Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nsHwyCkyFr.exe

Overview

General Information

Sample name:nsHwyCkyFr.exe
renamed because original name is a hash value
Original sample name:4a010c5abe2f5bb4dd6f31b03058bc1847e985a95a68d4e1bf0fb20c030c2307.exe
Analysis ID:1555000
MD5:c9c4ac12004cc6b946cb7d49b5eb5ee5
SHA1:7e738b153194c9f54aac1b433f8e7efff3beafd5
SHA256:4a010c5abe2f5bb4dd6f31b03058bc1847e985a95a68d4e1bf0fb20c030c2307
Tags:ConsolHQLTDexeuser-JAMESWT_MHT
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • nsHwyCkyFr.exe (PID: 7640 cmdline: "C:\Users\user\Desktop\nsHwyCkyFr.exe" MD5: C9C4AC12004CC6B946CB7D49B5EB5EE5)
    • javaw.exe (PID: 7656 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
      • icacls.exe (PID: 7744 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: nsHwyCkyFr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: nsHwyCkyFr.exeStatic PE information: certificate valid
Source: nsHwyCkyFr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
Source: javaw.exe, 00000001.00000002.1364470301.0000000004A00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
Source: nsHwyCkyFr.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
Source: nsHwyCkyFr.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
Source: nsHwyCkyFr.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
Source: nsHwyCkyFr.exeString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
Source: nsHwyCkyFr.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
Source: nsHwyCkyFr.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
Source: javaw.exe, 00000001.00000002.1364470301.0000000004A00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
Source: nsHwyCkyFr.exeString found in binary or memory: http://ocsps.ssl.com0
Source: nsHwyCkyFr.exeString found in binary or memory: http://ocsps.ssl.com0?
Source: nsHwyCkyFr.exeString found in binary or memory: http://ocsps.ssl.com0_
Source: javaw.exe, 00000001.00000002.1364470301.0000000004A8A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1364232608.0000000004968000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1364470301.0000000004A20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oracle.com/technetwork/java/javase/documentation/index.html
Source: nsHwyCkyFr.exeString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
Source: nsHwyCkyFr.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
Source: nsHwyCkyFr.exeString found in binary or memory: https://www.ssl.com/repository0
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeCode function: 0_2_00405D300_2_00405D30
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeCode function: 0_2_004013B00_2_004013B0
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeCode function: String function: 00406E10 appears 37 times
Source: nsHwyCkyFr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: clean4.winEXE@6/2@0/0
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeCode function: 0_2_00401ED0 GetLastError,puts,ShellExecuteA,printf,fclose,MessageBoxA,FormatMessageA,strlen,strcat,LocalFree,fprintf,fprintf,fprintf,0_2_00401ED0
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeCode function: 0_2_00402CB0 FindResourceExA,LoadResource,LockResource,fprintf,atoi,SetLastError,0_2_00402CB0
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7756:120:WilError_03
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
Source: nsHwyCkyFr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: nsHwyCkyFr.exeString found in binary or memory: --l4j-Startup error message not defined.Launcher:%s
Source: unknownProcess created: C:\Users\user\Desktop\nsHwyCkyFr.exe "C:\Users\user\Desktop\nsHwyCkyFr.exe"
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncherJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Development KitJump to behavior
Source: nsHwyCkyFr.exeStatic PE information: certificate valid
Source: nsHwyCkyFr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0279A21B push ecx; ret 1_2_0279A225
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0279A20A push ecx; ret 1_2_0279A21A
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0279BB67 push 00000000h; mov dword ptr [esp], esp1_2_0279BB8D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0279B3B7 push 00000000h; mov dword ptr [esp], esp1_2_0279B3DD
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0279B947 push 00000000h; mov dword ptr [esp], esp1_2_0279B96D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0279C477 push 00000000h; mov dword ptr [esp], esp1_2_0279C49D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: javaw.exe, 00000001.00000002.1363478563.0000000000C48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
Source: javaw.exe, 00000001.00000003.1360617298.0000000014E6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: javaw.exe, 00000001.00000003.1360617298.0000000014E6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: javaw.exe, 00000001.00000002.1363478563.0000000000C71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
Source: javaw.exe, 00000001.00000003.1360617298.0000000014E6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
Source: javaw.exe, 00000001.00000002.1363478563.0000000000C71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
Source: javaw.exe, 00000001.00000003.1360617298.0000000014E6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeCode function: 0_2_00401150 SetUnhandledExceptionFilter,__getmainargs,_iob,_iob,_setmode,_iob,_iob,_setmode,__p__fmode,__p__environ,_cexit,ExitProcess,0_2_00401150
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\nsHwyCkyFr.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncherJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_027903C0 cpuid 1_2_027903C0
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7656 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Services File Permissions Weakness
1
Services File Permissions Weakness
1
Services File Permissions Weakness
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
LSASS Memory22
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1555000 Sample: nsHwyCkyFr.exe Startdate: 13/11/2024 Architecture: WINDOWS Score: 4 7 nsHwyCkyFr.exe 2->7         started        process3 9 javaw.exe 8 7->9         started        process4 11 icacls.exe 1 9->11         started        process5 13 conhost.exe 11->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
nsHwyCkyFr.exe5%ReversingLabs
nsHwyCkyFr.exe3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0nsHwyCkyFr.exefalse
      high
      http://crls.ssl.com/ssl.com-rsa-RootCA.crl0nsHwyCkyFr.exefalse
        high
        http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0nsHwyCkyFr.exefalse
          high
          http://bugreport.sun.com/bugreport/javaw.exe, 00000001.00000002.1364470301.0000000004A00000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://www.ssl.com/repository0nsHwyCkyFr.exefalse
              high
              http://ocsps.ssl.com0?nsHwyCkyFr.exefalse
                high
                http://ocsps.ssl.com0_nsHwyCkyFr.exefalse
                  high
                  http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0nsHwyCkyFr.exefalse
                    high
                    http://java.oracle.com/javaw.exe, 00000001.00000002.1364470301.0000000004A00000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0QnsHwyCkyFr.exefalse
                        high
                        http://ocsps.ssl.com0nsHwyCkyFr.exefalse
                          high
                          http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0nsHwyCkyFr.exefalse
                            high
                            http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0nsHwyCkyFr.exefalse
                              high
                              http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0nsHwyCkyFr.exefalse
                                high
                                http://www.oracle.com/technetwork/java/javase/documentation/index.htmljavaw.exe, 00000001.00000002.1364470301.0000000004A8A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1364232608.0000000004968000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1364470301.0000000004A20000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  No contacted IP infos
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1555000
                                  Start date and time:2024-11-13 10:11:07 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 2m 11s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:nsHwyCkyFr.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:4a010c5abe2f5bb4dd6f31b03058bc1847e985a95a68d4e1bf0fb20c030c2307.exe
                                  Detection:CLEAN
                                  Classification:clean4.winEXE@6/2@0/0
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HCA Information:
                                  • Successful, ratio: 97%
                                  • Number of executed functions: 26
                                  • Number of non-executed functions: 35
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Stop behavior analysis, all processes terminated
                                  • Exclude process from analysis (whitelisted): dllhost.exe
                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
                                  • Execution Graph export aborted for target javaw.exe, PID 7656 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  No simulations
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  s-part-0017.t-0009.t-msedge.netXeno Executor Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  Xeno Executor Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  http://track.reviewmgr.com/ls/click?upn=u001.W5y-2Fhe84rCuLxXDO470nfuKD2Iz98QeQpE-2BkxRR0H-2BqB5cDKklujIJ5FLru7QrAASOSa17vR-2FSCLVAx4lWyy5Q-3D-3DNnGv_Yp4ydSxZWNatis3HtI6bBrJjg57JYwT6kbyY2f89Z-2FBhxNJZyCBl9w6yXNV0YfiKUAGjaILaAN0mF43Ydvv3aAXjCPBMrYvHXhqj-2F90M8IWSluK-2FDr0h4-2FIbAXpExZIWOjtRSKBCrpvm-2BHKZd6Q2itOPvvv8Wh8uHJq1rbQgzA92MMGG0eeFCZzQMnosAWydLTI7R4yQPl90fJpGVjewvRcCF77tY5-2B3PAHwq6SU-2Fc2kSK8E1mMumIEdp0dsw2BfptVK6-2FXO4Hh-2FAV8-2FJ5YFUs6qp3oyRx3LiWrBnDVYrVE-3DGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  new.batGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  txt2.batGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  http://t.nypost.com/1/e/r?aqet=clk&r=2&ca=26510028&v0=aftua%40gmail.com&ru=//www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://digitalplatform-admin-p.azurewebsites.net/external-link/?targetURL=https://www.google.nl/url?q=ZFCKQSES42J831UCOWMB4MEAK36T3IE7YuQiApLjODz3yh4nNeW8uuQi&rct=XS%SERIAL%25wDnNeW8yycT&sa=t&esrc=nNeW8F%SERIAL%25A0xys8Em2FL&source=&cd=tS6T8%SERIAL%25Tiw9XH&cad=XpPkDfJX%SERIAL%25VS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%62%79%64%61%2E%6E%67%2F%63%69%67%2E%62%69%6E%2F%67%67%6C%6E%46%78%50%51%30%47%76%38%64%43%45%35%45%43%61%37%66%37%78%63%58%71%32%79%74%4D%57%65%54%6E%31%37%53%74%68%66%4C%56%74%52%44%70%4E%58%36%63%6B%42%66%50%7A%42%38%6B%51%52%36%38%64%67%53%64%31%4C%6C%73%33%71%37%76%6E%79%6E%48%6D%75%41%73%31%2F%23Y2hyaXN0b3BoZXIuZG9sYW5AdmlyZ2lubW9uZXkuY29tGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                  • 13.107.246.45
                                  DHL.exeGet hashmaliciousFormBookBrowse
                                  • 13.107.246.45
                                  https://eu-central-1.protection.sophos.com/?d=xxxlgroup.com&u=aHR0cHM6Ly9zZXJ2aWNlcy5pc3QueHh4bGdyb3VwLmNvbS9QYXltZW50U2VydmljZS8xNy8wWi8wMDAxYzk5YzBhYzVjMGUzMDAwMDNmMzgwMDAwODkxODE0Nzk3NWMy&i=NWM0YWFhZTFlYmMxMjgxMzI2Mzk1MmZj&t=UjJrRmV2QXpnYUF0RUsvV3haZ0lQMllKYVZRbjFESmtncHdLSjlTVGFWST0=&h=30d9cb4dc2a54dd59052f7a4a0edde4a&s=AVNPUEhUT0NFTkNSWVBUSVYENbLvm6o_1YsgOojZ1VDNrB0gxZ-tcqRfXFH68hrgRwGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  https://eu-central-1.protection.sophos.com/?d=xxxlgroup.com&u=aHR0cHM6Ly9zZXJ2aWNlcy5pc3QueHh4bGdyb3VwLmNvbS9QYXltZW50U2VydmljZS8xNy8wWi8wMDAxYzk5YzBhYzVjMGUzMDAwMDNmMzgwMDAwODkxODE0Nzk3NWMy&i=NWM0YWFhZTFlYmMxMjgxMzI2Mzk1MmZj&t=UjJrRmV2QXpnYUF0RUsvV3haZ0lQMllKYVZRbjFESmtncHdLSjlTVGFWST0=&h=30d9cb4dc2a54dd59052f7a4a0edde4a&s=AVNPUEhUT0NFTkNSWVBUSVYENbLvm6o_1YsgOojZ1VDNrB0gxZ-tcqRfXFH68hrgRwGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fportal.eftsure.com.au%2finvite%2f%7b5943C803%2d027A%2d43C9%2dBBBB%2dDE0322D1F961%7d&umid=92db6cfc-6cf7-46fe-8f32-20799b471c27&auth=3a5566c60b1f4d8525fa8ab109f94675a663eb25-8cbc03c09e9a72f57497c9be7e9f6ecc1a7de37eGet hashmaliciousHTMLPhisherBrowse
                                  • 13.107.246.45
                                  No context
                                  No context
                                  No context
                                  Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):52
                                  Entropy (8bit):4.803724516543196
                                  Encrypted:false
                                  SSDEEP:3:oFj4I5vpm4USdj5:oJ5bH
                                  MD5:1C1C2F686D3CB33AE32A072792237050
                                  SHA1:1ADBFA9B9F7CB61E0B4E8CC5F1F662F43CAB89CB
                                  SHA-256:6BF568D0EB022B4CC63148096B901C9DA0DD358C520B2D7F597D7CB4943110A0
                                  SHA-512:2BDD4D8059546B0A80274D548B8A45091B82860416C6669296F25AE08BC502DAB523A1EA289688B955D68ED2817310FC5326CCB9D831228BDBD0B2D5E1E03E36
                                  Malicious:false
                                  Reputation:low
                                  Preview:C:\Program Files (x86)\Java\jre-1.8..1731489119890..
                                  Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):1.235779558934585
                                  Encrypted:false
                                  SSDEEP:96:4y4r+F8GQvNbE5+Q6rOI28IQqSJYYBHG1bo1L:4yn8GQlbE5+Q67IsJ3HGd
                                  MD5:72D109B4527B038C452A7271D06470C1
                                  SHA1:B62EDADB250EF033942CCA5C5567F6C2BBA3F1D8
                                  SHA-256:F6A3F0151E5D9AC87F2FEE122EE1105F3249C859AFA79D59D31E6AA50D150EB4
                                  SHA-512:D03ED4484F6FA4C244362E6B1CCBBEF1268DA77B567F7D25FF6D6040800ED7176864ADA6D96D9A6361D3A10C4820D17E75712691FCDAD2E9BAF35E78E2DCBF09
                                  Malicious:false
                                  Reputation:low
                                  Preview:.........7......H.*..... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                  File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Entropy (8bit):7.4182780858750075
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:nsHwyCkyFr.exe
                                  File size:80'968 bytes
                                  MD5:c9c4ac12004cc6b946cb7d49b5eb5ee5
                                  SHA1:7e738b153194c9f54aac1b433f8e7efff3beafd5
                                  SHA256:4a010c5abe2f5bb4dd6f31b03058bc1847e985a95a68d4e1bf0fb20c030c2307
                                  SHA512:c324685c6a15299504c62724c3c465b28027e93269d1df325921ac3f9a531a60de4c6a0d1775ce0c4365717497146b7360b36b1b87c1d1bae6acc0e1adc68664
                                  SSDEEP:1536:RZ2FWSNhd/4131iae+a0jnLjujUi1QqJ6cF3PK:z2ddQ131iae+HjPujfJ6E3
                                  TLSH:EC83CF43B50E50F1E62709B081DAEDFFCB30924981536506EF985E65DF2376ABC0E19B
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y:.f.................b........................@.................................|.....@... ............................
