Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PQ2.exe

Overview

General Information

Sample name:PQ2.exe
Analysis ID:1583199
MD5:77b621c8ae246da4619c8315c6996576
SHA1:43b19a006a6e8c864b33f63604c3d5b94b26a410
SHA256:0cb5c8e6987f74a213353851dc12b7b3a08130fd5ebb18f4455c659e8f46442f
Tags:Backdoorexemalwaretrojanuser-Joker
Infos:

Detection

Mimikatz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mimikatz
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Self deletion via cmd or bat file
Tries to delay execution (extensive OutputDebugStringW loop)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • PQ2.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\PQ2.exe" MD5: 77B621C8AE246DA4619C8315C6996576)
    • cmd.exe (PID: 7324 cmdline: C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 7404 cmdline: ping -n 2 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • Deuvw.exe (PID: 7300 cmdline: "C:\\Program Files\\Deuvw.exe" -auto MD5: 77B621C8AE246DA4619C8315C6996576)
    • Deuvw.exe (PID: 7332 cmdline: "C:\Program Files\Deuvw.exe" -acsi MD5: 77B621C8AE246DA4619C8315C6996576)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MimiKatzVaronis summarizes Mimikatz as an open-source application that allows users to view and save authentication credentials like Kerberos tickets. Benjamin Delpy continues to lead Mimikatz developments, so the toolset works with the current release of Windows and includes the most up-to-date attacks.Attackers commonly use Mimikatz to steal credentials and escalate privileges: in most cases, endpoint protection software and anti-virus systems will detect and delete it. Conversely, pentesters use Mimikatz to detect and exploit vulnerabilities in your networks so you can fix them.
  • APT32
  • Anunak
  • GALLIUM
https://malpedia.caad.fkie.fraunhofer.de/details/win.mimikatz
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
    00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Gh0st_ee6de6bcIdentifies a variant of Gh0st Ratunknown
    • 0xe0e:$a1: :]%d-%d-%d %d:%d:%d
    • 0xbd4:$a2: [Pause Break]
    • 0x24b14:$a3: f-secure.exe
    • 0x1158:$a4: Accept-Language: zh-cn
    • 0x11f1:$a4: Accept-Language: zh-cn
    • 0x1324:$a4: Accept-Language: zh-cn
    • 0x1467:$a4: Accept-Language: zh-cn
    • 0x16bc:$a4: Accept-Language: zh-cn
    00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
      00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Gh0st_ee6de6bcIdentifies a variant of Gh0st Ratunknown
      • 0xe0e:$a1: :]%d-%d-%d %d:%d:%d
      • 0xbd4:$a2: [Pause Break]
      • 0x24b14:$a3: f-secure.exe
      • 0x1158:$a4: Accept-Language: zh-cn
      • 0x11f1:$a4: Accept-Language: zh-cn
      • 0x1324:$a4: Accept-Language: zh-cn
      • 0x1467:$a4: Accept-Language: zh-cn
      • 0x16bc:$a4: Accept-Language: zh-cn
      00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        1.2.Deuvw.exe.100ff940.2.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
        • 0x7b12:$h1: Hid_State
        • 0x7b26:$h2: Hid_StealthMode
        • 0x7b46:$h3: Hid_HideFsDirs
        • 0x7b64:$h4: Hid_HideFsFiles
        • 0x7b84:$h5: Hid_HideRegKeys
        • 0x7ba4:$h6: Hid_HideRegValues
        • 0x7bc8:$h7: Hid_IgnoredImages
        • 0x7bec:$h8: Hid_ProtectedImages
        • 0xc42e:$s1: FLTMGR.SYS
        • 0xc9aa:$s2: HAL.dll
        • 0x954e:$s3: \SystemRoot\System32\csrss.exe
        • 0xad84:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
        • 0x258:$s5: INIT
        • 0xbe7e:$s6: \hidden-master\Debug\QAssist.pdb
        3.2.Deuvw.exe.100ff940.3.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
        • 0x7b12:$h1: Hid_State
        • 0x7b26:$h2: Hid_StealthMode
        • 0x7b46:$h3: Hid_HideFsDirs
        • 0x7b64:$h4: Hid_HideFsFiles
        • 0x7b84:$h5: Hid_HideRegKeys
        • 0x7ba4:$h6: Hid_HideRegValues
        • 0x7bc8:$h7: Hid_IgnoredImages
        • 0x7bec:$h8: Hid_ProtectedImages
        • 0xc42e:$s1: FLTMGR.SYS
        • 0xc9aa:$s2: HAL.dll
        • 0x954e:$s3: \SystemRoot\System32\csrss.exe
        • 0xad84:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
        • 0x258:$s5: INIT
        • 0xbe7e:$s6: \hidden-master\Debug\QAssist.pdb
        0.2.PQ2.exe.100ff940.3.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
        • 0x7b12:$h1: Hid_State
        • 0x7b26:$h2: Hid_StealthMode
        • 0x7b46:$h3: Hid_HideFsDirs
        • 0x7b64:$h4: Hid_HideFsFiles
        • 0x7b84:$h5: Hid_HideRegKeys
        • 0x7ba4:$h6: Hid_HideRegValues
        • 0x7bc8:$h7: Hid_IgnoredImages
        • 0x7bec:$h8: Hid_ProtectedImages
        • 0xc42e:$s1: FLTMGR.SYS
        • 0xc9aa:$s2: HAL.dll
        • 0x954e:$s3: \SystemRoot\System32\csrss.exe
        • 0xad84:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
        • 0x258:$s5: INIT
        • 0xbe7e:$s6: \hidden-master\Debug\QAssist.pdb
        1.2.Deuvw.exe.1010ef88.4.unpackGhostDragon_Gh0stRATDetects Gh0st RAT mentioned in Cylance\' Ghost Dragon ReportFlorian Roth
        • 0x110a8:$x4: Http/1.1 403 Forbidden
        • 0x110a8:$s5: Http/1.1 403 Forbidden
        1.2.Deuvw.exe.1010ef88.4.unpackMimikatz_StringsDetects Mimikatz stringsFlorian Roth
        • 0x1105f:$x1: sekurlsa::logonpasswords
        Click to see the 31 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-02T08:43:02.233971+010028420481Malware Command and Control Activity Detected192.168.2.54970438.6.164.15914994TCP
        2025-01-02T08:43:06.535380+010028420481Malware Command and Control Activity Detected192.168.2.54970438.6.164.15914994TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: PQ2.exeAvira: detected
        Source: C:\Program Files\Deuvw.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
        Source: C:\Program Files\Deuvw.exeReversingLabs: Detection: 84%
        Source: PQ2.exeReversingLabs: Detection: 84%
        Source: PQ2.exeVirustotal: Detection: 70%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
        Source: C:\Program Files\Deuvw.exeJoe Sandbox ML: detected
        Source: PQ2.exeJoe Sandbox ML: detected
        Source: PQ2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\PQ2.exeDirectory created: C:\Program Files\Deuvw.exeJump to behavior
        Source: Binary string: F:\hidden-master\x64\Debug\QAssist.pdb source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp
        Source: Binary string: F:\hidden-master\Debug\QAssist.pdb source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp
        Source: C:\Program Files\Deuvw.exeFile opened: z:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: x:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: v:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: t:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: r:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: p:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: n:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: l:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: j:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: h:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: f:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: b:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: y:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: w:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: u:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: s:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: q:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: o:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: m:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: k:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: i:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: g:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: e:Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: [:Jump to behavior

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2842048 - Severity 1 - ETPRO MALWARE Win32/Farfli.CTT CnC Activity : 192.168.2.5:49704 -> 38.6.164.159:14994
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 38.6.164.159:14994
        Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: hzh.0xox0xox0.com
        Source: global trafficDNS traffic detected: DNS query: ulai888.ydns.eu
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ptlogin2.qun.qq.com%s
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://qun.qq.com%s
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://localhost.ptlogin2.qq.com:4301%s
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ssl.ptlogin2.qq.com%s
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://xui.ptlogin2.qq.com/cgi-bin/xlogin?appid=715030901&daid=73&hide_close_icon=1&pt_no_auth=1&s_

        System Summary

        barindex
        Source: 1.2.Deuvw.exe.100ff940.2.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 3.2.Deuvw.exe.100ff940.3.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 0.2.PQ2.exe.100ff940.3.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 1.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 1.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 1.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 0.2.PQ2.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 0.2.PQ2.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 0.2.PQ2.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 3.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 3.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 3.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
        Source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
        Source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
        Source: 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies a variant of Gh0st Rat Author: unknown
        Source: 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies a variant of Gh0st Rat Author: unknown
        Source: 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies a variant of Gh0st Rat Author: unknown
        Source: Process Memory Space: PQ2.exe PID: 7280, type: MEMORYSTRMatched rule: Identifies a variant of Gh0st Rat Author: unknown
        Source: Process Memory Space: Deuvw.exe PID: 7300, type: MEMORYSTRMatched rule: Identifies a variant of Gh0st Rat Author: unknown
        Source: Process Memory Space: Deuvw.exe PID: 7332, type: MEMORYSTRMatched rule: Identifies a variant of Gh0st Rat Author: unknown
        Source: PQ2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 1.2.Deuvw.exe.100ff940.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 3.2.Deuvw.exe.100ff940.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 0.2.PQ2.exe.100ff940.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 1.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 0.2.PQ2.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.PQ2.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.PQ2.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 3.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.Deuvw.exe.1010ef88.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
        Source: 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23
        Source: 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23
        Source: 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23
        Source: Process Memory Space: PQ2.exe PID: 7280, type: MEMORYSTRMatched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23
        Source: Process Memory Space: Deuvw.exe PID: 7300, type: MEMORYSTRMatched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23
        Source: Process Memory Space: Deuvw.exe PID: 7332, type: MEMORYSTRMatched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23
        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/3@24/2
        Source: C:\Users\user\Desktop\PQ2.exeFile created: C:\Program Files\Deuvw.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7340:120:WilError_03
        Source: C:\Program Files\Deuvw.exeMutant created: \Sessions\1\BaseNamedObjects\ulai888.ydns.eu:14994
        Source: C:\Users\user\Desktop\PQ2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: PQ2.exeReversingLabs: Detection: 84%
        Source: PQ2.exeVirustotal: Detection: 70%
        Source: C:\Users\user\Desktop\PQ2.exeFile read: C:\Users\user\Desktop\PQ2.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\PQ2.exe "C:\Users\user\Desktop\PQ2.exe"
        Source: unknownProcess created: C:\Program Files\Deuvw.exe "C:\\Program Files\\Deuvw.exe" -auto
        Source: C:\Users\user\Desktop\PQ2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nul
        Source: C:\Program Files\Deuvw.exeProcess created: C:\Program Files\Deuvw.exe "C:\Program Files\Deuvw.exe" -acsi
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
        Source: C:\Users\user\Desktop\PQ2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nulJump to behavior
        Source: C:\Program Files\Deuvw.exeProcess created: C:\Program Files\Deuvw.exe "C:\Program Files\Deuvw.exe" -acsiJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1Jump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: devenum.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: msdmo.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: avicap32.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files\Deuvw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeDirectory created: C:\Program Files\Deuvw.exeJump to behavior
        Source: Binary string: F:\hidden-master\x64\Debug\QAssist.pdb source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp
        Source: Binary string: F:\hidden-master\Debug\QAssist.pdb source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\PQ2.exeCode function: 0_2_004670B7 LoadLibraryA,GetProcAddress,0_2_004670B7
        Source: initial sampleStatic PE information: section where entry point is pointing to: .data
        Source: Deuvw.exe.0.drStatic PE information: real checksum: 0x7f4b0 should be: 0x87fe3
        Source: PQ2.exeStatic PE information: real checksum: 0x7f4b0 should be: 0x87fe3
        Source: C:\Users\user\Desktop\PQ2.exeCode function: 0_2_00460132 push FFFFFFC7h; ret 0_2_00460155
        Source: C:\Users\user\Desktop\PQ2.exeCode function: 0_2_00469660 push eax; ret 0_2_0046968E
        Source: C:\Program Files\Deuvw.exeCode function: 1_2_00460132 push FFFFFFC7h; ret 1_2_00460155
        Source: C:\Program Files\Deuvw.exeCode function: 1_2_00469660 push eax; ret 1_2_0046968E
        Source: C:\Program Files\Deuvw.exeCode function: 3_2_00460132 push FFFFFFC7h; ret 3_2_00460155
        Source: C:\Program Files\Deuvw.exeCode function: 3_2_00469660 push eax; ret 3_2_0046968E
        Source: C:\Users\user\Desktop\PQ2.exeFile created: C:\Program Files\Deuvw.exeJump to dropped file
        Source: C:\Users\user\Desktop\PQ2.exeFile created: C:\Program Files\Deuvw.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\PQ2.exeProcess created: C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nul
        Source: C:\Users\user\Desktop\PQ2.exeProcess created: C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nulJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Deuvw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Deuvw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Program Files\Deuvw.exeFile opened: \Device\RasAcd count: 104733Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: \Device\Afd\Endpoint count: 43141Jump to behavior
        Source: C:\Program Files\Deuvw.exeFile opened: \Device\Afd\Endpoint count: 47984Jump to behavior
        Source: C:\Program Files\Deuvw.exeSection loaded: OutputDebugStringW count: 1936
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1Jump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7388Thread sleep count: 81 > 30Jump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7388Thread sleep time: -40500s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48928s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32391s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39436s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -86109s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31322s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30333s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -102188s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32662s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32757s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60212s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38528s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -54892s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31101s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48786s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32439s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31115s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31673s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38144s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39870s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43448s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31107s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30191s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64418s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32591s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56286s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61672s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48968s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41200s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -33038s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31556s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30303s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32609s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -65404s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30523s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30562s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40656s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56866s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -59738s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40284s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43762s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31998s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55784s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30510s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -62852s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -47514s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30932s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31329s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30145s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36120s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48417s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61248s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31316s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41342s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31185s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55964s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52878s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30606s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40318s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56594s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32270s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -34384s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30527s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31003s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -34444s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31286s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30974s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61666s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45186s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42238s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31060s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32170s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60454s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31928s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -65050s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -58022s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30771s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30188s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30900s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35426s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31111s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32356s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41112s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -47508s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31934s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31783s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31762s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -33282s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30877s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32678s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30695s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -58584s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -118224s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51122s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31627s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31240s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32604s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31818s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42196s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -46490s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51309s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64120s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42860s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32226s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32257s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32726s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31001s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31196s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32404s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30093s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30814s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30838s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36460s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32637s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31361s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30674s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30003s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32685s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31461s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -75807s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30234s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30212s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32170s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41420s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32168s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60160s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36747s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -58842s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40830s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -47882s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32745s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31762s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31907s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42272s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42586s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30114s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36476s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55836s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35318s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32498s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36474s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30807s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -62397s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36704s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40896s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56630s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -44672s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31418s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51656s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -75486s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -63508s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -53892s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30524s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31923s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56700s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30714s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31591s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30568s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -47652s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43920s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32611s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31450s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40527s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30300s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39390s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31172s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -54716s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30774s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30910s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60390s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -57064s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30556s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30974s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36566s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52444s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -57166s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31111s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64364s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38980s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31068s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32196s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -33656s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30238s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45002s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -75384s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64358s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40338s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -62620s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32528s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56916s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32756s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40556s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32075s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31982s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31244s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -82947s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -66045s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -53682s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48300s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30648s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48948s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32544s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31497s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31540s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37610s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -57582s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -53958s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61942s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31276s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52978s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30740s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32607s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -57522s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31163s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32584s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31758s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31577s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31582s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45824s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30693s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31226s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30180s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31947s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31810s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31351s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30189s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30422s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55332s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31348s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -57776s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31561s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32372s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30032s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -34412s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36332s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31020s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30109s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43234s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35812s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48780s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45597s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -84222s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30271s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31311s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38826s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30038s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31647s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38190s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30221s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31531s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55872s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45770s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42160s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31202s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31493s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -49546s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38194s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41332s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45280s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43958s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32029s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40166s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32718s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31063s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30470s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42094s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32588s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -58542s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -53835s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -58442s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40366s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40270s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32671s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -63084s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31601s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31812s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -65414s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -44580s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31339s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31981s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -84669s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -58260s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -63840s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31056s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60864s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32119s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45590s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42368s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40952s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60082s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31574s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31490s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32468s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -99312s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31690s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52520s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32195s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64850s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43094s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30502s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31203s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30048s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31495s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30591s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51582s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36600s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -34466s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37980s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30338s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32683s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31357s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31913s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32703s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31552s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32074s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39104s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -43194s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51358s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31088s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31635s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31717s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37262s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -59362s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31071s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61929s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -33680s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55266s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -54074s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32203s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39324s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31151s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32651s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32765s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39202s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30581s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -49958s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30614s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42952s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -33520s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32255s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30548s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30137s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32627s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30931s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30875s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30953s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30308s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61584s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32469s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30811s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35950s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30066s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -50790s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42218s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31250s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51004s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30862s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30885s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31260s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -45350s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64160s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64290s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -60462s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32072s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41472s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30259s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42708s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35858s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -65258s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -81255s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -46210s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32018s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30424s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -53628s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30104s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52770s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -63240s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52248s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30412s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32676s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32503s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32729s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56784s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51478s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41332s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31687s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30466s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -53838s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48014s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30947s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31376s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30664s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -50636s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31461s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31453s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -34314s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31245s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32764s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32657s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36518s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -64437s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -49186s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30806s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52320s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32261s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32506s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30783s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32053s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36270s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32389s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -63488s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37826s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55154s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30211s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42642s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31000s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -42744s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30731s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -47974s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32557s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -40340s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -54364s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32331s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31004s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30052s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39602s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30323s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31896s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31805s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38570s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32471s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31034s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -65438s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30435s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32686s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -33178s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37518s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32677s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31641s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30335s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -49236s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32094s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31522s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31896s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56426s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32621s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31547s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32444s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -48580s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31918s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31269s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31993s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -41754s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -44670s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30476s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35446s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37412s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30345s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31550s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39570s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30775s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -54592s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -51672s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -65304s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30397s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32125s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -39735s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32488s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -55598s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32612s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31864s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31708s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32499s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32701s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30024s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -56031s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30712s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30624s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31122s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -52106s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -38794s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -44394s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30742s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30037s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -31036s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -46122s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32736s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30470s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -50382s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30858s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -61812s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -35552s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32301s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32570s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -30643s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -36122s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32618s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -37226s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exe TID: 7392Thread sleep time: -32621s >= -30000sJump to behavior
        Source: C:\Program Files\Deuvw.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
        Source: C:\Program Files\Deuvw.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32391Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31322Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30333Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32662Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32757Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30106Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31101Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32439Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31115Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31673Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31107Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30191Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32209Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32591Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30836Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31556Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30303Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32609Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32702Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30523Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31998Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31426Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30932Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31329Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30145Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31316Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31185Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32270Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30527Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31003Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31286Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30974Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30833Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31060Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32170Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30227Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31928Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32525Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30771Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30188Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30900Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31111Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32356Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31934Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31783Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30877Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32678Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30695Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31627Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31240Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32604Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31818Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32060Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32226Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32257Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32726Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31001Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31196Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32404Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30093Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30814Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30838Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32637Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31361Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30674Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30003Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32685Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31461Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30212Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32168Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30080Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32745Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31762Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31907Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30114Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32498Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30807Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31418Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31754Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30524Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31923Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30714Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31591Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30568Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32611Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31450Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30300Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31172Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30774Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30910Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30195Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30556Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30974Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31111Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32182Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31068Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32196Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30238Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32179Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31310Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32528Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32756Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32075Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31982Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31244Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30648Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32544Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31497Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31540Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30971Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31276Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32607Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31163Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32584Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31758Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31577Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30693Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31226Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30180Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31947Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31810Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31351Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30189Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30422Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31348Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31561Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32372Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30032Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31020Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30109Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30271Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31311Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30038Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31647Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30221Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31531Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31202Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31493Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32029Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32718Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31063Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30470Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32588Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32671Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31601Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31812Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32707Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31339Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31981Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31920Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31056Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30432Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32119Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30041Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31490Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32468Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31690Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32195Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32425Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30502Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31203Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30048Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31495Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30591Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30338Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32683Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31357Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31913Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32703Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31552Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32074Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31088Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31635Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31717Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31071Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32203Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31151Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32651Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32765Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30581Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30614Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32255Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30548Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30137Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32627Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30931Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30875Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30953Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30308Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30792Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32469Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30811Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30066Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31250Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30862Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30885Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31260Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32080Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32145Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30231Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32072Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30259Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32629Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32018Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30424Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30104Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31620Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30412Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32676Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32503Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32729Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31687Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30466Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30947Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31376Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30664Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31461Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31453Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31245Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32764Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32657Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30806Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32261Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32506Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30783Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32053Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32389Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31744Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30211Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31000Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30731Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32557Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32331Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31004Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30323Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31805Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32471Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31034Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32719Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30435Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32686Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32677Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31641Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30335Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32094Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31522Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31896Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32621Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31547Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32444Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31918Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31269Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31993Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30345Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31550Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30775Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32652Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30397Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32125Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32488Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32612Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31864Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31708Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32499Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32701Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30712Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30624Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31122Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30742Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30037Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31036Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32736Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30470Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30858Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30906Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32301Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32570Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30643Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32618Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32621Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31313Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32271Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31441Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32668Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31015Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32240Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31641Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31505Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31502Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32046Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31901Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30350Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31476Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31155Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30946Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31065Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32715Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32200Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32106Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31302Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30175Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31597Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32036Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30169Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32097Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32176Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30260Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30721Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31447Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31723Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31506Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30270Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30245Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31283Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32389Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31785Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30935Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30883Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31496Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31539Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31654Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30510Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30499Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31256Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31665Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30630Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32517Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31066Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32371Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31102Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31417Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31463Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30519Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31585Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31371Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32019Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30843Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31274Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30511Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32702Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31467Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32091Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31159Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31314Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30134Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31478Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30301Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31676Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30062Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30665Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31999Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31413Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31175Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32501Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31622Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31988Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30977Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30876Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30816Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30654Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30574Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30538Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30623Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31149Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31741Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32628Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32471Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31180Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32482Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30732Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31165Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32143Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31768Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31347Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32000Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30786Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31597Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31579Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30787Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30837Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31626Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30336Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32405Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30049Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31270Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30119Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32521Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32050Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32020Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31098Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30406Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31033Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30096Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32190Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30580Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30285Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30571Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30000Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30916Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31539Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31099Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32057Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31148Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32655Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30582Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30794Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31884Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30432Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32530Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30393Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30121Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31870Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31794Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30144Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30388Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31395Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30542Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30487Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31668Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32361Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32313Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32128Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32235Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30014Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30884Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30759Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31655Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30219Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30283Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30265Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30160Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32666Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32048Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32514Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30856Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30180Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31987Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30503Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30057Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31210Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31565Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32692Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30103Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32169Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31958Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32174Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30076Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30129Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32647Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31623Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30132Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32177Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30528Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31593Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30079Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30185Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31077Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31499Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30554Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30522Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31826Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32485Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32364Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31657Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30867Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30369Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32212Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32759Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30943Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30954Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31504Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32589Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31230Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31520Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31782Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32705Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30870Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32684Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32151Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31184Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32271Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31825Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31173Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31238Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31197Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30589Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30382Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30339Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30633Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32134Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32071Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 32487Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31139Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30268Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31684Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31103Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30973Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30118Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 30209Jump to behavior
        Source: C:\Program Files\Deuvw.exeThread delayed: delay time: 31032Jump to behavior
        Source: Deuvw.exe, 00000003.00000002.3327552604.00000000005B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\PQ2.exeAPI call chain: ExitProcess graph end nodegraph_0-5987
        Source: C:\Program Files\Deuvw.exeAPI call chain: ExitProcess graph end nodegraph_1-5860
        Source: C:\Program Files\Deuvw.exeAPI call chain: ExitProcess graph end nodegraph_3-5862
        Source: C:\Program Files\Deuvw.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\PQ2.exeCode function: 0_2_004670B7 LoadLibraryA,GetProcAddress,0_2_004670B7
        Source: C:\Users\user\Desktop\PQ2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nulJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1Jump to behavior
        Source: Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndProgman%s.exeBITSlpszHostdoor -inst.sys\system32\drivers\\sysnative\drivers\SYSTEM\CurrentControlSet\Services\BITSSYSTEM\SelectMarkTimeSYSTEM\CurrentControlSet\Services\\Registry\Machine\System\CurrentControlSet\Services\%SZwUnloadDriverNTDLL.DLLRtlInitUnicodeStringSeLoadDriverPrivilegeCreateEventACloseHandleWaitForSingleObject
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Progman
        Source: C:\Users\user\Desktop\PQ2.exeCode function: 0_2_00467598 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,0_2_00467598
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: acs.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: cfp.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Mcshield.exe
        Source: PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 1.2.Deuvw.exe.100ff940.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.PQ2.exe.1010ef88.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.PQ2.exe.100ff940.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.Deuvw.exe.100ff940.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Deuvw.exe.1010ef88.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PQ2.exe PID: 7280, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Deuvw.exe PID: 7300, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Deuvw.exe PID: 7332, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure1
        Replication Through Removable Media
        1
        Native API
        1
        DLL Side-Loading
        12
        Process Injection
        12
        Masquerading
        OS Credential Dumping111
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        211
        Virtualization/Sandbox Evasion
        LSASS Memory2
        Process Discovery
        Remote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
        Process Injection
        Security Account Manager211
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive1
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS11
        Peripheral Device Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Remote System Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        File Deletion
        Cached Domain Credentials1
        System Network Configuration Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583199 Sample: PQ2.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 31 ulai888.ydns.eu 2->31 33 hzh.0xox0xox0.com 2->33 37 Suricata IDS alerts for network traffic 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus detection for dropped file 2->41 43 8 other signatures 2->43 8 PQ2.exe 1 2 2->8         started        12 Deuvw.exe 2->12         started        signatures3 process4 file5 25 C:\Program Files\Deuvw.exe, PE32 8->25 dropped 27 C:\Program Files\Deuvw.exe:Zone.Identifier, ASCII 8->27 dropped 45 Self deletion via cmd or bat file 8->45 14 cmd.exe 1 8->14         started        17 Deuvw.exe 1 12->17         started        signatures6 process7 dnsIp8 47 Uses ping.exe to sleep 14->47 49 Uses ping.exe to check the status of other devices and networks 14->49 20 PING.EXE 1 14->20         started        23 conhost.exe 14->23         started        29 ulai888.ydns.eu 38.6.164.159, 14994, 49704 COGENT-174US United States 17->29 51 Opens the same file many times (likely Sandbox evasion) 17->51 signatures9 process10 dnsIp11 35 127.0.0.1 unknown unknown 20->35

