 244 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: nuwcjd.exe PID: 2244JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-26T02:37:57.191863+0200
    SID:2022930
    Source Port:443
    Destination Port:55977
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-26T02:37:40.206459+0200
    SID:2838522
    Source Port:51208
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-26T02:38:15.891536+0200
    SID:2022930
    Source Port:443
    Destination Port:58025
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-26T02:37:41.199113+0200
    SID:2838522
    Source Port:51208
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-26T02:38:16.990641+0200
    SID:2022930
    Source Port:443
    Destination Port:58026
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 7Y18r(212).exeAvira: detected
    Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarIAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarHAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarEAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar$Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/qAvira URL Cloud: Label: phishing
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: ddos.dnsnb8.netVirustotal: Detection: 12%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarIVirustotal: Detection: 9%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarHVirustotal: Detection: 10%Perma Link
    Source: http://ddos.dnsnb8.net/qVirustotal: Detection: 14%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar$Virustotal: Detection: 15%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarEVirustotal: Detection: 13%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeReversingLabs: Detection: 92%
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeVirustotal: Detection: 93%Perma Link
    Source: 7Y18r(212).exeReversingLabs: Detection: 95%
    Source: 7Y18r(212).exeVirustotal: Detection: 87%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: 7Y18r(212).exeJoe Sandbox ML: detected
    Source: 7Y18r(212).exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B129E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00B129E2
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B12B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00B12B8C
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B11099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00B11099
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
    Source: nuwcjd.exe, 00000001.00000003.2133066360.0000000000B00000.00000004.00001000.00020000.00000000.sdmp, nuwcjd.exe, 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000C69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/q
    Source: nuwcjd.exe, 00000001.00000002.2203564540.000000000289A000.00000004.00000010.00020000.00000000.sdmp, nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar$
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarE
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarH
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000C4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarI
    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_13bd8487-a

    System Summary

    barindex
    Source: 7Y18r(212).exeStatic PE information: section name: i]|u
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: nuwcjd.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B160761_2_00B16076
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B16D001_2_00B16D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nuwcjd.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
    Source: C:\Users\user\Desktop\7Y18r(212).exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 244
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: 7Y18r(212).exeStatic PE information: Number of sections : 14 > 10
    Source: 7Y18r(212).exeStatic PE information: No import functions for PE file found
    Source: 7Y18r(212).exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
    Source: nuwcjd.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: nuwcjd.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: nuwcjd.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/13@3/0
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B1119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00B1119F
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6276
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2244
    Source: C:\Users\user\Desktop\7Y18r(212).exeFile created: C:\Users\user\AppData\Local\Temp\nuwcjd.exeJump to behavior
    Source: C:\Users\user\Desktop\7Y18r(212).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 7Y18r(212).exeReversingLabs: Detection: 95%
    Source: 7Y18r(212).exeVirustotal: Detection: 87%
    Source: unknownProcess created: C:\Users\user\Desktop\7Y18r(212).exe "C:\Users\user\Desktop\7Y18r(212).exe"
    Source: C:\Users\user\Desktop\7Y18r(212).exeProcess created: C:\Users\user\AppData\Local\Temp\nuwcjd.exe C:\Users\user\AppData\Local\Temp\nuwcjd.exe
    Source: C:\Users\user\Desktop\7Y18r(212).exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 244
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1568
    Source: C:\Users\user\Desktop\7Y18r(212).exeProcess created: C:\Users\user\AppData\Local\Temp\nuwcjd.exe C:\Users\user\AppData\Local\Temp\nuwcjd.exeJump to behavior
    Source: C:\Users\user\Desktop\7Y18r(212).exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
    Source: 7Y18r(212).exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: 7Y18r(212).exeStatic file information: File size 4981248 > 1048576
    Source: 7Y18r(212).exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2e3e00
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeUnpacked PE file: 1.2.nuwcjd.exe.b10000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: i]|u
    Source: 7Y18r(212).exeStatic PE information: section name: /4
    Source: 7Y18r(212).exeStatic PE information: section name: /18
    Source: 7Y18r(212).exeStatic PE information: section name: /30
    Source: 7Y18r(212).exeStatic PE information: section name: /43
    Source: 7Y18r(212).exeStatic PE information: section name: /59
    Source: 7Y18r(212).exeStatic PE information: section name: /75
    Source: 7Y18r(212).exeStatic PE information: section name: /90
    Source: 7Y18r(212).exeStatic PE information: section name: /109
    Source: 7Y18r(212).exeStatic PE information: section name: .symtab
    Source: 7Y18r(212).exeStatic PE information: section name: i]|u
    Source: nuwcjd.exe.0.drStatic PE information: section name: .aspack
    Source: nuwcjd.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B11638 push dword ptr [00B13084h]; ret 1_2_00B1170E
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B16014 push 00B114E1h; ret 1_2_00B16425
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B12D9B push ecx; ret 1_2_00B12DAB
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B1600A push ebp; ret 1_2_00B1600D
    Source: 7Y18r(212).exeStatic PE information: section name: i]|u entropy: 6.93440401754385
    Source: nuwcjd.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934500310551252
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934760778895195
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934530411452574