                                  Icon Hash:bdb5bd98b3f3190d
                                  Entrypoint:0x401290
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                                  Time Stamp:0x66D73A79 [Tue Sep 3 16:34:01 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:6011984d7c1f1b97a34d7517a498bff8
                                  Signature Valid:true
                                  Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                                  Signature Validation Error:The operation completed successfully
                                  Error Number:0
                                  Not Before, Not After
                                  • 30/08/2024 08:25:00 30/08/2025 08:25:00
                                  Subject Chain
                                  • OID.1.3.6.1.4.1.311.60.2.1.3=GB, OID.2.5.4.15=Private Organization, CN=ConsolHQ LTD, SERIALNUMBER=12800651, O=ConsolHQ LTD, L=Erith, C=GB
                                  Version:3
                                  Thumbprint MD5:E4ED28FFAC43E82D3DB5467DE244B770
                                  Thumbprint SHA-1:787863161875446360E7486D3CF5E34E15DC8009
                                  Thumbprint SHA-256:CA814262219EF4B9EF1CC76050E02D41B34F87AEF05D34FA378DAE913F4C784C
                                  Serial:740833F89CC52CAE8CEA1984A66DBB66
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 08h
                                  mov dword ptr [esp], 00000002h
                                  call dword ptr [00413290h]
                                  call 00007F0BACAE5C5Dh
                                  nop
                                  lea esi, dword ptr [esi+00000000h]
                                  push ebp
                                  mov ecx, dword ptr [004132C8h]
                                  mov ebp, esp
                                  pop ebp
                                  jmp ecx
                                  lea esi, dword ptr [esi+00h]
                                  push ebp
                                  mov ecx, dword ptr [004132B4h]
                                  mov ebp, esp
                                  pop ebp
                                  jmp ecx
                                  nop
                                  nop
                                  nop
                                  nop
                                  push ebp
                                  mov edx, 00000080h
                                  mov ebp, esp
                                  push edi
                                  xor eax, eax
                                  lea edi, dword ptr [ebp-00000118h]
                                  push esi
                                  push ebx
                                  sub esp, 0000011Ch
                                  mov dword ptr [esp+08h], edx
                                  mov dword ptr [esp+04h], eax
                                  mov dword ptr [esp], edi
                                  call 00007F0BACAEB8C4h
                                  mov dword ptr [esp+04h], edi
                                  mov dword ptr [esp], 00000018h
                                  call 00007F0BACAE6B6Ch
                                  test eax, eax
                                  je 00007F0BACAE5E32h
                                  mov dword ptr [esp], 00000000h
                                  xor ecx, ecx
                                  xor ebx, ebx
                                  mov dword ptr [esp+04h], ebx
                                  xor esi, esi
                                  mov dword ptr [esp+0Ch], ecx
                                  mov dword ptr [esp+08h], esi
                                  call 00007F0BACAEBA26h
                                  sub esp, 10h
                                  test eax, eax
                                  mov ebx, eax
                                  je 00007F0BACAE5E07h
                                  lea esi, dword ptr [ebp-00000098h]
                                  mov esi, esi
                                  mov dword ptr [esp+04h], esi
                                  mov eax, 0000007Fh
                                  mov dword ptr [esp+08h], eax
                                  mov dword ptr [esp], ebx
                                  call 00007F0BACAEBA08h
                                  sub esp, 0Ch
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x130000xaa8.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x9a0c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x116000x2648
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x132000x188.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x60800x62007a3818cabc9cf80103d368f58fbe48cfFalse0.47401147959183676data5.982433201699597IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0x80000x400x2003d4489f93d799c2f1cd6cbf1959b8bcfFalse0.052734375data0.1638075416558982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0x90000x5100x6000ba33aaa7c8de2d9ce0b1ff96bd9e64aFalse0.46484375data5.01354615045612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                  .bss0xa0000x8e300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata0x130000xaa80xc00ef152b96063582fc8f2bd1e1fd8a5e6fFalse0.3697916666666667data4.652641333274655IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x140000x9a0c0x9c0062b491b7e63c32ffaf9ad85db79d7cc7False0.9676732772435898data7.914760707660448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x143580x94d1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9972963750426542
                                  RT_RCDATA0x1d82c0x4data3.0
                                  RT_RCDATA0x1d8300x6data2.3333333333333335
                                  RT_RCDATA0x1d8380x2data5.0
                                  RT_RCDATA0x1d83c0x16data1.3636363636363635
                                  RT_RCDATA0x1d8540x29ASCII text, with no line terminators1.0975609756097562
                                  RT_RCDATA0x1d8800x6data2.3333333333333335
                                  RT_RCDATA0x1d8880x2data5.0
                                  RT_RCDATA0x1d88c0x3ASCII text, with no line terminators3.6666666666666665
                                  RT_RCDATA0x1d8900x19ASCII text, with no line terminators1.32
                                  RT_RCDATA0x1d8ac0x2data5.0
                                  RT_RCDATA0x1d8b00x32data1.16
                                  RT_RCDATA0x1d8e40x73ASCII text, with no line terminators0.8695652173913043
                                  RT_RCDATA0x1d9580x35ASCII text, with no line terminators1.1320754716981132
                                  RT_RCDATA0x1d9900x68data0.875
                                  RT_GROUP_ICON0x1d9f80x14data1.1
                                  DLLImport
                                  ADVAPI32.DLLRegCloseKey, RegEnumKeyExA, RegOpenKeyExA, RegQueryValueExA
                                  KERNEL32.dllCloseHandle, CreateMutexA, CreateProcessA, ExitProcess, FindResourceExA, FormatMessageA, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetEnvironmentVariableA, GetExitCodeProcess, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GlobalMemoryStatusEx, LoadResource, LocalFree, LockResource, SetEnvironmentVariableA, SetLastError, SetUnhandledExceptionFilter, WaitForSingleObject
                                  msvcrt.dll__getmainargs, __p__environ, __p__fmode, __set_app_type, _cexit, _chdir, _close, _findclose, _findfirst, _findnext, _iob, _itoa, _onexit, _open, _read, _setmode, _stat, atexit, atoi, fclose, fopen, fprintf, fwrite, memset, printf, puts, signal, strcat, strchr, strcmp, strcpy, strlen, strncat, strncpy, strpbrk, strrchr, strstr, strtok
                                  SHELL32.DLLShellExecuteA
                                  USER32.dllCreateWindowExA, DispatchMessageA, EnumWindows, FindWindowExA, GetMessageA, GetSystemMetrics, GetWindowLongA, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, KillTimer, LoadImageA, MessageBoxA, PostQuitMessage, SendMessageA, SetForegroundWindow, SetTimer, SetWindowPos, ShowWindow, TranslateMessage, UpdateWindow
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 13, 2024 10:11:55.404519081 CET1.1.1.1192.168.2.90x1cd9No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Nov 13, 2024 10:11:55.404519081 CET1.1.1.1192.168.2.90x1cd9No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:04:11:59
                                  Start date:13/11/2024
                                  Path:C:\Users\user\Desktop\nsHwyCkyFr.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\nsHwyCkyFr.exe"
                                  Imagebase:0x400000
                                  File size:80'968 bytes
                                  MD5 hash:C9C4AC12004CC6B946CB7D49B5EB5EE5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:04:11:59
                                  Start date:13/11/2024
                                  Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher
                                  Imagebase:0x210000
                                  File size:257'664 bytes
                                  MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:3
                                  Start time:04:11:59
                                  Start date:13/11/2024
                                  Path:C:\Windows\SysWOW64\icacls.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                  Imagebase:0xc00000
                                  File size:29'696 bytes
                                  MD5 hash:2E49585E4E08565F52090B144062F97E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:04:11:59
                                  Start date:13/11/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff70f010000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:27%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:26%
                                    Total number of Nodes:688
                                    Total number of Limit Nodes:15
                                    execution_graph 1727 404040 1728 404070 FindResourceExA 1727->1728 1729 40405a 1727->1729 1730 4040b4 LoadResource 1728->1730 1731 40426c SetLastError 1728->1731 1732 404110 atoi 1730->1732 1733 4040cd LockResource 1730->1733 1734 404284 fprintf 1731->1734 1735 404126 1732->1735 1736 404208 1732->1736 1733->1732 1740 4040de 1733->1740 1734->1732 1755 402cb0 1735->1755 1738 402cb0 45 API calls 1736->1738 1741 40413b 1738->1741 1739 404155 1742 4041a5 strcpy 1739->1742 1744 404168 1739->1744 1745 40423a 1739->1745 1740->1732 1740->1734 1743 404103 1740->1743 1741->1739 1748 402cb0 45 API calls 1741->1748 1746 4041c3 fprintf 1742->1746 1747 4041f4 1742->1747 1743->1732 1749 402cb0 45 API calls 1744->1749 1750 402cb0 45 API calls 1745->1750 1746->1747 1748->1739 1753 40417d 1749->1753 1750->1753 1752 404197 1752->1729 1752->1742 1753->1752 1754 402cb0 45 API calls 1753->1754 1754->1752 1756 402d50 FindResourceExA 1755->1756 1757 402cd3 1755->1757 1760 402d94 LoadResource 1756->1760 1761 402e39 SetLastError 1756->1761 1758 402d10 1757->1758 1759 402cd8 1757->1759 1762 402ce3 1758->1762 1765 402920 39 API calls 1758->1765 1759->1762 1769 402920 39 API calls 1759->1769 1763 402e00 atoi 1760->1763 1764 402dad LockResource 1760->1764 1761->1763 1767 402ce8 1762->1767 1772 402920 1762->1772 1763->1759 1764->1763 1766 402dbe 1764->1766 1765->1762 1766->1763 1771 402ddf fprintf 1766->1771 1767->1741 1769->1762 1770 402d26 1770->1741 1771->1763 1773 402970 RegOpenKeyExA 1772->1773 1774 402946 1772->1774 1777 4029a4 1773->1777 1778 4029ac memset memset memset 1773->1778 1775 402956 1774->1775 1776 40295b fprintf 1774->1776 1775->1776 1776->1773 1777->1770 1779 402a4f RegEnumKeyExA 1778->1779 1780 402aa9 strcpy strlen 1779->1780 1781 402c8b RegCloseKey 1779->1781 1782 402ac7 1780->1782 1783 402acd strcat 1780->1783 1781->1770 1782->1783 1784 402bf0 fprintf 1783->1784 1785 402aec strchr 1783->1785 1784->1770 1786 402b07 strlen 1785->1786 1787 402b1b strcpy 1785->1787 1786->1787 1788 402c30 strncpy strlen strcat 1786->1788 1789 402b33 strcmp 1787->1789 1788->1789 1793 402a37 1789->1793 1790 402a18 strcmp 1791 402b5f strcmp 1790->1791 1790->1793 1791->1793 1793->1779 1793->1790 1793->1791 1795 402b98 strcpy strcpy 1793->1795 1796 402bd6 fprintf 1793->1796 1797 4027a0 memset RegOpenKeyExA 1793->1797 1795->1793 1795->1796 1796->1770 1798 402830 memset RegQueryValueExA 1797->1798 1799 402814 1797->1799 1800 4028ed RegCloseKey 1798->1800 1802 402894 1798->1802 1799->1793 1800->1799 1801 402906 strcpy 1800->1801 1801->1799 1802->1802 1803 4028e3 1802->1803 1804 4028bd strlen 1802->1804 1809 402690 memset 1803->1809 1806 4028d2 strcat 1804->1806 1807 4028cc 1804->1807 1806->1803 1807->1806 1810 402708 strcpy 1809->1810 1811 4026c9 1809->1811 1813 402776 strlen 1810->1813 1814 40271e strlen 1810->1814 1812 4026f9 1811->1812 1815 4026e0 fprintf 1811->1815 1816 4026db 1811->1816 1812->1800 1817 40272d strcat _stat 1813->1817 1814->1817 1815->1812 1816->1815 1817->1811 1819 402762 SetLastError 1817->1819 1819->1811 2150 401000 2151 401061 2150->2151 2152 40101e 2150->2152 2153 40102a signal 2151->2153 2155 401025 2151->2155 2156 401087 2151->2156 2154 401080 2152->2154 2152->2155 2158 4010bb signal 2153->2158 2161 401041 2153->2161 2154->2156 2157 4010e2 signal 2154->2157 2155->2153 2160 401071 2155->2160 2156->2161 2162 40108e signal 2156->2162 2159 401129 signal 2157->2159 2157->2161 2158->2161 2159->2161 2162->2161 2163 40110f signal 2162->2163 2163->2161 2164 403700 GlobalMemoryStatusEx 2169 4033f0 FindResourceExA 2164->2169 2167 4033f0 18 API calls 2168 403781 2167->2168 2170 403450 LoadResource 2169->2170 2171 4036e8 SetLastError 2169->2171 2172 4034c0 atoi FindResourceExA 2170->2172 2173 403468 LockResource 2170->2173 2174 4036d0 SetLastError 2172->2174 2175 40350e LoadResource 2172->2175 2173->2172 2179 403479 2173->2179 2174->2171 2176 403580 atoi 2175->2176 2177 403527 LockResource 2175->2177 2184 4035ce 2176->2184 2177->2176 2178 403538 2177->2178 2178->2176 2182 40355f fprintf 2178->2182 2179->2172 2180 40349f fprintf 2179->2180 2180->2172 2181 403651 2181->2167 2182->2176 2183 403604 2186 40366a fprintf 2183->2186 2187 40360d strcat strlen _itoa strlen 2183->2187 2184->2181 2184->2183 2185 4036a7 fprintf 2184->2185 2185->2183 2186->2187 2187->2181 1820 401dc5 1821 401dd0 GetModuleHandleA GetProcAddress 1820->1821 1822 401e00 GetCurrentProcess 1821->1822 1823 401e13 1821->1823 1822->1823 1824 401e48 1823->1824 1825 401e33 fprintf 1823->1825 1825->1824 2188 401b87 memset strncpy strlen fopen 1826 40124a _setmode 1827 4011bb 1826->1827 1828 4011e0 1827->1828 1829 4011c0 _setmode 1827->1829 1830 401200 __p__fmode 1828->1830 1831 4011e5 _setmode 1828->1831 1829->1828 1832 406b30 1830->1832 1831->1830 1833 401212 __p__environ 1832->1833 1834 406a10 427 API calls 1833->1834 1835 401237 _cexit ExitProcess 1834->1835 1836 40334c 1837 403350 GetCurrentDirectoryA 1836->1837 1851 40320b 1837->1851 1838 4032f0 fprintf 1838->1851 1839 403160 strchr 1841 40317b strchr 1839->1841 1842 4033cc strcat 1839->1842 1840 4032e0 1841->1840 1843 40319d strncat strncat strlen 1841->1843 1842->1840 1844 403317 strncat 1843->1844 1843->1851 1844->1851 1845 403335 strcat 1845->1837 1845->1851 1846 403377 strcat 1846->1851 1847 40326c strstr 1848 403291 GetEnvironmentVariableA 1847->1848 1847->1851 1850 4033b2 strcat 1848->1850 1848->1851 1850->1851 1851->1837 1851->1838 1851->1839 1851->1840 1851->1845 1851->1846 1851->1847 1852 4023b0 strstr 1851->1852 1853 4023d6 strstr 1852->1853 1854 402448 strchr strrchr 1852->1854 1853->1854 1857 4023f0 strstr 1853->1857 1855 402503 RegOpenKeyExA 1854->1855 1856 402485 RegOpenKeyExA 1854->1856 1859 4024ae RegQueryValueExA RegCloseKey 1855->1859 1860 40252c 1855->1860 1858 4024f4 1856->1858 1856->1859 1857->1854 1861 40240a strstr 1857->1861 1858->1851 1859->1858 1860->1856 1861->1854 1862 402424 strstr 1861->1862 1862->1854 1863 40243e 1862->1863 1863->1851 1864 4030cc 1865 4030d0 strcat strlen 1864->1865 1866 401fcc 1867 401fd0 FormatMessageA 1866->1867 1868 402013 strlen strcat LocalFree 1867->1868 1869 402096 fprintf 1867->1869 1869->1868 1870 402e4e 1871 402e50 1870->1871 1872 402e70 1871->1872 1873 402ea1 1871->1873 1874 402cb0 45 API calls 1872->1874 1875 402cb0 45 