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        PQ2.exe84%ReversingLabsWin32.Backdoor.Farfli
        PQ2.exe71%VirustotalBrowse
        PQ2.exe100%AviraTR/Crypt.XPACK.Gen
        PQ2.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Program Files\Deuvw.exe100%AviraTR/Crypt.XPACK.Gen
        C:\Program Files\Deuvw.exe100%Joe Sandbox ML
        C:\Program Files\Deuvw.exe84%ReversingLabsWin32.Backdoor.Farfli
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://ptlogin2.qun.qq.com%s0%Avira URL Cloudsafe
        http://qun.qq.com%s0%Avira URL Cloudsafe
        https://localhost.ptlogin2.qq.com:4301%s0%Avira URL Cloudsafe
        https://ssl.ptlogin2.qq.com%s0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        ulai888.ydns.eu
        38.6.164.159
        truetrue
          unknown
          hzh.0xox0xox0.com
          unknown
          unknowntrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://ssl.ptlogin2.qq.com%sPQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://xui.ptlogin2.qq.com/cgi-bin/xlogin?appid=715030901&daid=73&hide_close_icon=1&pt_no_auth=1&s_PQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              http://ptlogin2.qun.qq.com%sPQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://qun.qq.com%sPQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://localhost.ptlogin2.qq.com:4301%sPQ2.exe, 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Deuvw.exe, 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              38.6.164.159
              ulai888.ydns.euUnited States
              174COGENT-174UStrue
              IP
              127.0.0.1
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1583199
              Start date and time:2025-01-02 08:42:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 32s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:PQ2.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@9/3@24/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 64%
              • Number of executed functions: 29
              • Number of non-executed functions: 34
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              02:43:04API Interceptor116742x Sleep call for process: Deuvw.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              COGENT-174UShttp://www.rr8844.comGet hashmaliciousUnknownBrowse
              • 149.104.32.188
              DF2.exeGet hashmaliciousUnknownBrowse
              • 38.40.94.251
              loligang.arm.elfGet hashmaliciousMiraiBrowse
              • 149.104.166.231
              loligang.sh4.elfGet hashmaliciousMiraiBrowse
              • 154.22.36.201
              loligang.mips.elfGet hashmaliciousMiraiBrowse
              • 149.38.61.254
              lDO4WBEQyL.exeGet hashmaliciousGO BackdoorBrowse
              • 38.180.205.164
              4iogI3WCTh.exeGet hashmaliciousGhostRatBrowse
              • 154.39.239.95
              Receipt-#202431029B.exeGet hashmaliciousXWormBrowse
              • 154.39.0.150
              arm.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              m68k.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              No context
              No context
              Process:C:\Users\user\Desktop\PQ2.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):502784
              Entropy (8bit):7.540324281637106
              Encrypted:false
              SSDEEP:6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2RD6lZv:oDR+u8pfjYMMWNvdhUSByFPzdv
              MD5:77B621C8AE246DA4619C8315C6996576
              SHA1:43B19A006A6E8C864B33F63604C3D5B94B26A410
              SHA-256:0CB5C8E6987F74A213353851DC12B7B3A08130FD5EBB18F4455C659E8F46442F
              SHA-512:A28BDB4B08C732558E97C6EFC71A32D2E7681D770C68EACC78E2DACE03F78E2DBF4ABFAA66D1B2E0E69CEFE05955D7A2CBFFB88DBAD3957E48D63D68AF4F0F46
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 84%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.x...+...+...+s..+...+.<.+...+3..+...+...+...+.<.+...+7..+...+Rich...+................PE..L....M.a.............................u............@.........................................................................\...(.......8............................................................................................................data..............................@....rsrc...8...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\PQ2.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Windows\SysWOW64\PING.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):331
              Entropy (8bit):4.92149009030101
              Encrypted:false
              SSDEEP:6:PzLSLzMRfmWxHLThx2LThx0sW26VY7FwAFeMmvVOIHJFxMVlmJHaVFEG1vv:PKMRJpTeT0sBSAFSkIrxMVlmJHaVzvv
              MD5:2E512EE24AAB186D09E9A1F9B72A0569
              SHA1:C5BA2E0C0338FFEE13ED1FB6DA0CC9C000824B0B
              SHA-256:DB41050CA723A06D95B73FFBE40B32DE941F5EE474F129B2B33E91C67B72674F
              SHA-512:6B4487A088155E34FE5C642E1C3D46F63CB2DDD9E4092809CE6F3BEEFDEF0D1F8AA67F8E733EDE70B07F467ED5BB6F07104EEA4C1E7AC7E1A502A772F56F7DE9
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.540324281637106
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:PQ2.exe
              File size:502'784 bytes
              MD5:77b621c8ae246da4619c8315c6996576
              SHA1:43b19a006a6e8c864b33f63604c3d5b94b26a410
              SHA256:0cb5c8e6987f74a213353851dc12b7b3a08130fd5ebb18f4455c659e8f46442f
              SHA512:a28bdb4b08c732558e97c6efc71a32d2e7681d770c68eacc78e2dace03f78e2dbf4abfaa66d1b2e0e69cefe05955d7a2cbffb88dbad3957e48d63d68af4f0f46
              SSDEEP:6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2RD6lZv:oDR+u8pfjYMMWNvdhUSByFPzdv
              TLSH:29B44AF4FB50B7F8D4001C72C2654A5848B97B97F6266B03FDA19E7922628BC5F81378
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.x...+...+...+s..+...+.<.+...+3..+...+...+...+.<.+...+7..+...+Rich...+................PE..L....M.a...........................
              Icon Hash:3e5f79b3b978198d
              Entrypoint:0x467598
              Entrypoint Section:.data
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              DLL Characteristics:
              Time Stamp:0x61CC4DC7 [Wed Dec 29 12:00:07 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:19d4e66d725c89ba6712b82bebc8196d
              Instruction
              push ebp
              mov ebp, esp
              push FFFFFFFFh
              push 00466378h
              push 00468368h
              mov eax, dword ptr fs:[00000000h]
              push eax
              mov dword ptr fs:[00000000h], esp
              sub esp, 58h
              push ebx
              push esi
              push edi
              mov dword ptr [ebp-18h], esp
              call dword ptr [00401010h]
              xor edx, edx
              mov dl, ah
              mov dword ptr [0046B4ACh], edx
              mov ecx, eax
              and ecx, 000000FFh
              mov dword ptr [0046B4A8h], ecx
              shl ecx, 08h
              add ecx, edx
              mov dword ptr [0046B4A4h], ecx
              shr eax, 10h
              mov dword ptr [0046B4A0h], eax
              push 00000001h
              call 00007F0500F864CFh
              pop ecx
              test eax, eax
              jne 00007F0500F858BAh
              push 0000001Ch
              call 00007F0500F85978h
              pop ecx
              call 00007F0500F8627Ah
              test eax, eax
              jne 00007F0500F858BAh
              push 00000010h
              call 00007F0500F85967h
              pop ecx
              xor esi, esi
              mov dword ptr [ebp-04h], esi
              call 00007F0500F860A8h
              call dword ptr [0040100Ch]
              mov dword ptr [0046BB58h], eax
              call 00007F0500F85F66h
              mov dword ptr [0046B490h], eax
              call 00007F0500F85D0Fh
              call 00007F0500F85C51h
              call 00007F0500F8595Ch
              mov dword ptr [ebp-30h], esi
              lea eax, dword ptr [ebp-5Ch]
              push eax
              call dword ptr [00401008h]
              call 00007F0500F85BE2h
              mov dword ptr [ebp-64h], eax
              test byte ptr [ebp-30h], 00000001h
              je 00007F0500F858B8h
              movzx eax, word ptr [ebp+00h]
              Programming Language:
              • [ C ] VS98 (6.0) SP6 build 8804
              • [C++] VS98 (6.0) SP6 build 8804
              • [EXP] VC++ 6.0 SP5 build 8804
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x6bb5c0x28.data
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000xf638.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000xc8.data
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .data0x10000x6afce0x6b000437904bad8bb8b717001438d6a8237ebFalse0.8334048262266355data7.790827391559138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x6c0000xf6380xf800514dbf6dc2998bdb92f361ac96eb3c38False0.15582472278225806data3.504281288959596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x6c1800xdcd8Device independent bitmap graphic, 128 x 214 x 32, image size 54784, resolution 27559 x 27559 px/mChineseChina0.10743597000141503
              RT_ICON0x79e700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.5403377110694184
              RT_ICON0x7af180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.726063829787234
              RT_GROUP_ICON0x79e580x14dataChineseChina1.15
              RT_GROUP_ICON0x7b3800x22dataChineseChina1.0294117647058822
              RT_MANIFEST0x7b3a80x28bXML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.5529953917050692
              DLLImport
              KERNEL32.dllGetProcAddress, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetCurrentThreadId, TlsSetValue, TlsAlloc, SetLastError, TlsGetValue, GetLastError, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, HeapFree, RtlUnwind, WriteFile, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCPInfo, GetACP, GetOEMCP, HeapAlloc, VirtualAlloc, HeapReAlloc, LoadLibraryA, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, InterlockedDecrement, InterlockedIncrement
              Language of compilation systemCountry where language is spokenMap
              ChineseChina
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2025-01-02T08:43:02.233971+01002842048ETPRO MALWARE Win32/Farfli.CTT CnC Activity1192.168.2.54970438.6.164.15914994TCP
              2025-01-02T08:43:06.535380+01002842048ETPRO MALWARE Win32/Farfli.CTT CnC Activity1192.168.2.54970438.6.164.15914994TCP
              TimestampSource PortDest PortSource IPDest IP
              Jan 2, 2025 08:43:06.007914066 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:43:06.012661934 CET149944970438.6.164.159192.168.2.5
              Jan 2, 2025 08:43:06.012726068 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:43:06.535379887 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:43:06.542584896 CET149944970438.6.164.159192.168.2.5
              Jan 2, 2025 08:43:06.876585960 CET149944970438.6.164.159192.168.2.5
              Jan 2, 2025 08:43:06.921283960 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:43:36.890039921 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:43:36.894896030 CET149944970438.6.164.159192.168.2.5
              Jan 2, 2025 08:44:06.905698061 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:44:06.910491943 CET149944970438.6.164.159192.168.2.5
              Jan 2, 2025 08:44:36.999460936 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:44:37.004578114 CET149944970438.6.164.159192.168.2.5
              Jan 2, 2025 08:45:07.077657938 CET4970414994192.168.2.538.6.164.159
              Jan 2, 2025 08:45:07.082607031 CET149944970438.6.164.159192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Jan 2, 2025 08:43:05.989190102 CET5851753192.168.2.51.1.1.1
              Jan 2, 2025 08:43:05.989330053 CET4943353192.168.2.51.1.1.1
              Jan 2, 2025 08:43:05.997095108 CET53585171.1.1.1192.168.2.5
              Jan 2, 2025 08:43:06.002485037 CET53494331.1.1.1192.168.2.5
              Jan 2, 2025 08:43:11.250313997 CET6041253192.168.2.51.1.1.1
              Jan 2, 2025 08:43:11.257792950 CET53604121.1.1.1192.168.2.5
              Jan 2, 2025 08:43:16.203536987 CET5426253192.168.2.51.1.1.1
              Jan 2, 2025 08:43:16.211005926 CET53542621.1.1.1192.168.2.5
              Jan 2, 2025 08:43:21.000205040 CET5769953192.168.2.51.1.1.1
              Jan 2, 2025 08:43:21.007615089 CET53576991.1.1.1192.168.2.5
              Jan 2, 2025 08:43:29.524172068 CET5547553192.168.2.51.1.1.1
              Jan 2, 2025 08:43:29.534425974 CET53554751.1.1.1192.168.2.5
              Jan 2, 2025 08:43:34.890849113 CET6278753192.168.2.51.1.1.1
              Jan 2, 2025 08:43:34.897902966 CET53627871.1.1.1192.168.2.5
              Jan 2, 2025 08:43:42.096738100 CET5714053192.168.2.51.1.1.1
              Jan 2, 2025 08:43:42.105556965 CET53571401.1.1.1192.168.2.5
              Jan 2, 2025 08:43:46.968919992 CET5996853192.168.2.51.1.1.1
              Jan 2, 2025 08:43:46.977406979 CET53599681.1.1.1192.168.2.5
              Jan 2, 2025 08:43:51.968873024 CET5384453192.168.2.51.1.1.1
              Jan 2, 2025 08:43:51.976227999 CET53538441.1.1.1192.168.2.5
              Jan 2, 2025 08:43:58.062782049 CET6466053192.168.2.51.1.1.1
              Jan 2, 2025 08:43:58.070607901 CET53646601.1.1.1192.168.2.5
              Jan 2, 2025 08:44:03.051552057 CET6295153192.168.2.51.1.1.1
              Jan 2, 2025 08:44:03.058600903 CET53629511.1.1.1192.168.2.5
              Jan 2, 2025 08:44:08.125370026 CET6131253192.168.2.51.1.1.1
              Jan 2, 2025 08:44:08.151927948 CET53613121.1.1.1192.168.2.5
              Jan 2, 2025 08:44:16.218957901 CET5636753192.168.2.51.1.1.1
              Jan 2, 2025 08:44:16.391292095 CET53563671.1.1.1192.168.2.5
              Jan 2, 2025 08:44:20.937691927 CET5209353192.168.2.51.1.1.1
              Jan 2, 2025 08:44:20.948575020 CET53520931.1.1.1192.168.2.5
              Jan 2, 2025 08:44:25.937429905 CET5892453192.168.2.51.1.1.1
              Jan 2, 2025 08:44:25.944783926 CET53589241.1.1.1192.168.2.5
              Jan 2, 2025 08:44:31.365525007 CET5746753192.168.2.51.1.1.1
              Jan 2, 2025 08:44:31.372514009 CET53574671.1.1.1192.168.2.5
              Jan 2, 2025 08:44:35.937458992 CET5746053192.168.2.51.1.1.1
              Jan 2, 2025 08:44:35.945101976 CET53574601.1.1.1192.168.2.5
              Jan 2, 2025 08:44:41.185120106 CET5491753192.168.2.51.1.1.1
              Jan 2, 2025 08:44:41.192297935 CET53549171.1.1.1192.168.2.5
              Jan 2, 2025 08:44:45.946690083 CET4932653192.168.2.51.1.1.1
              Jan 2, 2025 08:44:45.953912973 CET53493261.1.1.1192.168.2.5
              Jan 2, 2025 08:44:50.939282894 CET5916853192.168.2.51.1.1.1
              Jan 2, 2025 08:44:50.948000908 CET53591681.1.1.1192.168.2.5
              Jan 2, 2025 08:44:55.940181971 CET6017453192.168.2.51.1.1.1
              Jan 2, 2025 08:44:55.947726965 CET53601741.1.1.1192.168.2.5
              Jan 2, 2025 08:45:01.015829086 CET5461853192.168.2.51.1.1.1
              Jan 2, 2025 08:45:01.023004055 CET53546181.1.1.1192.168.2.5
              Jan 2, 2025 08:45:05.937344074 CET6129453192.168.2.51.1.1.1
              Jan 2, 2025 08:45:05.945245028 CET53612941.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jan 2, 2025 08:43:05.989190102 CET192.168.2.51.1.1.10x2eecStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:05.989330053 CET192.168.2.51.1.1.10x8bd1Standard query (0)ulai888.ydns.euA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:11.250313997 CET192.168.2.51.1.1.10x8e18Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:16.203536987 CET192.168.2.51.1.1.10xaceStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:21.000205040 CET192.168.2.51.1.1.10x11fStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:29.524172068 CET192.168.2.51.1.1.10xc0fbStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:34.890849113 CET192.168.2.51.1.1.10x73aeStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:42.096738100 CET192.168.2.51.1.1.10xeffaStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:46.968919992 CET192.168.2.51.1.1.10xdf4bStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:51.968873024 CET192.168.2.51.1.1.10x39ddStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:58.062782049 CET192.168.2.51.1.1.10x7126Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:03.051552057 CET192.168.2.51.1.1.10xe4fStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:08.125370026 CET192.168.2.51.1.1.10x3edaStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:16.218957901 CET192.168.2.51.1.1.10x8726Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:20.937691927 CET192.168.2.51.1.1.10xa707Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:25.937429905 CET192.168.2.51.1.1.10x881bStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:31.365525007 CET192.168.2.51.1.1.10xf0faStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:35.937458992 CET192.168.2.51.1.1.10x4dabStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:41.185120106 CET192.168.2.51.1.1.10x1829Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:45.946690083 CET192.168.2.51.1.1.10x83b4Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:50.939282894 CET192.168.2.51.1.1.10xea43Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:55.940181971 CET192.168.2.51.1.1.10x1768Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:45:01.015829086 CET192.168.2.51.1.1.10x799aStandard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              Jan 2, 2025 08:45:05.937344074 CET192.168.2.51.1.1.10x81e9Standard query (0)hzh.0xox0xox0.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jan 2, 2025 08:43:05.997095108 CET1.1.1.1192.168.2.50x2eecName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:06.002485037 CET1.1.1.1192.168.2.50x8bd1No error (0)ulai888.ydns.eu38.6.164.159A (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:11.257792950 CET1.1.1.1192.168.2.50x8e18Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:16.211005926 CET1.1.1.1192.168.2.50xaceName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:21.007615089 CET1.1.1.1192.168.2.50x11fName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:29.534425974 CET1.1.1.1192.168.2.50xc0fbName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:34.897902966 CET1.1.1.1192.168.2.50x73aeName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:42.105556965 CET1.1.1.1192.168.2.50xeffaName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:46.977406979 CET1.1.1.1192.168.2.50xdf4bName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:51.976227999 CET1.1.1.1192.168.2.50x39ddName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:43:58.070607901 CET1.1.1.1192.168.2.50x7126Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:03.058600903 CET1.1.1.1192.168.2.50xe4fName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:08.151927948 CET1.1.1.1192.168.2.50x3edaName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:16.391292095 CET1.1.1.1192.168.2.50x8726Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:20.948575020 CET1.1.1.1192.168.2.50xa707Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:25.944783926 CET1.1.1.1192.168.2.50x881bName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:31.372514009 CET1.1.1.1192.168.2.50xf0faName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:35.945101976 CET1.1.1.1192.168.2.50x4dabName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:41.192297935 CET1.1.1.1192.168.2.50x1829Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:45.953912973 CET1.1.1.1192.168.2.50x83b4Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:50.948000908 CET1.1.1.1192.168.2.50xea43Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:44:55.947726965 CET1.1.1.1192.168.2.50x1768Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:45:01.023004055 CET1.1.1.1192.168.2.50x799aName error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false
              Jan 2, 2025 08:45:05.945245028 CET1.1.1.1192.168.2.50x81e9Name error (3)hzh.0xox0xox0.comnonenoneA (IP address)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:02:43:04
              Start date:02/01/2025
              Path:C:\Users\user\Desktop\PQ2.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\PQ2.exe"
              Imagebase:0x400000
              File size:502'784 bytes
              MD5 hash:77B621C8AE246DA4619C8315C6996576
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Mimikatz_1, Description: Yara detected Mimikatz, Source: 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gh0st_ee6de6bc, Description: Identifies a variant of Gh0st Rat, Source: 00000000.00000002.2081272915.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:02:43:04
              Start date:02/01/2025
              Path:C:\Program Files\Deuvw.exe
              Wow64 process (32bit):true
              Commandline:"C:\\Program Files\\Deuvw.exe" -auto
              Imagebase:0x400000
              File size:502'784 bytes
              MD5 hash:77B621C8AE246DA4619C8315C6996576
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Mimikatz_1, Description: Yara detected Mimikatz, Source: 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gh0st_ee6de6bc, Description: Identifies a variant of Gh0st Rat, Source: 00000001.00000002.2081904947.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 84%, ReversingLabs
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:02:43:04
              Start date:02/01/2025
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\PQ2.exe > nul
              Imagebase:0x790000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:02:43:04
              Start date:02/01/2025
              Path:C:\Program Files\Deuvw.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files\Deuvw.exe" -acsi
              Imagebase:0x400000
              File size:502'784 bytes
              MD5 hash:77B621C8AE246DA4619C8315C6996576
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Mimikatz_1, Description: Yara detected Mimikatz, Source: 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gh0st_ee6de6bc, Description: Identifies a variant of Gh0st Rat, Source: 00000003.00000002.3328143326.00000000100FE000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Target ID:4
              Start time:02:43:04
              Start date:02/01/2025
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6d64d0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:02:43:04
              Start date:02/01/2025
              Path:C:\Windows\SysWOW64\PING.EXE
              Wow64 process (32bit):true
              Commandline:ping -n 2 127.0.0.1
              Imagebase:0x3b0000
              File size:18'944 bytes
              MD5 hash:B3624DD758CCECF93A1226CEF252CA12
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:5.8%
                Dynamic/Decrypted Code Coverage:1.2%
                Signature Coverage:6.3%
                Total number of Nodes:412
                Total number of Limit Nodes:18
                execution_graph 5486 101c0330 5487 101c033b 5486->5487 5489 101c0514 5486->5489 5488 101c04e0 VirtualProtect VirtualProtect 5487->5488 5490 101c04a9 5487->5490 5488->5489 5489->5489 5491 467598 GetVersion 5522 468210 HeapCreate 5491->5522 5493 4675f6 5494 467603 5493->5494 5495 4675fb 5493->5495 5534 467fcd 5494->5534 5610 4676c5 5495->5610 5499 467608 5500 467614 5499->5500 5501 46760c 5499->5501 5544 467e11 5500->5544 5502 4676c5 8 API calls 5501->5502 5505 467613 5502->5505 5504 46761e GetCommandLineA 5558 467cdf 5504->5558 5505->5500 5509 467638 5590 4679d9 5509->5590 5511 46763d 5512 467642 GetStartupInfoA 5511->5512 5603 467981 5512->5603 5514 467654 GetModuleHandleA 5607 46758a 5514->5607 5523 468266 5522->5523 5524 468230 5522->5524 5523->5493 5624 4680c8 5524->5624 5527 46823f 5636 46968f HeapAlloc 5527->5636 5528 46824c 5530 468269 5528->5530 5638 469ee0 5528->5638 5530->5493 5531 468249 5531->5530 5533 46825a HeapDestroy 5531->5533 5533->5523 5876 4685cc InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 5534->5876 5536 467fd3 TlsAlloc 5537 467fe3 5536->5537 5538 46801d 5536->5538 5539 469175 30 API calls 5537->5539 5538->5499 5540 467fec 5539->5540 5540->5538 5541 467ff4 TlsSetValue 5540->5541 5541->5538 5542 468005 5541->5542 5543 46800b GetCurrentThreadId 5542->5543 5543->5499 5545 468c80 29 API calls 5544->5545 5546 467e24 5545->5546 5547 467e32 GetStartupInfoA 5546->5547 5548 4676a0 7 API calls 5546->5548 5554 467f51 5547->5554 5556 467e80 5547->5556 5548->5547 5550 467f7c GetStdHandle 5553 467f8a GetFileType 5550->5553 5550->5554 5551 467fbc SetHandleCount 5551->5504 5552 468c80 29 API calls 5552->5556 5553->5554 5554->5550 5554->5551 5555 467ef7 5555->5554 5557 467f19 GetFileType 5555->5557 5556->5552 5556->5554 5556->5555 5557->5555 5559 467d2d 5558->5559 5560 467cfa GetEnvironmentStringsW 5558->5560 5561 467d02 5559->5561 5562 467d1e 5559->5562 5560->5561 5563 467d0e GetEnvironmentStrings 5560->5563 5565 467d3a GetEnvironmentStringsW 5561->5565 5569 467d46 WideCharToMultiByte 5561->5569 5564 46762e 5562->5564 5566 467dc0 GetEnvironmentStrings 5562->5566 5568 467dcc 5562->5568 5563->5562 5563->5564 5581 467a92 5564->5581 5565->5564 5565->5569 5566->5564 5566->5568 5568->5568 5572 468c80 29 API calls 5568->5572 5570 467dac FreeEnvironmentStringsW 5569->5570 5571 467d7a 5569->5571 5570->5564 5573 468c80 29 API calls 5571->5573 5579 467de7 5572->5579 5574 467d80 5573->5574 5574->5570 5575 467d89 WideCharToMultiByte 5574->5575 5577 467d9a 5575->5577 5578 467da3 5575->5578 5576 467dfd FreeEnvironmentStringsA 5576->5564 5580 468aa1 29 API calls 5577->5580 5578->5570 5579->5576 5580->5578 5582 467aa4 5581->5582 5583 467aa9 GetModuleFileNameA 5581->5583 5877 468a85 5582->5877 5585 467acc 5583->5585 5586 468c80 29 API calls 5585->5586 5587 467aed 5586->5587 5588 467afd 5587->5588 5589 4676a0 7 API calls 5587->5589 5588->5509 5589->5588 5591 4679e6 5590->5591 5594 4679eb 5590->5594 5592 468a85 48 API calls 5591->5592 5592->5594 5593 468c80 29 API calls 5595 467a18 5593->5595 5594->5593 5596 4676a0 7 API calls 5595->5596 5602 467a2c 5595->5602 5596->5602 5597 467a6f 5598 468aa1 29 API calls 5597->5598 5599 467a7b 5598->5599 5599->5511 5600 468c80 29 API calls 5600->5602 5601 4676a0 7 API calls 5601->5602 5602->5597 5602->5600 5602->5601 5604 46798a 5603->5604 5606 46798f 5603->5606 5605 468a85 48 API calls 5604->5605 5605->5606 5606->5514 5906 46751a 5607->5906 5611 4676d3 5610->5611 5612 4676ce 5610->5612 5614 468479 7 API calls 5611->5614 5613 468440 7 API calls 5612->5613 5613->5611 5615 4676dc ExitProcess 5614->5615 5616 467716 5981 467738 5616->5981 5619 467809 5620 468034 35 API calls 5619->5620 5622 467814 5620->5622 5621 46793a UnhandledExceptionFilter 5623 467692 5621->5623 5622->5621 5622->5623 5647 469660 5624->5647 5626 4680d5 GetVersionExA 5627 46810b GetEnvironmentVariableA 5626->5627 5629 4680f1 5626->5629 5628 4681e8 5627->5628 5631 46812a 5627->5631 5632 468103 5628->5632 5652 46809b GetModuleHandleA 5628->5652 5629->5627 5629->5632 5633 46816f GetModuleFileNameA 5631->5633 5634 468167 5631->5634 5632->5527 5632->5528 5633->5634 5634->5628 5649 4692b2 5634->5649 5637 4696ab 5636->5637 5637->5531 5639 469ef4 HeapAlloc 5638->5639 5640 469eed 5638->5640 5641 469f11 VirtualAlloc 5639->5641 5646 469f49 5639->5646 5640->5641 5642 46a006 5641->5642 5643 469f31 VirtualAlloc 5641->5643 5644 46a00e HeapFree 5642->5644 5642->5646 5645 469ff8 VirtualFree 5643->5645 5643->5646 5644->5646 5645->5642 5646->5531 5648 46966c 5647->5648 5648->5626 5648->5648 5654 4692c9 5649->5654 5653 4680b2 5652->5653 5653->5632 5656 4692e1 5654->5656 5658 469311 5656->5658 5663 46abec 5656->5663 5657 46abec 6 API calls 5657->5658 5658->5657 5661 46943a 5658->5661 5662 4692c5 5658->5662 5667 46aab1 5658->5667 5661->5662 5678 46aaa8 5661->5678 5662->5628 5664 46abfe 5663->5664 5665 46ac0a 5663->5665 5664->5656 5681 46a8dd 5665->5681 5668 46aacf InterlockedIncrement 5667->5668 5670 46aabc 5667->5670 5669 46aaeb InterlockedDecrement 5668->5669 5673 46aaf5 5668->5673 5693 4685f5 5669->5693 5670->5658 5708 46ab20 5673->5708 5675 46ab15 InterlockedDecrement 5675->5670 5676 46ab0b 5714 468656 LeaveCriticalSection 5676->5714 5848 468034 GetLastError TlsGetValue 5678->5848 5680 46aaad 5680->5662 5682 46a90e GetStringTypeW 5681->5682 5683 46a926 5681->5683 5682->5683 5684 46a92a GetStringTypeA 5682->5684 5685 46a975 5683->5685 5686 46a951 GetStringTypeA 5683->5686 5684->5683 5687 46aa12 5684->5687 5685->5687 5689 46a98b MultiByteToWideChar 5685->5689 5686->5687 5687->5664 5689->5687 5690 46a9af 5689->5690 5690->5687 5691 46a9e9 MultiByteToWideChar 5690->5691 5691->5687 5692 46aa02 GetStringTypeW 5691->5692 5692->5687 5694 46860d 5693->5694 5695 46864b EnterCriticalSection 5693->5695 5715 468c80 5694->5715 5695->5673 5698 468623 5700 4685f5 27 API calls 5698->5700 5701 46862b 5700->5701 5702 468632 InitializeCriticalSection 5701->5702 5703 46863c 5701->5703 5704 468641 5702->5704 5724 468aa1 5703->5724 5741 468656 LeaveCriticalSection 5704->5741 5707 468649 5707->5695 5709 46ab4b 5708->5709 5713 46ab02 5708->5713 5710 46ab67 5709->5710 5711 46abec 6 API calls 5709->5711 5710->5713 5830 46a68e 5710->5830 5711->5710 5713->5675 5713->5676 5714->5670 5742 468c92 5715->5742 5718 4676a0 5719 4676ae 5718->5719 5720 4676a9 5718->5720 5789 468479 5719->5789 5783 468440 5720->5783 5725 468acf 5724->5725 5726 468b7b 5724->5726 5727 468b14 5725->5727 5728 468ad9 5725->5728 5726->5704 5729 468b05 5727->5729 5732 4685f5 28 API calls 5727->5732 5730 4685f5 28 API calls 5728->5730 5729->5726 5731 468b6d HeapFree 5729->5731 5734 468ae0 5730->5734 5731->5726 5733 468b20 5732->5733 5736 468b4c 5733->5736 5812 46a193 5733->5812 5738 468afa 5734->5738 5803 469702 5734->5803 5816 468b63 5736->5816 5809 468b0b 5738->5809 5741->5707 5743 468615 5742->5743 5745 468c99 5742->5745 5743->5698 5743->5718 5745->5743 5746 468cbe 5745->5746 5747 468ceb 5746->5747 5750 468d2e 5746->5750 5748 4685f5 28 API calls 5747->5748 5749 468d19 5747->5749 5751 468d01 5748->5751 5752 468d9d RtlAllocateHeap 5749->5752 5755 468d20 5749->5755 5750->5749 5753 468d50 5750->5753 5764 469a2b 5751->5764 5752->5755 5756 4685f5 28 API calls 5753->5756 5755->5745 5758 468d57 5756->5758 5773 46a1d8 5758->5773 5761 468d6a 5780 468d84 5761->5780 5767 469a5d 5764->5767 5765 469afc 5766 469de5 VirtualAlloc 5765->5766 5769 468d0c 5765->5769 5766->5769 5767->5765 5768 469d34 HeapReAlloc HeapAlloc VirtualAlloc HeapFree 5767->5768 5767->5769 5768->5765 5770 468d25 5769->5770 5771 468656 LeaveCriticalSection 5770->5771 5772 468d2c 5771->5772 5772->5749 5774 46a1e6 5773->5774 5775 46a2d2 VirtualAlloc 5774->5775 5776 46a3a7 5774->5776 5779 46a2a3 5774->5779 5775->5779 5777 469ee0 HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 5776->5777 5777->5779 5779->5761 5781 468656 LeaveCriticalSection 5780->5781 5782 468d77 5781->5782 5782->5749 5782->5755 5784 46844a 5783->5784 5785 468477 5784->5785 5786 468479 7 API calls 5784->5786 5785->5719 5787 468461 5786->5787 5788 468479 7 API calls 5787->5788 5788->5785 5791 46848c 5789->5791 5790 4685a3 5793 4685b6 GetStdHandle WriteFile 5790->5793 5791->5790 5792 4684cc 5791->5792 5797 4676b7 5791->5797 5794 4684d8 GetModuleFileNameA 5792->5794 5792->5797 5793->5797 5795 4684f0 5794->5795 5798 46a504 5795->5798 5797->5698 5799 46a511 LoadLibraryA 5798->5799 5801 46a553 5798->5801 5800 46a522 GetProcAddress 5799->5800 5799->5801 5800->5801 5802 46a539 GetProcAddress GetProcAddress 5800->5802 5801->5797 5802->5801 5804 469740 5803->5804 5808 4699f6 5803->5808 5805 46993c VirtualFree 5804->5805 5804->5808 5806 4699a0 5805->5806 5807 4699af VirtualFree HeapFree 5806->5807 5806->5808 5807->5808 5808->5738 5819 468656 LeaveCriticalSection 5809->5819 5811 468b12 5811->5729 5813 46a1d6 5812->5813 5814 46a1c0 5812->5814 5813->5736 5814->5813 5820 46a07a 5814->5820 5829 468656 LeaveCriticalSection 5816->5829 5818 468b6a 5818->5729 5819->5811 5822 46a087 5820->5822 5821 46a137 5821->5813 5822->5821 5823 46a0a8 VirtualFree 5822->5823 5825 46a024 VirtualFree 5822->5825 5823->5822 5826 46a041 5825->5826 5827 46a071 5826->5827 5828 46a051 HeapFree 5826->5828 5827->5822 5828->5822 5829->5818 5831 46a6da 5830->5831 5832 46a6be LCMapStringW 5830->5832 5834 46a723 LCMapStringA 5831->5834 5835 46a740 5831->5835 5832->5831 5833 46a6e2 LCMapStringA 5832->5833 5833->5831 5836 46a81c 5833->5836 5834->5836 5835->5836 5837 46a756 MultiByteToWideChar 5835->5837 5836->5713 5837->5836 5838 46a780 5837->5838 5838->5836 5839 46a7b6 MultiByteToWideChar 5838->5839 5839->5836 5840 46a7cf LCMapStringW 5839->5840 5840->5836 5841 46a7ea 5840->5841 5842 46a7f0 5841->5842 5844 46a830 5841->5844 5842->5836 5843 46a7fe LCMapStringW 5842->5843 5843->5836 5844->5836 5845 46a868 LCMapStringW 5844->5845 5845->5836 5846 46a880 WideCharToMultiByte 5845->5846 5846->5836 5849 468050 5848->5849 5850 46808f SetLastError 5848->5850 5859 469175 5849->5859 5850->5680 5853 468087 5855 4676a0 7 API calls 5853->5855 5854 468061 TlsSetValue 5854->5853 5856 468072 5854->5856 5857 46808e 5855->5857 5858 468078 GetCurrentThreadId 5856->5858 5857->5850 5858->5850 5860 4691aa 5859->5860 5861 469262 HeapAlloc 5860->5861 5862 4685f5 29 API calls 5860->5862 5863 469a2b 5 API calls 5860->5863 5864 468059 5860->5864 5865 46a1d8 6 API calls 5860->5865 5868 46920e 5860->5868 5871 469297 5860->5871 5861->5860 5862->5860 5863->5860 5864->5853 5864->5854 5865->5860 5874 468656 LeaveCriticalSection 5868->5874 5870 469215 5870->5860 5875 468656 LeaveCriticalSection 5871->5875 5873 46929e 5873->5860 5874->5870 5875->5873 5876->5536 5878 468a95 5877->5878 5879 468a8e 5877->5879 5878->5583 5881 4686ad 5879->5881 5882 4685f5 29 API calls 5881->5882 5883 4686bd 5882->5883 5892 46885a 5883->5892 5887 468852 5887->5878 5889 4686f9 GetCPInfo 5891 46870f 5889->5891 5890 4686d4 5905 468656 LeaveCriticalSection 5890->5905 5891->5890 5897 468900 GetCPInfo 5891->5897 5893 46887a 5892->5893 5894 46886a GetOEMCP 5892->5894 5895 4686c5 5893->5895 5896 46887f GetACP 5893->5896 5894->5893 5895->5889 5895->5890 5895->5891 5896->5895 5898 4689eb 5897->5898 5902 468923 5897->5902 5898->5890 5899 46a8dd 6 API calls 5900 46899f 5899->5900 5901 46a68e 9 API calls 5900->5901 5903 4689c3 5901->5903 5902->5899 5904 46a68e 9 API calls 5903->5904 5904->5898 5905->5887 5907 46754a 5906->5907 5912 466b6a 5907->5912 5909 467584 5909->5616 5910 467550 5910->5909 5931 46732f 5910->5931 5942 4668c0 GetModuleHandleA GetProcAddress 5912->5942 5915 4668c0 4 API calls 5916 466c38 5915->5916 5917 4668c0 4 API calls 5916->5917 5918 466c71 5917->5918 5919 466c96 VirtualAlloc 5918->5919 5930 466d75 5918->5930 5920 466cad 5919->5920 5921 466cd0 VirtualAlloc 5920->5921 5920->5930 5922 466cfd 5921->5922 5948 466d84 5922->5948 5924 466d2e 5953 4670b7 5924->5953 5927 466d52 5928 46732f 4 API calls 5927->5928 5927->5930 5928->5930 5930->5910 5932 4668c0 4 API calls 5931->5932 5933 4673a9 5932->5933 5934 4668c0 4 API calls 5933->5934 5935 4673e9 5934->5935 5936 4668c0 4 API calls 5935->5936 5937 467435 5936->5937 5938 4668c0 4 API calls 5937->5938 5939 467469 5938->5939 5940 4674b7 5939->5940 5976 466a9d 5939->5976 5940->5909 5943 46695c GetModuleHandleA 5942->5943 5945 466952 5942->5945 5943->5945 5944 466958 GetProcAddress 5946 466976 5944->5946 5945->5944 5947 466974 5945->5947 5946->5915 5947->5946 5949 4668c0 4 API calls 5948->5949 5952 466e05 5949->5952 5950 466eac 5950->5924 5951 466e6a VirtualAlloc 5951->5952 5952->5950 5952->5951 5954 4668c0 4 API calls 5953->5954 5955 467138 5954->5955 5956 4668c0 4 API calls 5955->5956 5959 46717c 5956->5959 5957 4671c4 LoadLibraryA 5957->5959 5961 466d47 5957->5961 5959->5957 5960 467238 GetProcAddress 5959->5960 5959->5961 5969 46697b 5959->5969 5960->5959 5961->5927 5962 466eb1 5961->5962 5963 4668c0 4 API calls 5962->5963 5964 466f2a 5963->5964 5965 4668c0 4 API calls 5964->5965 5966 466f76 5965->5966 5967 46700e VirtualProtect 5966->5967 5968 467038 5966->5968 5967->5966 5968->5927 5970 4668c0 4 API calls 5969->5970 5971 466a02 5970->5971 5972 4668c0 4 API calls 5971->5972 5973 466a41 5972->5973 5974 4668c0 4 API calls 5973->5974 5975 466a78 5974->5975 5975->5959 5977 4668c0 4 API calls 5976->5977 5978 466b24 5977->5978 5979 4668c0 4 API calls 5978->5979 5980 466b57 5979->5980 5980->5940 5990 4677dd 5981->5990 5984 467749 GetCurrentProcess TerminateProcess 5985 46775a 5984->5985 5986 4677c4 5985->5986 5987 4677cb ExitProcess 5985->5987 5993 4677e6 5986->5993 5991 4685f5 29 API calls 5990->5991 5992 46773e 5991->5992 5992->5984 5992->5985 5996 468656 LeaveCriticalSection 5993->5996 5995 467681 5995->5619 5996->5995