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\7Y18r(212).exeFile created: C:\Users\user\AppData\Local\Temp\nuwcjd.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_1-1305
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1046
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B11718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00B11754h1_2_00B11718
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B129E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00B129E2
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B12B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00B12B8C
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.6.drBinary or memory string: VMware
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: nuwcjd.exe, 00000001.00000002.2203244758.0000000000C92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll`
    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeAPI call chain: ExitProcess graph end nodegraph_1-1021
    Source: C:\Users\user\Desktop\7Y18r(212).exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\7Y18r(212).exeCode function: 0_2_008DA044 mov eax, dword ptr fs:[00000030h]0_2_008DA044
    Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B11718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,1_2_00B11718
    Source: C:\Users\user\AppData\Local\Temp\nuwcjd.exeCode function: 1_2_00B1139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_00B1139F
    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: nuwcjd.exe PID: 2244, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: nuwcjd.exe PID: 2244, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Virtualization/Sandbox Evasion
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory121
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive1
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture1
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Software Packing
    LSA Secrets3
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials3
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    7Y18r(212).exe96%ReversingLabsWin32.Virus.Jadtre
    7Y18r(212).exe88%VirustotalBrowse
    7Y18r(212).exe100%AviraW32/Jadtre.B
    7Y18r(212).exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nuwcjd.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\nuwcjd.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\nuwcjd.exe92%ReversingLabsWin32.Trojan.Madeba
    C:\Users\user\AppData\Local\Temp\nuwcjd.exe93%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    ddos.dnsnb8.net13%VirustotalBrowse
    198.187.3.20.in-addr.arpa1%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.develop.com0%URL Reputationsafe
    http://www.lua.org0%URL Reputationsafe
    http://www.rftp.comJosiah0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://ddos.dnsnb8.net/100%URL Reputationmalware
    http://www.activestate.comHolger0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
    http://www.spaceblue.com0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.baanboard.com0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://www.baanboard.comBrendon0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarI100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarH100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rarE100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar$100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net/q100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarI9%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rarH11%VirustotalBrowse
    http://ddos.dnsnb8.net/q14%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rar$16%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rarE13%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalseunknown
    198.187.3.20.in-addr.arpa
    unknown
    unknownfalseunknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://www.develop.comSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://www.lua.orgSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://www.rftp.comJosiahSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://www.activestate.comSciTE.exe.1.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net/nuwcjd.exe, 00000001.00000002.2203244758.0000000000C69000.00000004.00000020.00020000.00000000.sdmptrue
    • URL Reputation: malware
    unknown
    http://www.activestate.comHolgerSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarnuwcjd.exe, 00000001.00000002.2203564540.000000000289A000.00000004.00000010.00020000.00000000.sdmp, nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmptrue
    • URL Reputation: malware
    unknown
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEnuwcjd.exe, 00000001.00000003.2133066360.0000000000B00000.00000004.00001000.00020000.00000000.sdmp, nuwcjd.exe, 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.spaceblue.comSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://upx.sf.netAmcache.hve.6.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.baanboard.comSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://www.rftp.comSciTE.exe.1.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarInuwcjd.exe, 00000001.00000002.2203244758.0000000000C4E000.00000004.00000020.00020000.00000000.sdmptrue
    • 9%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.develop.comDeepakSciTE.exe.1.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarHnuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmptrue
    • 11%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://www.baanboard.comBrendonSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarEnuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmptrue
    • 13%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    https://www.smartsharesystems.com/SciTE.exe.1.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rar$nuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmptrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.scintilla.orgSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net/qnuwcjd.exe, 00000001.00000002.2203244758.0000000000CC4000.00000004.00000020.00020000.00000000.sdmptrue
    • 14%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1482712
    Start date and time:2024-07-26 02:36:47 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 6s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:14
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:7Y18r(212).exe
    Detection:MAL
    Classification:mal100.spre.troj.evad.winEXE@5/13@3/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 14
    • Number of non-executed functions: 15
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.22
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtOpenFile calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    20:37:42API Interceptor2x Sleep call for process: WerFault.exe modified
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ddos.dnsnb8.net7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
    • 44.221.84.105
    A9095F44928219267930271D2AD000C7B2F7F2616DB4AD186E5D3AA283D14764.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
    • 44.221.84.105
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    builder_Release.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
    • 44.221.84.105
    BOTBINARY.EXE.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    BkPack.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    bss.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nuwcjd.exe7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
      7Y18r(223).exeGet hashmaliciousBdaejecBrowse
        builder_Release.exeGet hashmaliciousBdaejecBrowse
          A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
            BOTBINARY.EXE.exeGet hashmaliciousBdaejecBrowse
              BkPack.exeGet hashmaliciousBdaejecBrowse
                bss.exeGet hashmaliciousBdaejecBrowse
                  C0ED98D08381257B540A04C0868ECD6A628649AA70FEBCBE03778BAE532FB5BE.exeGet hashmaliciousBdaejec, BitCoin Miner, XmrigBrowse
                    builder_Release.exeGet hashmaliciousBdaejecBrowse
                      E9E758383C0F518C4DBD1204A824762F5FAC37375D8C5695C749AD1C36C0F108.exeGet hashmaliciousBabuk, Bdaejec, Djvu, ZorabBrowse
                        Process:C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                        File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):19456
                        Entropy (8bit):6.5909097396259275
                        Encrypted:false
                        SSDEEP:384:1F8ScXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:d8QGPL4vzZq2o9W7GsxBbPr
                        MD5:48FBE9E26974D06FA6C4110023BC1FA1
                        SHA1:18D3138357C6FD92FA9385A4B584AF2E568D6991
                        SHA-256:4FEFA03BAE494C5C971D3C23A27C6FE57C5F49DC57D535BA5623171DAB1CA97C
                        SHA-512:A394E027919A6AE6AA9CA398B4EC7DF5AA088877EAA0058D962476CF3D33E4D834EB08FF86E4F4F36AA6D7FE44BB792E179B8508C07EEBAB5B16A031739BB552
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                        Process:C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):2389504
                        Entropy (8bit):6.731347769927002
                        Encrypted:false
                        SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                        MD5:7FA9ECDF8F97F36D3BEE9C6122EAC302
                        SHA1:7D045DA42D8B2DBDD855571F0A6470B16A0E310D
                        SHA-256:CBA1FA8E29DAB2E4ED1AE78A198530E1E08669B5951DB6755CF69438E56AFD32
                        SHA-512:58F19B15DD505CF8DB87E91A35A311A0D0F382A2C9DBC7916DBF1184349DEC9BB716C34D8235755B9E3CD339ECB800172FF1B35B3DA35E2F3BEC01C69E1ED20A
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):31744
                        Entropy (8bit):6.366563506928589
                        Encrypted:false
                        SSDEEP:768:uWQ3655Kv1X/qY1MSdSvQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdSoGCq2iW7z
                        MD5:ADA5C0BB1A89541501AFDD3DCB280914
                        SHA1:55950B2F027F7DBF66F43E9E6099430A7150CADF
                        SHA-256:83305511F0997E0D8D42FC9E4CAA68568C1C15304CD7A5CE34365535CCF7366F
                        SHA-512:AE1C55BA2096E8D2BF2027F8ADB6D18D0A3AAF44B33F4090EE32F3F3C394362E0F791ADF2AED0375AB60D70B239F63430945D37F6F5FB05407384285CD46ADD9
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.6480796788025764
                        Encrypted:false
                        SSDEEP:96:TiwF8OIpowDTswhMa7J9bQXIDcQvc6QcEVcw3cE/X+HbHg/5hZAX/d5FMT2SlPkJ:TmOIpfDTg0BU/wjhzuiF8Z24IO87
                        MD5:1A4EF18E353EA15B9FF0CE0AF7B57BB6
                        SHA1:BD5B6342F997D7A6055C2D93D1CF8B84492D0351
                        SHA-256:3D788C856590BFF2BCED30369403EB8AAEC4F91AFD2C275530C762B9E0824F3B
                        SHA-512:43A6F704F90795558F0D0FA4552C335A0198E12A7DA6C322845BE603DAD861AD5996173E444C6D2CD78FC329FCC51029F332122262D6F3C1DEF858B56EDEB37D
                        Malicious:true
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.2.7.8.5.9.2.6.3.1.8.6.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.2.7.8.5.9.7.6.3.1.8.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.c.e.3.9.8.1.-.b.f.1.c.-.4.f.7.c.-.b.9.a.5.-.4.7.7.5.1.f.4.3.c.8.1.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.6.2.b.4.1.6.2.-.8.2.d.d.-.4.8.e.7.-.a.1.7.0.-.b.d.0.9.f.9.7.4.1.2.e.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.7.Y.1.8.r.(.2.1.2.)...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.8.4.-.0.0.0.1.-.0.0.1.5.-.3.1.7.b.-.3.2.0.4.f.4.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.f.e.c.a.d.6.a.b.c.6.c.5.6.5.5.9.d.f.1.3.1.d.c.e.c.3.4.5.9.d.f.0.0.0.0.f.f.f.f.!.0.0.0.0.d.9.c.a.3.f.f.e.e.b.3.9.1.c.b.d.d.0.3.4.8.6.1.f.1.1.9.f.2.2.1.d.a.a.8.1.7.e.3.1.!.7.Y.1.8.r.(.2.1.2.)...e.x.e.....T.a.r.g.e.t.A.p.p.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9104642016551889
                        Encrypted:false
                        SSDEEP:96:K/FrJbLusMhnG7afzQXIDcQEc6XcEgcw3mjC+HbHg/5ksS/YyNl1zWDUMsxzLOyy:gRJbLuS0qT6Yj8fHzuiF8Z24IO8pEm
                        MD5:71CBE9DB8A641A563400BDEE0C32F425
                        SHA1:0B99317F8AD709389D11C6E616BF6D80DA5EB620
                        SHA-256:C39620C813584A21DA2D529FD3917678E43926F6645EFFF86B25D831A117D132
                        SHA-512:E24DF88E4B621A9AAD1506F6A28068CEDB25898B5055FA95700502F3280028EFD5F87DE90F955A055B005BCD7C505449000A7B20B34C0FD19B946B53749BCC28
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.2.7.8.6.4.1.0.0.3.7.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.2.7.8.6.4.5.0.6.6.2.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.4.b.c.a.5.6.6.-.1.9.f.6.-.4.a.9.6.-.8.1.5.1.-.5.8.d.f.9.6.c.8.5.2.f.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.e.4.2.8.a.c.-.2.8.4.2.-.4.b.1.4.-.9.b.d.1.-.c.5.c.f.6.e.a.4.d.9.6.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.n.u.w.c.j.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.c.4.-.0.0.0.1.-.0.0.1.5.-.c.0.2.6.-.4.0.0.4.f.4.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.4.8.4.6.9.6.8.2.7.a.d.9.d.3.4.9.2.c.6.9.7.7.8.a.9.4.6.4.1.5.7.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.n.u.w.c.j.d...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Jul 26 00:37:39 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):30574
                        Entropy (8bit):1.808634412283413
                        Encrypted:false
                        SSDEEP:192:o7U2zhpBOevZjMUnmfsgcUdY2WW+NU5/D:Cl0eRjMUssHDWj
                        MD5:940359BCB0FA247E49F1ECAE9E7E94E6
                        SHA1:F52A123A6B8BB8C069AC11B95A5D6A0B10471E1D
                        SHA-256:5BACEBF635FA81F2EB708583E639EE4CFE6F53BCA6A20924DF2668FD3215889F
                        SHA-512:C36B85AEA67742E611B8D611705146E19A62D9372EFD7C0AF10CF2CD8BF9AA0A5D90C6197A7A067328354C841F7DEEF1CE06157D0B2B1D44B1B659033B8C88F1
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... .........f........................d...........................T.......8...........T...........`....m......................................................................................................eJ..............GenuineIntel............T.............f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8294
                        Entropy (8bit):3.694402199291567
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJ5jx6Z6Y2DYSUkcsk6Ggmf4lprq89bDksfPdhm:R6lXJtx6Z6YVSUVbgmf4rDXfPS
                        MD5:4A4169D74B633BB4F5357D9BD93BB22D
                        SHA1:6AE58AFB5B53A96D063F2D31946BBF184159F51C
                        SHA-256:AA55CDCD3A32C6E6803104A802CBACDDA5F073BAD8449D683D222696403994AD
                        SHA-512:D2B1CFE0765D82592C151203018B030EF18232F176404A4BE5DC59A2EF50632B3C481D63F466A3B5AD16828F86FE8483A985FBE27F724DAFD2A374CD2072F150
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.7.6.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4579
                        Entropy (8bit):4.443716499575832
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsQJg77aI9RWWpW8VYdYm8M4JN8UF9c+q8vg7PypM3dMjd:uIjfWI7/37VNJyrOyPyS3dMjd
                        MD5:618F121EE52B3DF2691FDCA7AD03E2A5
                        SHA1:0EC3519296E53BC6585CE9797C7604BB6D7174E1
                        SHA-256:608C2F47BD14F73B29481C7843DC6469718079A07FBF937C6A8971EAC21F4A04
                        SHA-512:4F617AD24F599A89DB4FA876FFB13CB2EDC1A52662D80EFB80DEEE683DB41BD9AACC35B115C2A7A89F42428F0DFE0784281AA6C062EC244198A2E6699DAD89F2
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427180" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Jul 26 00:37:44 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):167074
                        Entropy (8bit):1.8821953255714834
                        Encrypted:false
                        SSDEEP:384:W5n7ZxSlrBmyf8FASBRCqhUPiNpu5852AcTS1FCFW+BP2Xm+9Pt6PwWKGoW7GCBV:+7LStB10v+6695Oolc+BP2xPALoVKD
                        MD5:9735734B477B3614EACFE1D3A2854380
                        SHA1:0E3C86E808792E058C69238F990333B951E9A6DB
                        SHA-256:4E36061E351C3BD2391CC4FB234CC9B1C26B964278927B50BF144A06BF48D253
                        SHA-512:C36F5DD6C636BDE2BF835D6271B3A8ED492E4AB167F966F073163F4BC6CD2DC945F98F5C199544AAD4643BB05C30AEF8B79059E9BA6BD05A0971646EED572E7B
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... .........f............t...............|.......d...VK..........T.......8...........T............5...V..........|...........h...............................................................................eJ..............GenuineIntel............T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6264
                        Entropy (8bit):3.7169721668457405
                        Encrypted:false
                        SSDEEP:96:RSIU6o7wVetbgS65JYGDjwXn5aMQU089bxOsfWkGm:R6l7wVeJgS6HYGcpD089bxOsfW7m
                        MD5:031CEE0F95A618573C27232B0F852CEA
                        SHA1:2A2F1602594552C21760E7CBC3F3916D7C292D62
                        SHA-256:064C2CAD41E90B712B309E1E721B01012575C9986D6F1504B5AD8F75FE086758
                        SHA-512:161BBD44DF6636526D35FF0207CF2CA6BA4E37C47C6F9050F9FEEA3BBBEEBDF4C1649A65DE22994BABF095A133AF7701FCEE82F5A7291B9BB814E1CDB73BBA71
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.4.4.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4551
                        Entropy (8bit):4.436928246707926
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsQJg77aI9RWWpW8VYFYm8M4JNiKFanT+q8GurMSg7SYd:uIjfWI7/37VhJNmnTe7gGYd
                        MD5:F509B737E0AF76F41385C400689B389A
                        SHA1:3CE855845FB222E04642CBF076D55184D9B3F4DB
                        SHA-256:885550FB748D6774952911397CD64910F6F585BAE362512FDB20DA84322658BF
                        SHA-512:F7E0915D98C431A6461BFFF5D5224096CF6E8F7640E993CA7C881A4C2F37505233384D7B26A21EF7CFE40C1059661C366D14B67BAACE7083DEDF07CD5A0382B6
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427180" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Users\user\Desktop\7Y18r(212).exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):15872
                        Entropy (8bit):7.031075575407894
                        Encrypted:false
                        SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                        MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                        SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                        SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                        SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 92%
                        • Antivirus: Virustotal, Detection: 93%, Browse
                        Joe Sandbox View:
                        • Filename: 7Y18r(216).exe.dll, Detection: malicious, Browse
                        • Filename: 7Y18r(223).exe, Detection: malicious, Browse
                        • Filename: builder_Release.exe, Detection: malicious, Browse
                        • Filename: A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exe, Detection: malicious, Browse
                        • Filename: BOTBINARY.EXE.exe, Detection: malicious, Browse
                        • Filename: BkPack.exe, Detection: malicious, Browse
                        • Filename: bss.exe, Detection: malicious, Browse
                        • Filename: C0ED98D08381257B540A04C0868ECD6A628649AA70FEBCBE03778BAE532FB5BE.exe, Detection: malicious, Browse
                        • Filename: builder_Release.exe, Detection: malicious, Browse
                        • Filename: E9E758383C0F518C4DBD1204A824762F5FAC37375D8C5695C749AD1C36C0F108.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.4712283606847505
                        Encrypted:false
                        SSDEEP:6144:fzZfpi6ceLPx9skLmb0fJZWSP3aJG8nAgeiJRMMhA2zX4WABluuN7jDH5S:LZHtJZWOKnMM6bFphj4
                        MD5:6940D4EA04F5736D9DAC95A7E5E05BDF
                        SHA1:FA51FEA8F0BA8320A4B06A54059A431ACF6DCFBC
                        SHA-256:CB1485BEC913421F0089B4A527EC11EBC09F0AB632A465CE05C07A267E70C218
                        SHA-512:B0F1D9689E4CC5379403DAB85A8666390D22FEB643594CC40294A8E8CE040621FE00B958C64432836E37DE9F0E6B19773CA6BD5247FF454FFA95B25A03701FA2
                        Malicious:false
                        Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...................................................................................................................................................................................................................................................................................................................................................Pv.0........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                        Entropy (8bit):2.435161920948518
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • VXD Driver (31/22) 0.00%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:7Y18r(212).exe
                        File size:4'981'248 bytes
                        MD5:694c32cb655bcdc5ee56749cb64124e8
                        SHA1:d9ca3ffeeb391cbdd034861f119f221daa817e31
                        SHA256:347b1528f270d85186eca01132cb9b6fdbb818d317d5a17ac4772f2381473095
                        SHA512:92f88cf1ac7cb4072ab7707b7ffc77c9499fa76564de205a485e3cdd28265f5d8c405b1c70550a0ebef5698bfe9f22a166f8e011abc49adf532dbd33f3df0b5e
                        SSDEEP:24576:BBF6727HeoPO+XC7A9GaF2UdJwdOcRUVVc/2tQnwnoTTPqLvzxczjIBB6/HOy:FOY2UrwgbtT4ixiWy
                        TLSH:FD360151CEBF14F9D61A2134686F9B2FAA2126051F38EDEBC3C50D86D61BFF11132929
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........PE...........................M......P....@...........................M............................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x8da000
                        Entrypoint Section:i]|u
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
                        DLL Characteristics:
                        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:
                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 0000016Ch
                        xor eax, eax
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-24h], eax
                        mov dword ptr [ebp-10h], eax
                        mov dword ptr [ebp-14h], eax
                        mov dword ptr [ebp-08h], eax
                        mov dword ptr [ebp-0Ch], eax
                        mov dword ptr [ebp-20h], eax
                        mov dword ptr [ebp-18h], eax
                        mov dword ptr [ebp-48h], 6377756Eh
                        mov dword ptr [ebp-44h], 652E646Ah
                        mov dword ptr [ebp-40h], 00006578h
                        mov dword ptr [ebp-3Ch], 00000000h
                        call 00007F34A8B170A5h
                        pop eax
                        add eax, 00000225h
                        mov dword ptr [ebp-04h], eax
                        mov eax, dword ptr fs:[00000030h]
                        mov dword ptr [ebp-28h], eax
                        mov eax, dword ptr [ebp-04h]
                        mov dword ptr [eax], E904C483h
                        mov eax, dword ptr [ebp-04h]
                        mov dword ptr [eax+04h], FFB7241Fh
                        mov eax, dword ptr [ebp-28h]
                        mov eax, dword ptr [eax+0Ch]
                        mov eax, dword ptr [eax+1Ch]
                        mov eax, dword ptr [eax]
                        mov eax, dword ptr [eax+08h]
                        mov ecx, dword ptr [eax+3Ch]
                        mov ecx, dword ptr [ecx+eax+78h]
                        add ecx, eax
                        mov edi, dword ptr [ecx+1Ch]
                        mov ebx, dword ptr [ecx+20h]
                        mov esi, dword ptr [ecx+24h]
                        mov ecx, dword ptr [ecx+18h]
                        add esi, eax
                        add edi, eax
                        add ebx, eax
                        xor edx, edx
                        mov dword ptr [ebp-30h], esi
                        mov dword ptr [ebp-1Ch], edx
                        mov dword ptr [ebp-34h], ecx
                        cmp edx, dword ptr [ebp-34h]
                        jnc 00007F34A8B171EEh
                        movzx ecx, word ptr [esi+edx*2]
                        mov edx, dword ptr [ebx+edx*4]
                        mov esi, dword ptr [edi+ecx*4]
                        add edx, eax
                        mov ecx, dword ptr [edx]
                        add esi, eax
                        cmp ecx, 4D746547h
                        jne 00007F34A8B170F4h
                        cmp dword ptr [edx+04h], 6C75646Fh
                        jne 00007F34A8B170EBh
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x4710000x372.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c20000x17af0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x2e50000x8c.data
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x2e3cb90x2e3e00621fc4c1741d1aae19b7cb023966f0d5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x2e50000x465280x302008140f90bf0e9cc0d7cee6a4cb1cd7946False0.0010805600649350649data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        /40x32c0000x1160x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /180x32d0000x2dcb30x2de00918736048677cdec5b9be220905fb89dFalse0.001090982629427793data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /300x35b0000x24f980x250008ae23dda76ac8cf226db64eb890fe038False0.001121727195945946data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /430x3800000x131810x132004fcf65d3ad9691efc0f5963c0c85cc67False0.0012637867647058824data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /590x3940000x1eca80x1ee0027849d1d652ac20ecbc3b7ef6c1f1943False0.0011465713562753036data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /750x3b30000x200x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /900x3b40000x220x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        /1090x3b50000xbb3a50xbb400828819da66763d8fc856d7b412550fa3False0.0009987274699599466data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        .idata0x4710000x3720x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .symtab0x4720000x4f2d50x4f40063f56a2d641b240c6efbfb4d0efccad2False0.0010381752760252366data0.0IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        .rsrc0x4c20000x17af00x17c00e4ec5319f7265ca24ee5e653a6e35299False0.0012027138157894737data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        i]|u0x4da0000x50000x4200596d080a1947377e451a028daf424781False0.7774621212121212data6.93440401754385IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                        2024-07-26T02:37:57.191863+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435597713.85.23.86192.168.2.6
                        2024-07-26T02:37:40.206459+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5120853192.168.2.61.1.1.1
                        2024-07-26T02:38:15.891536+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435802552.165.165.26192.168.2.6
                        2024-07-26T02:37:41.199113+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5120853192.168.2.61.1.1.1
                        2024-07-26T02:38:16.990641+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435802652.165.165.26192.168.2.6
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 26, 2024 02:37:40.206459045 CEST5120853192.168.2.61.1.1.1
                        Jul 26, 2024 02:37:41.199112892 CEST5120853192.168.2.61.1.1.1
                        Jul 26, 2024 02:37:41.206186056 CEST53512081.1.1.1192.168.2.6
                        Jul 26, 2024 02:37:44.216032982 CEST53512081.1.1.1192.168.2.6
                        Jul 26, 2024 02:38:11.471772909 CEST5352777162.159.36.2192.168.2.6
                        Jul 26, 2024 02:38:11.957611084 CEST4986553192.168.2.61.1.1.1
                        Jul 26, 2024 02:38:11.966922998 CEST53498651.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jul 26, 2024 02:37:40.206459045 CEST192.168.2.61.1.1.10x143Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                        Jul 26, 2024 02:37:41.199112892 CEST192.168.2.61.1.1.10x143Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                        Jul 26, 2024 02:38:11.957611084 CEST192.168.2.61.1.1.10xcb75Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jul 26, 2024 02:37:44.216032982 CEST1.1.1.1192.168.2.60x143No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                        Jul 26, 2024 02:38:11.966922998 CEST1.1.1.1192.168.2.60xcb75Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:20:37:38
                        Start date:25/07/2024
                        Path:C:\Users\user\Desktop\7Y18r(212).exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\7Y18r(212).exe"
                        Imagebase:0x400000
                        File size:4'981'248 bytes
                        MD5 hash:694C32CB655BCDC5EE56749CB64124E8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:20:37:38
                        Start date:25/07/2024
                        Path:C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                        Imagebase:0xb10000
                        File size:15'872 bytes
                        MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 92%, ReversingLabs
                        • Detection: 93%, Virustotal, Browse
                        Reputation:moderate
                        Has exited:true