API calls 1873->1875 1876 402e81 1874->1876 1875->1876 1507 401290 __set_app_type 1510 401150 SetUnhandledExceptionFilter 1507->1510 1524 406b60 1510->1524 1512 40116e __getmainargs 1513 401200 __p__fmode 1512->1513 1514 4011a8 1512->1514 1525 406b30 1513->1525 1516 4011bb 1514->1516 1520 40124a _setmode 1514->1520 1517 4011e0 1516->1517 1518 4011c0 _setmode 1516->1518 1517->1513 1521 4011e5 _setmode 1517->1521 1518->1517 1520->1516 1521->1513 1524->1512 1526 401212 __p__environ 1525->1526 1527 406a10 1526->1527 1528 406a24 1527->1528 1529 406a29 GetCommandLineA GetStartupInfoA 1528->1529 1530 406a42 GetModuleHandleA 1529->1530 1532 406b00 1530->1532 1535 4013b0 1532->1535 1592 405d30 1535->1592 1537 4013c7 1538 4013d2 1537->1538 1539 40185b memset 1537->1539 1540 4013d5 1538->1540 1682 4021a0 FindResourceExA 1538->1682 1541 4020c0 5 API calls 1539->1541 1696 401ed0 GetLastError 1540->1696 1544 401888 1541->1544 1545 4018bc FindWindowExA 1544->1545 1547 40188e ShowWindow SetForegroundWindow 1544->1547 1552 4018e9 GetWindowTextA strstr 1544->1552 1545->1544 1546 4013fc 1548 401402 strstr 1546->1548 1549 40141b 1546->1549 1551 401c10 fclose 1547->1551 1548->1549 1553 4021a0 5 API calls 1549->1553 1550 401237 _cexit ExitProcess 1551->1544 1552->1547 1554 401915 FindWindowExA 1552->1554 1555 40142f 1553->1555 1554->1544 1554->1552 1556 40143c 1555->1556 1557 4021a0 5 API calls 1555->1557 1558 401458 CreateWindowExA 1556->1558 1587 401591 1556->1587 1559 4015f5 1557->1559 1560 401616 1558->1560 1569 4014cc 1558->1569 1559->1556 1561 4015fd strstr 1559->1561 1716 4020c0 FindResourceExA 1560->1716 1561->1556 1561->1560 1562 4014d6 SetTimer 1562->1540 1562->1569 1563 4017ee 1570 401837 fwrite 1563->1570 1571 4017fc 1563->1571 1565 401642 1567 401646 atoi 1565->1567 1568 40165d 1565->1568 1567->1568 1572 4021a0 5 API calls 1568->1572 1569->1540 1569->1562 1569->1563 1576 40155d GetMessageA 1569->1576 1569->1587 1689 406860 1569->1689 1570->1571 1724 406830 CloseHandle CloseHandle 1571->1724 1574 401686 1572->1574 1577 4016a3 1574->1577 1578 40168a strstr 1574->1578 1575 401801 1579 401c10 fclose 1575->1579 1576->1569 1580 401547 TranslateMessage DispatchMessageA 1576->1580 1581 4021a0 5 API calls 1577->1581 1578->1577 1582 4013da 1579->1582 1580->1576 1583 4016b9 LoadImageA 1581->1583 1582->1550 1583->1540 1585 4016f4 7 API calls 1583->1585 1585->1587 1586 40159b fprintf 1586->1587 1587->1562 1587->1563 1587->1586 1588 4015cc 1587->1588 1712 406830 CloseHandle CloseHandle 1587->1712 1589 401817 fprintf 1588->1589 1590 4015da 1588->1590 1589->1570 1713 401c10 1590->1713 1725 406c70 1592->1725 1594 405d3d GetModuleHandleA 1595 405d70 memset GetModuleFileNameA 1594->1595 1596 405d60 1594->1596 1597 406350 1595->1597 1598 405df8 strrchr 1595->1598 1596->1537 1597->1537 1598->1597 1599 405e1c 1598->1599 1600 401c30 12 API calls 1599->1600 1601 405e35 1600->1601 1601->1596 1602 405e3f GetModuleHandleA GetProcAddress 1601->1602 1603 405e68 GetCurrentProcess 1602->1603 1604 405e7b 1602->1604 1603->1604 1605 405eb0 FindResourceExA 1604->1605 1606 405e96 1604->1606 1607 405e9b fprintf 1604->1607 1608 405ee3 LoadResource 1605->1608 1609 40638b SetLastError 1605->1609 1606->1607 1607->1605 1610 405f35 FindResourceExA 1608->1610 1611 405efc LockResource 1608->1611 1612 4063a6 SetLastError 1609->1612 1610->1612 1613 405f68 LoadResource 1610->1613 1611->1610 1614 405f0d 1611->1614 1619 4063c1 SetLastError 1612->1619 1615 405f81 LockResource 1613->1615 1616 405fba FindResourceExA 1613->1616 1614->1610 1624 40641f fprintf 1614->1624 1615->1616 1622 405f92 1615->1622 1617 406361 SetLastError 1616->1617 1618 405fed LoadResource 1616->1618 1646 406323 1617->1646 1620 40600a LockResource 1618->1620 1618->1646 1621 4063dc SetLastError 1619->1621 1629 40601f 1620->1629 1620->1646 1626 4063f7 fprintf 1621->1626 1622->1616 1627 406447 fprintf 1622->1627 1623 40632c fprintf 1623->1597 1624->1610 1628 406047 memset FindResourceExA 1626->1628 1627->1616 1628->1619 1630 406097 LoadResource 1628->1630 1629->1626 1629->1628 1631 4060b0 LockResource 1630->1631 1632 4060c1 1630->1632 1631->1632 1633 406138 memset memset GetCurrentDirectoryA FindResourceExA 1632->1633 1634 4060ef CreateMutexA GetLastError 1632->1634 1643 406796 fprintf 1632->1643 1633->1621 1636 4061bd LoadResource 1633->1636 1634->1633 1635 40646f 1634->1635 1637 406482 fprintf 1635->1637 1638 406478 1635->1638 1639 406266 1636->1639 1640 4061da LockResource 1636->1640 1637->1596 1638->1596 1641 404740 162 API calls 1639->1641 1640->1639 1648 4061eb 1640->1648 1642 406278 1641->1642 1642->1596 1644 406282 6 API calls 1642->1644 1643->1632 1645 4064c0 strlen strcat SetEnvironmentVariableA 1644->1645 1644->1646 1645->1646 1649 406502 1645->1649 1646->1597 1646->1623 1647 406214 strncpy strlen 1651 406239 1647->1651 1652 40623f strcat _chdir 1647->1652 1648->1647 1650 4067b9 fprintf 1648->1650 1654 4051e0 38 API calls 1649->1654 1650->1647 1651->1652 1652->1639 1653 4064a6 fprintf 1652->1653 1653->1639 1655 406514 FindResourceExA 1654->1655 1656 406811 SetLastError 1655->1656 1657 40655b LoadResource 1655->1657 1658 4065c4 atoi 1657->1658 1659 406574 LockResource 1657->1659 1660 4067e2 strlen 1658->1660 1661 4065df strlen 1658->1661 1659->1658 1666 406585 1659->1666 1664 4067f7 1660->1664 1662 406600 strcat GlobalMemoryStatusEx 1661->1662 1663 4065f4 1661->1663 1665 4033f0 18 API calls 1662->1665 1663->1662 1664->1656 1667 406671 1665->1667 1666->1658 1668 4065a6 fprintf 1666->1668 1669 4033f0 18 API calls 1667->1669 1668->1658 1670 4066af memset 1669->1670 1671 403790 16 API calls 1670->1671 1672 4066d6 1671->1672 1673 403100 27 API calls 1672->1673 1674 4066fa 1673->1674 1675 405390 85 API calls 1674->1675 1676 406706 1675->1676 1677 405b60 14 API calls 1676->1677 1678 406711 1677->1678 1678->1638 1679 406724 fprintf 1678->1679 1679->1638 1680 406747 fprintf 1679->1680 1680->1638 1681 40676b strlen fprintf 1680->1681 1681->1596 1683 40227d SetLastError 1682->1683 1684 4021ed LoadResource 1682->1684 1683->1546 1685 402260 1684->1685 1686 402206 LockResource 1684->1686 1685->1546 1686->1685 1687 402217 1686->1687 1687->1685 1688 40223f fprintf 1687->1688 1688->1685 1690 406c70 1689->1690 1691 406870 6 API calls 1690->1691 1692 406970 1691->1692 1693 40694d 1691->1693 1692->1569 1694 406983 WaitForSingleObject GetExitCodeProcess CloseHandle CloseHandle 1693->1694 1695 406954 1693->1695 1694->1695 1695->1569 1697 402058 fprintf 1696->1697 1698 401eeb 1696->1698 1700 402077 fprintf 1697->1700 1699 401fd0 FormatMessageA 1698->1699 1701 401fa0 MessageBoxA 1698->1701 1702 401f01 1698->1702 1703 402013 strlen strcat LocalFree 1699->1703 1704 402096 fprintf 1699->1704 1700->1704 1701->1699 1707 401f16 1701->1707 1705 401f70 printf 1702->1705 1706 401f0a puts 1702->1706 1703->1582 1704->1703 1705->1707 1706->1707 1707->1700 1708 401f62 1707->1708 1709 401f2c ShellExecuteA 1707->1709 1710 401f90 fclose 1708->1710 1711 401f6b 1708->1711 1709->1708 1710->1582 1711->1582 1712->1587 1714 401c21 fclose 1713->1714 1715 401c1f 1713->1715 1714->1582 1715->1582 1717 40215b SetLastError 1716->1717 1718 4020fb LoadResource 1716->1718 1719 402170 1717->1719 1718->1719 1720 402114 LockResource 1718->1720 1719->1565 1720->1719 1721 402125 1720->1721 1722 40214f 1721->1722 1723 402179 fprintf 1721->1723 1722->1565 1723->1722 1724->1575 1726 406c76 1725->1726 1883 402e50 1884 402e70 1883->1884 1885 402ea1 1883->1885 1886 402cb0 45 API calls 1884->1886 1887 402cb0 45 API calls 1885->1887 1888 402e81 1886->1888 1887->1888 1889 401dd0 GetModuleHandleA GetProcAddress 1890 401e00 GetCurrentProcess 1889->1890 1892 401e13 1889->1892 1890->1892 1891 401e48 1892->1891 1893 401e33 fprintf 1892->1893 1893->1891 1894 4030d0 strcat strlen 1895 4012d0 memset 1896 4020c0 5 API calls 1895->1896 1897 401309 1896->1897 1898 401311 FindWindowExA 1897->1898 1899 40138d 1897->1899 1898->1899 1900 401338 1898->1900 1901 401340 GetWindowTextA strstr 1900->1901 1902 401397 1901->1902 1903 401368 FindWindowExA 1901->1903 1903->1899 1903->1901 1904 4050d0 1905 406c70 1904->1905 1906 4050e0 6 API calls 1905->1906 1907 4051a0 strlen strcat SetEnvironmentVariableA 1906->1907 1908 40516e 1906->1908 1907->1908 1911 4051d6 1907->1911 1909 405183 fprintf 1908->1909 1910 405177 1908->1910 1909->1910 2194 405010 2195 406c70 2194->2195 2196 40501d memset GetEnvironmentVariableA strlen 2195->2196 2197 405086 strlen strcat SetEnvironmentVariableA 2196->2197 2198 405077 2196->2198 1912 403659 1913 403660 1912->1913 1914 40366a fprintf 1913->1914 1915 40360d strcat strlen _itoa strlen 1913->1915 1914->1915 1916 403651 1915->1916 1917 401959 1918 401960 GetWindowThreadProcessId 1917->1918 1919 401993 GetWindowLongA 1918->1919 1920 401987 1918->1920 1919->1920 1921 4019ae ShowWindow 1919->1921 1921->1920 1922 405cdc 1928 405c6c 1922->1928 1923 405c50 strcpy strstr 1924 405ca5 1923->1924 1923->1928 1925 405c40 1924->1925 1926 405cae strlen strcat 1924->1926 1926->1925 1927 405c70 strchr 1927->1928 1929 405c8b strstr 1927->1929 1928->1923 1928->1927 1928->1929 1929->1924 1929->1927 2199 40261c 2200 402620 2199->2200 2201 402660 strlen 2200->2201 2202 402633 strlen 2200->2202 2203 402675 strcat 2201->2203 2204 40266f 2201->2204 2205 402642 2202->2205 2206 402648 strcat 2202->2206 2204->2203 2205->2206 2207 406a9c 2208 406aa0 GetModuleHandleA 2207->2208 2210 406b00 2208->2210 2211 4013b0 424 API calls 2210->2211 2212 406b1a 2211->2212 1930 4052de 1931 4052e0 SetEnvironmentVariableA 1930->1931 1932 4052ff strtok 1931->1932 1933 405364 1932->1933 1934 40530a strchr 1932->1934 1938 403100 1934->1938 1937 405346 fprintf 1937->1931 1939 406c70 1938->1939 1940 403110 memset memset 1939->1940 1941 4032e0 1940->1941 1942 40315f 1940->1942 1941->1931 1941->1937 1942->1941 1943 403160 strchr 1942->1943 1948 403335 strcat 1942->1948 1949 403350 GetCurrentDirectoryA 1942->1949 1950 4032f0 fprintf 1942->1950 1951 403377 strcat 1942->1951 1952 40326c strstr 1942->1952 1954 4023b0 11 API calls 1942->1954 1944 40317b strchr 1943->1944 1945 4033cc strcat 1943->1945 1944->1941 1946 40319d strncat strncat strlen 1944->1946 1945->1941 1946->1942 1947 403317 strncat 1946->1947 1947->1942 1948->1942 1948->1949 1949->1942 1950->1942 1951->1942 1952->1942 1953 403291 GetEnvironmentVariableA 1952->1953 1953->1942 1955 4033b2 strcat 1953->1955 1954->1942 1955->1942 1956 402ede 1957 402ee0 1956->1957 1958 402ff0 1957->1958 1959 402ef7 1957->1959 1960 402cb0 45 API calls 1958->1960 1961 402cb0 45 API calls 1959->1961 1963 403005 1960->1963 1962 402f0c 1961->1962 1964 402f26 1962->1964 1965 402cb0 45 API calls 1962->1965 1963->1964 1967 402cb0 45 API calls 1963->1967 1966 402f90 strcpy 1964->1966 1968 402f43 1964->1968 1969 403027 1964->1969 1965->1964 1970 402fad fprintf 1966->1970 1971 402fde 1966->1971 1967->1964 1972 402cb0 45 API calls 1968->1972 1973 402cb0 45 API calls 1969->1973 1970->1971 1975 402f58 1972->1975 1976 40303c 1973->1976 1978 402cb0 45 API calls 1975->1978 1979 402f76 1975->1979 1977 402cb0 45 API calls 1976->1977 1976->1979 1977->1979 1978->1979 1979->1966 1979->1971 1980 401e60 1981 401ea0 MessageBoxA 1980->1981 1983 401e73 printf 1980->1983 1984 401960 GetWindowThreadProcessId 1985 401993 GetWindowLongA 1984->1985 1986 401987 1984->1986 1985->1986 1987 4019ae ShowWindow 1985->1987 1987->1986 1988 4019e0 1989 401a20 GetExitCodeProcess 1988->1989 1990 4019ef 1988->1990 1991 401a73 1989->1991 1992 401a46 KillTimer PostQuitMessage 1989->1992 1993 401a90 ShowWindow 1990->1993 1994 4019fc 1990->1994 1991->1992 1997 401a6f 1991->1997 1992->1997 1993->1989 1998 401abd 1993->1998 1995 401b00 EnumWindows 1994->1995 1996 401a12 1994->1996 1995->1989 1996->1989 1998->1989 1999 401acb KillTimer 1998->1999 2000 401ed0 13 API calls 1999->2000 2001 401ae7 PostQuitMessage 2000->2001 2001->1989 2002 402ee0 2003 402ff0 2002->2003 2004 402ef7 2002->2004 2005 402cb0 45 API calls 2003->2005 2006 402cb0 45 API calls 2004->2006 2008 403005 2005->2008 2007 402f0c 2006->2007 2009 402f26 2007->2009 2010 402cb0 45 API calls 2007->2010 2008->2009 2012 402cb0 45 API calls 2008->2012 2011 402f90 strcpy 2009->2011 2013 402f43 2009->2013 2014 403027 2009->2014 2010->2009 2015 402fad fprintf 2011->2015 2016 402fde 2011->2016 2012->2009 2017 402cb0 45 API calls 2013->2017 2018 402cb0 45 API calls 2014->2018 2015->2016 2020 402f58 2017->2020 2021 40303c 2018->2021 2023 402cb0 45 API calls 2020->2023 2024 402f76 2020->2024 2022 402cb0 45 API calls 2021->2022 2021->2024 2022->2024 2023->2024 2024->2011 2024->2016 2025 4025e0 strlen 2026 402601 2025->2026 2213 402620 2214 402660 strlen 2213->2214 2215 402633 strlen 2213->2215 2216 402675 strcat 2214->2216 2217 40266f 2214->2217 2218 402642 2215->2218 2219 402648 strcat 2215->2219 2217->2216 2218->2219 2220 401b20 GetModuleHandleA 2221 401b40 2220->2221 2027 404069 2028 404070 FindResourceExA 2027->2028 2029 4040b4 LoadResource 2028->2029 2030 40426c SetLastError 2028->2030 2031 404110 atoi 2029->2031 2032 4040cd LockResource 2029->2032 2033 404284 fprintf 2030->2033 2034 404126 2031->2034 2035 404208 2031->2035 2032->2031 2039 4040de 2032->2039 2033->2031 2036 402cb0 45 API calls 2034->2036 2037 402cb0 45 API calls 2035->2037 2040 40413b 2036->2040 2037->2040 2038 404155 2041 4041a5 strcpy 2038->2041 2043 404168 2038->2043 2044 40423a 2038->2044 2039->2031 2039->2033 2042 404103 2039->2042 2040->2038 2047 402cb0 45 API calls 2040->2047 2045 4041c3 fprintf 2041->2045 2046 4041f4 2041->2046 2042->2031 2048 402cb0 45 API calls 2043->2048 2049 402cb0 45 API calls 2044->2049 2045->2046 2047->2038 2052 40417d 2048->2052 2049->2052 2051 404197 2051->2041 2053 40405a 2051->2053 2052->2051 2054 402cb0 45 API calls 2052->2054 2054->2051 2055 401269 2056 401270 __set_app_type 2055->2056 2057 401150 436 API calls 2056->2057 2058 401288 2057->2058 2059 4013e9 2060 4013f0 2059->2060 2061 4021a0 5 API calls 2060->2061 2062 4013fc 2061->2062 2063 401402 strstr 2062->2063 2064 40141b 2062->2064 2063->2064 2065 4021a0 5 API calls 2064->2065 2066 40142f 2065->2066 2067 40143c 2066->2067 2068 4021a0 5 API calls 2066->2068 2069 401458 CreateWindowExA 2067->2069 2081 4014cc 2067->2081 2070 4015f5 2068->2070 2071 401616 2069->2071 2069->2081 2070->2067 2072 4015fd strstr 2070->2072 2075 4020c0 5 API calls 2071->2075 2072->2067 2072->2071 2073 4014d6 SetTimer 2076 4013d5 2073->2076 2073->2081 2074 4017ee 2083 401837 fwrite 2074->2083 2084 4017fc 2074->2084 2077 401642 2075->2077 2082 401ed0 13 API calls 2076->2082 2079 401646 atoi 2077->2079 2080 40165d 2077->2080 2078 406860 10 API calls 2078->2081 2079->2080 2085 4021a0 5 API calls 2080->2085 2081->2073 2081->2074 2081->2076 2081->2078 2089 40155d GetMessageA 2081->2089 2098 40159b fprintf 2081->2098 2099 4015cc 2081->2099 2104 406830 CloseHandle CloseHandle 2081->2104 2103 4013da 2082->2103 2083->2084 2105 406830 CloseHandle CloseHandle 2084->2105 2087 401686 2085->2087 2090 4016a3 2087->2090 2091 40168a strstr 2087->2091 2088 401801 2092 401c10 fclose 2088->2092 2089->2081 2093 401547 TranslateMessage DispatchMessageA 2089->2093 2094 4021a0 5 API calls 2090->2094 2091->2090 2092->2103 2093->2089 2095 4016b9 LoadImageA 2094->2095 2095->2076 2097 4016f4 7 API calls 2095->2097 2097->2081 2098->2081 2100 401817 fprintf 2099->2100 2101 4015da 2099->2101 2100->2083 2102 401c10 fclose 2101->2102 2102->2103 2104->2081 2105->2088 2222 402829 2223 402830 memset RegQueryValueExA 2222->2223 2224 4028ed RegCloseKey 2223->2224 2226 402894 2223->2226 2225 402906 strcpy 2224->2225 2227 402814 2224->2227 2225->2227 2226->2226 2228 4028e3 2226->2228 2229 4028bd strlen 2226->2229 2230 402690 8 API calls 2228->2230 2231 4028d2 strcat 2229->2231 2232 4028cc 2229->2232 2233 4028eb 2230->2233 2231->2228 2232->2231 2233->2224 2106 402bec 2107 402bf0 fprintf 2106->2107 2108 401270 __set_app_type 2109 401150 436 API calls 2108->2109 2110 401288 2109->2110 2234 4022b0 FindResourceExA 2235 4022fd LoadResource 2234->2235 2236 40237f SetLastError atoi 2234->2236 2237 402370 atoi 2235->2237 2238 402316 LockResource 2235->2238 2238->2237 2239 402327 2238->2239 2239->2237 2240 40234f fprintf 2239->2240 2240->2237 2111 403071 2112 403080 GetModuleFileNameA 2111->2112 2113 4030b0 strrchr 2112->2113 2114 4030c5 2112->2114 2113->2114 2115 4039f1 2116 403a00 memset FindResourceExA 2115->2116 2117 403b38 SetLastError 2116->2117 2118 403a5a LoadResource 2116->2118 2119 403ad0 2117->2119 2120 403ad9 2117->2120 2118->2119 2121 403a72 LockResource 2118->2121 2119->2120 2122 403ae3 CreateMutexA GetLastError 2119->2122 2121->2119 2126 403a83 2121->2126 2122->2120 2123 403b28 2122->2123 2124 403b31 2123->2124 2125 403b59 fprintf 2123->2125 2125->2124 2126->2119 2127 403aaf fprintf 2126->2127 2127->2119 2241 402531 2242 402540 strchr 2241->2242 2243 40257d 2242->2243 2244 40256d strlen 2242->2244 2245 402597 strncpy strlen 2243->2245 2244->2243 2244->2245 2128 403b77 memset memset GetCurrentDirectoryA FindResourceExA 2129 403c10 LoadResource 2128->2129 2130 403cd7 SetLastError 2128->2130 2131 403cd0 2129->2131 2132 403c2d LockResource 2129->2132 2132->2131 2134 403c42 2132->2134 2133 403c73 strncpy strlen 2136 403c98 2133->2136 2137 403c9e strcat _chdir 2133->2137 2134->2133 2135 403cf4 fprintf 2134->2135 2135->2133 2136->2137 2137->2131 2138 403cbb fprintf 2137->2138 2138->2131 2139 401afc 2140 401b00 EnumWindows 2139->2140 2141 401a20 GetExitCodeProcess 2140->2141 2142 401a73 2141->2142 2143 401a46 KillTimer PostQuitMessage 2141->2143 2142->2143 2144 401a6f 2142->2144 2143->2144 2145 40397e 2146 403900 2145->2146 2147 403968 _close 2146->2147 2148 403957 strlen 2146->2148 2149 403976 2147->2149 2148->2147