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 59 4670b7-46719c call 4668c0 * 2 64 467272-467279 59->64 65 4671a2-4671ae 59->65 65->64 67 4671b4 65->67 68 4671b9-4671be 67->68 68->64 69 4671c4-4671d0 LoadLibraryA 68->69 70 4671d6-4671f0 call 46697b 69->70 71 46726e 69->71 70->71 74 4671f2-467202 70->74 71->64 75 467204-46720f 74->75 76 467211-467216 74->76 77 467219-467220 75->77 76->77 78 467255-467259 77->78 79 467222-467227 77->79 78->64 80 46725b-467266 78->80 81 467230-467235 79->81 82 467229-46722e 79->82 87 4671b6 80->87 88 46726c 80->88 83 467238-467246 GetProcAddress 81->83 82->83 85 467251 83->85 86 467248-46724f 83->86 85->78 86->77 87->68 88->64
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • LoadLibraryA.KERNEL32(?,?,?,?,00000016,00000000,?), ref: 004671C7
                • GetProcAddress.KERNEL32(?,GmF), ref: 0046723C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AddressProc$HandleModule$LibraryLoad
                • String ID: A$B$GmF$GmF$I$KERNEL32.dll$L$L$P$R$a$a$a$a$b$d$d$d$e$i$o$r$r$r$s$t$y
                • API String ID: 551388010-1369886350
                • Opcode ID: 9146fd96053e2050b3294d5e699eb0beb02dc719ea692024da2c8e9b1210d4cc
                • Instruction ID: 73e0fe1b8e5c6c9f5f942eac17084d9bf6255d1aace67817413c182afa2f5bd3
                • Opcode Fuzzy Hash: 9146fd96053e2050b3294d5e699eb0beb02dc719ea692024da2c8e9b1210d4cc
                • Instruction Fuzzy Hash: 30615470D08289DEEB11CBA8C8447DEBFF56F15358F184099E584A7382D3BD9944C776