                        Target ID:6
                        Start time:20:37:38
                        Start date:25/07/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 244
                        Imagebase:0x8f0000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:20:37:43
                        Start date:25/07/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1568
                        Imagebase:0x8f0000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:53.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:87.5%
                          Total number of Nodes:8
                          Total number of Limit Nodes:1
                          execution_graph 53 8da000 55 8da044 GetPEB 53->55 57 8da077 CreateFileA 55->57 58 8da22d 57->58 59 8da265 57->59 60 8da246 WriteFile 58->60 61 8da244 58->61 62 8da255 FindCloseChangeNotification WinExec 60->62 61->62 62->59

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_008DA044 1 Function_008DA000 1->0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 8da044-8da074 GetPEB 1 8da077-8da09a 0->1 2 8da09d-8da0a0 1->2 3 8da1ee-8da22b CreateFileA 2->3 4 8da0a6-8da0bc 2->4 28 8da22d-8da230 3->28 29 8da265-8da269 3->29 5 8da0be-8da0c5 4->5 6 8da110-8da116 4->6 5->6 7 8da0c7-8da0ce 5->7 9 8da129-8da12f 6->9 10 8da118-8da11f 6->10 7->6 11 8da0d0-8da0d7 7->11 13 8da148-8da14e 9->13 14 8da131-8da138 9->14 10->9 12 8da121-8da124 10->12 11->6 18 8da0d9-8da0dd 11->18 20 8da1bb-8da1c0 12->20 16 8da167-8da16f 13->16 17 8da150-8da157 13->17 14->13 15 8da13a-8da141 14->15 15->13 21 8da143-8da146 15->21 25 8da188-8da18e 16->25 26 8da171-8da178 16->26 17->16 24 8da159-8da160 17->24 18->6 27 8da0df-8da0e3 18->27 22 8da1e0-8da1e9 20->22 23 8da1c2-8da1c5 20->23 21->20 22->2 23->22 30 8da1c7-8da1ca 23->30 24->16 31 8da162-8da165 24->31 34 8da1a7-8da1ad 25->34 35 8da190-8da197 25->35 26->25 32 8da17a-8da181 26->32 27->20 33 8da0e9-8da10b 27->33 36 8da232-8da238 28->36 30->22 39 8da1cc-8da1cf 30->39 31->20 32->25 40 8da183-8da186 32->40 33->1 34->20 42 8da1af-8da1b6 34->42 35->34 41 8da199-8da1a0 35->41 37 8da23a-8da242 36->37 38 8da246-8da252 WriteFile 36->38 37->36 44 8da244 37->44 45 8da255-8da262 FindCloseChangeNotification WinExec 38->45 39->22 46 8da1d1-8da1d4 39->46 40->20 41->34 48 8da1a2-8da1a5 41->48 42->20 43 8da1b8 42->43 43->20 44->45 45->29 46->22 49 8da1d6-8da1d9 46->49 48->20 49->22 50 8da1db-8da1de 49->50 50->3 50->22
                          APIs
                          • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 008DA223
                          • WriteFile.KERNELBASE(00000000,FFB7241F,00003E00,?,00000000), ref: 008DA252
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 008DA256
                          • WinExec.KERNEL32(?,00000005), ref: 008DA262
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2171591596.00000000008DA000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2171069418.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2171098287.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2171611840.00000000008DB000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_7Y18r(212).jbxd
                          Similarity
                          • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                          • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$nuwcjd.exe$odul
                          • API String ID: 2234911746-2528574354
                          • Opcode ID: 22ae9d5cb094e7cec920e355afca94933ede293029b45c6f72bd23c75b5eb4a5
                          • Instruction ID: 2d62b46ae082640fc3f502ce1ccedd0adbae1300d2fb27b685911f92d85b9e46
                          • Opcode Fuzzy Hash: 22ae9d5cb094e7cec920e355afca94933ede293029b45c6f72bd23c75b5eb4a5
                          • Instruction Fuzzy Hash: 8161E774D0121ADBCF28CF94C885AAEB7B4FF45715F2582ABD506AB741C3709E81CB92