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00404040 95 Function_00402CB0 0->95 1 Function_00404740 37 Function_00403D20 1->37 1->95 97 Function_004042B0 1->97 2 Function_00401149 3 Function_0040124A 31 Function_00406A10 3->31 48 Function_00406B30 3->48 4 Function_0040334C 100 Function_004023B0 4->100 5 Function_00402E4E 5->95 6 Function_00402E50 6->95 7 Function_00401E50 8 Function_00401150 17 Function_00406B60 8->17 8->31 8->48 9 Function_00403659 10 Function_00406859 11 Function_00401959 12 Function_00405B5E 13 Function_00401E60 14 Function_00401960 15 Function_00406860 22 Function_00406C70 15->22 16 Function_00405B60 16->22 18 Function_00404069 18->95 19 Function_00401269 19->8 20 Function_00401270 20->8 21 Function_00406B70 23 Function_00403071 24 Function_00403B77 25 Function_0040397E 26 Function_00406C00 98 Function_004012B0 26->98 27 Function_00401000 27->17 28 Function_00406A00 29 Function_00403100 29->22 29->100 30 Function_00403700 72 Function_004033F0 30->72 31->22 31->26 96 Function_004013B0 31->96 32 Function_00401C10 33 Function_00405010 33->22 34 Function_00403D17 35 Function_0040261C 36 Function_0040291C 37->22 37->29 84 Function_00402690 37->84 38 Function_00402620 39 Function_00402920 92 Function_004027A0 39->92 40 Function_00401B20 41 Function_00402829 41->84 42 Function_00401C2C 43 Function_0040682C 44 Function_00405D2C 45 Function_00405D30 45->1 45->16 45->22 45->29 46 Function_00401C30 45->46 63 Function_004051E0 45->63 45->72 82 Function_00405390 45->82 83 Function_00403790 45->83 46->22 47 Function_00406830 49 Function_00402531 50 Function_004020C0 51 Function_00401DC5 52 Function_004030CC 53 Function_00401FCC 54 Function_00406ACE 54->96 55 Function_00401DD0 56 Function_004030D0 57 Function_00401ED0 58 Function_004012D0 58->50 59 Function_004050D0 59->22 60 Function_00405CDC 61 Function_004052DE 61->29 62 Function_00402EDE 62->95 63->22 63->29 64 Function_004019E0 64->57 65 Function_00402EE0 65->95 66 Function_004025E0 67 Function_004069E0 68 Function_004033E5 69 Function_00406CE9 70 Function_004013E9 70->15 70->32 70->47 70->50 70->57 93 Function_004021A0 70->93 71 Function_00402BEC 91 Function_00406CA0 72->91 73 Function_004069F0 74 Function_004039F1 75 Function_00406BF9 76 Function_00401AFC 77 Function_00401B87 78 Function_00405387 79 Function_00403789 80 Function_0040268C 81 Function_0040398E 82->22 82->29 85 Function_00401290 85->8 86 Function_00402199 87 Function_00402799 88 Function_00406B99 88->98 89 Function_00406A9C 89->96 90 Function_00406BA0 90->98 92->84 94 Function_004042A7 95->39 96->15 96->32 96->45 96->47 96->50 96->57 96->93 99 Function_004022B0 101 Function_004020B9 102 Function_004012BC

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 405d30-405d5e call 406c70 GetModuleHandleA 3 405d70-405df2 memset GetModuleFileNameA 0->3 4 405d60-405d6e 0->4 5 406350-406360 3->5 6 405df8-405e16 strrchr 3->6 6->5 7 405e1c-405e39 call 401c30 6->7 7->4 10 405e3f-405e66 GetModuleHandleA GetProcAddress 7->10 11 405e68-405e7b GetCurrentProcess 10->11 12 405e7e-405e85 10->12 11->12 13 405eb0-405edd FindResourceExA 12->13 14 405e87-405e94 12->14 18 405ee3-405efa LoadResource 13->18 19 40638b-40639e SetLastError 13->19 16 405e96 14->16 17 405e9b-405eab fprintf 14->17 16->17 17->13 20 405f35-405f62 FindResourceExA 18->20 21 405efc-405f0b LockResource 18->21 22 4063a6-4063b9 SetLastError 19->22 20->22 23 405f68-405f7f LoadResource 20->23 21->20 24 405f0d 21->24 32 4063c1-4063d4 SetLastError 22->32 25 405f81-405f90 LockResource 23->25 26 405fba-405fe7 FindResourceExA 23->26 27 405f0f-405f1c 24->27 25->26 28 405f92 25->28 29 406361-406374 SetLastError 26->29 30 405fed-406004 LoadResource 26->30 27->27 31 405f1e-405f26 27->31 33 405f94-405fa1 28->33 34 406377-40637e 29->34 30->34 35 40600a-406019 LockResource 30->35 31->20 36 405f28-405f2f 31->36 37 4063dc-4063ef SetLastError 32->37 33->33 38 405fa3-405fab 33->38 34->5 40 406380-406389 34->40 35->34 39 40601f 35->39 36->20 41 40641f-406442 fprintf 36->41 45 4063f7-40641a fprintf 37->45 38->26 42 405fad-405fb4 38->42 43 406021-40602e 39->43 44 406335-406349 fprintf 40->44 41->20 42->26 46 406447-40646a fprintf 42->46 43->43 47 406030-406038 43->47 44->5 48 406047-406091 memset FindResourceExA 45->48 46->26 47->48 49 40603a-406041 47->49 48->32 50 406097-4060ae LoadResource 48->50 49->45 49->48 51 4060b0-4060bf LockResource 50->51 52 4060e6-4060ed 50->52 51->52 53 4060c1 51->53 54 406138-4061b7 memset * 2 GetCurrentDirectoryA FindResourceExA 52->54 55 4060ef-406132 CreateMutexA GetLastError 52->55 56 4060c3-4060cd 53->56 54->37 58 4061bd-4061d4 LoadResource 54->58 55->54 57 40646f-406476 55->57 56->56 59 4060cf-4060d7 56->59 60 406482-4064a1 fprintf 57->60 61 406478-40647d 57->61 62 406266-40627c call 404740 58->62 63 4061da-4061e9 LockResource 58->63 59->52 65 4060d9-4060e0 59->65 60->4 61->4 62->4 70 406282-40631d memset strcpy strlen memset GetEnvironmentVariableA strlen 62->70 63->62 66 4061eb 63->66 65->52 68 406796-4067b4 fprintf 65->68 69 4061ed-4061fb 66->69 68->52 69->69 71 4061fd-406205 69->71 72 4064c0-4064fc strlen strcat SetEnvironmentVariableA 70->72 73 406323-40632a 70->73 74 406214-406237 strncpy strlen 71->74 75 406207-40620e 71->75 72->73 77 406502-406555 call 4051e0 FindResourceExA 72->77 73->5 76 40632c-406331 73->76 79 406239 74->79 80 40623f-406260 strcat _chdir 74->80 75->74 78 4067b9-4067dd fprintf 75->78 76->44 84 406811-406824 SetLastError 77->84 85 40655b-406572 LoadResource 77->85 78->74 79->80 80->62 81 4064a6-4064bb fprintf 80->81 81->62 86 4065c4-4065d9 atoi 85->86 87 406574-406583 LockResource 85->87 89 4067e2-4067f5 strlen 86->89 90 4065df-4065f2 strlen 86->90 87->86 88 406585 87->88 91 406587-406591 88->91 94 406803-406808 89->94 95 4067f7-4067fc 89->95 92 406600-406701 strcat GlobalMemoryStatusEx call 4033f0 * 2 memset call 403790 call 403100 call 405390 90->92 93 4065f4-4065f9 90->93 91->91 96 406593-40659b 91->96 108 406706-406718 call 405b60 92->108 93->92 94->84 95->94 96->86 98 40659d-4065a4 96->98 98->86 100 4065a6-4065bf fprintf 98->100 100->86 111 406724-406745 fprintf 108->111 112 40671a-40671f 108->112 111->112 113 406747-406769 fprintf 111->113 112->4 113->112 114 40676b-406791 strlen fprintf 113->114 114->4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: ModuleResource$Handle$AddressCurrentFileFindLoadLockNameProcProcessfprintfmemsetstrrchr
                                    • String ID: -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher$-Xms$-Xmx$An error occurred while starting the application.$Args length:%d/32768 chars$C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$C:\Users\user\Desktop$Error:%s$Instance already exists.$IsWow64Process$Laun$Launcher args:%s$Launcher:%s$Resource %d:%s$Startup error message not defined.$WOW64:%s$Working dir:%s$\bin$appendToPathVar failed.$bin\java.exe$bin\javaw.exe$ch4j$yes
                                    • API String ID: 919401838-82608069
                                    • Opcode ID: e98f0b280fdfade851ebe13318b98efc7c14c0c3f0ba294e535c625494688a31
                                    • Instruction ID: bf9eff1d8a15de45e5a137a0cf06cc9be9fda6a92e4b939ea636d94b2118cc52
                                    • Opcode Fuzzy Hash: e98f0b280fdfade851ebe13318b98efc7c14c0c3f0ba294e535c625494688a31
                                    • Instruction Fuzzy Hash: 6A521EB09087018BD714EF29D58025EBBE1EF84344F15C87FE889AB391DB7C89658F4A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 308 4013b0-4013cc call 405d30 311 4013d2-4013d3 308->311 312 40185b-40188a memset call 4020c0 308->312 313 4013f0-401400 call 4021a0 311->313 314 4013d5-4013da call 401ed0 311->314 319 4018bc-4018e1 FindWindowExA 312->319 320 40188c 312->320 325 401402-401415 strstr 313->325 326 40141b-401436 call 4021a0 313->326 327 4013df-4013e6 314->327 319->320 324 4018e3 319->324 323 40188e-4018b2 ShowWindow SetForegroundWindow call 401c10 320->323 323->319 329 4018e9-40190f GetWindowTextA strstr 324->329 325->326 330 40180d-401812 325->330 336 4015e9-4015f7 call 4021a0 326->336 337 40143c 326->337 329->323 333 401915-401938 FindWindowExA 329->333 330->326 333->329 335 40193a 333->335 335->320 339 401441-40144e 336->339 346 4015fd-401610 strstr 336->346 337->339 340 401450-401452 339->340 341 401458-4014c6 CreateWindowExA 339->341 340->341 343 4017e6-4017e8 340->343 344 40161b-401644 call 4020c0 341->344 345 4014cc-4014d4 341->345 348 4014d6-401504 SetTimer 343->348 349 4017ee 343->349 355 401646-401657 atoi 344->355 356 401668-401688 call 4021a0 344->356 345->348 351 40150a-40151a call 406860 345->351 346->339 347 401616 346->347 347->344 348->314 348->351 354 4017f3-4017fa 349->354 357 40151f-401521 351->357 358 401837-401859 fwrite 354->358 359 4017fc-401808 call 406830 call 401c10 354->359 360 40165d-401662 355->360 361 40193f-401944 355->361 370 4016a3-4016ee call 4021a0 LoadImageA 356->370 371 40168a-40169d strstr 356->371 357->314 362 401527-40152f 357->362 358->359 359->327 360->356 361->356 365 401531-401539 362->365 366 40153f-401545 362->366 365->354 365->366 369 40155d-40157c GetMessageA 366->369 373 401547-40155a TranslateMessage DispatchMessageA 369->373 374 40157e-401586 369->374 370->314 383 4016f4-4017de SendMessageA GetWindowRect GetSystemMetrics * 2 SetWindowPos ShowWindow UpdateWindow 370->383 371->370 375 401949-40194e 371->375 373->369 378 4015b0-4015bc call 406830 374->378 379 401588-40158f 374->379 375->370 387 4015cc-4015d4 378->387 388 4015be-4015c6 378->388 379->378 382 401591-401599 379->382 382->378 385 40159b-4015ab fprintf 382->385 386 4017e1 383->386 385->378 386->343 389 401817-40182d fprintf 387->389 390 4015da-4015e4 call 401c10 387->390 388->386 388->387 389->358 390->327
                                    APIs
                                      • Part of subcall function 00405D30: GetModuleHandleA.KERNEL32(?,004013C7), ref: 00405D4D
                                    • strstr.MSVCRT ref: 0040140E
                                    • CreateWindowExA.USER32 ref: 004014B1
                                    • SetTimer.USER32 ref: 004014FA
                                    • GetMessageA.USER32 ref: 00401572
                                      • Part of subcall function 00401ED0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,004013DA), ref: 00401ED7
                                      • Part of subcall function 00401ED0: puts.MSVCRT ref: 00401F11
                                      • Part of subcall function 00401ED0: ShellExecuteA.SHELL32 ref: 00401F5A
                                    • memset.MSVCRT ref: 00401873
                                    • ShowWindow.USER32 ref: 0040189A
                                    • SetForegroundWindow.USER32 ref: 004018A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Window$CreateErrorExecuteForegroundHandleLastMessageModuleShellShowTimermemsetputsstrstr
                                    • String ID: --l4j-dont-wait$--l4j-no-splash$--l4j-no-splash-err$Exit code:%d$Exit code:%d, restarting the application!$STATIC
                                    • API String ID: 2862500452-2488410787
                                    • Opcode ID: ef69a45fb9a8d98a3e7d4beaa163ba7c94590803dc5b94dc991fefc783aab643
                                    • Instruction ID: 24b147bc9a002fea4a62b88368d981a48f0c15b8e85cb8378e8374e035e88a4e
                                    • Opcode Fuzzy Hash: ef69a45fb9a8d98a3e7d4beaa163ba7c94590803dc5b94dc991fefc783aab643
                                    • Instruction Fuzzy Hash: CBE14CB19083018BD714EF3AD54131BBAE5AF84344F01C93FE989A73A1DB78D8519B8B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 615 402cb0-402ccd 616 402d50-402d8e FindResourceExA 615->616 617 402cd3-402cd6 615->617 620 402d94-402dab LoadResource 616->620 621 402e39-402e4c SetLastError 616->621 618 402d10-402d18 617->618 619 402cd8 617->619 622 402d33-402d41 call 402920 618->622 623 402d1a 618->623 625 402cf5-402cf6 619->625 626 402cda-402cdd 619->626 624 402e00-402e08 atoi 620->624 627 402dad-402dbc LockResource 620->627 621->624 637 402d46-402d4d 622->637 628 402d1e-402d21 call 402920 623->628 630 402e12-402e25 call 402920 624->630 633 402ce8-402cf4 625->633 634 402cf8-402d00 625->634 626->630 631 402ce3 626->631 627->624 632 402dbe 627->632 641 402d26-402d32 628->641 630->634 644 402e2b-402e2e 630->644 638 402ce6 631->638 639 402dc0-402dca 632->639 634->633 640 402d02-402d0e 634->640 637->638 638->623 638->633 639->639 643 402dcc-402dd4 639->643 640->628 643->624 645 402dd6-402ddd 643->645 644->633 646 402e34 644->646 645->624 647 402ddf-402dfd fprintf 645->647 646->634 647->624
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockatoifprintf
                                    • String ID: Resource %d:%s$`O@
                                    • API String ID: 2193512306-2494596910
                                    • Opcode ID: d2c659763aea7fa65e5a142a8afab7499bcdc8dbce1d9b0d6845306160327ef1
                                    • Instruction ID: 0e451c3d1c8705976eb6372eae49d11802872584f9afc5ab120ed64a9f793ad4
                                    • Opcode Fuzzy Hash: d2c659763aea7fa65e5a142a8afab7499bcdc8dbce1d9b0d6845306160327ef1
                                    • Instruction Fuzzy Hash: 1C4151709083059BDB149F29D68426EBBE1EF84300F14847FD885B73D0D6B8DD519B8A

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: _setmode$ExceptionExitFilterProcessUnhandled__getmainargs__p__environ__p__fmode_cexit
                                    • String ID:
                                    • API String ID: 3695137517-0
                                    • Opcode ID: 60854d5bb89194ddad18fca627b3fed1a2910dcd429b76d8ba96fdf7a2bac1dc
                                    • Instruction ID: 9b036dcc62e5206002a8964a93b809c6819fe7ae1a2a78e05521c6610f765c41
                                    • Opcode Fuzzy Hash: 60854d5bb89194ddad18fca627b3fed1a2910dcd429b76d8ba96fdf7a2bac1dc