                Control-flow Graph

                APIs
                • GetVersion.KERNEL32 ref: 004675BE
                  • Part of subcall function 00468210: HeapCreate.KERNEL32(00000000,00001000,00000000,004675F6,00000001), ref: 00468221
                  • Part of subcall function 00468210: HeapDestroy.KERNEL32 ref: 00468260
                • GetCommandLineA.KERNEL32 ref: 0046761E
                • GetStartupInfoA.KERNEL32(?), ref: 00467649
                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 0046766C
                  • Part of subcall function 004676C5: ExitProcess.KERNEL32 ref: 004676E2
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                • String ID:
                • API String ID: 2057626494-0
                • Opcode ID: 74ae398f86775484538032804f60e5769ebf57acb35412f92e8c4fd7a89ff731
                • Instruction ID: f877db75b34aef535155fa93e1ad8a33f9cc10bfb3bd4b0f6148cfe794d3ada0
                • Opcode Fuzzy Hash: 74ae398f86775484538032804f60e5769ebf57acb35412f92e8c4fd7a89ff731
                • Instruction Fuzzy Hash: 902165B19447059ED704AFB5DD46A6E7BA8EF0471CF10452FF501972A2FB784880CB9B

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 466b6a-466c7f call 4668c0 * 3 7 466d76-466d78 0->7 8 466c85-466c90 0->8 9 466d7f-466d83 7->9 8->7 10 466c96-466cab VirtualAlloc 8->10 11 466cc6-466d36 VirtualAlloc call 466d84 10->11 12 466cad-466cc0 10->12 19 466d41-466d4a call 4670b7 11->19 20 466d38-466d40 call 46703d 11->20 12->7 12->11 25 466d6f-466d75 call 46732f 19->25 26 466d4c-466d5a call 466eb1 19->26 20->19 25->7 31 466d5c-466d60 26->31 32 466d7d 26->32 31->25 33 466d62-466d68 31->33 32->9 34 466d6b-466d6d 33->34 34->25 35 466d7a 34->35 35->32
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,?,?,?,?,?,?,004010F0), ref: 00466CA3
                • VirtualAlloc.KERNEL32(00000016,?,00001000,00000004,?,?,?,?,?,?,?,004010F0), ref: 00466CEE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AddressAllocHandleModuleProcVirtual
                • String ID: A$A$G$H$H$HeapAlloc$KERNEL32.dll$P$V$VirtualAlloc$a$a$a$c$c$c$e$e$e$e$i$l$l$l$l$l$o$o$o$p$p$r$r$s$s$t$t$u
                • API String ID: 3695083113-2890414303
                • Opcode ID: eea5828057d8a8a3ca217eb1021cde760f26655aafc521580391e7091950ef6c
                • Instruction ID: 56dfe851e749cfa52889f2bfcfc8cef8fedfa8cb50ddae72ef14544c6a3e4736
                • Opcode Fuzzy Hash: eea5828057d8a8a3ca217eb1021cde760f26655aafc521580391e7091950ef6c
                • Instruction Fuzzy Hash: 06814271D08288DEEB11DBA8C844BDEBFF55F16708F084089E5807B282D7BE5549C77A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 36 466eb1-466f90 call 4668c0 * 2 41 466f96-466f9b 36->41 42 46703a-46703c 36->42 43 466f9e-466fbf 41->43 44 466fd1-466fe5 43->44 45 466fc1-466fcf 43->45 46 466fe7 44->46 47 466fed-466ff4 44->47 51 46701a 45->51 46->47 49 466ff6-466ffa 47->49 50 46700c 47->50 52 467001-467005 49->52 53 466ffc-466fff 49->53 54 46700e-467017 VirtualProtect 50->54 55 46701d-467032 50->55 51->55 52->55 58 467007 52->58 57 46700a 53->57 54->51 55->43 56 467038-467039 55->56 56->42 57->50 58->57
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • VirtualProtect.KERNEL32(?,?,00000000,?,00000016,00000000,?,?,?,?,?,?), ref: 00467017
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AddressHandleModuleProc$ProtectVirtual
                • String ID: @$F$KERNEL32.dll$P$RmF$RmF$V$V$a$a$c$e$e$e$i$i$l$l$o$r$r$r$r$t$t$t$t$u$u
                • API String ID: 2080333215-3833892956
                • Opcode ID: cb608eef3711ebfc93400a4942087660b63e14b03940701ee4406093afd551ff
                • Instruction ID: 72b4ce0505e3628847bb6db0ce6ea59a5e3d376deda158c5c7a16eff45700afd
                • Opcode Fuzzy Hash: cb608eef3711ebfc93400a4942087660b63e14b03940701ee4406093afd551ff
                • Instruction Fuzzy Hash: 60513270C082C8DEDB02CBA8D5887DEBFB56F16348F184099D5847B292D3BE5A09C776

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 89 466d84-466e25 call 4668c0 92 466eac-466eb0 89->92 93 466e2b 89->93 94 466e2e-466e31 93->94 95 466e33-466e3b 94->95 96 466e6a-466e98 VirtualAlloc 94->96 97 466e9b-466eaa 95->97 98 466e3d-466e68 95->98 96->97 97->92 97->94 98->97
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                • VirtualAlloc.KERNEL32(?,?,00001000,00000004,00000016,00000000,?), ref: 00466E7A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AddressProc$AllocHandleModuleVirtual
                • String ID: .$2$3$A$E$E$K$L$N$R$V$a$c$d$i$l$l$l$l$l$o$r$t$u
                • API String ID: 3787274985-1410553462
                • Opcode ID: 9a20da68c6a90be79534ff80353c2f0603882a79139077a3888f10a88befb3b9
                • Instruction ID: b7ee7351b5069f9bbbcd0e3288277ca9420c032c07cd61825cf92ba50ad0a3c8
                • Opcode Fuzzy Hash: 9a20da68c6a90be79534ff80353c2f0603882a79139077a3888f10a88befb3b9
                • Instruction Fuzzy Hash: 02416171D04288DBDF01CBA8C448BDEBFF1AF55704F084099D584AB382D3BA5A58C779

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 46a68e-46a6bc 101 46a704-46a707 100->101 102 46a6be-46a6d8 LCMapStringW 100->102 105 46a719-46a721 101->105 106 46a709-46a716 call 46a8b2 101->106 103 46a6e2-46a6f4 LCMapStringA 102->103 104 46a6da-46a6e0 102->104 109 46a81c 103->109 110 46a6fa 103->110 104->101 107 46a723-46a73b LCMapStringA 105->107 108 46a740-46a743 105->108 106->105 112 46a81e-46a82f 107->112 108->109 113 46a749-46a74c 108->113 109->112 110->101 115 46a756-46a77a MultiByteToWideChar 113->115 116 46a74e-46a753 113->116 115->109 117 46a780-46a7b4 call 469660 115->117 116->115 117->109 121 46a7b6-46a7cd MultiByteToWideChar 117->121 121->109 122 46a7cf-46a7e8 LCMapStringW 121->122 122->109 123 46a7ea-46a7ee 122->123 124 46a830-46a866 call 469660 123->124 125 46a7f0-46a7f3 123->125 124->109 132 46a868-46a87e LCMapStringW 124->132 127 46a8ab-46a8ad 125->127 128 46a7f9-46a7fc 125->128 127->112 128->109 130 46a7fe-46a816 LCMapStringW 128->130 130->109 130->127 132->109 133 46a880-46a885 132->133 134 46a887-46a889 133->134 135 46a88b-46a88e 133->135 136 46a891-46a8a5 WideCharToMultiByte 134->136 135->136 136->109 136->127
                APIs
                • LCMapStringW.KERNEL32(00000000,00000100,00466730,00000001,00000000,00000000,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A6D0
                • LCMapStringA.KERNEL32(00000000,00000100,0046672C,00000001,00000000,00000000,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A6EC
                • LCMapStringA.KERNEL32(?,?,?,0046AB02,?,?,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A735
                • MultiByteToWideChar.KERNEL32(?,0046B7E5,?,0046AB02,00000000,00000000,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A76D
                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,0046AB02,?,00000000,?,?,0046AB02,?), ref: 0046A7C5
                • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0046AB02,?), ref: 0046A7DB
                • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,0046AB02,?), ref: 0046A80E
                • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,0046AB02,?), ref: 0046A876
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: String$ByteCharMultiWide
                • String ID:
                • API String ID: 352835431-0
                • Opcode ID: a28fd5e3e5a475bf9b6a264a68c1a845a1e8dddc284e8329ea69289aa823242b
                • Instruction ID: 12cc6b9feb3d9a71118cc58f801efc8483379fe271ac96587175e3a828ac97c7
                • Opcode Fuzzy Hash: a28fd5e3e5a475bf9b6a264a68c1a845a1e8dddc284e8329ea69289aa823242b
                • Instruction Fuzzy Hash: F4516B71900649ABCF219F94CD49AAF7FB9FB48750F10412AF910B2261E3398C61DF6B