                          Execution Graph

                          Execution Coverage:27.5%
                          Dynamic/Decrypted Code Coverage:10.5%
                          Signature Coverage:23.6%
                          Total number of Nodes:296
                          Total number of Limit Nodes:10
                          execution_graph 1012 b114e1 1013 b11541 1012->1013 1014 b114fd GetModuleHandleA 1012->1014 1015 b11573 1013->1015 1019 b11549 1013->1019 1016 b11512 1014->1016 1017 b1151a VirtualQuery 1014->1017 1023 b11638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1015->1023 1016->1013 1017->1016 1018 b11566 1019->1018 1040 b11af9 1019->1040 1021 b11579 ExitProcess 1024 b1167a 1023->1024 1025 b1167f 1023->1025 1058 b1139f GetVersionExA 1024->1058 1046 b11718 GetSystemTimeAsFileTime 1025->1046 1028 b11686 1029 b116ca 1028->1029 1032 b116a0 CreateThread 1028->1032 1030 b116d0 1029->1030 1031 b116d7 1029->1031 1079 b11581 1030->1079 1034 b116dd lstrcpy 1031->1034 1035 b1170f 1031->1035 1051 b12c48 memset 1032->1051 1295 b11099 1032->1295 1034->1021 1035->1021 1039 b11718 3 API calls 1039->1029 1041 b11b11 1040->1041 1042 b11b09 1040->1042 1044 b11b16 CreateThread 1041->1044 1045 b11b0f 1041->1045 1043 b11638 188 API calls 1042->1043 1043->1045 1044->1045 1313 b11638 189 API calls 1044->1313 1045->1018 1045->1045 1047 b11735 SHSetValueA 1046->1047 1048 b11754 1046->1048 1050 b11786 __aulldiv 1047->1050 1049 b1175a SHGetValueA 1048->1049 1048->1050 1049->1050 1050->1028 1085 b11973 PathFileExistsA 1051->1085 1054 b12cb2 1056 b116ba WaitForSingleObject 1054->1056 1057 b12cbb VirtualFree 1054->1057 1055 b12c8f CreateThread WaitForMultipleObjects 1055->1054 1107 b12b8c memset GetLogicalDriveStringsA 1055->1107 1056->1039 1057->1056 1059 b114da 1058->1059 1060 b113cf LookupPrivilegeValueA 1058->1060 1059->1025 1061 b113ef 1060->1061 1062 b113e7 1060->1062 1061->1059 1280 b1120e GetModuleHandleA GetProcAddress 1061->1280 1275 b1119f GetCurrentProcess OpenProcessToken 1062->1275 1068 b11448 GetCurrentProcessId 1068->1059 1069 b11457 1068->1069 1069->1059 1070 b11319 3 API calls 1069->1070 1071 b1147f 1070->1071 1072 b11319 3 API calls 1071->1072 1073 b1148e 1072->1073 1073->1059 1074 b11319 3 API calls 1073->1074 1075 b114b4 1074->1075 1076 b11319 3 API calls 1075->1076 1077 b114c3 1076->1077 1078 b11319 3 API calls 1077->1078 1078->1059 1294 b1185b GetSystemTimeAsFileTime srand rand srand rand 1079->1294 1081 b11592 wsprintfA wsprintfA lstrlen CreateFileA 1082 b11633 1081->1082 1083 b115fb WriteFile CloseHandle 1081->1083 1082->1035 1083->1082 1084 b1161d ShellExecuteA 1083->1084 1084->1082 1086 b119a0 1085->1086 1087 b11ac7 1085->1087 1088 b119af CreateFileA 1086->1088 1087->1054 1087->1055 1089 b119c4 Sleep 1088->1089 1090 b11a28 GetFileSize 1088->1090 1089->1088 1092 b119d5 1089->1092 1091 b11a38 1090->1091 1101 b11a80 1090->1101 1093 b11a3d VirtualAlloc 1091->1093 1091->1101 1106 b1185b GetSystemTimeAsFileTime srand rand srand rand 1092->1106 1093->1101 1105 b11a53 1093->1105 1094 b11a96 1098 b11aad 1094->1098 1099 b11a9c DeleteFileA 1094->1099 1095 b11a8d FindCloseChangeNotification 1095->1094 1097 b119da wsprintfA CopyFileA 1097->1090 1100 b11a0d CreateFileA 1097->1100 1098->1087 1104 b11ab8 VirtualFree 1098->1104 1099->1098 1100->1090 1100->1099 1101->1094 1101->1095 1102 b11a59 ReadFile 1102->1101 1102->1105 1104->1087 1105->1101 1105->1102 1106->1097 1108 b12c09 WaitForMultipleObjects 1107->1108 1109 b12bc8 1107->1109 1111 b12c2a CreateThread 1108->1111 1112 b12c3c 1108->1112 1110 b12bfa lstrlen 1109->1110 1113 b12bd2 GetDriveTypeA 1109->1113 1114 b12be3 CreateThread 1109->1114 1110->1108 1110->1109 1111->1112 1118 b12845 1111->1118 1113->1109 1113->1110 1114->1110 1115 b12b7d 1114->1115 1128 b129e2 memset wsprintfA 1115->1128 1265 b1274a memset memset SHGetSpecialFolderPathA wsprintfA 1118->1265 1120 b12878 DeleteFileA 1121 b1289a 1120->1121 1122 b1288c VirtualFree 1120->1122 1125 b128a4 CloseHandle 1121->1125 1126 b128ab 1121->1126 1122->1121 1123 b12853 1123->1120 1124 b12692 8 API calls 1123->1124 1127 b1239d 186 API calls 1123->1127 1124->1123 1125->1126 1127->1123 1129 b12a3a memset lstrlen lstrcpyn strrchr 1128->1129 1130 b12abc memset memset FindFirstFileA 1128->1130 1129->1130 1132 b12a88 1129->1132 1142 b128b8 memset wsprintfA 1130->1142 1132->1130 1134 b12a9a lstrcmpiA 1132->1134 1135 b12b74 1134->1135 1136 b12aad lstrlen 1134->1136 1136->1130 1136->1134 1137 b12b61 FindNextFileA 1138 b12b23 1137->1138 1139 b12b6d FindClose 1137->1139 1140 b12b35 lstrcmpiA 1138->1140 1141 b128b8 174 API calls 1138->1141 1139->1135 1140->1138 1140->1139 1141->1137 1143 b12905 1142->1143 1148 b12951 memset 1142->1148 1144 b12956 strrchr 1143->1144 1145 b1291b memset wsprintfA 1143->1145 1143->1148 1147 b12967 lstrcmpiA 1144->1147 1144->1148 1146 b129e2 180 API calls 1145->1146 1146->1148 1149 b12988 lstrcmpiA 1147->1149 1150 b1297a 1147->1150 1148->1137 1149->1148 1151 b12994 1149->1151 1160 b11e6e 1150->1160 1153 b129ad strstr 1151->1153 1154 b129a5 lstrcpy 1151->1154 1155 b129d3 1153->1155 1156 b129cb 1153->1156 1154->1153 1225 b12692 1155->1225 1203 b1239d strstr 1156->1203 1161 b11e7d 1160->1161 1234 b11df6 strrchr 1161->1234 1164 b11eb0 SetFileAttributesA CreateFileA 1165 b12332 1164->1165 1166 b11edf 1164->1166 1168 b12346 1165->1168 1169 b1233d UnmapViewOfFile 1165->1169 1239 b11915 1166->1239 1171 b12350 1168->1171 1172 b1234b FindCloseChangeNotification 1168->1172 1169->1168 1173 b12391 1171->1173 1174 b12356 CloseHandle 1171->1174 1172->1171 1173->1148 1174->1173 1175 b11f2e 1175->1165 1245 b11c81 1175->1245 1179 b11f92 1180 b11c81 2 API calls 1179->1180 1181 b11f9f 1180->1181 1181->1165 1182 b11af9 169 API calls 1181->1182 1183 b12024 1181->1183 1187 b11fc0 1182->1187 1183->1165 1184 b11af9 169 API calls 1183->1184 1185 b1207a 1184->1185 1186 b11af9 169 API calls 1185->1186 1191 b12090 1186->1191 1187->1165 1187->1183 1188 b11af9 169 API calls 1187->1188 1189 b11ffe 1188->1189 1190 b12013 FlushViewOfFile 1189->1190 1190->1183 1192 b120bb memset memset 1191->1192 1193 b120f5 1192->1193 1194 b11c81 2 API calls 1193->1194 1195 b121de 1194->1195 1196 b12226 memcpy UnmapViewOfFile FindCloseChangeNotification 1195->1196 1250 b11b8a 1196->1250 1198 b1226e 1258 b1185b GetSystemTimeAsFileTime srand rand srand rand 1198->1258 1200 b122ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1201 b11915 3 API calls 1200->1201 1202 b1231f FindCloseChangeNotification 1201->1202 1202->1165 1204 b12451 CreateFileA GetFileSize 1203->1204 1209 b123d8 1203->1209 1205 b12480 1204->1205 1206 b12675 CloseHandle 1204->1206 1205->1206 1210 b12499 1205->1210 1207 b1267c RemoveDirectoryA 1206->1207 1208 b12687 1207->1208 1208->1148 1209->1204 1209->1208 1211 b11915 3 API calls 1210->1211 1212 b124a4 9 API calls 1211->1212 1260 b1189d memset CreateProcessA 1212->1260 1215 b1255c Sleep memset wsprintfA 1216 b129e2 163 API calls 1215->1216 1217 b12597 memset wsprintfA Sleep 1216->1217 1218 b1189d 6 API calls 1217->1218 1219 b125e4 Sleep CreateFileA 1218->1219 1220 b11915 3 API calls 1219->1220 1221 b12610 CloseHandle 1220->1221 1221->1207 1222 b1261e 1221->1222 1222->1207 1223 b12641 SetFilePointer WriteFile 1222->1223 1223->1207 1224 b12667 SetEndOfFile 1223->1224 1224->1207 1226 b126b2 WaitForSingleObject 1225->1226 1227 b126a2 CreateEventA 1225->1227 1228 b126c1 lstrlen ??2@YAPAXI 1226->1228 1231 b12708 1226->1231 1227->1226 1229 b12736 SetEvent 1228->1229 1230 b126da lstrcpy 1228->1230 1229->1148 1232 b126f1 1230->1232 1231->1229 1233 b12718 lstrcpy ??3@YAXPAX 1231->1233 1232->1229 1233->1232 1235 b11e13 lstrcpy strrchr 1234->1235 1236 b11e62 1234->1236 1235->1236 1237 b11e40 lstrcmpiA 1235->1237 1236->1164 1236->1165 1237->1236 1238 b11e52 lstrlen 1237->1238 1238->1236 1238->1237 1240 b11924 SetFilePointer CreateFileMappingA MapViewOfFile 1239->1240 1241 b11928 1239->1241 1240->1165 1240->1175 1242 b1194f 1241->1242 1243 b1192e memset GetFileTime 1241->1243 1242->1240 1244 b11954 SetFileTime 1242->1244 1243->1240 1244->1240 1246 b11c9c 1245->1246 1248 b11c94 1245->1248 1247 b11cae memset memset 1246->1247 1246->1248 1247->1248 1248->1165 1249 b1185b GetSystemTimeAsFileTime srand rand srand rand 1248->1249 1249->1179 1251 b11b93 1250->1251 1259 b1185b GetSystemTimeAsFileTime srand rand srand rand 1251->1259 1253 b11bca srand 1254 b11bd8 rand 1253->1254 1255 b11c08 1254->1255 1255->1254 1256 b11c29 memset memcpy lstrcat 1255->1256 1256->1198 1258->1200 1259->1253 1261 b118e0 CloseHandle WaitForSingleObject 1260->1261 1262 b1190c 1260->1262 1263 b11907 CloseHandle 1261->1263 1264 b118fb GetExitCodeProcess 1261->1264 1262->1207 1262->1215 1263->1262 1264->1263 1274 b1185b GetSystemTimeAsFileTime srand rand srand rand 1265->1274 1267 b127b5 wsprintfA CopyFileA 1268 b12840 1267->1268 1269 b127de wsprintfA 1267->1269 1268->1123 1270 b11973 17 API calls 1269->1270 1271 b1280f 1270->1271 1272 b12820 CreateFileA 1271->1272 1273 b12813 DeleteFileA 1271->1273 1272->1268 1273->1272 1274->1267 1276 b11200 CloseHandle 1275->1276 1277 b111c6 AdjustTokenPrivileges 1275->1277 1276->1061 1278 b111f7 CloseHandle 1277->1278 1279 b111f6 1277->1279 1278->1276 1279->1278 1281 b11310 1280->1281 1282 b1123f GetCurrentProcessId OpenProcess 1280->1282 1281->1059 1289 b11319 1281->1289 1282->1281 1285 b11262 1282->1285 1283 b112b0 VirtualAlloc 1283->1285 1288 b112b8 1283->1288 1284 b112f1 CloseHandle 1284->1281 1286 b11302 VirtualFree 1284->1286 1285->1283 1285->1284 1287 b11296 VirtualFree 1285->1287 1285->1288 1286->1281 1287->1283 1288->1284 1290 b1134a 1289->1290 1291 b1132a GetModuleHandleA GetProcAddress 1289->1291 1292 b11363 1290->1292 1293 b11351 memset 1290->1293 1291->1290 1291->1292 1292->1059 1292->1068 1293->1292 1294->1081 1296 b110ba 1295->1296 1297 b11196 1295->1297 1296->1297 1304 b1185b GetSystemTimeAsFileTime srand rand srand rand 1296->1304 1299 b11118 wsprintfA wsprintfA URLDownloadToFileA 1300 b11168 lstrlen Sleep 1299->1300 1301 b110dc 1299->1301 1300->1296 1305 b11000 CreateFileA 1301->1305 1304->1299 1306 b11092 WinExec lstrlen 1305->1306 1307 b11025 GetFileSize CreateFileMappingA MapViewOfFile 1305->1307 1306->1296 1306->1297 1308 b1107b 1307->1308 1309 b11057 1307->1309 1311 b11087 CloseHandle 1308->1311 1312 b1108d CloseHandle 1308->1312 1310 b11074 UnmapViewOfFile 1309->1310 1310->1308 1311->1312 1312->1306 1328 b12361 1329 b12374 1328->1329 1330 b1236b UnmapViewOfFile 1328->1330 1331 b12382 1329->1331 1332 b12379 CloseHandle 1329->1332 1330->1329 1333 b12391 1331->1333 1334 b12388 CloseHandle 1331->1334 1332->1331 1334->1333 1335 b16014 1336 b1605f 1335->1336 1337 b16035 GetModuleHandleA 1335->1337 1338 b1604d GetProcAddress 1337->1338 1339 b16058 1338->1339 1339->1336 1339->1338 1339->1339 1314 b16076 1315 b1607b 1314->1315 1320 b160c7 1314->1320 1317 b160b0 VirtualAlloc 1315->1317 1318 b161b2 1315->1318 1315->1320 1316 b1615f VirtualFree 1316->1320 1317->1320 1322 b16389 VirtualProtect 1318->1322 1327 b162fb 1318->1327 1319 b16198 VirtualFree 1319->1318 1320->1316 1320->1319 1321 b160d5 VirtualAlloc 1320->1321 1321->1320 1325 b163b7 1322->1325 1323 b163fc VirtualProtect 1324 b16400 1323->1324 1325->1323 1326 b163e7 VirtualProtect 1325->1326 1326->1323 1326->1325 1340 b16159 VirtualFree 1348 b160c7 1340->1348 1341 b16198 VirtualFree 1350 b161b2 1341->1350 1342 b160d5 VirtualAlloc 1342->1348 1343 b16389 VirtualProtect 1347 b163b7 1343->1347 1344 b163fc VirtualProtect 1345 b16400 1344->1345 1346 b1615f VirtualFree 1346->1348 1347->1344 1349 b163e7 VirtualProtect 1347->1349 1348->1341 1348->1342 1348->1346 1349->1344 1349->1347 1350->1343 1351 b162fb 1350->1351

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00B169B0 1 Function_00B16734 23 Function_00B16D00 1->23 24 Function_00B16B02 1->24 25 Function_00B16A84 1->25 2 Function_00B16834 3 Function_00B128B8 7 Function_00B12692 3->7 15 Function_00B1239D 3->15 44 Function_00B129E2 3->44 46 Function_00B11E6E 3->46 4 Function_00B11638 11 Function_00B11099 4->11 13 Function_00B11718 4->13 18 Function_00B1139F 4->18 21 Function_00B11581 4->21 47 Function_00B117D0 4->47 52 Function_00B12C48 4->52 5 Function_00B167A4 6 Function_00B165A6 8 Function_00B16012 9 Function_00B11915 10 Function_00B16014 22 Function_00B11000 11->22 49 Function_00B1185B 11->49 12 Function_00B11319 32 Function_00B12CF0 13->32 14 Function_00B12D9B 15->9 16 Function_00B1189D 15->16 15->44 17 Function_00B1119F 18->12 18->17 31 Function_00B1120E 18->31 19 Function_00B16001 28 Function_00B1600A 19->28 20 Function_00B11C81 21->49 22->47 23->0 34 Function_00B16CF2 23->34 43 Function_00B16B63 23->43 24->43 30 Function_00B1680F 25->30 25->34 26 Function_00B11D8A 27 Function_00B11B8A 27->49 29 Function_00B12B8C 39 Function_00B12B7D 29->39 51 Function_00B12845 29->51 33 Function_00B11973 33->49 38 Function_00B16CF8 34->38 35 Function_00B16076 53 Function_00B166C8 35->53 36 Function_00B11DF6 37 Function_00B11AF9 37->4 39->44 40 Function_00B114E1 40->4 40->37 41 Function_00B12361 41->14 42 Function_00B12D60 43->0 43->2 43->5 44->3 45 Function_00B11C68 46->9 46->14 46->20 46->26 46->27 46->36 46->37 46->42 46->45 46->49 48 Function_00B16159 48->53 50 Function_00B1235D 51->7 51->15 54 Function_00B1274A 51->54 52->29 52->33 53->23 53->24 53->25 54->33 54->49