                                    • Instruction Fuzzy Hash: 34212AB4A053048FC704FF65D58161ABBF5BF88344F01C93EE895A73A6DB389850CB5A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 115 405390-40545e call 406c70 memset * 4 FindResourceExA 118 405464-40547b LoadResource 115->118 119 405a9e-405ab1 SetLastError 115->119 120 4054cd-405517 FindResourceExA 118->120 121 40547d-40548c LockResource 118->121 122 405ab9-405ad3 strcat strlen 119->122 124 405a83-405a96 SetLastError 120->124 125 40551d-405533 LoadResource 120->125 121->120 123 40548e 121->123 126 405ad8-405add 122->126 127 405490-40549a 123->127 124->119 128 405535-405544 LockResource 125->128 129 405597-4055c4 FindResourceExA 125->129 136 405ae9-405b0b strcat strlen 126->136 127->127 132 40549c-4054a4 127->132 128->129 133 405546-405549 128->133 130 4058e6-4058f9 SetLastError 129->130 131 4055ca-4055e1 LoadResource 129->131 134 4058fc-4058fe 130->134 131->134 135 4055e7-4055f6 LockResource 131->135 132->120 137 4054a6-4054ad 132->137 138 405550-40555e 133->138 139 405900-405942 strlen strcat strlen 134->139 140 40595b-4059a9 strlen strncat strlen 134->140 135->134 141 4055fc-4055fe 135->141 136->126 137->120 142 4054af-4054c8 fprintf 137->142 138->138 143 405560-405568 138->143 144 405947-40595a 139->144 146 4059b7-4059d9 strcat strlen 140->146 147 4059ab-4059b0 140->147 145 405600-40560d 141->145 142->120 143->129 148 40556a-405571 143->148 145->145 150 40560f-405617 145->150 146->144 147->146 148->129 149 405573-405592 fprintf 148->149 149->129 151 405626-405653 FindResourceExA 150->151 152 405619-405620 150->152 154 405a39-405a4c SetLastError 151->154 155 405659-405670 LoadResource 151->155 152->151 153 405b0d-405b30 fprintf 152->153 153->151 157 405a4f-405a56 154->157 156 405676-405685 LockResource 155->156 155->157 156->157 158 40568b 156->158 159 4056b4-405713 call 403100 strlen 157->159 160 405a5c-405a7e fwrite 157->160 162 40568d-40569b 158->162 159->122 165 405719-405720 159->165 160->159 162->162 164 40569d-4056a5 162->164 164->159 166 4056a7-4056ae 164->166 165->136 167 405726-405741 strtok 165->167 166->159 168 405b35-405b59 fprintf 166->168 169 405897-4058e5 strlen * 2 strcat 167->169 170 405747-405749 167->170 168->159 171 405750-405757 170->171 172 40575d-405770 strpbrk 171->172 173 4059de-405a06 fprintf strpbrk 171->173 174 405776-40578b strrchr 172->174 175 405a0c-405a34 strcat strlen 172->175 173->174 173->175 176 405792-4057d2 strncpy _findfirst 174->176 177 40578d-40578f 174->177 178 405878-405891 strtok 175->178 179 405870-405873 _findclose 176->179 180 4057d8-4057de 176->180 177->176 178->169 178->171 179->178 181 4057f6-405837 strcpy strcat strlen 180->181 182 4057e0-4057f4 _findnext 181->182 183 405839-405868 fprintf _findnext 181->183 182->179 182->181 183->181 184 40586a 183->184 184->179
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$strlen$strcat$ErrorFindLastLoadLockfprintfmemset$_findnextstrpbrkstrtok$_findclose_findfirstfwritestrcpystrncatstrncpystrrchr
                                    • String ID: " :%s$-Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher$-cla$-jar$-jar$Add classpath:%s$Resource %d:%s$org.develnext.jphp.ext.javafx.FXLauncher$sspa$th "$true
                                    • API String ID: 689643918-1453997902
                                    • Opcode ID: f3cc387d6fe282e7dd2616dd62daa608cb237d8618ec9fd67493d2c34684ebff
                                    • Instruction ID: 45e07854ae54010095be9281c7dcb4a820f195fbc1c947dc7b9175b2af9540e9
                                    • Opcode Fuzzy Hash: f3cc387d6fe282e7dd2616dd62daa608cb237d8618ec9fd67493d2c34684ebff
                                    • Instruction Fuzzy Hash: AE1261B09087018BD710AF29C54065BBBE5EF94304F0589BFE8C9AB391D77D8995CF8A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 185 404740-404794 FindResourceExA 186 40479a-4047b1 LoadResource 185->186 187 404c7b-404c8b SetLastError 185->187 188 404810-404859 FindResourceExA 186->188 189 4047b3-4047c2 LockResource 186->189 193 404c93-404ca6 SetLastError 187->193 190 404cae-404cc1 SetLastError 188->190 191 40485f-404876 LoadResource 188->191 189->188 192 4047c4-4047c9 189->192 197 404cc9-404ce0 call 402cb0 190->197 194 4048e0-4048f7 strchr 191->194 195 404878-404887 LockResource 191->195 196 4047d0-4047da 192->196 193->190 199 4048f9-404907 strlen 194->199 200 40490d-40491d strcpy 194->200 195->194 198 404889-40488c 195->198 196->196 201 4047dc-4047e4 196->201 211 404ce6-404cee 197->211 212 404f7d-404f92 call 402cb0 197->212 203 404890-40489d 198->203 199->200 204 404afc-404b4c strncpy strlen strcat 199->204 205 404922-404950 FindResourceExA 200->205 201->188 206 4047e6-4047ed 201->206 203->203 209 40489f-4048a7 203->209 204->205 205->193 210 404956-40496c LoadResource 205->210 206->188 207 4047ef-40480d fprintf 206->207 207->188 209->194 213 4048a9-4048b0 209->213 214 4049e0-4049f7 strchr 210->214 215 40496e-40497d LockResource 210->215 217 404cf4-404d10 strcpy 211->217 218 404a39-404a53 call 403d20 211->218 237 404f97-404fae call 402cb0 212->237 213->194 221 4048b2-4048d9 fprintf 213->221 219 4049f9-404a07 strlen 214->219 220 404a0d-404a1d strcpy 214->220 215->214 222 40497f-404981 215->222 225 404a55-404a5f 217->225 226 404d16-404d22 217->226 218->225 239 404a97-404aa6 call 4042b0 218->239 219->220 227 404aa7-404af7 strncpy strlen strcat 219->227 228 404a22-404a2a 220->228 221->194 223 404990-40499d 222->223 223->223 230 40499f-4049a7 223->230 231 404d24 226->231 232 404d29-404d47 fprintf 226->232 227->228 233 404a60-404a6d call 403d20 228->233 234 404a2c-404a33 228->234 230->214 236 4049a9-4049b0 230->236 231->232 232->225 246 404a72-404a74 233->246 234->218 238 404b51-404b8f FindResourceExA 234->238 236->214 241 4049b2-4049d9 fprintf 236->241 254 404fb4-404fc0 237->254 255 404e97-404e9f 237->255 244 404f33-404f43 SetLastError 238->244 245 404b95-404bac LoadResource 238->245 241->214 257 404f4b-404f5b call 402cb0 244->257 250 404bea-404bfa atoi 245->250 251 404bae-404bbd LockResource 245->251 246->225 247 404a76-404a84 246->247 252 404a8a-404a95 247->252 253 404d7e-404dbb FindResourceExA 247->253 258 404c00-404c18 call 402cb0 250->258 259 404d4c-404d63 call 402cb0 250->259 251->250 256 404bbf-404bc1 251->256 252->225 252->239 264 404dc1-404dd8 LoadResource 253->264 265 404fc9-404fd9 SetLastError 253->265 254->265 255->252 260 404ea5-404ec1 strcpy 255->260 262 404bd0-404bda 256->262 274 404f60-404f62 257->274 278 404c1a-404c2a call 402cb0 258->278 279 404c2f-404c37 258->279 259->279 283 404d69-404d75 259->283 270 404ec3-404ecf 260->270 271 404ef4-404efb 260->271 262->262 273 404bdc-404be4 262->273 267 404e10-404e20 atoi 264->267 268 404dda-404de9 LockResource 264->268 285 404fe1-404fff fprintf 265->285 267->257 282 404e26-404e3e call 402cb0 267->282 268->267 277 404deb 268->277 280 404ed1 270->280 281 404ed6-404eef fprintf 270->281 284 404f03-404f0a 271->284 273->250 273->284 275 404e55-404e5d 274->275 276 404f68-404f74 274->276 275->260 291 404e5f-404e62 275->291 276->212 286 404ded-404df7 277->286 278->279 279->217 288 404c3d-404c40 279->288 280->281 281->271 282->275 298 404e40-404e50 call 402cb0 282->298 283->253 284->250 290 404f10-404f2e fprintf 284->290 285->267 286->286 292 404df9-404e01 286->292 288->197 293 404c46-404c5e call 402cb0 288->293 290->250 291->237 295 404e68-404e80 call 402cb0 291->295 292->267 296 404e03-404e0a 292->296 293->211 304 404c64-404c79 call 402cb0 293->304 295->255 303 404e82-404e92 call 402cb0 295->303 296->267 296->285 298->275 303->255 304->211
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLock$fprintf$ErrorLaststrchrstrcpystrlen
                                    • String ID: 1.8.0$1.8.0$1.8.0_381$C:\Program Files (x86)\Java\jre-1.8$C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$Resource %d:%s$Runtime used:%s (%s-bit)$true
                                    • API String ID: 1095060389-3579399910
                                    • Opcode ID: f6b770761259c2e060e376a2df3e08878bd46d2002b65d4fedf3764ae1e6227b
                                    • Instruction ID: 877def55760d6699fa8b0a675f498fd38e355f95ffd6f34839a3e279e3ce58b8
                                    • Opcode Fuzzy Hash: f6b770761259c2e060e376a2df3e08878bd46d2002b65d4fedf3764ae1e6227b
                                    • Instruction Fuzzy Hash: 70225DB4A083019BD700AF65D64435FBBE1AB84344F01C87FE989AB3C2D77C9955DB8A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 393 402920-402944 394 402970-4029a2 RegOpenKeyExA 393->394 395 402946-402954 393->395 398 4029a4-4029ab 394->398 399 4029ac-402a16 memset * 3 394->399 396 402956 395->396 397 40295b-40296b fprintf 395->397 396->397 397->394 400 402a4f-402aa3 RegEnumKeyExA 399->400 401 402aa9-402ac5 strcpy strlen 400->401 402 402c8b-402ca3 RegCloseKey 400->402 403 402ac7 401->403 404 402acd-402ae6 strcat 401->404 403->404 405 402bf0-402c05 fprintf 404->405 406 402aec-402b05 strchr 404->406 407 402b07-402b15 strlen 406->407 408 402b1b-402b2e strcpy 406->408 407->408 409 402c30-402c86 strncpy strlen strcat 407->409 410 402b33-402b4c strcmp 408->410 409->410 411 402b52-402b59 410->411 412 402a37-402a3e 410->412 413 402a18-402a31 strcmp 411->413 414 402b5f-402b78 strcmp 411->414 415 402c10-402c1f 412->415 416 402a44-402a49 412->416 413->412 413->414 414->412 418 402b7e-402b8b call 4027a0 414->418 417 402c23-402c2b fprintf 415->417 416->400 420 402b90-402b92 418->420 420->412 421 402b98-402bd0 strcpy * 2 420->421 421->416 422 402bd6-402be9 421->422 422->417
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strcpy$memsetstrcmpstrlen$fprintfstrcat$EnumOpenstrchrstrncpy
                                    • String ID: %s-bit search:%s...$1.8.0$1.8.0_381$Check:%s$Ignore:%s$Match:%s$SOFTWARE\JavaSoft\Java Runtime Environment\1.8.0_381
                                    • API String ID: 972160396-2880201714
                                    • Opcode ID: dea267d38a76d0ea903f176a95922dc6f8066b72660dfeb9114f6276e47ced82
                                    • Instruction ID: 9a2c2f7deab8620c59848cd1e9c546dad7476eac0264ac07e1180a0b30e31d97
                                    • Opcode Fuzzy Hash: dea267d38a76d0ea903f176a95922dc6f8066b72660dfeb9114f6276e47ced82
                                    • Instruction Fuzzy Hash: 25A12AB49087149BC711EF25C98429EFBF5AF84704F0188BFE489A7391D7789A858F86

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 423 403d20-403d7d call 406c70 memset FindResourceExA 426 403e91-403ea9 SetLastError 423->426 427 403d83-403d9a LoadResource 423->427 428 403eb0-403eb9 426->428 427->428 429 403da0-403daf LockResource 427->429 429->428 430 403db5-403db9 429->430 431 403dc0-403dca 430->431 431->431 432 403dcc-403dd4 431->432 433 403de3-403e1e memset call 403100 432->433 434 403dd6-403ddd 432->434 438 403fc4-403fd4 fprintf 433->438 439 403e24-403e2b 433->439 434->433 436 403fde-403ffc fprintf 434->436 436->433 438->436 440 403e3a-403e45 strcpy 439->440 441 403e2d-403e34 439->441 443 403e4a-403e51 call 402690 440->443 441->440 442 403f77-403fa1 strncpy strlen 441->442 445 403fa3-403fa8 442->445 446 403faf-403fbf strcat 442->446 447 403e56-403e58 443->447 445->446 446->443 447->428 448 403e5a-403e62 447->448 449 403e64 448->449 450 403eba-403efb FindResourceExA 448->450 451 403e69-403e90 strcpy 449->451 452 404001-404017 SetLastError 450->452 453 403f01-403f18 LoadResource 450->453 454 403f50-403f6c 452->454 453->454 455 403f1a-403f29 LockResource 453->455 454->451 457 403f72 454->457 455->454 456 403f2b 455->456 458 403f2d-403f37 456->458 457->442 458->458 459 403f39-403f41 458->459 459->454 460 403f43-403f4a 459->460 460->454 461 40401c-40403a fprintf 460->461 461->454
                                    APIs
                                    • memset.MSVCRT ref: 00403D50
                                    • FindResourceExA.KERNEL32(00000003,00412360,?), ref: 00403D73
                                    • LoadResource.KERNEL32(?,?,?,00404A72), ref: 00403D90
                                    • LockResource.KERNEL32(?,?,?,?,?,00404A72), ref: 00403DA3
                                    • memset.MSVCRT ref: 00403DFB
                                    • strcpy.MSVCRT ref: 00403E45
                                    • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00404A72), ref: 00403E7F
                                    • SetLastError.KERNEL32(?,?,?,00404A72), ref: 00403E98
                                    • FindResourceExA.KERNEL32 ref: 00403EF1
                                    • LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00404A72), ref: 00403F0E
                                    • LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00404A72), ref: 00403F1D
                                    • strncpy.MSVCRT ref: 00403F89
                                    • strlen.MSVCRT ref: 00403F95
                                    • strcat.MSVCRT ref: 00403FBA
                                    • fprintf.MSVCRT ref: 00403FD4
                                    • fprintf.MSVCRT ref: 00403FF7
                                    • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00404A72), ref: 00404008
                                    • fprintf.MSVCRT ref: 00404035
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$fprintf$ErrorFindLastLoadLockmemsetstrcpy$strcatstrlenstrncpy
                                    • String ID: :$Bundled JRE:%s$C:\Program Files (x86)\Java\jre-1.8$C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$Resource %d:%s$\$true
                                    • API String ID: 1825146110-3456947707
                                    • Opcode ID: 3fddfb02c48c50c2158d36c8c973bd121e6bc0de472b92549c6627d4258191eb
                                    • Instruction ID: a351f2335a7c1ffd526f9bc51b8a145b2b5fd6ff43207c8f2e401759d570546c
                                    • Opcode Fuzzy Hash: 3fddfb02c48c50c2158d36c8c973bd121e6bc0de472b92549c6627d4258191eb
                                    • Instruction Fuzzy Hash: 178160B09083019BD710AF29D54035ABFE9EF84344F05C87FE989AB3D1DB7C99558B8A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 462 403790-4037cc FindResourceExA 463 4037d2-4037e9 LoadResource 462->463 464 4039b4-4039c6 SetLastError 462->464 465 40383a-40389f memset strlen strncpy strlen _open 463->465 466 4037eb-4037fa LockResource 463->466 467 4039ce-4039ec fprintf 464->467 468 4038a5-4038ac 465->468 469 403976-40397d 465->469 466->465 470 4037fc-4037fe 466->470 471 403826-403834 strlen 467->471 472 4038b2-4038f4 strlen _read 468->472 473 40399a-4039af fprintf 468->473 474 403800-40380d 470->474 471->465 475 403944-40394f 472->475 476 4038f6-4038f9 472->476 473->472 474->474 477 40380f-403817 474->477 478 403951-403955 475->478 479 403968-403971 _close 475->479 480 403900-403906 476->480 477->471 481 403819-403820 477->481 478->479 482 403957-403962 strlen 478->482 479->469 483 403990-403998 480->483 484 40390c-40391c 480->484 481->467 481->471 482->479 487 403940-403942 483->487 485 403980-403988 484->485 486 40391e-40392c 484->486 485->487 489 40398a-40398c 485->489 486->487 488 40392e-403932 486->488 487->475 487->480 488->487 490 403934 488->490 491 403937-403939 489->491 490->491 491->487
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strlen$Resource$ErrorFindLastLoadLock_close_open_readmemsetstrncpy
                                    • String ID: Loading:%s$Resource %d:%s$ini
                                    • API String ID: 3498103655-913749543
                                    • Opcode ID: 1aeefc6938f78fb95fdeba6918e8ca31fde1e41f92e779772340ee2ce77c709b
                                    • Instruction ID: ffe5270cda513766b45dd1113f6f5d5a6076afea4e1b231d249c2800047aef03
                                    • Opcode Fuzzy Hash: 1aeefc6938f78fb95fdeba6918e8ca31fde1e41f92e779772340ee2ce77c709b
                                    • Instruction Fuzzy Hash: 4E6181B59083118BDB10AF29C58035EBFE5AF44344F05847FE9C9A7382D7789A51CB8A

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 0040689C
                                    • memset.MSVCRT ref: 004068BD
                                    • strcat.MSVCRT ref: 004068DA
                                    • strlen.MSVCRT ref: 004068E2
                                    • strcat.MSVCRT ref: 004068FE
                                    • CreateProcessA.KERNEL32 ref: 00406941
                                    • WaitForSingleObject.KERNEL32(?,?,?,?,?,0040A01C,00000001,00000000,?,0040151F), ref: 00406994
                                    • GetExitCodeProcess.KERNEL32 ref: 004069AC
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,0040A01C,00000001,00000000,?,0040151F), ref: 004069BD
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,0040A01C,00000001,00000000,?,0040151F), ref: 004069CE
                                    Strings
                                    • -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher, xrefs: 004068F2
                                    • D, xrefs: 004068A1
                                    • C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe, xrefs: 004068C7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcessmemsetstrcat$CodeCreateExitObjectSingleWaitstrlen
                                    • String ID: -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher$C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$D
                                    • API String ID: 196992964-638251383
                                    • Opcode ID: 925ee4bed1523179cba05dbda226f6a8605d2966789c7c8ca7956b0a3c785639
                                    • Instruction ID: c9cdd45e2a5c81e006214db6be6d40eb90bac674d27234413dd11b55ebfa4603
                                    • Opcode Fuzzy Hash: 925ee4bed1523179cba05dbda226f6a8605d2966789c7c8ca7956b0a3c785639