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 171 468900-46891d GetCPInfo 172 468923-468925 171->172 173 468a39-468a3b 171->173 174 46892a-468934 172->174 175 468a40-468a43 173->175 174->174 176 468936-468942 174->176 177 468a45-468a48 175->177 178 468a5e-468a61 175->178 181 468944-468946 176->181 182 46897b-4689be call 46a8dd call 46a68e 176->182 177->178 183 468a4a-468a53 177->183 179 468a76 178->179 180 468a63-468a66 178->180 186 468a7d-468a80 179->186 180->179 185 468a68-468a74 180->185 187 468949-468951 181->187 195 4689c3-4689f0 call 46a68e 182->195 184 468a56-468a5c 183->184 184->186 185->184 186->175 189 468a82-468a84 186->189 190 468953-46896e 187->190 191 468970-468977 187->191 190->191 191->187 194 468979-46897a 191->194 194->182 198 4689f6-4689fc 195->198 199 468a14-468a17 198->199 200 4689fe-468a05 198->200 202 468a29 199->202 203 468a19-468a27 199->203 201 468a0c-468a12 200->201 204 468a30-468a35 201->204 202->204 203->201 204->198 205 468a37 204->205 205->189
                APIs
                • GetCPInfo.KERNEL32(?,00000000), ref: 00468914
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: Info
                • String ID: $
                • API String ID: 1807457897-3032137957
                • Opcode ID: 8a739a128cb405312d00240f0076b108f8cfc1bf0800c8ea65d5b8b068e5d4fd
                • Instruction ID: b91b7a80f5c212ae6bf3e4eeca3f6c145e7dbed152764a56bdc0ce5edf8456d9
                • Opcode Fuzzy Hash: 8a739a128cb405312d00240f0076b108f8cfc1bf0800c8ea65d5b8b068e5d4fd
                • Instruction Fuzzy Hash: 1D4156310042581AEB119694CD59BF63FE8DB06700F1801EBDA85D7152FB7A49989BFF

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 206 101c0330-101c0335 207 101c051d 206->207 208 101c033b-101c0348 206->208 207->207 209 101c035a-101c035f 208->209 210 101c0361 209->210 211 101c0350-101c0355 210->211 212 101c0363 210->212 213 101c0356-101c0358 211->213 214 101c0368-101c036a 212->214 213->209 213->210 215 101c036c-101c0371 214->215 216 101c0373-101c0377 214->216 215->216 217 101c0379 216->217 218 101c0384-101c0387 216->218 219 101c037b-101c0382 217->219 220 101c03a3-101c03a8 217->220 221 101c0389-101c038e 218->221 222 101c0390-101c0392 218->222 219->218 219->220 223 101c03aa-101c03b3 220->223 224 101c03bb-101c03bd 220->224 221->222 222->214 225 101c042a-101c042d 223->225 226 101c03b5-101c03b9 223->226 227 101c03bf-101c03c4 224->227 228 101c03c6 224->228 229 101c0432-101c0435 225->229 226->228 227->228 230 101c03c8-101c03cb 228->230 231 101c0394-101c0396 228->231 234 101c0437-101c0439 229->234 235 101c03cd-101c03d2 230->235 236 101c03d4 230->236 232 101c039f-101c03a1 231->232 233 101c0398-101c039d 231->233 238 101c03f5-101c0404 232->238 233->232 234->229 239 101c043b-101c043e 234->239 235->236 236->231 237 101c03d6-101c03d8 236->237 240 101c03da-101c03df 237->240 241 101c03e1-101c03e5 237->241 242 101c0414-101c0421 238->242 243 101c0406-101c040d 238->243 239->229 244 101c0440-101c045c 239->244 240->241 241->237 246 101c03e7 241->246 242->242 248 101c0423-101c0425 242->248 243->243 247 101c040f 243->247 244->234 245 101c045e 244->245 249 101c0464-101c0468 245->249 250 101c03e9-101c03f0 246->250 251 101c03f2 246->251 247->213 248->213 252 101c04af-101c04b2 249->252 253 101c046a-101c0480 249->253 250->237 250->251 251->238 254 101c04b5-101c04bc 252->254 261 101c0481-101c0486 253->261 256 101c04be-101c04c0 254->256 257 101c04e0-101c0510 VirtualProtect * 2 254->257 258 101c04c2-101c04d1 256->258 259 101c04d3-101c04de 256->259 260 101c0514-101c0518 257->260 258->254 259->258 260->260 262 101c051a 260->262 261->249 263 101c0488-101c048a 261->263 262->207 264 101c048c-101c0492 263->264 265 101c0493-101c04a0 263->265 264->265 267 101c04a9-101c04ac 265->267 268 101c04a2-101c04a7 265->268 268->261
                APIs
                • VirtualProtect.KERNEL32(10000000,00001000,00000004,?,00000000), ref: 101C04F7
                • VirtualProtect.KERNEL32(10000000,00001000), ref: 101C050C
                Memory Dump Source
                • Source File: 00000000.00000002.2081566139.00000000101BB000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                • Associated: 00000000.00000002.2081272915.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10000000_PQ2.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: f30959f0f6a4eb4032516a435b7a182ae7d14d45056fa550e5aeef4c246b8788
                • Instruction ID: 844558c3945075b3369738829a84c8e651ef885c73b90527f10f3a1f81f79590
                • Opcode Fuzzy Hash: f30959f0f6a4eb4032516a435b7a182ae7d14d45056fa550e5aeef4c246b8788
                • Instruction Fuzzy Hash: 4251F972A543D24FD7168AB88FD07567794FB63260B2A0738E6E1C73C5E7A8D8068760

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 269 468210-46822e HeapCreate 270 468266-468268 269->270 271 468230-46823d call 4680c8 269->271 274 46823f-46824a call 46968f 271->274 275 46824c-46824f 271->275 281 468256-468258 274->281 277 468251 call 469ee0 275->277 278 468269-46826c 275->278 277->281 281->278 282 46825a-468260 HeapDestroy 281->282 282->270
                APIs
                • HeapCreate.KERNEL32(00000000,00001000,00000000,004675F6,00000001), ref: 00468221
                  • Part of subcall function 004680C8: GetVersionExA.KERNEL32 ref: 004680E7
                • HeapDestroy.KERNEL32 ref: 00468260
                  • Part of subcall function 0046968F: HeapAlloc.KERNEL32(00000000,00000140,00468249,000003F8), ref: 0046969C
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: Heap$AllocCreateDestroyVersion
                • String ID:
                • API String ID: 2507506473-0
                • Opcode ID: 00308e250556f24be53d22c4c1e5b2513877d9e21008081d955c28075247dc7a
                • Instruction ID: 6e6482bd650207ad86c54233ac2670d8762018555e74c8298600f12d13cd5025
                • Opcode Fuzzy Hash: 00308e250556f24be53d22c4c1e5b2513877d9e21008081d955c28075247dc7a
                • Instruction Fuzzy Hash: D1F0ED70B58B019BEB206B719C4133A3794DB44792F104A7FF500D81A0FFB888C0965F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 296 4686ad-4686d2 call 4685f5 call 46885a 301 4686d4-4686d6 296->301 302 4686db-4686dd 296->302 303 46884b-468859 call 468656 301->303 304 4686e3-4686e5 302->304 305 468839 call 4688d7 302->305 307 4686ea-4686ec 304->307 309 46883e call 468900 305->309 310 468762-468779 307->310 311 4686ee-4686f7 307->311 318 468843 309->318 313 46877f-468784 310->313 311->307 315 4686f9-468709 GetCPInfo 311->315 316 468786-46878b 313->316 317 4687b2-4687bc 313->317 319 468830-468837 315->319 320 46870f-46872c 315->320 316->317 321 46878d-468795 316->321 317->313 323 4687be-4687ea call 4688a4 317->323 322 468848 318->322 319->305 319->322 324 468732-468736 320->324 325 46881d 320->325 327 468797-46879a 321->327 328 4687ab-4687b0 321->328 322->303 323->309 330 46873c 324->330 331 4687f8 324->331 326 468824-46882e 325->326 326->309 332 4687a0-4687a9 327->332 328->316 328->317 334 46873f-468743 330->334 335 4687fa-468807 331->335 332->328 332->332 334->331 336 468749-46874d 334->336 335->335 337 468809-46881b call 4688a4 335->337 338 468750-468752 336->338 337->326 341 4687ec-4687f2 338->341 342 468758-468760 338->342 341->331 341->334 342->338
                APIs
                  • Part of subcall function 004685F5: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 00468632
                  • Part of subcall function 004685F5: EnterCriticalSection.KERNEL32(?,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046864D
                • GetCPInfo.KERNEL32(00000000,?,?,00000000,00000000,?,?,00467638), ref: 004686FE
                  • Part of subcall function 00468656: LeaveCriticalSection.KERNEL32(?,00468D8B,00000009,00468D77,00000000,?,00000000,00000000,00000000), ref: 00468663
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: CriticalSection$EnterInfoInitializeLeave
                • String ID:
                • API String ID: 1866836854-0
                • Opcode ID: d544553c3794957d79ceab9ece9c6795c21eceff83caea486740067c3f9cd554
                • Instruction ID: 72f3e8e95f47c0a7d074f3bfbe55f138b4f0ed167d66031de908a5d040259cbe
                • Opcode Fuzzy Hash: d544553c3794957d79ceab9ece9c6795c21eceff83caea486740067c3f9cd554
                • Instruction Fuzzy Hash: 294144719142509EEB10EBA4CC8436A7BA1DB05316F28423FD245CB292FF794986878F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 343 468cbe-468ce9 344 468d2e-468d31 343->344 345 468ceb-468cf4 343->345 346 468d8d-468d92 344->346 348 468d33-468d38 344->348 345->346 347 468cfa-468d1e call 4685f5 call 469a2b call 468d25 345->347 352 468d97-468d9c 346->352 353 468d94-468d96 346->353 347->346 368 468d20 347->368 349 468d42-468d44 348->349 350 468d3a-468d40 348->350 354 468d45-468d4e 349->354 350->354 356 468d9d-468da5 RtlAllocateHeap 352->356 353->352 357 468d50-468d7c call 4685f5 call 46a1d8 call 468d84 354->357 358 468d7e-468d7f 354->358 360 468dab-468db9 356->360 357->358 357->360 358->356 368->360
                APIs
                • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 00468DA5
                  • Part of subcall function 004685F5: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 00468632
                  • Part of subcall function 004685F5: EnterCriticalSection.KERNEL32(?,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046864D
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: CriticalSection$AllocateEnterHeapInitialize
                • String ID:
                • API String ID: 1616793339-0
                • Opcode ID: d61b49250cba0679e96cc4cfd21523a09ec566e2447095eb700d5c577036a16c
                • Instruction ID: 023bd7e95caace73af2066e80e319a55485bbdef7d29d97c7b16ee4f705c963f
                • Opcode Fuzzy Hash: d61b49250cba0679e96cc4cfd21523a09ec566e2447095eb700d5c577036a16c
                • Instruction Fuzzy Hash: 4521AC71640608ABDB10EF65DC41B9E7774EB10724F14431FF410EB2D1FB7899418A6E
                APIs
                • GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                • GetProcAddress.KERNEL32(00000000), ref: 00466948
                • GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                • GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: .$2$3$A$E$E$K$L$L$L$Libr$LoadLibr$LoadLibr$N$R$a$a$b$d$d$i$l$l$o$r$r$y
                • API String ID: 1646373207-713136220
                • Opcode ID: ab11df402e6262a6cd0bd32f4206eccbc3d47516eb2c55da4dfc699759f1ff03
                • Instruction ID: 408384f28f9ef53e4cf42fff1d531f2f4c792ab3fc2232b330d19c68f6871aa3
                • Opcode Fuzzy Hash: ab11df402e6262a6cd0bd32f4206eccbc3d47516eb2c55da4dfc699759f1ff03
                • Instruction Fuzzy Hash: D621DF519082DDEDEF0297A8C8087EEBFA65F12348F184099D58476292D3FE4658C7BA
                APIs
                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467CFA
                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467D0E
                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467D3A
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0046762E), ref: 00467D72
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0046762E), ref: 00467D94
                • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,0046762E), ref: 00467DAD
                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467DC0
                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00467DFE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                • String ID: .vF
                • API String ID: 1823725401-726173741
                • Opcode ID: 21081ef7853c4b6e1e71b35f9d3aba763abd31334b7cf08a66a00147fecdca15
                • Instruction ID: e0ff4c1f4c83d16eda3da060816b460531535d088a5a1c2de0a90e5b0c67148f
                • Opcode Fuzzy Hash: 21081ef7853c4b6e1e71b35f9d3aba763abd31334b7cf08a66a00147fecdca15
                • Instruction Fuzzy Hash: E93103B250D2656FD7217F789C8487B7A9CEE4535C7150E3BF582C3200FA298C8182AB
                APIs
                • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,0046859D,?,Microsoft Visual C++ Runtime Library,00012010,?,00466618,?,00466668,?,?,?,Runtime Error!Program: ), ref: 0046A516
                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0046A52E
                • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0046A53F
                • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0046A54C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AddressProc$LibraryLoad
                • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$hfF$user32.dll
                • API String ID: 2238633743-3168188537
                • Opcode ID: cfa0cc50ece0866b78a170ab5342ea6b85cd7e283ba0fb2aa1623d024210fd94
                • Instruction ID: 744f6a593e7a9add090b9772e32a29f883b75c07cff326d20426f5d76b4cd1ff
                • Opcode Fuzzy Hash: cfa0cc50ece0866b78a170ab5342ea6b85cd7e283ba0fb2aa1623d024210fd94
                • Instruction Fuzzy Hash: 02011E72600651AB8711DFB5DC80A5B7BE8EB54795714443BF102E2221F7B8CCA19FAF
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004684E6
                • GetStdHandle.KERNEL32(000000F4,00466618,00000000,00000000,00000000,?), ref: 004685BC
                • WriteFile.KERNEL32(00000000), ref: 004685C3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: File$HandleModuleNameWrite
                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                • API String ID: 3784150691-4022980321
                • Opcode ID: e2e85c8ef0b16a8288ff27266e0de427043c067a522af83105a15374f6e707cc
                • Instruction ID: 2056a4cf523c6c61efd455e582aa4bd90fb20045327001bf824e2cedd7879936
                • Opcode Fuzzy Hash: e2e85c8ef0b16a8288ff27266e0de427043c067a522af83105a15374f6e707cc
                • Instruction Fuzzy Hash: 6631C5B2600218AFEF20EB60DD45F9A736CEB55704F10065FF545E6051FA78EA418A6F
                APIs
                • GetStringTypeW.KERNEL32(00000001,00466730,00000001,?,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A91C
                • GetStringTypeA.KERNEL32(00000000,00000001,0046672C,00000001,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A936
                • GetStringTypeA.KERNEL32(?,?,?,?,0046AB02,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A96A
                • MultiByteToWideChar.KERNEL32(?,0046B7E5,?,?,00000000,00000000,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A9A2
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,0046AB02,?), ref: 0046A9F8
                • GetStringTypeW.KERNEL32(?,?,00000000,0046AB02,?,?,?,?,?,?,0046AB02,?), ref: 0046AA0A
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: StringType$ByteCharMultiWide
                • String ID:
                • API String ID: 3852931651-0
                • Opcode ID: ab4217411143ffe3254ca9e7388d5397779f7d60e845bb51e8d462f5dba7c91c
                • Instruction ID: 5d04ebb630ede76be34a412984aa30ef206bdfb02e237f80f5ded91fe66f7989
                • Opcode Fuzzy Hash: ab4217411143ffe3254ca9e7388d5397779f7d60e845bb51e8d462f5dba7c91c
                • Instruction Fuzzy Hash: 3F417EB1600609BFCF108F94DD85EAF3B69EB05754F204526F915F2260E3398DA4DBAB
                APIs
                • GetVersionExA.KERNEL32 ref: 004680E7
                • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 0046811C
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0046817C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: EnvironmentFileModuleNameVariableVersion
                • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                • API String ID: 1385375860-4131005785
                • Opcode ID: 53528356a6435874c4cea8836d0c504b681df6164dbf9ca25d22a8d434fd30e9
                • Instruction ID: 5b987649a18d894d0e495aeb664bcd7067431a9f38e5e2f94aadff08a1f212ff
                • Opcode Fuzzy Hash: 53528356a6435874c4cea8836d0c504b681df6164dbf9ca25d22a8d434fd30e9
                • Instruction Fuzzy Hash: 3331F3719452886AEB3186709C51BDB37689B03308F1402DFE185E5242FE788EC7CB1B
                APIs
                • GetStartupInfoA.KERNEL32(?), ref: 00467E6F
                • GetFileType.KERNEL32(?,?,00000000), ref: 00467F1A
                • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00467F7D
                • GetFileType.KERNEL32(00000000,?,00000000), ref: 00467F8B
                • SetHandleCount.KERNEL32 ref: 00467FC2
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: FileHandleType$CountInfoStartup
                • String ID:
                • API String ID: 1710529072-0
                • Opcode ID: 34c641e5c7566a4f61e51126171c732304a31f5bcaff118d0c42436aae4cc374
                • Instruction ID: 904a1bf5860a3ccec006ab94641980349b31f95e458b6625cd4b51425871e72e
                • Opcode Fuzzy Hash: 34c641e5c7566a4f61e51126171c732304a31f5bcaff118d0c42436aae4cc374
                • Instruction Fuzzy Hash: AD5134315083058FD724CF28C884B667BA0EB1172CF2446AED5A6DB6E1F7389C49C75B
                APIs
                • GetLastError.KERNEL32(00000103,7FFFFFFF,0046AAAD,00469480,00000000,?,?,00000000,00000001), ref: 00468036
                • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 00468044
                • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 00468090
                  • Part of subcall function 00469175: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046926B
                • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00468068
                • GetCurrentThreadId.KERNEL32 ref: 00468079
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: ErrorLastValue$AllocCurrentHeapThread
                • String ID:
                • API String ID: 2020098873-0
                • Opcode ID: 8052f77e0d2cf52281169dad796c00c49ce1532b00fa052d94a585fd97d9bf58
                • Instruction ID: b74b10b1bdd3e7229d6419e3796b190ce8a51909fc87ae4804f62f1af361191e
                • Opcode Fuzzy Hash: 8052f77e0d2cf52281169dad796c00c49ce1532b00fa052d94a585fd97d9bf58
                • Instruction Fuzzy Hash: B4F0F6316002515BD7302B75BD0956A3B649B01771B150B3EF5C2E56B0EF788CC5466A
                APIs
                • HeapAlloc.KERNEL32(00000000,00002020,00463C80,00463C80,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F01
                • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F25
                • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F3F
                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000,?), ref: 0046A000
                • HeapFree.KERNEL32(00000000,00000000,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000,?,00000000), ref: 0046A017
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AllocVirtual$FreeHeap
                • String ID:
                • API String ID: 714016831-0
                • Opcode ID: 2bf0c84c70cf4df8327d2a3aebbceef8d6b212f0e4515c6402ae096c437e29aa
                • Instruction ID: 445181fbcf65ce7e9d39d92d2b604eca806c0f8a9288605ab4d6bb1f59089151
                • Opcode Fuzzy Hash: 2bf0c84c70cf4df8327d2a3aebbceef8d6b212f0e4515c6402ae096c437e29aa
                • Instruction Fuzzy Hash: 1C31D072600701ABE3308F24DC44B66BBA8EB44755F11423BF156E7790FBB8AD409B4E
                APIs
                • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,00469AFC,00000000,00000000,00000000,00468D0C,00000000,00000000,?,00000000,00000000,00000000), ref: 00469D5C
                • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,00469AFC,00000000,00000000,00000000,00468D0C,00000000,00000000,?,00000000,00000000,00000000), ref: 00469D90
                • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 00469DAA
                • HeapFree.KERNEL32(00000000,?), ref: 00469DC1
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: AllocHeap$FreeVirtual
                • String ID:
                • API String ID: 3499195154-0
                • Opcode ID: 85db0018b5f02a0a531da6da56e99f1b82eb4dab677bd662bfc4afaa2d152d60
                • Instruction ID: a1c2a3597b2230bcaeaffa70772468b135f739cde47e51b730ca6c90506df880
                • Opcode Fuzzy Hash: 85db0018b5f02a0a531da6da56e99f1b82eb4dab677bd662bfc4afaa2d152d60
                • Instruction Fuzzy Hash: AE114F70600701EFC7218F2AEC45D627BB9FB85721711493AF1A2D65B0E3B198C2CF8A
                APIs
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685D9
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685E1
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685E9
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685F1
                Memory Dump Source
                • Source File: 00000000.00000002.2080870374.0000000000465000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2080798679.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080822459.0000000000401000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080890901.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2080911048.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_PQ2.jbxd
                Similarity
                • API ID: CriticalInitializeSection
                • String ID:
                • API String ID: 32694325-0
                • Opcode ID: 503c6c650575022db7612a51c23a455fa7bd590d9805bfc3dac3f36800976718
                • Instruction ID: 0ad9e4f4a03855f4481bac37ad47b37e425ca202d897247833f3bf621bba40d6
                • Opcode Fuzzy Hash: 503c6c650575022db7612a51c23a455fa7bd590d9805bfc3dac3f36800976718
                • Instruction Fuzzy Hash: 6BC002318040B49ACF126F95FE06946BF25EB447A23050077F5845143497A21D50FFD9