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                          • String ID: %s*$C:\$Documents and Settings
                          • API String ID: 2826467728-110786608
                          • Opcode ID: cbc49afbefa4bf5cc5dc65aa6329bce29c877bcde56a1f99e701b59057b81ab4
                          • Instruction ID: 4306bdab0b621e1224cdc90f0d9deaba69ab71d3960a937892dc7ec1a48b825c
                          • Opcode Fuzzy Hash: cbc49afbefa4bf5cc5dc65aa6329bce29c877bcde56a1f99e701b59057b81ab4
                          • Instruction Fuzzy Hash: E64175B2404349AFD720DBA0DC89EDB77ECEF84715F444869F945D3111FA34D69887A2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 172 b11099-b110b4 173 b11199-b1119c 172->173 174 b110ba-b110c7 172->174 175 b110c8-b110d4 174->175 176 b11184-b11190 175->176 177 b110da 175->177 176->175 178 b11196-b11198 176->178 179 b11113-b11162 call b1185b wsprintfA * 2 URLDownloadToFileA 177->179 178->173 182 b11168-b11182 lstrlen Sleep 179->182 183 b110dc-b1110d call b11000 WinExec lstrlen 179->183 182->176 182->179 183->178 183->179
                          APIs
                            • Part of subcall function 00B1185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76938400,http://%s:%d/%s/%s,?,?,?,00B11118), ref: 00B11867
                            • Part of subcall function 00B1185B: srand.MSVCRT ref: 00B11878
                            • Part of subcall function 00B1185B: rand.MSVCRT ref: 00B11880
                            • Part of subcall function 00B1185B: srand.MSVCRT ref: 00B11890
                            • Part of subcall function 00B1185B: rand.MSVCRT ref: 00B11894
                          • WinExec.KERNEL32(?,00000005), ref: 00B110F1
                          • lstrlen.KERNEL32(00B14748), ref: 00B110FA
                          • wsprintfA.USER32 ref: 00B1112A
                          • wsprintfA.USER32 ref: 00B11143
                          • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00B1115B
                          • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00B11169
                          • Sleep.KERNEL32 ref: 00B11179
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                          • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1280626985-762681358
                          • Opcode ID: 69e0a51ecd699d3bd0098d3f0648b0846f6beb783fc4ec65480352ba4ec877a7
                          • Instruction ID: ac0f84f1c75f7911f58b68ddc6a99ead38d19399bf9c44ba32d3ca510af9b346
                          • Opcode Fuzzy Hash: 69e0a51ecd699d3bd0098d3f0648b0846f6beb783fc4ec65480352ba4ec877a7
                          • Instruction Fuzzy Hash: 3C216975900248BEDB20DBA4DC48BEEBBF8EB05755F9188D5E600A3050EB749BD4CFA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 205 b11718-b11733 GetSystemTimeAsFileTime 206 b11735-b11752 SHSetValueA 205->206 207 b11754-b11758 205->207 208 b117c6-b117cd 206->208 207->208 209 b1175a-b11784 SHGetValueA 207->209 209->208 210 b11786-b117b3 call b12cf0 * 2 209->210 210->208 215 b117b5 210->215 216 b117b7-b117bd 215->216 217 b117bf 215->217 216->208 216->217 217->208
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B11729
                          • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00B1174C
                          • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00B1177C
                          • __aulldiv.LIBCMT ref: 00B11796
                          • __aulldiv.LIBCMT ref: 00B117A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: TimeValue__aulldiv$FileSystem
                          • String ID: C:\Users\user\AppData\Local\Temp\nuwcjd.exe$SOFTWARE\GTplus$Time
                          • API String ID: 541852442-4140730086
                          • Opcode ID: 12b11c1bcc5ec2c22ed3a180a4c5818cdfa3e5807fb8e2f49dcc9efca1b22b6a
                          • Instruction ID: e3de16dc5f9775570bfd460bc2efc5f4630f32bd94e57067eaa9579c5c9a5be4
                          • Opcode Fuzzy Hash: 12b11c1bcc5ec2c22ed3a180a4c5818cdfa3e5807fb8e2f49dcc9efca1b22b6a
                          • Instruction Fuzzy Hash: 2F1136B5A00209BBDB109B94CC85FEF7BFCEB44B14F908555FA01B6280D6719E948760

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 218 b16076-b16079 219 b160e0-b160eb 218->219 220 b1607b-b16080 218->220 223 b160ee-b160f4 219->223 221 b16082-b16085 220->221 222 b160f7-b160f8 220->222 224 b16087 221->224 225 b160f6 221->225 226 b160fa-b160fc call b166c8 222->226 227 b160fe-b16106 222->227 223->225 224->223 228 b16089-b16095 224->228 225->222 226->227 230 b16155-b16189 VirtualFree 227->230 231 b16108-b1611d 227->231 233 b160a1-b160aa 228->233 234 b16097-b1609f 228->234 240 b1618c-b16192 230->240 232 b1611f-b16121 231->232 236 b16151-b16154 232->236 237 b16123 232->237 238 b160b0-b160c1 VirtualAlloc 233->238 239 b161ba-b161c8 233->239 234->233 236->230 237->236 243 b16125-b16128 237->243 244 b160c7-b160cf 238->244 241 b16243-b16251 239->241 242 b161ca-b161d7 239->242 240->244 245 b16198-b161b0 VirtualFree 240->245 250 b16253 241->250 251 b16264-b1626f 241->251 246 b161dd-b161e0 242->246 247 b16134-b1613b 243->247 248 b1612a-b1612e 243->248 244->240 249 b160d5-b160df VirtualAlloc 244->249 245->239 252 b161b2-b161b4 245->252 246->241 254 b161e2-b161f2 246->254 261 b16130-b16132 247->261 262 b1613d-b1614f 247->262 248->247 248->261 249->219 257 b16255-b16258 250->257 253 b16271-b16276 251->253 252->239 258 b16389-b163b1 VirtualProtect 253->258 259 b1627c-b16289 253->259 260 b161f5-b161fe 254->260 257->251 263 b1625a-b16262 257->263 266 b163b7-b163ba 258->266 274 b16292-b16298 259->274 275 b1628b 259->275 264 b16200-b16203 260->264 265 b1620c-b16219 260->265 261->232 262->232 263->257 268 b16205-b16208 264->268 269 b1621b-b16228 264->269 270 b16238-b1623f 265->270 271 b163fc-b163ff VirtualProtect 266->271 272 b163bc-b163c2 266->272 276 b1622a-b16236 268->276 277 b1620a 268->277 269->270 270->260 279 b16241 270->279 273 b16400-b16416 271->273 272->272 278 b163c4 272->278 280 b16420-b16425 273->280 281 b16418-b1641d 273->281 282 b162a2-b162ac 274->282 275->274 276->270 277->270 278->271 283 b163c6-b163cf 278->283 279->246 284 b162b1-b162c8 282->284 285 b162ae 282->285 286 b163d1 283->286 287 b163d4-b163d8 283->287 288 b16373-b16384 284->288 289 b162ce-b162d4 284->289 285->284 286->287 290 b163da 287->290 291 b163dd-b163e1 287->291 288->253 294 b162d6-b162d9 289->294 295 b162da-b162f1 289->295 290->291 292 b163e3 291->292 293 b163e7-b163fa VirtualProtect 291->293 292->293 293->266 293->271 294->295 297 b162f3-b162f9 295->297 298 b16365-b1636e 295->298 299 b16314-b16326 297->299 300 b162fb-b1630f 297->300 298->282 302 b16328-b1634a 299->302 303 b1634c-b16360 299->303 301 b16426-b164a9 300->301 311 b16519-b1651c 301->311 312 b164ab-b164c0 301->312 302->298 303->301 313 b16583-b16587 311->313 314 b1651d-b1651e 311->314 318 b164c2 312->318 319 b16535-b16537 312->319 316 b16588-b1658b 313->316 317 b16522-b16533 314->317 320 b165a1-b165a3 316->320 321 b1658d-b1658f 316->321 317->319 324 b164c5-b164cd 318->324 325 b164f8 318->325 322 b16539 319->322 323 b1659a 319->323 326 b16591-b16593 321->326 327 b165b4 322->327 328 b1653b-b16541 322->328 329 b1659b-b1659d 323->329 330 b16542-b16545 324->330 331 b164cf-b164d4 324->331 332 b164fa-b164fe 325->332 333 b1656c-b1656f 325->333 326->329 334 b16595 326->334 339 b165be-b16608 327->339 328->330 329->326 335 b1659f 329->335 336 b1654d-b16550 330->336 337 b16517-b16518 331->337 338 b164d6-b164d9 331->338 340 b16500 332->340 341 b16572 332->341 333->341 334->323 335->316 336->339 343 b16552-b16556 336->343 337->311 338->336 344 b164db-b164f5 338->344 340->317 345 b16502 340->345 346 b16573-b16576 341->346 347 b16578-b1657f 343->347 348 b16558-b16569 343->348 344->325 345->346 349 b16504-b16513 345->349 346->347 347->313 348->333 349->319 351 b16515 349->351 351->337
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00001800,00001000,00000004), ref: 00B160BE
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 00B160DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00B16189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00B161A5
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: 668c373869f473e2b0fefbbac2edcf4f609f1323634012cd4e69227d5d3c7b2c
                          • Instruction ID: 0e8befa0361c9edb981d3145b3048b8b39040675b5ff5af7ec3c26e6f85734b6
                          • Opcode Fuzzy Hash: 668c373869f473e2b0fefbbac2edcf4f609f1323634012cd4e69227d5d3c7b2c
                          • Instruction Fuzzy Hash: 621244B25087849FDB328F24CC85BEA7BF5EF12310F9845EED8858B292D774A980C755

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 353 b12b8c-b12bc6 memset GetLogicalDriveStringsA 354 b12c09-b12c28 WaitForMultipleObjects 353->354 355 b12bc8-b12bcc 353->355 358 b12c2a-b12c3a CreateThread 354->358 359 b12c3c-b12c45 354->359 356 b12bfa-b12c07 lstrlen 355->356 357 b12bce-b12bd0 355->357 356->354 356->355 357->356 360 b12bd2-b12bdc GetDriveTypeA 357->360 358->359 360->356 361 b12bde-b12be1 360->361 361->356 362 b12be3-b12bf6 CreateThread 361->362 362->356
                          APIs
                          • memset.MSVCRT ref: 00B12BA6
                          • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00B12BB4
                          • GetDriveTypeA.KERNELBASE(?), ref: 00B12BD3
                          • CreateThread.KERNELBASE(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00B12BEE
                          • lstrlen.KERNEL32(?), ref: 00B12BFB
                          • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00B12C16
                          • CreateThread.KERNEL32(00000000,00000000,00B12845,00000000,00000000,00000000), ref: 00B12C3A
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                          • String ID:
                          • API String ID: 1073171358-0
                          • Opcode ID: 4f375dc4b8b7246f774cfadda79a8f48b697b10b3171f36164b187b1d3fccc02
                          • Instruction ID: 89b4fff271ffe78109d8db893c7060cc60d393bc756e00e1937a4b14aabe66ea
                          • Opcode Fuzzy Hash: 4f375dc4b8b7246f774cfadda79a8f48b697b10b3171f36164b187b1d3fccc02
                          • Instruction Fuzzy Hash: 1A21D5B180414CAFEB209F64AC84EEF7BEDFB09744B940525F942D3161EB208E56CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 16 b11e6e-b11e95 call b12d60 19 b11e97 call b11d8a 16->19 20 b11e9c-b11eaa call b11df6 16->20 19->20 24 b11eb0-b11ed9 SetFileAttributesA CreateFileA 20->24 25 b12332 20->25 24->25 26 b11edf-b11f28 call b11915 SetFilePointer CreateFileMappingA MapViewOfFile 24->26 27 b12338-b1233b 25->27 26->25 36 b11f2e-b11f39 26->36 29 b12346-b12349 27->29 30 b1233d-b12340 UnmapViewOfFile 27->30 32 b12350-b12354 29->32 33 b1234b-b1234e FindCloseChangeNotification 29->33 30->29 34 b12391-b1239a call b12d9b 32->34 35 b12356-b1235b CloseHandle 32->35 33->32 35->34 36->25 38 b11f3f-b11f56 36->38 38->25 40 b11f5c-b11f64 38->40 40->25 41 b11f6a-b11f70 40->41 41->25 42 b11f76-b11f87 call b11c81 41->42 42->25 45 b11f8d-b11fa7 call b1185b call b11c81 42->45 45->25 50 b11fad-b11fb4 45->50 51 b12024-b12045 50->51 52 b11fb6-b11fc5 call b11af9 50->52 51->25 53 b1204b-b1204e 51->53 52->51 60 b11fc7-b11fd2 52->60 55 b12070-b120f4 call b11af9 * 2 call b11c68 * 2 memset * 2 53->55 56 b12050-b12053 53->56 78 b120f5-b120fe 55->78 58 b12056-b1205a 56->58 58->55 61 b1205c-b12061 58->61 60->25 63 b11fd8-b11fe7 60->63 61->25 64 b12067-b1206e 61->64 66 b11fe9-b11fec 63->66 67 b11fef-b12006 call b11af9 63->67 64->58 66->67 73 b12013-b1201e FlushViewOfFile 67->73 74 b12008-b1200e call b11c68 67->74 73->51 74->73 79 b12130-b12139 78->79 80 b12100-b12114 78->80 83 b1213c-b12142 79->83 81 b12116-b1212a 80->81 82 b1212d-b1212e 80->82 81->82 82->78 84 b12144-b12150 83->84 85 b1215c 83->85 86 b12152-b12154 84->86 87 b12157-b1215a 84->87 88 b1215f-b12162 85->88 86->87 87->83 89 b12181-b12184 88->89 90 b12164-b12171 88->90 91 b12186 89->91 92 b1218d-b121ba call b11c68 89->92 93 b12177-b1217e 90->93 94 b1232a-b1232d 90->94 91->92 97 b121d3-b1220b call b11c81 call b11c68 92->97 98 b121bc-b121d0 call b11c68 92->98 93->89 94->88 105 b1221b-b1221e 97->105 106 b1220d-b12218 call b11c68 97->106 98->97 107 b12220-b12223 105->107 108 b12226-b12328 memcpy UnmapViewOfFile FindCloseChangeNotification call b11b8a call b1185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call b11915 FindCloseChangeNotification 105->108 106->105 107->108 108->27
                          APIs
                          • SetFileAttributesA.KERNELBASE(?,00000080,?,00B132B0,00000164,00B12986,?), ref: 00B11EB9
                          • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00B11ECD
                          • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00B11EF3
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00B11F07
                          • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000400), ref: 00B11F1D
                          • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00B1201E
                          • memset.MSVCRT ref: 00B120D8
                          • memset.MSVCRT ref: 00B120EA
                          • memcpy.MSVCRT ref: 00B1222D
                          • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B12238
                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B1224A
                          • SetFilePointer.KERNELBASE(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B122C6
                          • SetEndOfFile.KERNELBASE(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B122CB
                          • SetFilePointer.KERNELBASE(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B122DD
                          • WriteFile.KERNELBASE(000000FF,00B14008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B122F7
                          • WriteFile.KERNELBASE(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B1230D
                          • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B12322
                          • UnmapViewOfFile.KERNEL32(?,?,00B132B0,00000164,00B12986,?), ref: 00B12340
                          • FindCloseChangeNotification.KERNELBASE(?,?,00B132B0,00000164,00B12986,?), ref: 00B1234E
                          • CloseHandle.KERNEL32(000000FF,?,00B132B0,00000164,00B12986,?), ref: 00B12359
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$CloseView$ChangeFindNotificationPointer$CreateUnmapWritememset$AttributesFlushHandleMappingmemcpy
                          • String ID:
                          • API String ID: 307705342-0
                          • Opcode ID: b51601acf7334a410916437849e358d967c880d8b19289002139cc595c5bbc7d
                          • Instruction ID: 73667d79f11fe36069f2208b1cd54d5ce613cfc00172a005b129250848d1665a
                          • Opcode Fuzzy Hash: b51601acf7334a410916437849e358d967c880d8b19289002139cc595c5bbc7d
                          • Instruction Fuzzy Hash: A7F13871900209EFCB20DFA8D885AEDBBF5FF08314F90856AE519A7661D730AE91CF54