                                    • Instruction Fuzzy Hash: EF4129B19083009BD700EF69D58064EFBF0FF84310F02897EE599AB391D7789965CB8A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 500 402690-4026c7 memset 501 402708-40271c strcpy 500->501 502 4026c9-4026d0 500->502 505 402776-402783 strlen 501->505 506 40271e-40272b strlen 501->506 503 4026d2-4026d9 502->503 504 4026f9-402707 502->504 507 4026e0-4026f4 fprintf 503->507 508 4026db 503->508 511 402785 505->511 512 40278b-402794 505->512 509 402733-402738 506->509 510 40272d 506->510 507->504 508->507 513 40273c-40275c strcat _stat 509->513 510->509 511->512 512->513 513->502 514 402762-402771 SetLastError 513->514 514->502
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strlen$ErrorLast_statfprintfmemsetstrcatstrcpy
                                    • String ID: (OK)$(not found)$Check launcher:%s %s$bin\java.exe$bin\javaw.exe
                                    • API String ID: 1479257852-1030199565
                                    • Opcode ID: 045868294d0a7ed06c315ae385c8820c2325015fc6260560a2149f7d46a293a6
                                    • Instruction ID: e8944f1a8106916e4475c21f7cef91e4a366f81d5ed1b62317d4ded5b41b0450
                                    • Opcode Fuzzy Hash: 045868294d0a7ed06c315ae385c8820c2325015fc6260560a2149f7d46a293a6
                                    • Instruction Fuzzy Hash: A63191B4908705DFD710AF65C58421EBBE0AF44304F16887FE888BB3D1D7B88941CB8A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 515 4027a0-402812 memset RegOpenKeyExA 516 402830-402892 memset RegQueryValueExA 515->516 517 402814-402819 515->517 519 402894-402899 516->519 520 4028ed-402900 RegCloseKey 516->520 518 40281f-402828 517->518 522 4028a0-4028b2 519->522 520->517 521 402906-402916 strcpy 520->521 521->518 522->522 523 4028b4-4028bb 522->523 524 4028e3-4028e6 call 402690 523->524 525 4028bd-4028ca strlen 523->525 529 4028eb 524->529 527 4028d2-4028de strcat 525->527 528 4028cc 525->528 527->524 528->527 529->520
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: memset$CloseOpenQueryValuestrcatstrcpystrlen
                                    • String ID: C:\Program Files (x86)\Java\jre-1.8$JavaHome$jre
                                    • API String ID: 2991842512-781186548
                                    • Opcode ID: bbda5aac9f1fbed216a375d1f50ad02967d02f9e0ca73d0a26f9d6527b4fb1ea
                                    • Instruction ID: f9c37e86e1fa10c1b6e9cf4516faf301a59072f01b137ca7bee1a517f153a641
                                    • Opcode Fuzzy Hash: bbda5aac9f1fbed216a375d1f50ad02967d02f9e0ca73d0a26f9d6527b4fb1ea
                                    • Instruction Fuzzy Hash: 7A4152B5D047159BD710EF29C94425ABBE0EF84310F01C5BEE88DA7381D7789A84CF86

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 530 402829 531 402830-402892 memset RegQueryValueExA 530->531 532 402894-402899 531->532 533 4028ed-402900 RegCloseKey 531->533 536 4028a0-4028b2 532->536 534 402814-402819 533->534 535 402906-402916 strcpy 533->535 537 40281f-402828 534->537 535->537 536->536 538 4028b4-4028bb 536->538 539 4028e3-4028e6 call 402690 538->539 540 4028bd-4028ca strlen 538->540 544 4028eb 539->544 542 4028d2-4028de strcat 540->542 543 4028cc 540->543 542->539 543->542 544->533
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: CloseQueryValuememsetstrcatstrcpystrlen
                                    • String ID: C:\Program Files (x86)\Java\jre-1.8$JavaHome$jre
                                    • API String ID: 2049115317-781186548
                                    • Opcode ID: ec20f89f2d16415cbd2b41da4748407b3325ed6add80f57665febe99c4b464d0
                                    • Instruction ID: 0f7c0f34ce8200dd43c2f0bb0ff6e98dc681f3c32799e7a142d2370fabdcc0ea
                                    • Opcode Fuzzy Hash: ec20f89f2d16415cbd2b41da4748407b3325ed6add80f57665febe99c4b464d0
                                    • Instruction Fuzzy Hash: DB217F759087158AD710EF29C58439ABBE1EF84304F05C9BEE58967381D7789A84CB86

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 545 4013e9-401400 call 4021a0 549 401402-401415 strstr 545->549 550 40141b-401436 call 4021a0 545->550 549->550 551 40180d-401812 549->551 554 4015e9-4015f7 call 4021a0 550->554 555 40143c 550->555 551->550 557 401441-40144e 554->557 564 4015fd-401610 strstr 554->564 555->557 558 401450-401452 557->558 559 401458-4014c6 CreateWindowExA 557->559 558->559 561 4017e6-4017e8 558->561 562 40161b-401644 call 4020c0 559->562 563 4014cc-4014d4 559->563 566 4014d6-401504 SetTimer 561->566 567 4017ee 561->567 574 401646-401657 atoi 562->574 575 401668-401688 call 4021a0 562->575 563->566 569 40150a-401521 call 406860 563->569 564->557 565 401616 564->565 565->562 566->569 570 4013d5-4013da call 401ed0 566->570 573 4017f3-4017fa 567->573 569->570 582 401527-40152f 569->582 589 4013df-4013e6 570->589 578 401837-401859 fwrite 573->578 579 4017fc-401808 call 406830 call 401c10 573->579 580 40165d-401662 574->580 581 40193f-401944 574->581 592 4016a3-4016ee call 4021a0 LoadImageA 575->592 593 40168a-40169d strstr 575->593 578->579 579->589 580->575 581->575 586 401531-401539 582->586 587 40153f-401545 582->587 586->573 586->587 591 40155d-40157c GetMessageA 587->591 595 401547-40155a TranslateMessage DispatchMessageA 591->595 596 40157e-401586 591->596 592->570 605 4016f4-4017de SendMessageA GetWindowRect GetSystemMetrics * 2 SetWindowPos ShowWindow UpdateWindow 592->605 593->592 597 401949-40194e 593->597 595->591 600 4015b0-4015bc call 406830 596->600 601 401588-40158f 596->601 597->592 609 4015cc-4015d4 600->609 610 4015be-4015c6 600->610 601->600 604 401591-401599 601->604 604->600 607 40159b-4015ab fprintf 604->607 608 4017e1 605->608 607->600 608->561 611 401817-40182d fprintf 609->611 612 4015da-4015e4 call 401c10 609->612 610->608 610->609 611->578 612->589
                                    APIs
                                      • Part of subcall function 004021A0: FindResourceExA.KERNEL32 ref: 004021DD
                                      • Part of subcall function 004021A0: LoadResource.KERNEL32 ref: 004021FA
                                      • Part of subcall function 004021A0: LockResource.KERNEL32 ref: 00402209
                                      • Part of subcall function 004021A0: fprintf.MSVCRT ref: 00402253
                                    • strstr.MSVCRT ref: 0040140E
                                    • CreateWindowExA.USER32 ref: 004014B1
                                    • SetTimer.USER32 ref: 004014FA
                                    • TranslateMessage.USER32 ref: 0040154A
                                    • DispatchMessageA.USER32 ref: 00401555
                                    • GetMessageA.USER32 ref: 00401572
                                    • fprintf.MSVCRT ref: 004015AB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: MessageResource$fprintf$CreateDispatchFindLoadLockTimerTranslateWindowstrstr
                                    • String ID: --l4j-no-splash$Exit code:%d, restarting the application!$STATIC
                                    • API String ID: 2241055113-1185063601
                                    • Opcode ID: 33ac18716a739c8569af302160795fed5acb0a4af97f80bbe930cd5371412de7
                                    • Instruction ID: 67a90b80666c473e9742fa792ab923d60fcf46590e4eeb89ab99995b83f5f157
                                    • Opcode Fuzzy Hash: 33ac18716a739c8569af302160795fed5acb0a4af97f80bbe930cd5371412de7
                                    • Instruction Fuzzy Hash: 4F514B71A043058BD714DF2AD94035BB7F1ABC4300F15C83FE989AB3A0EB39C8519B8A

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: _setmode$ExitProcess__p__environ__p__fmode_cexit
                                    • String ID:
                                    • API String ID: 2747451157-0
                                    • Opcode ID: 55b44065cfc3671dcbda3173ad3e590a602a7e1e9e535e6ec2c50fd80800269a
                                    • Instruction ID: 6dd9965de3e649a4df042f89f412d9c8f3f420679e1b57de8b71a4d36494cbca
                                    • Opcode Fuzzy Hash: 55b44065cfc3671dcbda3173ad3e590a602a7e1e9e535e6ec2c50fd80800269a
                                    • Instruction Fuzzy Hash: CD1109746057108FC304FF25D9C181A77B1BF88304B12CA7EE986AB3A6C738D850DB4A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: CommandHandleInfoLineModuleStartup
                                    • String ID:
                                    • API String ID: 1628297973-0
                                    • Opcode ID: 426b7e169bc4001adf4ac2880b2c14a6d5950ebf415b9d4ab6f3d543cdd5321b
                                    • Instruction ID: ebf8bf4e4e20132a1a66f6807e23304a966a01df456f573df18988500c29227c
                                    • Opcode Fuzzy Hash: 426b7e169bc4001adf4ac2880b2c14a6d5950ebf415b9d4ab6f3d543cdd5321b
                                    • Instruction Fuzzy Hash: 00215CB67047154FEB147636C4A23AB7BE26F42344F8AC03BC583321C3D23C5AB59A06
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 661c79fa3b8ac9abb4e224266d4cded6d62ffdd14050f3927dba7b757e43ebb2
                                    • Instruction ID: f042ff4e9afc238231ba2f0a1a21a068439de561cfa6daf720de4363d65ecbf7
                                    • Opcode Fuzzy Hash: 661c79fa3b8ac9abb4e224266d4cded6d62ffdd14050f3927dba7b757e43ebb2
                                    • Instruction Fuzzy Hash: 23F0F4B1A047154BDB14AF39C09139BBBF2AF40348F86C43EC987732C2D37C99608A02
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: acdd093e482f5bde7bba130dde77f32350e70ae8059faee5c55a3686f59b36ed
                                    • Instruction ID: 3ce4b8eff68f737e1e19327138148219799e312e833f16ad5da121a4cd60d1db
                                    • Opcode Fuzzy Hash: acdd093e482f5bde7bba130dde77f32350e70ae8059faee5c55a3686f59b36ed
                                    • Instruction Fuzzy Hash: 1DF0A0B6A083244ADB04AF7AC18136AFFF1AF45358F45C47ED985626D2D27C8550CB52
                                    APIs
                                    • __set_app_type.MSVCRT ref: 0040129D
                                      • Part of subcall function 00401150: SetUnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?,?,004012A8), ref: 00401161
                                      • Part of subcall function 00401150: __getmainargs.MSVCRT ref: 0040119A
                                      • Part of subcall function 00401150: _setmode.MSVCRT ref: 004011D5
                                      • Part of subcall function 00401150: _setmode.MSVCRT ref: 004011FB
                                      • Part of subcall function 00401150: __p__fmode.MSVCRT ref: 00401200
                                      • Part of subcall function 00401150: __p__environ.MSVCRT ref: 00401215
                                      • Part of subcall function 00401150: _cexit.MSVCRT ref: 00401239
                                      • Part of subcall function 00401150: ExitProcess.KERNEL32 ref: 00401241
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: _setmode$ExceptionExitFilterProcessUnhandled__getmainargs__p__environ__p__fmode__set_app_type_cexit
                                    • String ID:
                                    • API String ID: 250851222-0
                                    • Opcode ID: f8f8779216d611a18a63dbf5b8c311eb09e190107aa71f1f2c959bcc01329ce4
                                    • Instruction ID: f3566ed841fe2c78bbec3e3585cf37c7a6b3b3915cdcc1304e07bfa49eda4ab5
                                    • Opcode Fuzzy Hash: f8f8779216d611a18a63dbf5b8c311eb09e190107aa71f1f2c959bcc01329ce4
                                    • Instruction Fuzzy Hash: F3C09B3041421497C3003FB5DC0E359BBA87B05305F41443CD5C967261D67839054796
                                    APIs
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,004013DA), ref: 00401ED7
                                    • puts.MSVCRT ref: 00401F11
                                    • ShellExecuteA.SHELL32 ref: 00401F5A
                                    • printf.MSVCRT ref: 00401F89
                                    • fclose.MSVCRT ref: 00401F93
                                    • MessageBoxA.USER32 ref: 00401FBF
                                    • FormatMessageA.KERNEL32(?,?,?,?,?,?,?,?,004013DA), ref: 00401FFD
                                    • strlen.MSVCRT ref: 0040201F
                                    • strcat.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004013DA), ref: 00402040
                                    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004013DA), ref: 0040204B
                                    • fprintf.MSVCRT ref: 0040206D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Message$ErrorExecuteFormatFreeLastLocalShellfclosefprintfprintfputsstrcatstrlen
                                    • String ID: An error occurred while starting the application.$Error msg:%s$Error:%s$Open URL:%s$open
                                    • API String ID: 1449747937-1100426463
                                    • Opcode ID: 1d01a69e9d7fb2250e9da01269d9a9a695086d462b34391a24b83a14a180ea29
                                    • Instruction ID: 2d12064388d49b1e09197d997951df6f1fa04ecba0d9f77cc5412a013d33004a
                                    • Opcode Fuzzy Hash: 1d01a69e9d7fb2250e9da01269d9a9a695086d462b34391a24b83a14a180ea29
                                    • Instruction Fuzzy Hash: 5041F1B0B083019BD704EF29D68525FBAE1BB84344F11C83FE589A7391D77C89559B8B
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockstrlen$strcat$ErrorLastfprintf
                                    • String ID: - $-bit$1.8.0$1.8.0$An error occurred while starting the application.$Resource %d:%s
                                    • API String ID: 484976878-253376002
                                    • Opcode ID: b992894269d4df67585a336ef44875f4a4d0f1fa0297b5c6ea2c178211651a31
                                    • Instruction ID: 34e31f97e9555f3506bafa7709ed99a0cf1f3aa383949e3ef6a0ea41d6191ac0
                                    • Opcode Fuzzy Hash: b992894269d4df67585a336ef44875f4a4d0f1fa0297b5c6ea2c178211651a31
                                    • Instruction Fuzzy Hash: 50B170B07183018BD704EF3AD64035ABAE1BB84344F05C93ED989E7391D77DC9658B9A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strcat$strncat$memsetstrchr$CurrentDirectoryEnvironmentVariablestrlenstrstr
                                    • String ID: C:\Program Files (x86)\Java\jre-1.8$C:\Users\user\Desktop$EXEDIR$EXEFILE$HKEY$JREHOMEDIR$OLDPWD$PWD$Substitute:%s = %s
                                    • API String ID: 3324974479-1786125850
                                    • Opcode ID: 6614e760f1d2ee19f4b253176852c44bfd1491407e5a90ce63a812219ddd9ebb
                                    • Instruction ID: ed202c75566bdcf25b9861d036979bf7c043f81e68319857b6959b64db836d4b
                                    • Opcode Fuzzy Hash: 6614e760f1d2ee19f4b253176852c44bfd1491407e5a90ce63a812219ddd9ebb
                                    • Instruction Fuzzy Hash: 80711C759043159BCB54DF25C88025ABBE5FF84314F41C8BEE98DA7381DB389E85CB8A
                                    APIs
                                    Strings
                                    • Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB, xrefs: 004036B0
                                    • Resource %d:%s, xrefs: 004034A3, 00403563
                                    • Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB, xrefs: 00403688
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockatoifprintfstrlen$ErrorLast_itoastrcat
                                    • String ID: Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB$Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB$Resource %d:%s
                                    • API String ID: 1284713559-335395982
                                    • Opcode ID: 49b52521ad4b28281b4610723bdc3fecec1105f7fc221ab9df715c009cf8496d
                                    • Instruction ID: 556c7044ae09a008ffae0a8d9fc69ada731a51744f4509117c473fc4c8ef08ad
                                    • Opcode Fuzzy Hash: 49b52521ad4b28281b4610723bdc3fecec1105f7fc221ab9df715c009cf8496d
                                    • Instruction Fuzzy Hash: CC916FB19083159BDB14EF69C58025FBBF5BF88304F05883EE889AB391D738D915CB86