                Execution Graph

                Execution Coverage:5.5%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:406
                Total number of Limit Nodes:17
                execution_graph 5367 467598 GetVersion 5398 468210 HeapCreate 5367->5398 5369 4675f6 5370 467603 5369->5370 5371 4675fb 5369->5371 5410 467fcd 5370->5410 5486 4676c5 5371->5486 5375 467608 5376 467614 5375->5376 5377 46760c 5375->5377 5420 467e11 5376->5420 5378 4676c5 8 API calls 5377->5378 5381 467613 5378->5381 5380 46761e GetCommandLineA 5434 467cdf 5380->5434 5381->5376 5385 467638 5466 4679d9 5385->5466 5387 46763d 5388 467642 GetStartupInfoA 5387->5388 5479 467981 5388->5479 5390 467654 GetModuleHandleA 5483 46758a 5390->5483 5397 467692 5399 468266 5398->5399 5400 468230 5398->5400 5399->5369 5500 4680c8 5400->5500 5403 46823f 5512 46968f HeapAlloc 5403->5512 5404 46824c 5406 468269 5404->5406 5514 469ee0 5404->5514 5406->5369 5407 468249 5407->5406 5409 46825a HeapDestroy 5407->5409 5409->5399 5750 4685cc InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 5410->5750 5412 467fd3 TlsAlloc 5413 467fe3 5412->5413 5414 46801d 5412->5414 5415 469175 30 API calls 5413->5415 5414->5375 5416 467fec 5415->5416 5416->5414 5417 467ff4 TlsSetValue 5416->5417 5417->5414 5418 468005 5417->5418 5419 46800b GetCurrentThreadId 5418->5419 5419->5375 5421 468c80 29 API calls 5420->5421 5422 467e24 5421->5422 5423 467e32 GetStartupInfoA 5422->5423 5424 4676a0 7 API calls 5422->5424 5430 467f51 5423->5430 5433 467e80 5423->5433 5424->5423 5426 467f7c GetStdHandle 5429 467f8a GetFileType 5426->5429 5426->5430 5427 467fbc SetHandleCount 5427->5380 5428 468c80 29 API calls 5428->5433 5429->5430 5430->5426 5430->5427 5431 467ef7 5431->5430 5432 467f19 GetFileType 5431->5432 5432->5431 5433->5428 5433->5430 5433->5431 5435 467d2d 5434->5435 5436 467cfa GetEnvironmentStringsW 5434->5436 5437 467d02 5435->5437 5439 467d1e 5435->5439 5436->5437 5438 467d0e GetEnvironmentStrings 5436->5438 5441 467d46 WideCharToMultiByte 5437->5441 5442 467d3a GetEnvironmentStringsW 5437->5442 5438->5439 5440 46762e 5438->5440 5439->5440 5443 467dc0 GetEnvironmentStrings 5439->5443 5444 467dcc 5439->5444 5457 467a92 5440->5457 5446 467dac FreeEnvironmentStringsW 5441->5446 5447 467d7a 5441->5447 5442->5440 5442->5441 5443->5440 5443->5444 5448 468c80 29 API calls 5444->5448 5446->5440 5449 468c80 29 API calls 5447->5449 5455 467de7 5448->5455 5450 467d80 5449->5450 5450->5446 5451 467d89 WideCharToMultiByte 5450->5451 5452 467d9a 5451->5452 5453 467da3 5451->5453 5456 468aa1 29 API calls 5452->5456 5453->5446 5454 467dfd FreeEnvironmentStringsA 5454->5440 5455->5454 5456->5453 5458 467aa4 5457->5458 5459 467aa9 GetModuleFileNameA 5457->5459 5751 468a85 5458->5751 5461 467acc 5459->5461 5462 468c80 29 API calls 5461->5462 5463 467aed 5462->5463 5464 467afd 5463->5464 5465 4676a0 7 API calls 5463->5465 5464->5385 5465->5464 5467 4679e6 5466->5467 5470 4679eb 5466->5470 5468 468a85 48 API calls 5467->5468 5468->5470 5469 468c80 29 API calls 5471 467a18 5469->5471 5470->5469 5472 4676a0 7 API calls 5471->5472 5478 467a2c 5471->5478 5472->5478 5473 467a6f 5474 468aa1 29 API calls 5473->5474 5475 467a7b 5474->5475 5475->5387 5476 468c80 29 API calls 5476->5478 5477 4676a0 7 API calls 5477->5478 5478->5473 5478->5476 5478->5477 5480 46798a 5479->5480 5482 46798f 5479->5482 5481 468a85 48 API calls 5480->5481 5481->5482 5482->5390 5780 46751a 5483->5780 5487 4676d3 5486->5487 5488 4676ce 5486->5488 5490 468479 7 API calls 5487->5490 5489 468440 7 API calls 5488->5489 5489->5487 5491 4676dc ExitProcess 5490->5491 5492 467716 5855 467738 5492->5855 5495 467809 5496 468034 35 API calls 5495->5496 5498 467814 5496->5498 5497 46793a UnhandledExceptionFilter 5499 467839 5497->5499 5498->5497 5498->5499 5499->5397 5499->5499 5523 469660 5500->5523 5503 4680f1 5504 46810b GetEnvironmentVariableA 5503->5504 5508 468103 5503->5508 5505 4681e8 5504->5505 5507 46812a 5504->5507 5505->5508 5528 46809b GetModuleHandleA 5505->5528 5509 46816f GetModuleFileNameA 5507->5509 5510 468167 5507->5510 5508->5403 5508->5404 5509->5510 5510->5505 5525 4692b2 5510->5525 5513 4696ab 5512->5513 5513->5407 5515 469ef4 HeapAlloc 5514->5515 5516 469eed 5514->5516 5517 469f11 VirtualAlloc 5515->5517 5522 469f49 5515->5522 5516->5517 5518 46a006 5517->5518 5519 469f31 VirtualAlloc 5517->5519 5520 46a00e HeapFree 5518->5520 5518->5522 5521 469ff8 VirtualFree 5519->5521 5519->5522 5520->5522 5521->5518 5522->5407 5524 4680d5 GetVersionExA 5523->5524 5524->5503 5524->5504 5530 4692c9 5525->5530 5529 4680b2 5528->5529 5529->5508 5532 4692e1 5530->5532 5534 469311 5532->5534 5539 46abec 5532->5539 5533 46abec 6 API calls 5533->5534 5534->5533 5537 46943a 5534->5537 5538 4692c5 5534->5538 5543 46aab1 5534->5543 5537->5538 5554 46aaa8 5537->5554 5538->5505 5540 46abfe 5539->5540 5541 46ac0a 5539->5541 5540->5532 5557 46a8dd 5541->5557 5544 46aacf InterlockedIncrement 5543->5544 5545 46aabc 5543->5545 5546 46aaeb InterlockedDecrement 5544->5546 5547 46aaf5 5544->5547 5545->5534 5569 4685f5 5546->5569 5584 46ab20 5547->5584 5551 46ab15 InterlockedDecrement 5551->5545 5552 46ab0b 5590 468656 LeaveCriticalSection 5552->5590 5722 468034 GetLastError TlsGetValue 5554->5722 5556 46aaad 5556->5538 5558 46a90e GetStringTypeW 5557->5558 5559 46a926 5557->5559 5558->5559 5560 46a92a GetStringTypeA 5558->5560 5562 46a951 GetStringTypeA 5559->5562 5563 46a975 5559->5563 5560->5559 5564 46aa12 5560->5564 5562->5564 5563->5564 5565 46a98b MultiByteToWideChar 5563->5565 5564->5540 5565->5564 5566 46a9af 5565->5566 5566->5564 5567 46a9e9 MultiByteToWideChar 5566->5567 5567->5564 5568 46aa02 GetStringTypeW 5567->5568 5568->5564 5570 46860d 5569->5570 5571 46864b EnterCriticalSection 5569->5571 5591 468c80 5570->5591 5571->5547 5574 468623 5576 4685f5 27 API calls 5574->5576 5577 46862b 5576->5577 5578 468632 InitializeCriticalSection 5577->5578 5579 46863c 5577->5579 5580 468641 5578->5580 5600 468aa1 5579->5600 5617 468656 LeaveCriticalSection 5580->5617 5583 468649 5583->5571 5585 46ab4b 5584->5585 5589 46ab02 5584->5589 5586 46ab67 5585->5586 5587 46abec 6 API calls 5585->5587 5586->5589 5704 46a68e 5586->5704 5587->5586 5589->5551 5589->5552 5590->5545 5618 468c92 5591->5618 5594 4676a0 5595 4676ae 5594->5595 5596 4676a9 5594->5596 5663 468479 5595->5663 5657 468440 5596->5657 5601 468acf 5600->5601 5602 468b7b 5600->5602 5603 468b14 5601->5603 5604 468ad9 5601->5604 5602->5580 5605 468b05 5603->5605 5608 4685f5 28 API calls 5603->5608 5606 4685f5 28 API calls 5604->5606 5605->5602 5607 468b6d HeapFree 5605->5607 5609 468ae0 5606->5609 5607->5602 5610 468b20 5608->5610 5611 468afa 5609->5611 5677 469702 5609->5677 5612 468b4c 5610->5612 5686 46a193 5610->5686 5683 468b0b 5611->5683 5690 468b63 5612->5690 5617->5583 5619 468615 5618->5619 5621 468c99 5618->5621 5619->5574 5619->5594 5621->5619 5622 468cbe 5621->5622 5623 468d2e 5622->5623 5624 468ceb 5622->5624 5630 4685f5 28 API calls 5623->5630 5634 468d19 5623->5634 5625 4685f5 28 API calls 5624->5625 5624->5634 5627 468d01 5625->5627 5626 468d9d HeapAlloc 5628 468d20 5626->5628 5638 469a2b 5627->5638 5628->5621 5632 468d57 5630->5632 5647 46a1d8 5632->5647 5634->5626 5634->5628 5636 468d6a 5654 468d84 5636->5654 5641 469a5d 5638->5641 5639 469afc 5640 469de5 VirtualAlloc 5639->5640 5643 468d0c 5639->5643 5640->5643 5641->5639 5642 469d34 HeapReAlloc HeapAlloc VirtualAlloc HeapFree 5641->5642 5641->5643 5642->5639 5644 468d25 5643->5644 5645 468656 LeaveCriticalSection 5644->5645 5646 468d2c 5645->5646 5646->5634 5648 46a1e6 5647->5648 5649 46a2d2 VirtualAlloc 5648->5649 5650 46a3a7 5648->5650 5653 46a2a3 5648->5653 5649->5653 5651 469ee0 HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 5650->5651 5651->5653 5653->5636 5655 468656 LeaveCriticalSection 5654->5655 5656 468d8b 5655->5656 5656->5634 5658 46844a 5657->5658 5659 468479 7 API calls 5658->5659 5662 468477 5658->5662 5660 468461 5659->5660 5661 468479 7 API calls 5660->5661 5661->5662 5662->5595 5665 46848c 5663->5665 5664 4685a3 5667 4685b6 GetStdHandle WriteFile 5664->5667 5665->5664 5666 4684cc 5665->5666 5671 4676b7 5665->5671 5668 4684d8 GetModuleFileNameA 5666->5668 5666->5671 5667->5671 5669 4684f0 5668->5669 5672 46a504 5669->5672 5671->5574 5673 46a511 LoadLibraryA 5672->5673 5674 46a553 5672->5674 5673->5674 5675 46a522 GetProcAddress 5673->5675 5674->5671 5675->5674 5676 46a539 GetProcAddress GetProcAddress 5675->5676 5676->5674 5678 469740 5677->5678 5682 4699f6 5677->5682 5679 46993c VirtualFree 5678->5679 5678->5682 5680 4699a0 5679->5680 5681 4699af VirtualFree HeapFree 5680->5681 5680->5682 5681->5682 5682->5611 5693 468656 LeaveCriticalSection 5683->5693 5685 468b12 5685->5605 5687 46a1d6 5686->5687 5688 46a1c0 5686->5688 5687->5612 5688->5687 5694 46a07a 5688->5694 5703 468656 LeaveCriticalSection 5690->5703 5692 468b6a 5692->5605 5693->5685 5696 46a087 5694->5696 5695 46a137 5695->5687 5696->5695 5697 46a0a8 VirtualFree 5696->5697 5699 46a024 VirtualFree 5696->5699 5697->5696 5700 46a041 5699->5700 5701 46a071 5700->5701 5702 46a051 HeapFree 5700->5702 5701->5696 5702->5696 5703->5692 5705 46a6be LCMapStringW 5704->5705 5707 46a6da 5704->5707 5706 46a6e2 LCMapStringA 5705->5706 5705->5707 5706->5707 5710 46a81c 5706->5710 5708 46a723 LCMapStringA 5707->5708 5709 46a740 5707->5709 5708->5710 5709->5710 5711 46a756 MultiByteToWideChar 5709->5711 5710->5589 5711->5710 5712 46a780 5711->5712 5712->5710 5713 46a7b6 MultiByteToWideChar 5712->5713 5713->5710 5714 46a7cf LCMapStringW 5713->5714 5714->5710 5715 46a7ea 5714->5715 5716 46a7f0 5715->5716 5718 46a830 5715->5718 5716->5710 5717 46a7fe LCMapStringW 5716->5717 5717->5710 5718->5710 5719 46a868 LCMapStringW 5718->5719 5719->5710 5720 46a880 WideCharToMultiByte 5719->5720 5720->5710 5723 468050 5722->5723 5724 46808f SetLastError 5722->5724 5733 469175 5723->5733 5724->5556 5727 468087 5729 4676a0 7 API calls 5727->5729 5728 468061 TlsSetValue 5728->5727 5730 468072 5728->5730 5731 46808e 5729->5731 5732 468078 GetCurrentThreadId 5730->5732 5731->5724 5732->5724 5734 4691aa 5733->5734 5735 4685f5 29 API calls 5734->5735 5736 469262 HeapAlloc 5734->5736 5737 469a2b 5 API calls 5734->5737 5738 468059 5734->5738 5739 46a1d8 6 API calls 5734->5739 5742 46920e 5734->5742 5745 469297 5734->5745 5735->5734 5736->5734 5737->5734 5738->5727 5738->5728 5739->5734 5748 468656 LeaveCriticalSection 5742->5748 5744 469215 5744->5734 5749 468656 LeaveCriticalSection 5745->5749 5747 46929e 5747->5734 5748->5744 5749->5747 5750->5412 5752 468a8e 5751->5752 5754 468a95 5751->5754 5755 4686ad 5752->5755 5754->5459 5756 4685f5 29 API calls 5755->5756 5757 4686bd 5756->5757 5766 46885a 5757->5766 5761 468852 5761->5754 5762 4686f9 GetCPInfo 5765 46870f 5762->5765 5764 4686d4 5779 468656 LeaveCriticalSection 5764->5779 5765->5764 5771 468900 GetCPInfo 5765->5771 5767 46887a 5766->5767 5768 46886a GetOEMCP 5766->5768 5769 46887f GetACP 5767->5769 5770 4686c5 5767->5770 5768->5767 5769->5770 5770->5762 5770->5764 5770->5765 5775 468923 5771->5775 5778 4689eb 5771->5778 5772 46a8dd 6 API calls 5773 46899f 5772->5773 5774 46a68e 9 API calls 5773->5774 5776 4689c3 5774->5776 5775->5772 5777 46a68e 9 API calls 5776->5777 5777->5778 5778->5764 5779->5761 5781 46754a 5780->5781 5786 466b6a 5781->5786 5783 467550 5785 467584 5783->5785 5805 46732f 5783->5805 5785->5492 5816 4668c0 GetModuleHandleA GetProcAddress 5786->5816 5789 4668c0 4 API calls 5790 466c38 5789->5790 5791 4668c0 4 API calls 5790->5791 5792 466c71 5791->5792 5793 466c96 VirtualAlloc 5792->5793 5803 466d75 5792->5803 5794 466cad 5793->5794 5795 466cd0 VirtualAlloc 5794->5795 5794->5803 5796 466cfd 5795->5796 5822 466d84 5796->5822 5798 466d2e 5827 4670b7 5798->5827 5802 46732f 4 API calls 5802->5803 5803->5783 5804 466d52 5804->5802 5804->5803 5806 4668c0 4 API calls 5805->5806 5807 4673a9 5806->5807 5808 4668c0 4 API calls 5807->5808 5809 4673e9 5808->5809 5810 4668c0 4 API calls 5809->5810 5811 467435 5810->5811 5812 4668c0 4 API calls 5811->5812 5813 467469 5812->5813 5815 4674b7 5813->5815 5850 466a9d 5813->5850 5815->5785 5817 466952 5816->5817 5818 46695c GetModuleHandleA 5816->5818 5819 466958 GetProcAddress 5817->5819 5821 466974 5817->5821 5818->5817 5820 466976 5819->5820 5820->5789 5821->5820 5823 4668c0 4 API calls 5822->5823 5824 466e05 5823->5824 5825 466eac 5824->5825 5826 466e6a VirtualAlloc 5824->5826 5825->5798 5826->5824 5828 4668c0 4 API calls 5827->5828 5829 467138 5828->5829 5830 4668c0 4 API calls 5829->5830 5833 46717c 5830->5833 5831 4671c4 LoadLibraryA 5831->5833 5835 466d47 5831->5835 5833->5831 5834 467238 GetProcAddress 5833->5834 5833->5835 5843 46697b 5833->5843 5834->5833 5835->5804 5836 466eb1 5835->5836 5837 4668c0 4 API calls 5836->5837 5838 466f2a 5837->5838 5839 4668c0 4 API calls 5838->5839 5842 466f76 5839->5842 5840 467038 5840->5804 5841 46700e VirtualProtect 5841->5842 5842->5840 5842->5841 5844 4668c0 4 API calls 5843->5844 5845 466a02 5844->5845 5846 4668c0 4 API calls 5845->5846 5847 466a41 5846->5847 5848 4668c0 4 API calls 5847->5848 5849 466a78 5848->5849 5849->5833 5851 4668c0 4 API calls 5850->5851 5852 466b24 5851->5852 5853 4668c0 4 API calls 5852->5853 5854 466b57 5853->5854 5854->5815 5864 4677dd 5855->5864 5858 467749 GetCurrentProcess TerminateProcess 5861 46775a 5858->5861 5859 4677c4 5867 4677e6 5859->5867 5860 4677cb ExitProcess 5861->5859 5861->5860 5865 4685f5 29 API calls 5864->5865 5866 46773e 5865->5866 5866->5858 5866->5861 5870 468656 LeaveCriticalSection 5867->5870 5869 467681 5869->5495 5870->5869