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 117 b11973-b1199a PathFileExistsA 118 b119a0-b119aa 117->118 119 b11ac7-b11acc 117->119 122 b119af-b119c2 CreateFileA 118->122 120 b11ad0-b11ad5 119->120 121 b11ace 119->121 123 b11af0-b11af6 120->123 124 b11ad7-b11ad9 120->124 121->120 125 b119c4-b119d3 Sleep 122->125 126 b11a28-b11a36 GetFileSize 122->126 124->123 125->122 129 b119d5-b11a0b call b1185b wsprintfA CopyFileA 125->129 127 b11a87-b11a8b 126->127 128 b11a38-b11a3b 126->128 131 b11a96-b11a9a 127->131 132 b11a8d-b11a90 FindCloseChangeNotification 127->132 128->127 130 b11a3d-b11a51 VirtualAlloc 128->130 129->126 140 b11a0d-b11a26 CreateFileA 129->140 130->127 135 b11a53-b11a57 130->135 136 b11aad-b11ab1 131->136 137 b11a9c 131->137 132->131 141 b11a80 135->141 142 b11a59-b11a6d ReadFile 135->142 138 b11ab3-b11ab6 136->138 139 b11adb-b11ae0 136->139 143 b11aa0-b11aa7 DeleteFileA 137->143 138->119 144 b11ab8-b11ac1 VirtualFree 138->144 146 b11ae2-b11ae5 139->146 147 b11ae7-b11aec 139->147 140->126 145 b11a9e 140->145 141->127 142->127 148 b11a6f-b11a7e 142->148 143->136 144->119 145->143 146->147 147->123 149 b11aee 147->149 148->141 148->142 149->123
                          APIs
                          • PathFileExistsA.KERNELBASE(00B14E5C,00000000,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B11992
                          • CreateFileA.KERNELBASE(00B14E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00B119BA
                          • Sleep.KERNEL32(00000064), ref: 00B119C6
                          • wsprintfA.USER32 ref: 00B119EC
                          • CopyFileA.KERNEL32(00B14E5C,?,00000000), ref: 00B11A00
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B11A1E
                          • GetFileSize.KERNEL32(00B14E5C,00000000), ref: 00B11A2C
                          • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00B11A46
                          • ReadFile.KERNELBASE(00B14E5C,00B14E60,00000000,?,00000000), ref: 00B11A65
                          • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 00B11A90
                          • DeleteFileA.KERNEL32(?), ref: 00B11AA7
                          • VirtualFree.KERNEL32(00B14E60,00000000,00008000), ref: 00B11AC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                          • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                          • API String ID: 2523042076-1062935941
                          • Opcode ID: 154e24b8f5861f20ac6817dedd42b0fd3b44ce46fd21a740259451aeca28693b
                          • Instruction ID: b51dd20f953bdafd018d05399b4eb3af1ae79c2b57bd5d5a13adb6d4d08878e2
                          • Opcode Fuzzy Hash: 154e24b8f5861f20ac6817dedd42b0fd3b44ce46fd21a740259451aeca28693b
                          • Instruction Fuzzy Hash: ED513D71911219AFCF109F98CC88AEEBFF9EF09754F9049A9F625E6190D7309E90CB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 150 b128b8-b128ff memset wsprintfA 151 b12905-b1290d 150->151 152 b129db-b129df 150->152 151->152 153 b12913-b12919 151->153 154 b12956-b12965 strrchr 153->154 155 b1291b-b1294c memset wsprintfA call b129e2 153->155 154->152 157 b12967-b12978 lstrcmpiA 154->157 158 b12951 155->158 159 b12988-b12992 lstrcmpiA 157->159 160 b1297a-b12981 call b11e6e 157->160 158->152 159->152 161 b12994-b1299b 159->161 165 b12986 160->165 163 b129ad-b129c9 strstr 161->163 164 b1299d-b129a3 161->164 167 b129d3-b129d6 call b12692 163->167 168 b129cb-b129d1 call b1239d 163->168 164->163 166 b129a5-b129a7 lstrcpy 164->166 165->152 166->163 167->152 168->152
                          APIs
                          • memset.MSVCRT ref: 00B128D3
                          • wsprintfA.USER32 ref: 00B128F7
                          • memset.MSVCRT ref: 00B12925
                          • wsprintfA.USER32 ref: 00B12940
                            • Part of subcall function 00B129E2: memset.MSVCRT ref: 00B12A02
                            • Part of subcall function 00B129E2: wsprintfA.USER32 ref: 00B12A1A
                            • Part of subcall function 00B129E2: memset.MSVCRT ref: 00B12A44
                            • Part of subcall function 00B129E2: lstrlen.KERNEL32(?), ref: 00B12A54
                            • Part of subcall function 00B129E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00B12A6C
                            • Part of subcall function 00B129E2: strrchr.MSVCRT ref: 00B12A7C
                            • Part of subcall function 00B129E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00B12A9F
                            • Part of subcall function 00B129E2: lstrlen.KERNEL32(Documents and Settings), ref: 00B12AAE
                            • Part of subcall function 00B129E2: memset.MSVCRT ref: 00B12AC6
                            • Part of subcall function 00B129E2: memset.MSVCRT ref: 00B12ADA
                            • Part of subcall function 00B129E2: FindFirstFileA.KERNELBASE(?,?), ref: 00B12AEF
                            • Part of subcall function 00B129E2: memset.MSVCRT ref: 00B12B13
                          • strrchr.MSVCRT ref: 00B12959
                          • lstrcmpiA.KERNEL32(00000001,exe), ref: 00B12974
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                          • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                          • API String ID: 3004273771-1791786966
                          • Opcode ID: db9f6e71730fd2e9cd3c88a799df72187f4b5309fd47957bf46e35cbe5af1481
                          • Instruction ID: 82483476a338cda750d0fc9536d7f30676c49407d1eb06bd365202539fd1f493
                          • Opcode Fuzzy Hash: db9f6e71730fd2e9cd3c88a799df72187f4b5309fd47957bf46e35cbe5af1481
                          • Instruction Fuzzy Hash: 9D31937294031D6BDB20A768DC89FDA77ECDB14750F8404E2F945E3081FAB49AD48BA0