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strstr$fprintfmemset$EnvironmentVariablefopenstrlenstrncpy
                                    • String ID: Version:%s$--l4j-debug$--l4j-debug-all$3.9$CmdLine:%s %s$debug$debug-all$j.lo$nch4
                                    • API String ID: 1991431792-3923029096
                                    • Opcode ID: a285fad08061a693a5248468f59be63a75b3341ece323a7797179705ea493636
                                    • Instruction ID: 60ffc86f505bfdbbbba3efb310094abc59b8358325a5033e9b193ab27e218064
                                    • Opcode Fuzzy Hash: a285fad08061a693a5248468f59be63a75b3341ece323a7797179705ea493636
                                    • Instruction Fuzzy Hash: AA411DB49083059BC710AF6AC58056EFBE5EF84754F01C83FE989AB391D738D851DB8A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$strcatstrlenstrstr$ErrorFindLastLoadLockmemsetstrchrstrcpy
                                    • String ID: --l4j-$-Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher$Resource %d:%s
                                    • API String ID: 782867121-649097702
                                    • Opcode ID: ac6294b31dbabfa38df6261dad10e70e22e75e7ae9a4ecf5308ff82ecc24c60d
                                    • Instruction ID: d40fd4806269129820aebf3143e2994a5f350a870bc7b93ef3ae692e42a163e9
                                    • Opcode Fuzzy Hash: ac6294b31dbabfa38df6261dad10e70e22e75e7ae9a4ecf5308ff82ecc24c60d
                                    • Instruction Fuzzy Hash: E6414DB0908B019AE714AF29C54432BBAE5EF45704F01C87FE589A73C2D73D88958F9B
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strstr$Open$CloseQueryValuestrchrstrrchr
                                    • String ID: HKEY$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS
                                    • API String ID: 356245303-4236897492
                                    • Opcode ID: 2f58436ba1d9a0b613b282f8eb25c1e7930d7951b9ec5870fe4d8ca9b2378fcc
                                    • Instruction ID: 2ae7df6790b6f1853f37995f78c893f74154cd1711da3b843cecc37fcb260c67
                                    • Opcode Fuzzy Hash: 2f58436ba1d9a0b613b282f8eb25c1e7930d7951b9ec5870fe4d8ca9b2378fcc
                                    • Instruction Fuzzy Hash: 2B414FB5D087069BDB00EF69C98425EFBE1BF84314F05883FE988A7381D77899448B96
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$fprintfmemset$CurrentDirectoryErrorFindLastLoadLock_chdirstrcatstrlenstrncpy
                                    • String ID: C:\Users\user\Desktop$Resource %d:%s$Working dir:%s
                                    • API String ID: 422477114-2404225895
                                    • Opcode ID: 9c9ccb99f420a877555200c07f2862f7891259c708e168cf86730445fea71b0e
                                    • Instruction ID: 349f221890d6d40fe71c0e96cafd37487ebf52b12bf3dfd57c186abffd885e97
                                    • Opcode Fuzzy Hash: 9c9ccb99f420a877555200c07f2862f7891259c708e168cf86730445fea71b0e
                                    • Instruction Fuzzy Hash: B1416BB19087119BE700AF29D58135EBFE4EF84344F01883EE989A7381D7389994CB8A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockatoifprintfstrcpy
                                    • String ID: 1.8.0$1.8.0_381$C:\Program Files (x86)\Java\jre-1.8$C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$Resource %d:%s$Runtime used:%s (%s-bit)
                                    • API String ID: 1856142485-2878787163
                                    • Opcode ID: 5bad5463ab02470c6f235011ec21a0e21543ba014425d0f3e3f6b6fee1eeea78
                                    • Instruction ID: 209fe916da85df5c911ae4276ce2f96064c2a1019c36ad74d5d97ab76ae223e1
                                    • Opcode Fuzzy Hash: 5bad5463ab02470c6f235011ec21a0e21543ba014425d0f3e3f6b6fee1eeea78
                                    • Instruction Fuzzy Hash: A8513AB0A083059BD704AF65D54436EBBE1ABC4304F01C87EE989AB3D2D77D9C919B4A
                                    APIs
                                    • memset.MSVCRT ref: 00405211
                                    • memset.MSVCRT ref: 00405228
                                    • FindResourceExA.KERNEL32(?,00000000,?), ref: 00405250
                                    • LoadResource.KERNEL32(?,?,?,00406514), ref: 0040526D
                                    • LockResource.KERNEL32(?,?,?,?,?,00406514), ref: 0040527C
                                    • fprintf.MSVCRT ref: 004052C8
                                    • SetEnvironmentVariableA.KERNEL32 ref: 004052EC
                                    • strtok.MSVCRT(?,?,?,?,00406514), ref: 004052FF
                                    • strchr.MSVCRT ref: 00405316
                                    • fprintf.MSVCRT ref: 0040535A
                                    • SetLastError.KERNEL32(?,?,?,00406514), ref: 00405373
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$fprintfmemset$EnvironmentErrorFindLastLoadLockVariablestrchrstrtok
                                    • String ID: Resource %d:%s$Set var:%s = %s
                                    • API String ID: 301265589-2172967655
                                    • Opcode ID: 269e6b674d12423d849caec9e5e778c3ff3d2c18b953fcfb33869b71bd7f8dc3
                                    • Instruction ID: afa5dd9bf5237a591f145b88366e3ef618c797e9271656589243b0a106b18b75
                                    • Opcode Fuzzy Hash: 269e6b674d12423d849caec9e5e778c3ff3d2c18b953fcfb33869b71bd7f8dc3
                                    • Instruction Fuzzy Hash: DA4138B0A087019BD710AF2AD58035FBBE4EF88340F41C87EE489A7391D738D9559F9A
                                    APIs
                                    Strings
                                    • C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe, xrefs: 004050F1
                                    • Error:%s, xrefs: 0040518B
                                    • appendToPathVar failed., xrefs: 00405186
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strlen$EnvironmentVariablememset$fprintfstrcatstrcpy
                                    • String ID: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$Error:%s$appendToPathVar failed.
                                    • API String ID: 495583820-2191414873
                                    • Opcode ID: 1bd0987b0e2fc78d473a59205c3eea85c459be8ceac31c8754d4a8f2c5af2878
                                    • Instruction ID: f6e45bb88e98a1b81569ded4109919bd0ed7862b498e3da174d31cb25c7df640
                                    • Opcode Fuzzy Hash: 1bd0987b0e2fc78d473a59205c3eea85c459be8ceac31c8754d4a8f2c5af2878
                                    • Instruction Fuzzy Hash: 232161B5A087109AD710AF2AD44016FBBE5EFC4704F42C43FE489AB391D73C88528B8A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$ErrorLastfprintf$CreateFindLoadLockMutexmemset
                                    • String ID: Error:%s$Instance already exists.$Resource %d:%s
                                    • API String ID: 1676011544-3441027790
                                    • Opcode ID: 5d703d892fcee4d035bb5678ce239c4aadbc0211198db526eb703aee52715d62
                                    • Instruction ID: 63ebb8a2186d1c087548a531fdd3118c811b0fdf88078b365d510e972c39d1b2
                                    • Opcode Fuzzy Hash: 5d703d892fcee4d035bb5678ce239c4aadbc0211198db526eb703aee52715d62
                                    • Instruction Fuzzy Hash: 7E414F70A083059BDB14EF39D58135ABBE4AB84344F00C87EE48EE73C1E678D9959F56
                                    APIs
                                    Strings
                                    • C:\Program Files (x86)\Java\jre-1.8, xrefs: 004041AC
                                    • Runtime used:%s (%s-bit), xrefs: 004041DF
                                    • C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe, xrefs: 004041A5
                                    • 1.8.0_381, xrefs: 004041DA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$fprintf$ErrorFindLastLoadLockatoistrcpy
                                    • String ID: 1.8.0_381$C:\Program Files (x86)\Java\jre-1.8$C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe$Runtime used:%s (%s-bit)
                                    • API String ID: 440416407-175693797
                                    • Opcode ID: bd0dd93339672a2f3fc852d7772f3d6f5c9daa2767713f90459c8e259a1bbb6b
                                    • Instruction ID: 5389436385b8e7cd97168d55a14ed6d8c30c170912d26635384efc32abc192e5
                                    • Opcode Fuzzy Hash: bd0dd93339672a2f3fc852d7772f3d6f5c9daa2767713f90459c8e259a1bbb6b
                                    • Instruction Fuzzy Hash: D3415CB0A043019BD714AF25D58436EBBE1ABC4304F05C87ED989AB3D2D77D9C918B4A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$atoi$ErrorFindLastLoadLockfprintf
                                    • String ID: Resource %d:%s
                                    • API String ID: 1405122715-3770364717
                                    • Opcode ID: 860e33d9464aaac1aaf4294ce0ce0efbf730c1f33b9003797695dbf45b4547a1
                                    • Instruction ID: 173d0b95324560bc3b63ac67752d65b29fca71815bb9e03dc755f331b579f335
                                    • Opcode Fuzzy Hash: 860e33d9464aaac1aaf4294ce0ce0efbf730c1f33b9003797695dbf45b4547a1
                                    • Instruction Fuzzy Hash: 5B21B2759083018BDB14EF3AD58076FBBE0AF84340F01883EE989A7391D73CD8658B96
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$ErrorFindLastLoadLockfprintf
                                    • String ID: Resource %d:%s$true
                                    • API String ID: 2300709556-1650570159
                                    • Opcode ID: 81dd6341af696f5ba0067316c7a2603a014bd5558d3fa65d953e464f06248ab3
                                    • Instruction ID: edd0d00bdcf57973877bd5b19408a799ab47b92a6fbc58d7c0a8dfc23e37736a
                                    • Opcode Fuzzy Hash: 81dd6341af696f5ba0067316c7a2603a014bd5558d3fa65d953e464f06248ab3
                                    • Instruction Fuzzy Hash: DA21FB72A083155BDB10AF79D54436BBBE4FF80350F05847FE989A73C0D639DA148B95
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: AddressCurrentHandleModuleProcProcessfprintf
                                    • String ID: IsWow64Process$WOW64:%s$yes
                                    • API String ID: 24026888-2072328098
                                    • Opcode ID: 79cba90a5c32919940d47014e4f11db2286ddd08fea7034ebff4aa08fe6649a9
                                    • Instruction ID: aea4bb79273e8d534990c21f24d6dc2711a2c6fda4608cbe9aad56ecb48cfa11
                                    • Opcode Fuzzy Hash: 79cba90a5c32919940d47014e4f11db2286ddd08fea7034ebff4aa08fe6649a9
                                    • Instruction Fuzzy Hash: 9001677060430597CB00BF75D58521B76E0AB84348F01C83ED5857B381D778DC25CB9A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: AddressCurrentHandleModuleProcProcessfprintf
                                    • String ID: IsWow64Process$WOW64:%s$yes
                                    • API String ID: 24026888-2072328098
                                    • Opcode ID: 0f449fa4e61134affe168ec5c855c7a0e9b7151d64be7ae9747b5a4d41c4c0fd
                                    • Instruction ID: a217be7bda152947c960663f56388daf3a3792abde6a83131336f65876ccd3cc
                                    • Opcode Fuzzy Hash: 0f449fa4e61134affe168ec5c855c7a0e9b7151d64be7ae9747b5a4d41c4c0fd
                                    • Instruction Fuzzy Hash: 52F03170A0830597DB00BF75D58511F7AE4AB84348F01C83ED985AB3D6EB78DC249B9A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strstr$ErrorLaststrcatstrchrstrcpystrlen
                                    • String ID: --l4j-$-Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher
                                    • API String ID: 1304447673-3764877108
                                    • Opcode ID: d165a1be7fc4b68c02de8a7e451452b4915db2d7301cae9c236fcca6c72a7ef8
                                    • Instruction ID: 56afbf9f269423abcfbc407513a566e97e7e4f5f61a7ec7fa9ea9c2cf9926f11
                                    • Opcode Fuzzy Hash: d165a1be7fc4b68c02de8a7e451452b4915db2d7301cae9c236fcca6c72a7ef8
                                    • Instruction Fuzzy Hash: 950109745087109AE710AF65C44436BBAE1EF44304F45887FD589B73C2D77D88518B8A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: KillMessagePostQuitTimer$CodeEnumExitProcessShowWindowWindows
                                    • String ID:
                                    • API String ID: 1905518172-0
                                    • Opcode ID: ed7f04139cc10e99910bf818abc7fe4566fa36b293454e2dcc1566a67e520c2f
                                    • Instruction ID: 4aa06db3ae75fa459c5dc857b340d842a3fba66811b007700aa9ab28a47e10bc
                                    • Opcode Fuzzy Hash: ed7f04139cc10e99910bf818abc7fe4566fa36b293454e2dcc1566a67e520c2f
                                    • Instruction Fuzzy Hash: 75216F71B053048BC714EF39EA4571A77E1AB80348F00853EE885A73A0D739E915DB9B
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$ErrorFindLastLoadLockfprintf
                                    • String ID: Resource %d:%s
                                    • API String ID: 2300709556-3770364717
                                    • Opcode ID: 5fdb7a8abfa6b102f5a50e062b281fc94a6f536b858fcc5aa029184cd9954bbf
                                    • Instruction ID: 7b4c6ba3150bb0ca76113f71d5647f24083859b2f22289e308b5470f49ef36ec
                                    • Opcode Fuzzy Hash: 5fdb7a8abfa6b102f5a50e062b281fc94a6f536b858fcc5aa029184cd9954bbf
                                    • Instruction Fuzzy Hash: D321C570A083018BDB00FF39DA8035ABBE4EF44344F00847FE989EB381D278D8558B86
                                    APIs
                                    Strings
                                    • Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB, xrefs: 00403688
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strlen$_itoafprintfstrcat
                                    • String ID: Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB
                                    • API String ID: 309510014-1709647519
                                    • Opcode ID: 4c106ecc713cc839283f90cd6b49804e0ebd0d678dfbdb3f99c2325a0ba98a86
                                    • Instruction ID: e9b7ccf47b61d8f8975171a80ab5ecc25053be3e66329a59218f8502b43fd955
                                    • Opcode Fuzzy Hash: 4c106ecc713cc839283f90cd6b49804e0ebd0d678dfbdb3f99c2325a0ba98a86
                                    • Instruction Fuzzy Hash: 2B1115B59083059FCB04DF59C08129EFBF2FF88300F12882EE899AB351C7389855CB86
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: fopenmemsetstrlenstrncpy
                                    • String ID: j.lo$nch4
                                    • API String ID: 80595551-1605737849
                                    • Opcode ID: 70a3b17f3908ebedc0b3180f6b19ea0b43561d51c620d0b91f5d0ff4da68ae63
                                    • Instruction ID: 17a981617f60ab97fca732e22f92d21c70fcd95c49624fe496cb553d8773ac1f
                                    • Opcode Fuzzy Hash: 70a3b17f3908ebedc0b3180f6b19ea0b43561d51c620d0b91f5d0ff4da68ae63
                                    • Instruction Fuzzy Hash: 0601E8B5D083049BC714AF25D48155AFBE0FF48314F42C86EA88D9B356D6389954CB96
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: signal
                                    • String ID:
                                    • API String ID: 1946981877-0
                                    • Opcode ID: dc29bf9aea78ba53ae1806de999a580e3e5e4b6085ce782c554fd26ddb7216e3
                                    • Instruction ID: 1bbb52622e8a19badba6bad6b28e715f43f04d6c83c205b25cbd975ffaf7a7a3
                                    • Opcode Fuzzy Hash: dc29bf9aea78ba53ae1806de999a580e3e5e4b6085ce782c554fd26ddb7216e3
                                    • Instruction Fuzzy Hash: 63312FB0A042408BD724AF69C58036EB6A0BF49354F16893FD9C5E77E1C6BECCD0974A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: EnvironmentVariablestrlen$memsetstrcat
                                    • String ID:
                                    • API String ID: 2108680700-0
                                    • Opcode ID: d95cb74e045f58805c42f9113675087c7de655c0657359ccab51889906dee4cd