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 466b6a-466c7f call 4668c0 * 3 7 466d76-466d78 0->7 8 466c85-466c90 0->8 9 466d7f-466d83 7->9 8->7 10 466c96-466cab VirtualAlloc 8->10 11 466cc6-466d36 VirtualAlloc call 466d84 10->11 12 466cad-466cc0 10->12 19 466d41-466d4a call 4670b7 11->19 20 466d38-466d40 call 46703d 11->20 12->7 12->11 25 466d6f-466d75 call 46732f 19->25 26 466d4c-466d5a call 466eb1 19->26 20->19 25->7 31 466d5c-466d60 26->31 32 466d7d 26->32 31->25 33 466d62-466d68 31->33 32->9 34 466d6b-466d6d 33->34 34->25 35 466d7a 34->35 35->32
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,?,?,?,?,?,?,004010F0), ref: 00466CA3
                • VirtualAlloc.KERNEL32(00000016,?,00001000,00000004,?,?,?,?,?,?,?,004010F0), ref: 00466CEE
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressAllocHandleModuleProcVirtual
                • String ID: A$A$G$H$H$HeapAlloc$KERNEL32.dll$P$V$VirtualAlloc$a$a$a$c$c$c$e$e$e$e$i$l$l$l$l$l$o$o$o$p$p$r$r$s$s$t$t$u
                • API String ID: 3695083113-2890414303
                • Opcode ID: eea5828057d8a8a3ca217eb1021cde760f26655aafc521580391e7091950ef6c
                • Instruction ID: 56dfe851e749cfa52889f2bfcfc8cef8fedfa8cb50ddae72ef14544c6a3e4736
                • Opcode Fuzzy Hash: eea5828057d8a8a3ca217eb1021cde760f26655aafc521580391e7091950ef6c
                • Instruction Fuzzy Hash: 06814271D08288DEEB11DBA8C844BDEBFF55F16708F084089E5807B282D7BE5549C77A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 36 466eb1-466f90 call 4668c0 * 2 41 466f96-466f9b 36->41 42 46703a-46703c 36->42 43 466f9e-466fbf 41->43 44 466fd1-466fe5 43->44 45 466fc1-466fcf 43->45 46 466fe7 44->46 47 466fed-466ff4 44->47 53 46701a 45->53 46->47 49 466ff6-466ffa 47->49 50 46700c 47->50 54 467001-467005 49->54 55 466ffc-466fff 49->55 51 46700e-467017 VirtualProtect 50->51 52 46701d-467032 50->52 51->53 52->43 56 467038-467039 52->56 53->52 54->52 58 467007 54->58 57 46700a 55->57 56->42 57->50 58->57
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • VirtualProtect.KERNEL32(?,?,00000000,?,00000016,00000000,?,?,?,?,?,?), ref: 00467017
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressHandleModuleProc$ProtectVirtual
                • String ID: @$F$KERNEL32.dll$P$RmF$RmF$V$V$a$a$c$e$e$e$i$i$l$l$o$r$r$r$r$t$t$t$t$u$u
                • API String ID: 2080333215-3833892956
                • Opcode ID: cb608eef3711ebfc93400a4942087660b63e14b03940701ee4406093afd551ff
                • Instruction ID: 72b4ce0505e3628847bb6db0ce6ea59a5e3d376deda158c5c7a16eff45700afd
                • Opcode Fuzzy Hash: cb608eef3711ebfc93400a4942087660b63e14b03940701ee4406093afd551ff
                • Instruction Fuzzy Hash: 60513270C082C8DEDB02CBA8D5887DEBFB56F16348F184099D5847B292D3BE5A09C776

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 59 4670b7-46719c call 4668c0 * 2 64 467272-467279 59->64 65 4671a2-4671ae 59->65 65->64 67 4671b4 65->67 68 4671b9-4671be 67->68 68->64 69 4671c4-4671d0 LoadLibraryA 68->69 70 4671d6-4671f0 call 46697b 69->70 71 46726e 69->71 70->71 74 4671f2-467202 70->74 71->64 75 467204-46720f 74->75 76 467211-467216 74->76 77 467219-467220 75->77 76->77 78 467255-467259 77->78 79 467222-467227 77->79 78->64 80 46725b-467266 78->80 81 467230-467235 79->81 82 467229-46722e 79->82 87 4671b6 80->87 88 46726c 80->88 83 467238-467246 GetProcAddress 81->83 82->83 85 467251 83->85 86 467248-46724f 83->86 85->78 86->77 87->68 88->64
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • LoadLibraryA.KERNEL32(?,?,?,?,00000016,00000000,?), ref: 004671C7
                • GetProcAddress.KERNEL32(?,GmF), ref: 0046723C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressProc$HandleModule$LibraryLoad
                • String ID: A$B$GmF$GmF$I$KERNEL32.dll$L$L$P$R$a$a$a$a$b$d$d$d$e$i$o$r$r$r$s$t$y
                • API String ID: 551388010-1369886350
                • Opcode ID: 9146fd96053e2050b3294d5e699eb0beb02dc719ea692024da2c8e9b1210d4cc
                • Instruction ID: 73e0fe1b8e5c6c9f5f942eac17084d9bf6255d1aace67817413c182afa2f5bd3
                • Opcode Fuzzy Hash: 9146fd96053e2050b3294d5e699eb0beb02dc719ea692024da2c8e9b1210d4cc
                • Instruction Fuzzy Hash: 30615470D08289DEEB11CBA8C8447DEBFF56F15358F184099E584A7382D3BD9944C776

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 89 466d84-466e25 call 4668c0 92 466eac-466eb0 89->92 93 466e2b 89->93 94 466e2e-466e31 93->94 95 466e33-466e3b 94->95 96 466e6a-466e98 VirtualAlloc 94->96 97 466e3d-466e68 95->97 98 466e9b-466eaa 95->98 96->98 97->98 98->92 98->94
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                • VirtualAlloc.KERNEL32(?,?,00001000,00000004,00000016,00000000,?), ref: 00466E7A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressProc$AllocHandleModuleVirtual
                • String ID: .$2$3$A$E$E$K$L$N$R$V$a$c$d$i$l$l$l$l$l$o$r$t$u
                • API String ID: 3787274985-1410553462
                • Opcode ID: 9a20da68c6a90be79534ff80353c2f0603882a79139077a3888f10a88befb3b9
                • Instruction ID: b7ee7351b5069f9bbbcd0e3288277ca9420c032c07cd61825cf92ba50ad0a3c8
                • Opcode Fuzzy Hash: 9a20da68c6a90be79534ff80353c2f0603882a79139077a3888f10a88befb3b9
                • Instruction Fuzzy Hash: 02416171D04288DBDF01CBA8C448BDEBFF1AF55704F084099D584AB382D3BA5A58C779

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 46a68e-46a6bc 101 46a704-46a707 100->101 102 46a6be-46a6d8 LCMapStringW 100->102 105 46a719-46a721 101->105 106 46a709-46a716 call 46a8b2 101->106 103 46a6e2-46a6f4 LCMapStringA 102->103 104 46a6da-46a6e0 102->104 107 46a81c 103->107 108 46a6fa 103->108 104->101 110 46a723-46a73b LCMapStringA 105->110 111 46a740-46a743 105->111 106->105 113 46a81e-46a82f 107->113 108->101 110->113 111->107 114 46a749-46a74c 111->114 115 46a756-46a77a MultiByteToWideChar 114->115 116 46a74e-46a753 114->116 115->107 117 46a780-46a7b4 call 469660 115->117 116->115 117->107 121 46a7b6-46a7cd MultiByteToWideChar 117->121 121->107 122 46a7cf-46a7e8 LCMapStringW 121->122 122->107 123 46a7ea-46a7ee 122->123 124 46a830-46a866 call 469660 123->124 125 46a7f0-46a7f3 123->125 124->107 132 46a868-46a87e LCMapStringW 124->132 126 46a8ab-46a8ad 125->126 127 46a7f9-46a7fc 125->127 126->113 127->107 129 46a7fe-46a816 LCMapStringW 127->129 129->107 129->126 132->107 133 46a880-46a885 132->133 134 46a887-46a889 133->134 135 46a88b-46a88e 133->135 136 46a891-46a8a5 WideCharToMultiByte 134->136 135->136 136->107 136->126
                APIs
                • LCMapStringW.KERNEL32(00000000,00000100,00466730,00000001,00000000,00000000,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A6D0
                • LCMapStringA.KERNEL32(00000000,00000100,0046672C,00000001,00000000,00000000,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A6EC
                • LCMapStringA.KERNEL32(?,?,?,0046AB02,?,?,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A735
                • MultiByteToWideChar.KERNEL32(?,0046B7E5,?,0046AB02,00000000,00000000,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A76D
                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,0046AB02,?,00000000,?,?,0046AB02,?), ref: 0046A7C5
                • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0046AB02,?), ref: 0046A7DB
                • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,0046AB02,?), ref: 0046A80E
                • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,0046AB02,?), ref: 0046A876
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: String$ByteCharMultiWide
                • String ID:
                • API String ID: 352835431-0
                • Opcode ID: a28fd5e3e5a475bf9b6a264a68c1a845a1e8dddc284e8329ea69289aa823242b
                • Instruction ID: 12cc6b9feb3d9a71118cc58f801efc8483379fe271ac96587175e3a828ac97c7
                • Opcode Fuzzy Hash: a28fd5e3e5a475bf9b6a264a68c1a845a1e8dddc284e8329ea69289aa823242b
                • Instruction Fuzzy Hash: F4516B71900649ABCF219F94CD49AAF7FB9FB48750F10412AF910B2261E3398C61DF6B

                Control-flow Graph

                APIs
                • GetVersion.KERNEL32 ref: 004675BE
                  • Part of subcall function 00468210: HeapCreate.KERNEL32(00000000,00001000,00000000,004675F6,00000001), ref: 00468221
                  • Part of subcall function 00468210: HeapDestroy.KERNEL32 ref: 00468260
                • GetCommandLineA.KERNEL32 ref: 0046761E
                • GetStartupInfoA.KERNEL32(?), ref: 00467649
                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 0046766C
                  • Part of subcall function 004676C5: ExitProcess.KERNEL32 ref: 004676E2
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                • String ID: x1m
                • API String ID: 2057626494-1358822061
                • Opcode ID: 74ae398f86775484538032804f60e5769ebf57acb35412f92e8c4fd7a89ff731
                • Instruction ID: f877db75b34aef535155fa93e1ad8a33f9cc10bfb3bd4b0f6148cfe794d3ada0
                • Opcode Fuzzy Hash: 74ae398f86775484538032804f60e5769ebf57acb35412f92e8c4fd7a89ff731
                • Instruction Fuzzy Hash: 902165B19447059ED704AFB5DD46A6E7BA8EF0471CF10452FF501972A2FB784880CB9B

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 171 468900-46891d GetCPInfo 172 468923-468925 171->172 173 468a39-468a3b 171->173 174 46892a-468934 172->174 175 468a40-468a43 173->175 174->174 176 468936-468942 174->176 177 468a45-468a48 175->177 178 468a5e-468a61 175->178 181 468944-468946 176->181 182 46897b-4689be call 46a8dd call 46a68e 176->182 177->178 183 468a4a-468a53 177->183 179 468a76 178->179 180 468a63-468a66 178->180 186 468a7d-468a80 179->186 180->179 185 468a68-468a74 180->185 187 468949-468951 181->187 195 4689c3-4689f0 call 46a68e 182->195 184 468a56-468a5c 183->184 184->186 185->184 186->175 189 468a82-468a84 186->189 190 468953-46896e 187->190 191 468970-468977 187->191 190->191 191->187 194 468979-46897a 191->194 194->182 198 4689f6-4689fc 195->198 199 468a14-468a17 198->199 200 4689fe-468a05 198->200 202 468a29 199->202 203 468a19-468a27 199->203 201 468a0c-468a12 200->201 204 468a30-468a35 201->204 202->204 203->201 204->198 205 468a37 204->205 205->189
                APIs
                • GetCPInfo.KERNEL32(?,00000000), ref: 00468914
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: Info
                • String ID: $
                • API String ID: 1807457897-3032137957
                • Opcode ID: 8a739a128cb405312d00240f0076b108f8cfc1bf0800c8ea65d5b8b068e5d4fd
                • Instruction ID: b91b7a80f5c212ae6bf3e4eeca3f6c145e7dbed152764a56bdc0ce5edf8456d9
                • Opcode Fuzzy Hash: 8a739a128cb405312d00240f0076b108f8cfc1bf0800c8ea65d5b8b068e5d4fd
                • Instruction Fuzzy Hash: 1D4156310042581AEB119694CD59BF63FE8DB06700F1801EBDA85D7152FB7A49989BFF