                          Control-flow Graph

                          APIs
                          • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00B1164F
                          • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00B1165B
                          • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\nuwcjd.exe,00000104), ref: 00B1166E
                          • CreateThread.KERNELBASE(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 00B116AC
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00B116BD
                            • Part of subcall function 00B1139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B113BC
                            • Part of subcall function 00B1139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00B113DA
                            • Part of subcall function 00B1139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00B11448
                          • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B116E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nuwcjd.exe$C:\Windows\system32$Documents and Settings
                          • API String ID: 123563730-3325892672
                          • Opcode ID: 296dd4406f0b1cb9f717947690fc45bd8b191f9cdcc2408d03f6558cac5e1e79
                          • Instruction ID: 59fc262b9ee93444df7dfebdce1a2aeded1db6be680fe9b19274cf1b9bcf5194
                          • Opcode Fuzzy Hash: 296dd4406f0b1cb9f717947690fc45bd8b191f9cdcc2408d03f6558cac5e1e79
                          • Instruction Fuzzy Hash: B711D671501114BBCF205BA8AD4DFDB3EEDEB09761FD044A4F309921A0EA7189C0C7A1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 363 b12c48-b12c75 memset call b11973 366 b12cb2-b12cb9 363->366 367 b12c77-b12c7f 363->367 370 b12cc8-b12ccc 366->370 371 b12cbb-b12cc2 VirtualFree 366->371 368 b12c81-b12c8b 367->368 369 b12c8f-b12cac CreateThread WaitForMultipleObjects 367->369 368->369 369->366 371->370
                          APIs
                          • memset.MSVCRT ref: 00B12C57
                            • Part of subcall function 00B11973: PathFileExistsA.KERNELBASE(00B14E5C,00000000,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B11992
                            • Part of subcall function 00B11973: CreateFileA.KERNELBASE(00B14E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00B119BA
                            • Part of subcall function 00B11973: Sleep.KERNEL32(00000064), ref: 00B119C6
                            • Part of subcall function 00B11973: wsprintfA.USER32 ref: 00B119EC
                            • Part of subcall function 00B11973: CopyFileA.KERNEL32(00B14E5C,?,00000000), ref: 00B11A00
                            • Part of subcall function 00B11973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B11A1E
                            • Part of subcall function 00B11973: GetFileSize.KERNEL32(00B14E5C,00000000), ref: 00B11A2C
                            • Part of subcall function 00B11973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00B11A46
                            • Part of subcall function 00B11973: ReadFile.KERNELBASE(00B14E5C,00B14E60,00000000,?,00000000), ref: 00B11A65
                          • CreateThread.KERNELBASE(00000000,00000000,00B12B8C,00000000,00000000,00000000), ref: 00B12C99
                          • WaitForMultipleObjects.KERNEL32(00000001,00B116BA,00000001,000000FF,?,00B116BA,00000000), ref: 00B12CAC
                          • VirtualFree.KERNEL32(00AF0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\nuwcjd.exe,00B14E5C,00B14E60,?,00B116BA,00000000), ref: 00B12CC2
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nuwcjd.exe, xrefs: 00B12C69
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                          • String ID: C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                          • API String ID: 2042498389-289599860
                          • Opcode ID: dffa758c3a69993228c352ac541d63525fc3c5008dd7c312170b6b30afcba7f1
                          • Instruction ID: 8898615ce52702a0c6900bdf6eba8a9c8e8e94790ac2538b8f4586d945d30402
                          • Opcode Fuzzy Hash: dffa758c3a69993228c352ac541d63525fc3c5008dd7c312170b6b30afcba7f1
                          • Instruction Fuzzy Hash: 6B0184766412247BD7149795DC0EEDF7EECEF05B60FD08150B605DA1D1EAA09990C7F0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 372 b114e1-b114fb 373 b11541-b11547 372->373 374 b114fd-b11510 GetModuleHandleA 372->374 375 b11573-b11574 call b11638 373->375 376 b11549-b1154c 373->376 377 b11512-b11518 374->377 378 b1151a-b11535 VirtualQuery 374->378 385 b11579-b1157a ExitProcess 375->385 381 b11569-b11570 376->381 382 b1154e-b11555 376->382 377->373 379 b11537-b11539 378->379 380 b1153b 378->380 379->373 379->380 380->373 382->381 384 b11557-b11566 call b11af9 382->384 384->381
                          APIs
                          • GetModuleHandleA.KERNEL32(00000000), ref: 00B11504
                          • VirtualQuery.KERNEL32(00B114E1,?,0000001C), ref: 00B11525
                          • ExitProcess.KERNEL32 ref: 00B1157A
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: ExitHandleModuleProcessQueryVirtual
                          • String ID:
                          • API String ID: 3946701194-0
                          • Opcode ID: 6ff5399a284267e86694b6d8170b9713b40046dd570cfb296cca6a41c0a54cf3
                          • Instruction ID: d8e5b5b792ef1d7813971eddcdf7253f0c41f344dd0d049ebaedd1941a10dc8e
                          • Opcode Fuzzy Hash: 6ff5399a284267e86694b6d8170b9713b40046dd570cfb296cca6a41c0a54cf3
                          • Instruction Fuzzy Hash: 90114871901205DFCB20DFADB886AF977F8EB94710BA0847AE602A3150EB348D81DB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 388 b11915-b11922 389 b11924-b11926 388->389 390 b11928-b1192c 388->390 391 b1196e-b11970 389->391 392 b1194f-b11952 390->392 393 b1192e-b1194d memset GetFileTime 390->393 392->391 395 b11954-b11960 SetFileTime 392->395 394 b11966-b11968 393->394 396 b1196a 394->396 397 b1196c 394->397 395->394 396->397 397->391
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: FileTimememset
                          • String ID:
                          • API String ID: 176422537-0
                          • Opcode ID: 59b123457b100646e807be2b0d534ad207e0f0645c8146f8c1dcfc21eb30cd8a
                          • Instruction ID: a41d24d13543241a6c0a83c45392bcfecafc7c7ad4a1f9db8f1b0243b1671058
                          • Opcode Fuzzy Hash: 59b123457b100646e807be2b0d534ad207e0f0645c8146f8c1dcfc21eb30cd8a
                          • Instruction Fuzzy Hash: BAF06832200209ABDB20DE2ADC04BE777ECEB547A1F408976F626D5050E730D686CBB0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 398 b16159-b16189 VirtualFree 399 b1618c-b16192 398->399 400 b160c7-b160cf 399->400 401 b16198-b161b0 VirtualFree 399->401 400->399 402 b160d5-b160f8 VirtualAlloc 400->402 403 b161b2-b161b4 401->403 404 b161ba-b161c8 401->404 424 b160fa-b160fc call b166c8 402->424 425 b160fe-b16106 402->425 403->404 405 b16243-b16251 404->405 406 b161ca-b161d7 404->406 410 b16253 405->410 411 b16264-b1626f 405->411 408 b161dd-b161e0 406->408 408->405 413 b161e2-b161f2 408->413 415 b16255-b16258 410->415 412 b16271-b16276 411->412 416 b16389-b163b1 VirtualProtect 412->416 417 b1627c-b16289 412->417 418 b161f5-b161fe 413->418 415->411 420 b1625a-b16262 415->420 423 b163b7-b163ba 416->423 437 b16292-b16298 417->437 438 b1628b 417->438 421 b16200-b16203 418->421 422 b1620c-b16219 418->422 420->415 427 b16205-b16208 421->427 428 b1621b-b16228 421->428 429 b16238-b1623f 422->429 430 b163fc-b16416 VirtualProtect 423->430 431 b163bc-b163c2 423->431 424->425 433 b16155-b16189 VirtualFree 425->433 434 b16108-b1611d 425->434 439 b1622a-b16236 427->439 440 b1620a 427->440 428->429 429->418 442 b16241 429->442 446 b16420-b16425 430->446 447 b16418-b1641d 430->447 431->431 441 b163c4 431->441 433->399 435 b1611f-b16121 434->435 444 b16151-b16154 435->444 445 b16123 435->445 448 b162a2-b162ac 437->448 438->437 439->429 440->429 441->430 449 b163c6-b163cf 441->449 442->408 444->433 445->444 450 b16125-b16128 445->450 451 b162b1-b162c8 448->451 452 b162ae 448->452 453 b163d1 449->453 454 b163d4-b163d8 449->454 455 b16134-b1613b 450->455 456 b1612a-b1612e 450->456 457 b16373-b16384 451->457 458 b162ce-b162d4 451->458 452->451 453->454 459 b163da 454->459 460 b163dd-b163e1 454->460 467 b16130-b16132 455->467 468 b1613d-b1614f 455->468 456->455 456->467 457->412 465 b162d6-b162d9 458->465 466 b162da-b162f1 458->466 459->460 461 b163e3 460->461 462 b163e7-b163fa VirtualProtect 460->462 461->462 462->423 462->430 465->466 470 b162f3-b162f9 466->470 471 b16365-b1636e 466->471 467->435 468->435 472 b16314-b16326 470->472 473 b162fb-b1630f 470->473 471->448 475 b16328-b1634a 472->475 476 b1634c-b16360 472->476 474 b16426-b164a9 473->474 484 b16519-b1651c 474->484 485 b164ab-b164c0 474->485 475->471 476->474 486 b16583-b16587 484->486 487 b1651d-b1651e 484->487 491 b164c2 485->491 492 b16535-b16537 485->492 489 b16588-b1658b 486->489 490 b16522-b16533 487->490 493 b165a1-b165a3 489->493 494 b1658d-b1658f 489->494 490->492 497 b164c5-b164cd 491->497 498 b164f8 491->498 495 b16539 492->495 496 b1659a 492->496 499 b16591-b16593 494->499 500 b165b4 495->500 501 b1653b-b16541 495->501 502 b1659b-b1659d 496->502 503 b16542-b16545 497->503 504 b164cf-b164d4 497->504 505 b164fa-b164fe 498->505 506 b1656c-b1656f 498->506 499->502 507 b16595 499->507 512 b165be-b16608 500->512 501->503 502->499 508 b1659f 502->508 509 b1654d-b16550 503->509 510 b16517-b16518 504->510 511 b164d6-b164d9 504->511 513 b16500 505->513 514 b16572 505->514 506->514 507->496 508->489 509->512 516 b16552-b16556 509->516 510->484 511->509 517 b164db-b164f5 511->517 513->490 518 b16502 513->518 519 b16573-b16576 514->519 520 b16578-b1657f 516->520 521 b16558-b16569 516->521 517->498 518->519 522 b16504-b16513 518->522 519->520 520->486 521->506 522->492 524 b16515 522->524 524->510
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 00B160DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00B16189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00B161A5
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: Virtual$Free$Alloc
                          • String ID:
                          • API String ID: 1852963964-0
                          • Opcode ID: bb24bd534f81e4389fe96f4ee43071a241772b8d06ea67700a2d036d8fe43670
                          • Instruction ID: c0d6b2200c306f4d6c80b67fe57a11e9c03cca508ce2d56cd33db51b74ee69e1
                          • Opcode Fuzzy Hash: bb24bd534f81e4389fe96f4ee43071a241772b8d06ea67700a2d036d8fe43670
                          • Instruction Fuzzy Hash: 66116A32A00649CFCF318F58CC857ED37E1FF05301FA944A9DE89AB292DA716994CB94
                          APIs
                          • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\nuwcjd.exe,?,?,?,?,?,?,00B113EF), ref: 00B111AB
                          • OpenProcessToken.ADVAPI32(00000000,00000028,00B113EF,?,?,?,?,?,?,00B113EF), ref: 00B111BB
                          • AdjustTokenPrivileges.ADVAPI32(00B113EF,00000000,?,00000010,00000000,00000000), ref: 00B111EB
                          • CloseHandle.KERNEL32(00B113EF), ref: 00B111FA
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00B113EF), ref: 00B11203
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nuwcjd.exe, xrefs: 00B111A5
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                          • String ID: C:\Users\user\AppData\Local\Temp\nuwcjd.exe
                          • API String ID: 75692138-289599860
                          • Opcode ID: b4201974eec3c83f7592bf8ee84b8a5e0fee5630235b4f98d712174175faf714
                          • Instruction ID: ed47b85c80bbadf4c975954a4a48837ae0aed5b320f1d732fa0b2ae0485b9e74
                          • Opcode Fuzzy Hash: b4201974eec3c83f7592bf8ee84b8a5e0fee5630235b4f98d712174175faf714
                          • Instruction Fuzzy Hash: 1901D675900209EFDB00DFD4C989AEEBBF8FB08745F508569E605A2150EB715F449B50
                          APIs
                          • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B113BC
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00B113DA
                          • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00B11448
                            • Part of subcall function 00B1119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\nuwcjd.exe,?,?,?,?,?,?,00B113EF), ref: 00B111AB
                            • Part of subcall function 00B1119F: OpenProcessToken.ADVAPI32(00000000,00000028,00B113EF,?,?,?,?,?,?,00B113EF), ref: 00B111BB
                            • Part of subcall function 00B1119F: AdjustTokenPrivileges.ADVAPI32(00B113EF,00000000,?,00000010,00000000,00000000), ref: 00B111EB
                            • Part of subcall function 00B1119F: CloseHandle.KERNEL32(00B113EF), ref: 00B111FA
                            • Part of subcall function 00B1119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00B113EF), ref: 00B11203
                          Strings
                          • SeDebugPrivilege, xrefs: 00B113D3
                          • C:\Users\user\AppData\Local\Temp\nuwcjd.exe, xrefs: 00B113A8
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                          • String ID: C:\Users\user\AppData\Local\Temp\nuwcjd.exe$SeDebugPrivilege
                          • API String ID: 4123949106-2010471490
                          • Opcode ID: 23ed6242e94d2ad69543a23b4bb253feff03982e27b6feca40b2b2cea337a2a8
                          • Instruction ID: 2da2aa8268f39246316fec1234871a66cc7dd47b39d1dea7fb476bd7220b8942
                          • Opcode Fuzzy Hash: 23ed6242e94d2ad69543a23b4bb253feff03982e27b6feca40b2b2cea337a2a8
                          • Instruction Fuzzy Hash: 94313271D00209EAEF209BA99C45FEEBBF8EB54B04F9045A9E614F2141E6705E85CF60
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                          • Instruction ID: b079faf611eecc3df593e7a96d7c2dc926a2bacbb5a287ac08269351c0461bcb
                          • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                          • Instruction Fuzzy Hash: E381A171204B418FC728CF28D890AAAB7E2EFD5314F54CA6DD0EAC7755D734A989CB44