                                    • Instruction ID: 19ba68cff2aee44dae23cc5b56ef49d50704ee26ecf9892f5ebb6658b324295f
                                    • Opcode Fuzzy Hash: d95cb74e045f58805c42f9113675087c7de655c0657359ccab51889906dee4cd
                                    • Instruction Fuzzy Hash: 9D1119B5D087149BCB00EF69C54105DFBF1EF88314F1284BEE888A7355DA385A518BC6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strcatstrlen
                                    • String ID: bin\java.exe$bin\javaw.exe
                                    • API String ID: 1179760717-2770878578
                                    • Opcode ID: b65ea48d9e9f20d7926c5458ddd7f93f7f40326ce165c218aab041ff87f19a90
                                    • Instruction ID: 7687c5f18350c46cbce8d6c5260ce5ab4989a23d013a9ddc911cfd2f41cc631c
                                    • Opcode Fuzzy Hash: b65ea48d9e9f20d7926c5458ddd7f93f7f40326ce165c218aab041ff87f19a90
                                    • Instruction Fuzzy Hash: 01F062B4D183049EE710AF39D9C9A1ABBD4AF00308F46487EE4895F3D3D77A8450879A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: fprintfstrcpy
                                    • String ID: 1.8.0_381$C:\Program Files (x86)\Java\jre-1.8$Runtime used:%s (%s-bit)
                                    • API String ID: 1458319006-1209485249
                                    • Opcode ID: 384320036ec86c7677915ca7cd64674f5bfe1fbe95e064327e76059add0c0678
                                    • Instruction ID: e570360796af71997f007bbec0ddf7bd71377d3d7eeb5d391251dbc393d587ea
                                    • Opcode Fuzzy Hash: 384320036ec86c7677915ca7cd64674f5bfe1fbe95e064327e76059add0c0678
                                    • Instruction Fuzzy Hash: CA3139719093019BD715AF24864839FB6A1EB80748F01C87FE8887B3C6D7BD9C419B8A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: fprintfstrcpy
                                    • String ID: 1.8.0_381$C:\Program Files (x86)\Java\jre-1.8$Runtime used:%s (%s-bit)
                                    • API String ID: 1458319006-1209485249
                                    • Opcode ID: e035c1c117aebe9e0d10ea843332a47cc9c32bea83d5b872931b4e891ef88464
                                    • Instruction ID: 2e410cda6b073cc25c187766190d21a1da9afde98849d5476af63c368e3af956
                                    • Opcode Fuzzy Hash: e035c1c117aebe9e0d10ea843332a47cc9c32bea83d5b872931b4e891ef88464
                                    • Instruction Fuzzy Hash: 602181719043059BD7149F15C64439BB7A5EB80348F01C87EE8887B3C6C7BD9C519B89
                                    APIs
                                    • SetEnvironmentVariableA.KERNEL32 ref: 004052EC
                                    • strtok.MSVCRT(?,?,?,?,00406514), ref: 004052FF
                                    • strchr.MSVCRT ref: 00405316
                                      • Part of subcall function 00403100: memset.MSVCRT ref: 00403136
                                      • Part of subcall function 00403100: memset.MSVCRT ref: 00403151
                                      • Part of subcall function 00403100: strchr.MSVCRT ref: 0040316C
                                      • Part of subcall function 00403100: strchr.MSVCRT ref: 0040318A
                                      • Part of subcall function 00403100: strncat.MSVCRT ref: 004031AF
                                      • Part of subcall function 00403100: strncat.MSVCRT ref: 004031D5
                                      • Part of subcall function 00403100: strlen.MSVCRT ref: 004031EB
                                      • Part of subcall function 00403100: strstr.MSVCRT ref: 0040327E
                                    • fprintf.MSVCRT ref: 0040535A
                                    • SetLastError.KERNEL32(?,?,?,00406514), ref: 00405373
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strchr$memsetstrncat$EnvironmentErrorLastVariablefprintfstrlenstrstrstrtok
                                    • String ID: Set var:%s = %s
                                    • API String ID: 3263537496-1184643595
                                    • Opcode ID: ee98d8c8936dcdd218bc3ae6b4bee14f3b7f662cf54e9fc7437ca12448ec09f5
                                    • Instruction ID: b35ccef8a7e5673246ed472a237be416f5c44ba05b5604b2d57a73e62d97e0d5
                                    • Opcode Fuzzy Hash: ee98d8c8936dcdd218bc3ae6b4bee14f3b7f662cf54e9fc7437ca12448ec09f5
                                    • Instruction Fuzzy Hash: FA01DAB05087109EC701AF2AC58031EBFE4AF88744F41C87FE4C8AB381D77889519F9A
                                    APIs
                                    • FormatMessageA.KERNEL32(?,?,?,?,?,?,?,?,004013DA), ref: 00401FFD
                                    • strlen.MSVCRT ref: 0040201F
                                    • strcat.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004013DA), ref: 00402040
                                    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004013DA), ref: 0040204B
                                    • fprintf.MSVCRT ref: 004020A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: FormatFreeLocalMessagefprintfstrcatstrlen
                                    • String ID: An error occurred while starting the application.
                                    • API String ID: 863393273-2110520379
                                    • Opcode ID: 9e24085052815f66a929547d79b0b0ecebc814cf3094997c733abd0dc5bb07b1
                                    • Instruction ID: 48929c70c90143ab4f29c9b601d13be01fb97ec1997cc056402bd9998a5ef999
                                    • Opcode Fuzzy Hash: 9e24085052815f66a929547d79b0b0ecebc814cf3094997c733abd0dc5bb07b1
                                    • Instruction Fuzzy Hash: 730116B0A083018BC300EF69C28025BBBF1BB84314F01886EE8C9A7245D77896548B8A
                                    APIs
                                    • memset.MSVCRT ref: 004012F4
                                      • Part of subcall function 004020C0: FindResourceExA.KERNEL32(?,?,?,00401888), ref: 004020EF
                                      • Part of subcall function 004020C0: LoadResource.KERNEL32 ref: 00402108
                                      • Part of subcall function 004020C0: LockResource.KERNEL32 ref: 00402117
                                    • FindWindowExA.USER32 ref: 0040132A
                                    • GetWindowTextA.USER32 ref: 00401350
                                    • strstr.MSVCRT ref: 0040135F
                                    • FindWindowExA.USER32 ref: 0040137F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: FindResourceWindow$LoadLockTextmemsetstrstr
                                    • String ID:
                                    • API String ID: 1871962372-0
                                    • Opcode ID: 1298e7c1909e02cac85a35fd553868d9f91c7302c22f4e1a6b2c68c72ce7dee5
                                    • Instruction ID: 5d52d5c0b459d14cb6f1974f7d56ade6fd7020e608e51b2663064d8790cfeea0
                                    • Opcode Fuzzy Hash: 1298e7c1909e02cac85a35fd553868d9f91c7302c22f4e1a6b2c68c72ce7dee5
                                    • Instruction Fuzzy Hash: 282160B2A083019BE714AF6AD54129FFBE4EF84354F01C83FE98CD3691E67885548B86
                                    APIs
                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00403717
                                      • Part of subcall function 004033F0: FindResourceExA.KERNEL32 ref: 00403440
                                      • Part of subcall function 004033F0: LoadResource.KERNEL32 ref: 0040345C
                                      • Part of subcall function 004033F0: LockResource.KERNEL32 ref: 0040346B
                                      • Part of subcall function 004033F0: fprintf.MSVCRT ref: 004034B3
                                      • Part of subcall function 004033F0: atoi.MSVCRT ref: 004034C3
                                      • Part of subcall function 004033F0: FindResourceExA.KERNEL32 ref: 004034FE
                                      • Part of subcall function 004033F0: LoadResource.KERNEL32 ref: 0040351B
                                      • Part of subcall function 004033F0: LockResource.KERNEL32 ref: 0040352A
                                      • Part of subcall function 004033F0: fprintf.MSVCRT ref: 00403573
                                      • Part of subcall function 004033F0: atoi.MSVCRT ref: 00403583
                                      • Part of subcall function 004033F0: strcat.MSVCRT(?), ref: 0040361A
                                      • Part of subcall function 004033F0: strlen.MSVCRT ref: 00403622
                                      • Part of subcall function 004033F0: _itoa.MSVCRT ref: 00403639
                                      • Part of subcall function 004033F0: strlen.MSVCRT ref: 00403641
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockatoifprintfstrlen$GlobalMemoryStatus_itoastrcat
                                    • String ID: -Xms$-Xmx$@
                                    • API String ID: 2157757142-2676391021
                                    • Opcode ID: dff8b46c210c447c65d657b453adb865e188cc97235aba00eb8c1e73047c40b0
                                    • Instruction ID: 0838842f76f9e4a7ac68c74f3cf3971a36c87926e8153908363a189b489a0147
                                    • Opcode Fuzzy Hash: dff8b46c210c447c65d657b453adb865e188cc97235aba00eb8c1e73047c40b0
                                    • Instruction Fuzzy Hash: 1D01D7B09097099FC704DF69E18154EBBF1EF88304F10883EF489A7385D738D9449B46
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: CodeEnumExitKillMessagePostProcessQuitTimerWindows
                                    • String ID:
                                    • API String ID: 405088690-0
                                    • Opcode ID: 9d36f53bfc2b48dcf375a5f439baa85ef358b269035d827499970f5c7433ee0c
                                    • Instruction ID: 4530f2aae7447fe0df29e6f37fc7dc1219e95ab942fdeb78a325eac38ac8bd41
                                    • Opcode Fuzzy Hash: 9d36f53bfc2b48dcf375a5f439baa85ef358b269035d827499970f5c7433ee0c
                                    • Instruction Fuzzy Hash: 87F05EB59093008BC300BF34DA052197AE0AB40348F018A3FE8C5A33D1D77C9558EB9B
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID: Laun$ch4j
                                    • API String ID: 4139908857-52159806
                                    • Opcode ID: ba5704b0daeddb5bd746fd9b5eed543a5f99ab6f6a48090e1268a62a4232c58d
                                    • Instruction ID: 3efb9f204aa9b6cf598ae448a7fd9fa3256bf58a8a3bede9923b47c04f3ea8c0
                                    • Opcode Fuzzy Hash: ba5704b0daeddb5bd746fd9b5eed543a5f99ab6f6a48090e1268a62a4232c58d
                                    • Instruction Fuzzy Hash: 30F01CB0A042058BD708EF3EEE053963AE2A784300F04C27ED409CB3B5EBB484618B8D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1359073088.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1359007891.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359113141.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359131273.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1359185315.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_nsHwyCkyFr.jbxd
                                    Similarity
                                    • API ID: strlen$strchrstrncpy
                                    • String ID:
                                    • API String ID: 4793283-0
                                    • Opcode ID: c717c3167b26713e1d36be612c62a11c9a96452fabd6d96aff045e23f77e9a9b
                                    • Instruction ID: 1041cfa0432d9ad742072a7b848d71ebc1d8de872eff087a6a568f2cbe167894
                                    • Opcode Fuzzy Hash: c717c3167b26713e1d36be612c62a11c9a96452fabd6d96aff045e23f77e9a9b
                                    • Instruction Fuzzy Hash: 0E11D3B8D04728ABCB009F55C5841AEFBB1EF48310F1684AAE8547B381C779AA41CBC6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2790000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df9a74ad1facb2b777f8e68bd3b9585c3abf0eb644f452b4bba2d5b088e3e4f1
                                    • Instruction ID: 0bfbd5a9a49c299b4852dc2af9806be3289ea4906125236fdcbff1d50b77e289
                                    • Opcode Fuzzy Hash: df9a74ad1facb2b777f8e68bd3b9585c3abf0eb644f452b4bba2d5b088e3e4f1
                                    • Instruction Fuzzy Hash: BB1149B681022A9FCF24CF48D8815ADB7B0FB99324F164525DD65A7741D3346920CF90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2790000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 673803d3c0d64bc346a69436ff40ff507c189774a9c81711587006cd83bdfd86
                                    • Instruction ID: 4651d1134710353c12cb836720a2d22951d7103964e7cd73c36b74e085d3fd60
                                    • Opcode Fuzzy Hash: 673803d3c0d64bc346a69436ff40ff507c189774a9c81711587006cd83bdfd86
                                    • Instruction Fuzzy Hash: A4118FB6D0022A8FCF24CF88D4865EDB7B0FB49324F164559DC64A7342D3346D61CB81
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2790000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b6657055d1cb97638c29c3afa1398fe00a75bf05f4923be127b3933239bc28b9
                                    • Instruction ID: ec65764643c41158d1422f4fbfe5db39b7f37606076f6fd3f4366767d357911e
                                    • Opcode Fuzzy Hash: b6657055d1cb97638c29c3afa1398fe00a75bf05f4923be127b3933239bc28b9
                                    • Instruction Fuzzy Hash: C3F0A576C0022ADB8F54DF48D4841ADBBB1FB45228B1A8596DC6977241D332AD62CF91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2792000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 36e9bd9c1b694fcc5e745f7907f82692276675359976f32f2426e15b88652bbb
                                    • Instruction ID: 5fc024cc2cf60923fdb107272c0ff4913bddf397b0526b27729e157439382342
                                    • Opcode Fuzzy Hash: 36e9bd9c1b694fcc5e745f7907f82692276675359976f32f2426e15b88652bbb
                                    • Instruction Fuzzy Hash: FEF079B6A04B16EBDB258F61C0047DAFBB4BB88718F15821AD92CA7350D778B4658BC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2792000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9a9b07b682c5e7f3f72a119ced51e2f77d7a8706903a2418a99b358167123f30
                                    • Instruction ID: 86ba84032e002e8549c00a2481cc8bbf5e98ad5523ec2247db105bede5d7300d
                                    • Opcode Fuzzy Hash: 9a9b07b682c5e7f3f72a119ced51e2f77d7a8706903a2418a99b358167123f30
                                    • Instruction Fuzzy Hash: 0FF0CAB6D00A1AABDB248F61C0047DAFBB4BB88714F19421AC52C67320D378B465CBC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2792000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e23f3f30023145bd5b9d8646c33d7ca644500e79b58848b01564098ff282c280
                                    • Instruction ID: c0b8479a2cb04cc779ac8e339e3553c60ca9f3a805ce52827253e148d0fa77eb
                                    • Opcode Fuzzy Hash: e23f3f30023145bd5b9d8646c33d7ca644500e79b58848b01564098ff282c280
                                    • Instruction Fuzzy Hash: 55F0CAB6D00A1AABDB248F61C0047DAFBB4BB88714F16421AC52CA7320D378B465CFC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2792000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: afa91ac4db3d6f83bac3115f81c4e251ef1b8cbca671593b6c4611de73c4515a
                                    • Instruction ID: 2f35c50c1039b3cef2c4b836632182ecd9c4134556e91ca93f5ae6d63f0ce4d5
                                    • Opcode Fuzzy Hash: afa91ac4db3d6f83bac3115f81c4e251ef1b8cbca671593b6c4611de73c4515a
                                    • Instruction Fuzzy Hash: D0F0CAB6D00A1AABDB248F65C0047DAFBB4BB88724F19421AC52C63320D3B8B465CBC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1364023394.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2790000_javaw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                    • Instruction ID: 6143f804da18813e045217a6b8ccf7ad278d9380312c89a78cf28a1d541bb54a
                                    • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                    • Instruction Fuzzy Hash: 742103BA5182568FEF358F199C403D9B7E5FB09314F21482EDEC9E7710D3306A898B90