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 529 b1239d-b123d6 strstr 530 b12451-b1247a CreateFileA GetFileSize 529->530 531 b123d8-b123e2 529->531 533 b12480-b12483 530->533 534 b12675-b12676 CloseHandle 530->534 532 b123ed-b123f1 531->532 536 b123f3-b1241d 532->536 537 b123e4-b123ec 532->537 533->534 538 b12489-b12493 533->538 535 b1267c-b12681 RemoveDirectoryA 534->535 539 b12687-b1268f 535->539 536->530 540 b1241f-b12425 536->540 537->532 538->534 541 b12499-b1254b call b11915 CloseHandle memset strrchr wsprintfA strrchr memset * 2 wsprintfA Sleep call b1189d 538->541 542 b12427-b12436 540->542 543 b1243a-b12443 540->543 541->535 550 b12551-b12556 541->550 542->540 545 b12438 542->545 543->539 546 b12449 543->546 545->530 546->530 550->535 551 b1255c-b1261c Sleep memset wsprintfA call b129e2 memset wsprintfA Sleep call b1189d Sleep CreateFileA call b11915 CloseHandle 550->551 551->535 558 b1261e-b12626 551->558 558->535 559 b12628-b1262c 558->559 560 b12634-b12640 559->560 561 b1262e-b12632 559->561 562 b12641-b12665 SetFilePointer WriteFile 560->562 561->562 562->535 563 b12667-b12673 SetEndOfFile 562->563 563->535
                          APIs
                          • strstr.MSVCRT ref: 00B123CC
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B12464
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00B12472
                          • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00B124A8
                          • memset.MSVCRT ref: 00B124B9
                          • strrchr.MSVCRT ref: 00B124C9
                          • wsprintfA.USER32 ref: 00B124DE
                          • strrchr.MSVCRT ref: 00B124ED
                          • memset.MSVCRT ref: 00B124F2
                          • memset.MSVCRT ref: 00B12505
                          • wsprintfA.USER32 ref: 00B12524
                          • Sleep.KERNEL32(000007D0), ref: 00B12535
                          • Sleep.KERNEL32(000007D0), ref: 00B1255D
                          • memset.MSVCRT ref: 00B1256E
                          • wsprintfA.USER32 ref: 00B12585
                          • memset.MSVCRT ref: 00B125A6
                          • wsprintfA.USER32 ref: 00B125CA
                          • Sleep.KERNEL32(000007D0), ref: 00B125D0
                          • Sleep.KERNEL32(000007D0,?,?), ref: 00B125E5
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B125FC
                          • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00B12611
                          • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00B12642
                          • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00B1265B
                          • SetEndOfFile.KERNEL32 ref: 00B1266D
                          • CloseHandle.KERNEL32(00000000), ref: 00B12676
                          • RemoveDirectoryA.KERNEL32(?), ref: 00B12681
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                          • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2203340711-774930870
                          • Opcode ID: 832c159ac8b85274db9d363b9ed87d3934ac8a4853c3c8657a9f4e97cd9677af
                          • Instruction ID: 9cc533c845b71fcbbebf9baf2be1f17ac351c95b6bcd9cc78e9a3bb859385538
                          • Opcode Fuzzy Hash: 832c159ac8b85274db9d363b9ed87d3934ac8a4853c3c8657a9f4e97cd9677af
                          • Instruction Fuzzy Hash: 0581C1B1504344ABD710DF60DC89FEB7BECEB88B04F80455AFA44D31A0E7749A998BA5
                          APIs
                          • memset.MSVCRT ref: 00B12766
                          • memset.MSVCRT ref: 00B12774
                          • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00B12787
                          • wsprintfA.USER32 ref: 00B127AB
                            • Part of subcall function 00B1185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76938400,http://%s:%d/%s/%s,?,?,?,00B11118), ref: 00B11867
                            • Part of subcall function 00B1185B: srand.MSVCRT ref: 00B11878
                            • Part of subcall function 00B1185B: rand.MSVCRT ref: 00B11880
                            • Part of subcall function 00B1185B: srand.MSVCRT ref: 00B11890
                            • Part of subcall function 00B1185B: rand.MSVCRT ref: 00B11894
                          • wsprintfA.USER32 ref: 00B127C6
                          • CopyFileA.KERNEL32(?,00B14C80,00000000), ref: 00B127D4
                          • wsprintfA.USER32 ref: 00B127F4
                            • Part of subcall function 00B11973: PathFileExistsA.KERNELBASE(00B14E5C,00000000,C:\Users\user\AppData\Local\Temp\nuwcjd.exe), ref: 00B11992
                            • Part of subcall function 00B11973: CreateFileA.KERNELBASE(00B14E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00B119BA
                            • Part of subcall function 00B11973: Sleep.KERNEL32(00000064), ref: 00B119C6
                            • Part of subcall function 00B11973: wsprintfA.USER32 ref: 00B119EC
                            • Part of subcall function 00B11973: CopyFileA.KERNEL32(00B14E5C,?,00000000), ref: 00B11A00
                            • Part of subcall function 00B11973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B11A1E
                            • Part of subcall function 00B11973: GetFileSize.KERNEL32(00B14E5C,00000000), ref: 00B11A2C
                            • Part of subcall function 00B11973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00B11A46
                            • Part of subcall function 00B11973: ReadFile.KERNELBASE(00B14E5C,00B14E60,00000000,?,00000000), ref: 00B11A65
                          • DeleteFileA.KERNEL32(?,?,00B14E54,00B14E58), ref: 00B1281A
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00B14E54,00B14E58), ref: 00B12832
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                          • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                          • API String ID: 692489704-3099098879
                          • Opcode ID: f4e41c27fd714e25c365bf188c51e0e776e19f1c2fa4c4d3705a7714fd38a745
                          • Instruction ID: 9108c2cf1aff3d5da0c1f6c67d51e38994a7c10b6399f957719992f976014e90
                          • Opcode Fuzzy Hash: f4e41c27fd714e25c365bf188c51e0e776e19f1c2fa4c4d3705a7714fd38a745
                          • Instruction Fuzzy Hash: 6D2130B694021C7BDB10E7A49C89FDB77ECEB14B44F8045E1B644E3051F6709FD48AA0
                          APIs
                            • Part of subcall function 00B1185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76938400,http://%s:%d/%s/%s,?,?,?,00B11118), ref: 00B11867
                            • Part of subcall function 00B1185B: srand.MSVCRT ref: 00B11878
                            • Part of subcall function 00B1185B: rand.MSVCRT ref: 00B11880
                            • Part of subcall function 00B1185B: srand.MSVCRT ref: 00B11890
                            • Part of subcall function 00B1185B: rand.MSVCRT ref: 00B11894
                          • wsprintfA.USER32 ref: 00B115AA
                          • wsprintfA.USER32 ref: 00B115C6
                          • lstrlen.KERNEL32(?), ref: 00B115D2
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00B115EE
                          • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00B11609
                          • CloseHandle.KERNEL32(00000000), ref: 00B11612
                          • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00B1162D
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                          • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nuwcjd.exe$open
                          • API String ID: 617340118-2048616475
                          • Opcode ID: d6f45179cf5ac1f6568c09b556c462ac7da570394dfa032bfbad31e542275eb5
                          • Instruction ID: b9537a54b0260a63198895e8eec78d91c8d071a3e06dcaa99b9cdd9dd68f35d7
                          • Opcode Fuzzy Hash: d6f45179cf5ac1f6568c09b556c462ac7da570394dfa032bfbad31e542275eb5
                          • Instruction Fuzzy Hash: B3115476A411287ED72097A49C8DEEB7AECDF59B51F800491F949E3050EA749BC4CBB0
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00B11400), ref: 00B11226
                          • GetProcAddress.KERNEL32(00000000), ref: 00B1122D
                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00B11400), ref: 00B1123F
                          • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00B11400), ref: 00B11250
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\nuwcjd.exe,?,?,?,?,00B11400), ref: 00B1129E
                          • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\nuwcjd.exe,?,?,?,?,00B11400), ref: 00B112B0
                          • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nuwcjd.exe,?,?,?,?,00B11400), ref: 00B112F5
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00B11400), ref: 00B1130A
                          Strings
                          • ntdll.dll, xrefs: 00B11219
                          • ZwQuerySystemInformation, xrefs: 00B11212
                          • C:\Users\user\AppData\Local\Temp\nuwcjd.exe, xrefs: 00B11262
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                          • String ID: C:\Users\user\AppData\Local\Temp\nuwcjd.exe$ZwQuerySystemInformation$ntdll.dll
                          • API String ID: 1500695312-2506007772
                          • Opcode ID: ab79e78412be0259e7abfdc222463389d77acd8072cbf31946f1da8ef9dc941d
                          • Instruction ID: 14bdcb41d26dd3d4395aec837a22675293066c9c19229c865597de279149d8b9
                          • Opcode Fuzzy Hash: ab79e78412be0259e7abfdc222463389d77acd8072cbf31946f1da8ef9dc941d
                          • Instruction Fuzzy Hash: 6E21C371605311ABD7209B69DC48BEBBAE8FB8AF00F904D58F645E7240D770DA8487E5
                          APIs
                          • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00B110E8,?), ref: 00B11018
                          • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76938400,?,http://%s:%d/%s/%s,00B110E8,?), ref: 00B11029
                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00B11038
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00B110E8,?), ref: 00B1104B
                          • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00B110E8,?), ref: 00B11075
                          • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00B110E8,?), ref: 00B1108B
                          • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00B110E8,?), ref: 00B1108E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                          • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1223616889-3273462101
                          • Opcode ID: 2e3f56fe16f6980411aea292d1e413db91f6a737f97a1369d30871a8041e2ea3
                          • Instruction ID: 768b180e02377a7ac1285536677c80fa7c7f618e47af90be0d03fd4fc9d5252e
                          • Opcode Fuzzy Hash: 2e3f56fe16f6980411aea292d1e413db91f6a737f97a1369d30871a8041e2ea3
                          • Instruction Fuzzy Hash: F7015EB150025CBFE6205F649C8CFABBAECDB48B99F414929F345A3190EA705E848A60
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76938400,http://%s:%d/%s/%s,?,?,?,00B11118), ref: 00B11867
                          • srand.MSVCRT ref: 00B11878
                          • rand.MSVCRT ref: 00B11880
                          • srand.MSVCRT ref: 00B11890
                          • rand.MSVCRT ref: 00B11894
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: Timerandsrand$FileSystem
                          • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 4106363736-3273462101
                          • Opcode ID: 038828a9bd3cb101bf6389c68b8743ad199ca2f88549425defa1ad42a3d5fb64
                          • Instruction ID: 435fabe6acdec04f9a233a2eca457e2b99aa2f3316e07ea5034575ae2b1b4f18
                          • Opcode Fuzzy Hash: 038828a9bd3cb101bf6389c68b8743ad199ca2f88549425defa1ad42a3d5fb64
                          • Instruction Fuzzy Hash: 3FE09277A00218BBDB00A7A9EC4ADDEBBECDE88561B100566F600D3250F971E9448AB4
                          APIs
                          • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7622E800,?,?,00B129DB,?,00000001), ref: 00B126A7
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,7622E800,?,?,00B129DB,?,00000001), ref: 00B126B5
                          • lstrlen.KERNEL32(?), ref: 00B126C4
                          • ??2@YAPAXI@Z.MSVCRT ref: 00B126CE
                          • lstrcpy.KERNEL32(00000004,?), ref: 00B126E3
                          • lstrcpy.KERNEL32(?,00000004), ref: 00B1271F
                          • ??3@YAXPAX@Z.MSVCRT ref: 00B1272D
                          • SetEvent.KERNEL32 ref: 00B1273C
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                          • String ID:
                          • API String ID: 41106472-0
                          • Opcode ID: 37bc0fe139ab2d5e4c023342535dd0f55c6d98b0bddb83a0a0248fa9e9f5413e
                          • Instruction ID: 6ea3f625b3c7e968e18c687209e3e6499f6ab33afe02d27e9daa61d3c8434256
                          • Opcode Fuzzy Hash: 37bc0fe139ab2d5e4c023342535dd0f55c6d98b0bddb83a0a0248fa9e9f5413e
                          • Instruction Fuzzy Hash: 31119D36500200EFCB219F14EC489DB7BE9FB88B207E48065F858C7260EB308ED5CB90
                          APIs
                          Strings
                          • .exe, xrefs: 00B11C57
                          • shRNoTVqwpBtJvUOdLJooKYfUedYICWGrPyzbeDRpKEQOSjjOJgNDymCFWFlAcrIsnbcvqIBljpLrhDEgWMNBnubvdiZSsHxUkmVltEcwuwHfTGHPXQZhGaZainSMzYtKzXxxQXyAPVgqRkFLAkiMamfeCuT, xrefs: 00B11B8A, 00B11B9C, 00B11C15, 00B11C49
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: lstrcatmemcpymemsetrandsrand
                          • String ID: .exe$shRNoTVqwpBtJvUOdLJooKYfUedYICWGrPyzbeDRpKEQOSjjOJgNDymCFWFlAcrIsnbcvqIBljpLrhDEgWMNBnubvdiZSsHxUkmVltEcwuwHfTGHPXQZhGaZainSMzYtKzXxxQXyAPVgqRkFLAkiMamfeCuT
                          • API String ID: 122620767-178692489
                          • Opcode ID: 36b9d235441d866c991c9e373da29d3f2715897c381a5c28523b6473ab0ee936
                          • Instruction ID: a4c6128e8935de73cecb885234c4d209b11eb1c0e167c8f6d217dd61fd0a71c9
                          • Opcode Fuzzy Hash: 36b9d235441d866c991c9e373da29d3f2715897c381a5c28523b6473ab0ee936
                          • Instruction Fuzzy Hash: E6219E22E081906ED615133C7C41BEA2FC4CFA7B10FE684E9F6854B1A2E6640DC582A0
                          APIs
                          • memset.MSVCRT ref: 00B118B1
                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,76230F00,76938400), ref: 00B118D3
                          • CloseHandle.KERNEL32(00B12549), ref: 00B118E9
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B118F0
                          • GetExitCodeProcess.KERNEL32(?,00B12549), ref: 00B11901
                          • CloseHandle.KERNEL32(?), ref: 00B1190A
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                          • String ID:
                          • API String ID: 876959470-0
                          • Opcode ID: f54f8d83478d128e98383649d0c714560b70f14d8be01dcd0dd64f114cadad86
                          • Instruction ID: a6afb06e443f7f6b11f2ca1108507d2e58d879dc93b8ad963d85d6a020748f9b
                          • Opcode Fuzzy Hash: f54f8d83478d128e98383649d0c714560b70f14d8be01dcd0dd64f114cadad86
                          • Instruction Fuzzy Hash: 92017176901128BBCB216B95DC4CEDF7FBDEF85760F504021FA15A61A0D6354A58CAA0
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00B11334
                          • GetProcAddress.KERNEL32(00000000), ref: 00B1133B
                          • memset.MSVCRT ref: 00B11359
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcmemset
                          • String ID: NtSystemDebugControl$ntdll.dll
                          • API String ID: 3137504439-2438149413
                          • Opcode ID: 1101e45f93aa8ca1824f265882c5f3255735df20b1069cbed8f53a2f3e74a290
                          • Instruction ID: 8767dcd59e490de29898871b2a8798c817e0026f5d0a1f248fd400006047e050
                          • Opcode Fuzzy Hash: 1101e45f93aa8ca1824f265882c5f3255735df20b1069cbed8f53a2f3e74a290
                          • Instruction Fuzzy Hash: 7401ADB1A0030DBFDB10DF98AC84AEFBBF8FB04704F8045AAFA11A2150E7708695CA54
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: strrchr$lstrcmpilstrcpylstrlen
                          • String ID:
                          • API String ID: 3636361484-0
                          • Opcode ID: 51b4975f46ad015af7f4e1c477414145a2347735fea9622edee0a7ee72b082da
                          • Instruction ID: f5df2e1c813a3d7cf137c586a3fee7b131525e65bc0e2fa157a27005f1b77a50
                          • Opcode Fuzzy Hash: 51b4975f46ad015af7f4e1c477414145a2347735fea9622edee0a7ee72b082da
                          • Instruction Fuzzy Hash: E801D6B390421A6FEB2097A4EC48BD67BDCDB04310F9444A6EA45E3090EF749AC4CBA0
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00B1603C
                          • GetProcAddress.KERNEL32(00000000,00B16064), ref: 00B1604F
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2203200093.0000000000B16000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                          • Associated: 00000001.00000002.2203010810.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203124982.0000000000B11000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203158058.0000000000B13000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.2203178569.0000000000B14000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_b10000_nuwcjd.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: kernel32.dll
                          • API String ID: 1646373207-1793498882
                          • Opcode ID: 78f32ee08e75b66f738abb6375095a6ff87836801837d7b1dbccd7c7d1175aaa
                          • Instruction ID: f421761b1832f9577a7c70f38a9414405b1f1e4e929ca3a7a2078ca12d386b9b
                          • Opcode Fuzzy Hash: 78f32ee08e75b66f738abb6375095a6ff87836801837d7b1dbccd7c7d1175aaa
                          • Instruction Fuzzy Hash: 67F0F6B11402898FDF70CE64CC84BDE37E4EB05700F90047AEA09CB241CB348685CB14