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 206 468210-46822e HeapCreate 207 468266-468268 206->207 208 468230-46823d call 4680c8 206->208 211 46823f-46824a call 46968f 208->211 212 46824c-46824f 208->212 218 468256-468258 211->218 214 468251 call 469ee0 212->214 215 468269-46826c 212->215 214->218 218->215 219 46825a-468260 HeapDestroy 218->219 219->207
                APIs
                • HeapCreate.KERNEL32(00000000,00001000,00000000,004675F6,00000001), ref: 00468221
                  • Part of subcall function 004680C8: GetVersionExA.KERNEL32 ref: 004680E7
                • HeapDestroy.KERNEL32 ref: 00468260
                  • Part of subcall function 0046968F: HeapAlloc.KERNEL32(00000000,00000140,00468249,000003F8), ref: 0046969C
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: Heap$AllocCreateDestroyVersion
                • String ID:
                • API String ID: 2507506473-0
                • Opcode ID: 00308e250556f24be53d22c4c1e5b2513877d9e21008081d955c28075247dc7a
                • Instruction ID: 6e6482bd650207ad86c54233ac2670d8762018555e74c8298600f12d13cd5025
                • Opcode Fuzzy Hash: 00308e250556f24be53d22c4c1e5b2513877d9e21008081d955c28075247dc7a
                • Instruction Fuzzy Hash: D1F0ED70B58B019BEB206B719C4133A3794DB44792F104A7FF500D81A0FFB888C0965F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 233 4686ad-4686d2 call 4685f5 call 46885a 238 4686d4-4686d6 233->238 239 4686db-4686dd 233->239 240 46884b-468859 call 468656 238->240 241 4686e3-4686e5 239->241 242 468839 call 4688d7 239->242 245 4686ea-4686ec 241->245 247 46883e call 468900 242->247 248 468762-468779 245->248 249 4686ee-4686f7 245->249 253 468843 247->253 251 46877f-468784 248->251 249->245 250 4686f9-468709 GetCPInfo 249->250 254 468830-468837 250->254 255 46870f-46872c 250->255 256 468786-46878b 251->256 257 4687b2-4687bc 251->257 262 468848 253->262 254->242 254->262 259 468732-468736 255->259 260 46881d 255->260 256->257 261 46878d-468795 256->261 257->251 258 4687be-4687ea call 4688a4 257->258 258->247 264 46873c 259->264 265 4687f8 259->265 266 468824-46882e 260->266 267 468797-46879a 261->267 268 4687ab-4687b0 261->268 262->240 270 46873f-468743 264->270 271 4687fa-468807 265->271 266->247 272 4687a0-4687a9 267->272 268->256 268->257 270->265 273 468749-46874d 270->273 271->271 274 468809-46881b call 4688a4 271->274 272->268 272->272 275 468750-468752 273->275 274->266 277 4687ec-4687f2 275->277 278 468758-468760 275->278 277->265 277->270 278->275
                APIs
                  • Part of subcall function 004685F5: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 00468632
                  • Part of subcall function 004685F5: EnterCriticalSection.KERNEL32(?,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046864D
                • GetCPInfo.KERNEL32(00000000,?,?,00000000,00000000,?,?,00467638), ref: 004686FE
                  • Part of subcall function 00468656: LeaveCriticalSection.KERNEL32(?,00468D8B,00000009,00468D77,00000000,?,00000000,00000000,00000000), ref: 00468663
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: CriticalSection$EnterInfoInitializeLeave
                • String ID:
                • API String ID: 1866836854-0
                • Opcode ID: d544553c3794957d79ceab9ece9c6795c21eceff83caea486740067c3f9cd554
                • Instruction ID: 72f3e8e95f47c0a7d074f3bfbe55f138b4f0ed167d66031de908a5d040259cbe
                • Opcode Fuzzy Hash: d544553c3794957d79ceab9ece9c6795c21eceff83caea486740067c3f9cd554
                • Instruction Fuzzy Hash: 294144719142509EEB10EBA4CC8436A7BA1DB05316F28423FD245CB292FF794986878F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 288 4668c0-466950 GetModuleHandleA GetProcAddress 289 466952-466955 288->289 290 46695c-466963 GetModuleHandleA 288->290 291 466958-46695a GetProcAddress 289->291 292 466965-46696c 290->292 293 46696e-466972 290->293 294 466976-46697a 291->294 292->293 296 466974 292->296 293->291 296->294
                APIs
                • GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                • GetProcAddress.KERNEL32(00000000), ref: 00466948
                • GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                • GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: .$2$3$A$E$E$K$L$L$L$Libr$LoadLibr$LoadLibr$N$R$a$a$b$d$d$i$l$l$o$r$r$y
                • API String ID: 1646373207-713136220
                • Opcode ID: ab11df402e6262a6cd0bd32f4206eccbc3d47516eb2c55da4dfc699759f1ff03
                • Instruction ID: 408384f28f9ef53e4cf42fff1d531f2f4c792ab3fc2232b330d19c68f6871aa3
                • Opcode Fuzzy Hash: ab11df402e6262a6cd0bd32f4206eccbc3d47516eb2c55da4dfc699759f1ff03
                • Instruction Fuzzy Hash: D621DF519082DDEDEF0297A8C8087EEBFA65F12348F184099D58476292D3FE4658C7BA
                APIs
                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467CFA
                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467D0E
                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467D3A
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0046762E), ref: 00467D72
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0046762E), ref: 00467D94
                • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,0046762E), ref: 00467DAD
                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467DC0
                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00467DFE
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                • String ID: .vF
                • API String ID: 1823725401-726173741
                • Opcode ID: 21081ef7853c4b6e1e71b35f9d3aba763abd31334b7cf08a66a00147fecdca15
                • Instruction ID: e0ff4c1f4c83d16eda3da060816b460531535d088a5a1c2de0a90e5b0c67148f
                • Opcode Fuzzy Hash: 21081ef7853c4b6e1e71b35f9d3aba763abd31334b7cf08a66a00147fecdca15
                • Instruction Fuzzy Hash: E93103B250D2656FD7217F789C8487B7A9CEE4535C7150E3BF582C3200FA298C8182AB
                APIs
                • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,0046859D,?,Microsoft Visual C++ Runtime Library,00012010,?,00466618,?,00466668,?,?,?,Runtime Error!Program: ), ref: 0046A516
                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0046A52E
                • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0046A53F
                • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0046A54C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressProc$LibraryLoad
                • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$hfF$user32.dll
                • API String ID: 2238633743-3168188537
                • Opcode ID: cfa0cc50ece0866b78a170ab5342ea6b85cd7e283ba0fb2aa1623d024210fd94
                • Instruction ID: 744f6a593e7a9add090b9772e32a29f883b75c07cff326d20426f5d76b4cd1ff
                • Opcode Fuzzy Hash: cfa0cc50ece0866b78a170ab5342ea6b85cd7e283ba0fb2aa1623d024210fd94
                • Instruction Fuzzy Hash: 02011E72600651AB8711DFB5DC80A5B7BE8EB54795714443BF102E2221F7B8CCA19FAF
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004684E6
                • GetStdHandle.KERNEL32(000000F4,00466618,00000000,00000000,00000000,?), ref: 004685BC
                • WriteFile.KERNEL32(00000000), ref: 004685C3
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: File$HandleModuleNameWrite
                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                • API String ID: 3784150691-4022980321
                • Opcode ID: e2e85c8ef0b16a8288ff27266e0de427043c067a522af83105a15374f6e707cc
                • Instruction ID: 2056a4cf523c6c61efd455e582aa4bd90fb20045327001bf824e2cedd7879936
                • Opcode Fuzzy Hash: e2e85c8ef0b16a8288ff27266e0de427043c067a522af83105a15374f6e707cc
                • Instruction Fuzzy Hash: 6631C5B2600218AFEF20EB60DD45F9A736CEB55704F10065FF545E6051FA78EA418A6F
                APIs
                • GetStringTypeW.KERNEL32(00000001,00466730,00000001,?,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A91C
                • GetStringTypeA.KERNEL32(00000000,00000001,0046672C,00000001,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A936
                • GetStringTypeA.KERNEL32(?,?,?,?,0046AB02,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A96A
                • MultiByteToWideChar.KERNEL32(?,0046B7E5,?,?,00000000,00000000,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A9A2
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,0046AB02,?), ref: 0046A9F8
                • GetStringTypeW.KERNEL32(?,?,00000000,0046AB02,?,?,?,?,?,?,0046AB02,?), ref: 0046AA0A
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: StringType$ByteCharMultiWide
                • String ID:
                • API String ID: 3852931651-0
                • Opcode ID: ab4217411143ffe3254ca9e7388d5397779f7d60e845bb51e8d462f5dba7c91c
                • Instruction ID: 5d04ebb630ede76be34a412984aa30ef206bdfb02e237f80f5ded91fe66f7989
                • Opcode Fuzzy Hash: ab4217411143ffe3254ca9e7388d5397779f7d60e845bb51e8d462f5dba7c91c
                • Instruction Fuzzy Hash: 3F417EB1600609BFCF108F94DD85EAF3B69EB05754F204526F915F2260E3398DA4DBAB
                APIs
                • GetVersionExA.KERNEL32 ref: 004680E7
                • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 0046811C
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0046817C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: EnvironmentFileModuleNameVariableVersion
                • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                • API String ID: 1385375860-4131005785
                • Opcode ID: 53528356a6435874c4cea8836d0c504b681df6164dbf9ca25d22a8d434fd30e9
                • Instruction ID: 5b987649a18d894d0e495aeb664bcd7067431a9f38e5e2f94aadff08a1f212ff
                • Opcode Fuzzy Hash: 53528356a6435874c4cea8836d0c504b681df6164dbf9ca25d22a8d434fd30e9
                • Instruction Fuzzy Hash: 3331F3719452886AEB3186709C51BDB37689B03308F1402DFE185E5242FE788EC7CB1B
                APIs
                • GetStartupInfoA.KERNEL32(?), ref: 00467E6F
                • GetFileType.KERNEL32(?,?,00000000), ref: 00467F1A
                • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00467F7D
                • GetFileType.KERNEL32(00000000,?,00000000), ref: 00467F8B
                • SetHandleCount.KERNEL32 ref: 00467FC2
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: FileHandleType$CountInfoStartup
                • String ID:
                • API String ID: 1710529072-0
                • Opcode ID: 34c641e5c7566a4f61e51126171c732304a31f5bcaff118d0c42436aae4cc374
                • Instruction ID: 904a1bf5860a3ccec006ab94641980349b31f95e458b6625cd4b51425871e72e
                • Opcode Fuzzy Hash: 34c641e5c7566a4f61e51126171c732304a31f5bcaff118d0c42436aae4cc374
                • Instruction Fuzzy Hash: AD5134315083058FD724CF28C884B667BA0EB1172CF2446AED5A6DB6E1F7389C49C75B
                APIs
                • GetLastError.KERNEL32(00000103,7FFFFFFF,0046AAAD,00469480,00000000,?,?,00000000,00000001), ref: 00468036
                • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 00468044
                • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 00468090
                  • Part of subcall function 00469175: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046926B
                • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00468068
                • GetCurrentThreadId.KERNEL32 ref: 00468079
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: ErrorLastValue$AllocCurrentHeapThread
                • String ID:
                • API String ID: 2020098873-0
                • Opcode ID: 8052f77e0d2cf52281169dad796c00c49ce1532b00fa052d94a585fd97d9bf58
                • Instruction ID: b74b10b1bdd3e7229d6419e3796b190ce8a51909fc87ae4804f62f1af361191e
                • Opcode Fuzzy Hash: 8052f77e0d2cf52281169dad796c00c49ce1532b00fa052d94a585fd97d9bf58
                • Instruction Fuzzy Hash: B4F0F6316002515BD7302B75BD0956A3B649B01771B150B3EF5C2E56B0EF788CC5466A
                APIs
                • HeapAlloc.KERNEL32(00000000,00002020,00463C80,00463C80,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F01
                • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F25
                • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F3F
                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000,?), ref: 0046A000
                • HeapFree.KERNEL32(00000000,00000000,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000,?,00000000), ref: 0046A017
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AllocVirtual$FreeHeap
                • String ID:
                • API String ID: 714016831-0
                • Opcode ID: 2bf0c84c70cf4df8327d2a3aebbceef8d6b212f0e4515c6402ae096c437e29aa
                • Instruction ID: 445181fbcf65ce7e9d39d92d2b604eca806c0f8a9288605ab4d6bb1f59089151
                • Opcode Fuzzy Hash: 2bf0c84c70cf4df8327d2a3aebbceef8d6b212f0e4515c6402ae096c437e29aa
                • Instruction Fuzzy Hash: 1C31D072600701ABE3308F24DC44B66BBA8EB44755F11423BF156E7790FBB8AD409B4E
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files\Deuvw.exe,00000104,?,00000000,?,?,?,?,00467638), ref: 00467AB5
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: FileModuleName
                • String ID: C:\Program Files\Deuvw.exe$x1m
                • API String ID: 514040917-541418664
                • Opcode ID: d83c7c4e9e1193ae3d3f180d9194bdeb499f7cac9df07e2eddc262459bf5ec96
                • Instruction ID: 5c724fa40256d467c63a20c8c08852a6288f263fca8b5ddd64194d7735452be0
                • Opcode Fuzzy Hash: d83c7c4e9e1193ae3d3f180d9194bdeb499f7cac9df07e2eddc262459bf5ec96
                • Instruction Fuzzy Hash: 9C114CB2904108BFD711EBD9DD81CAB77ACEB44758B14016BF605D3202FA74AE458BEA
                APIs
                • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,00469AFC,00000000,00000000,00000000,00468D0C,00000000,00000000,?,00000000,00000000,00000000), ref: 00469D5C
                • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,00469AFC,00000000,00000000,00000000,00468D0C,00000000,00000000,?,00000000,00000000,00000000), ref: 00469D90
                • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 00469DAA
                • HeapFree.KERNEL32(00000000,?), ref: 00469DC1
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AllocHeap$FreeVirtual
                • String ID:
                • API String ID: 3499195154-0
                • Opcode ID: 85db0018b5f02a0a531da6da56e99f1b82eb4dab677bd662bfc4afaa2d152d60
                • Instruction ID: a1c2a3597b2230bcaeaffa70772468b135f739cde47e51b730ca6c90506df880
                • Opcode Fuzzy Hash: 85db0018b5f02a0a531da6da56e99f1b82eb4dab677bd662bfc4afaa2d152d60
                • Instruction Fuzzy Hash: AE114F70600701EFC7218F2AEC45D627BB9FB85721711493AF1A2D65B0E3B198C2CF8A
                APIs
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685D9
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685E1
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685E9
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685F1
                Memory Dump Source
                • Source File: 00000001.00000002.2081387905.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.2081006469.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081043241.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081417446.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000001.00000002.2081438266.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Deuvw.jbxd
                Similarity
                • API ID: CriticalInitializeSection
                • String ID:
                • API String ID: 32694325-0
                • Opcode ID: 503c6c650575022db7612a51c23a455fa7bd590d9805bfc3dac3f36800976718
                • Instruction ID: 0ad9e4f4a03855f4481bac37ad47b37e425ca202d897247833f3bf621bba40d6
                • Opcode Fuzzy Hash: 503c6c650575022db7612a51c23a455fa7bd590d9805bfc3dac3f36800976718
                • Instruction Fuzzy Hash: 6BC002318040B49ACF126F95FE06946BF25EB447A23050077F5845143497A21D50FFD9

                Execution Graph

                Execution Coverage:5.5%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:406
                Total number of Limit Nodes:17
                execution_graph 5369 467598 GetVersion 5400 468210 HeapCreate 5369->5400 5371 4675f6 5372 467603 5371->5372 5373 4675fb 5371->5373 5412 467fcd 5372->5412 5488 4676c5 5373->5488 5377 467608 5378 467614 5377->5378 5379 46760c 5377->5379 5422 467e11 5378->5422 5380 4676c5 8 API calls 5379->5380 5383 467613 5380->5383 5382 46761e GetCommandLineA 5436 467cdf 5382->5436 5383->5378 5387 467638 5468 4679d9 5387->5468 5389 46763d 5390 467642 GetStartupInfoA 5389->5390 5481 467981 5390->5481 5392 467654 GetModuleHandleA 5485 46758a 5392->5485 5399 467692 5401 468266 5400->5401 5402 468230 5400->5402 5401->5371 5502 4680c8 5402->5502 5405 46823f 5514 46968f HeapAlloc 5405->5514 5406 46824c 5408 468269 5406->5408 5516 469ee0 5406->5516 5408->5371 5409 468249 5409->5408 5411 46825a HeapDestroy 5409->5411 5411->5401 5752 4685cc InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 5412->5752 5414 467fd3 TlsAlloc 5415 467fe3 5414->5415 5416 46801d 5414->5416 5417 469175 30 API calls 5415->5417 5416->5377 5418 467fec 5417->5418 5418->5416 5419 467ff4 TlsSetValue 5418->5419 5419->5416 5420 468005 5419->5420 5421 46800b GetCurrentThreadId 5420->5421 5421->5377 5423 468c80 29 API calls 5422->5423 5424 467e24 5423->5424 5425 467e32 GetStartupInfoA 5424->5425 5426 4676a0 7 API calls 5424->5426 5433 467f51 5425->5433 5435 467e80 5425->5435 5426->5425 5428 467fbc SetHandleCount 5428->5382 5429 467f7c GetStdHandle 5431 467f8a GetFileType 5429->5431 5429->5433 5430 468c80 29 API calls 5430->5435 5431->5433 5432 467ef7 5432->5433 5434 467f19 GetFileType 5432->5434 5433->5428 5433->5429 5434->5432 5435->5430 5435->5432 5435->5433 5437 467d2d 5436->5437 5438 467cfa GetEnvironmentStringsW 5436->5438 5439 467d02 5437->5439 5441 467d1e 5437->5441 5438->5439 5440 467d0e GetEnvironmentStrings 5438->5440 5443 467d46 WideCharToMultiByte 5439->5443 5444 467d3a GetEnvironmentStringsW 5439->5444 5440->5441 5442 46762e 5440->5442 5441->5442 5445 467dc0 GetEnvironmentStrings 5441->5445 5446 467dcc 5441->5446 5459 467a92 5442->5459 5448 467dac FreeEnvironmentStringsW 5443->5448 5449 467d7a 5443->5449 5444->5442 5444->5443 5445->5442 5445->5446 5451 468c80 29 API calls 5446->5451 5448->5442 5450 468c80 29 API calls 5449->5450 5452 467d80 5450->5452 5457 467de7 5451->5457 5452->5448 5453 467d89 WideCharToMultiByte 5452->5453 5455 467d9a 5453->5455 5456 467da3 5453->5456 5454 467dfd FreeEnvironmentStringsA 5454->5442 5458 468aa1 29 API calls 5455->5458 5456->5448 5457->5454 5458->5456 5460 467aa4 5459->5460 5461 467aa9 GetModuleFileNameA 5459->5461 5753 468a85 5460->5753 5463 467acc 5461->5463 5464 468c80 29 API calls 5463->5464 5465 467aed 5464->5465 5466 467afd 5465->5466 5467 4676a0 7 API calls 5465->5467 5466->5387 5467->5466 5469 4679e6 5468->5469 5470 4679eb 5468->5470 5471 468a85 48 API calls 5469->5471 5472 468c80 29 API calls 5470->5472 5471->5470 5473 467a18 5472->5473 5474 4676a0 7 API calls 5473->5474 5480 467a2c 5473->5480 5474->5480 5475 467a6f 5476 468aa1 29 API calls 5475->5476 5477 467a7b 5476->5477 5477->5389 5478 468c80 29 API calls 5478->5480 5479 4676a0 7 API calls 5479->5480 5480->5475 5480->5478 5480->5479 5482 46798a 5481->5482 5484 46798f 5481->5484 5483 468a85 48 API calls 5482->5483 5483->5484 5484->5392 5782 46751a 5485->5782 5489 4676d3 5488->5489 5490 4676ce 5488->5490 5492 468479 7 API calls 5489->5492 5491 468440 7 API calls 5490->5491 5491->5489 5493 4676dc ExitProcess 5492->5493 5494 467716 5857 467738 5494->5857 5497 467809 5498 468034 35 API calls 5497->5498 5500 467814 5498->5500 5499 46793a UnhandledExceptionFilter 5501 467839 5499->5501 5500->5499 5500->5501 5501->5399 5501->5501 5525 469660 5502->5525 5505 4680f1 5506 46810b GetEnvironmentVariableA 5505->5506 5510 468103 5505->5510 5507 4681e8 5506->5507 5509 46812a 5506->5509 5507->5510 5530 46809b GetModuleHandleA 5507->5530 5511 46816f GetModuleFileNameA 5509->5511 5512 468167 5509->5512 5510->5405 5510->5406 5511->5512 5512->5507 5527 4692b2 5512->5527 5515 4696ab 5514->5515 5515->5409 5517 469ef4 HeapAlloc 5516->5517 5518 469eed 5516->5518 5519 469f11 VirtualAlloc 5517->5519 5524 469f49 5517->5524 5518->5519 5520 46a006 5519->5520 5521 469f31 VirtualAlloc 5519->5521 5522 46a00e HeapFree 5520->5522 5520->5524 5523 469ff8 VirtualFree 5521->5523 5521->5524 5522->5524 5523->5520 5524->5409 5526 4680d5 GetVersionExA 5525->5526 5526->5505 5526->5506 5532 4692c9 5527->5532 5531 4680b2 5530->5531 5531->5510 5534 4692e1 5532->5534 5536 469311 5534->5536 5541 46abec 5534->5541 5535 46abec 6 API calls 5535->5536 5536->5535 5539 46943a 5536->5539 5540 4692c5 5536->5540 5545 46aab1 5536->5545 5539->5540 5556 46aaa8 5539->5556 5540->5507 5542 46ac0a 5541->5542 5544 46abfe 5541->5544 5559 46a8dd 5542->5559 5544->5534 5546 46aacf InterlockedIncrement 5545->5546 5555 46aabc 5545->5555 5547 46aaeb InterlockedDecrement 5546->5547 5548 46aaf5 5546->5548 5571 4685f5 5547->5571 5586 46ab20 5548->5586 5552 46ab15 InterlockedDecrement 5552->5555 5553 46ab0b 5592 468656 LeaveCriticalSection 5553->5592 5555->5536 5724 468034 GetLastError TlsGetValue 5556->5724 5558 46aaad 5558->5540 5560 46a90e GetStringTypeW 5559->5560 5561 46a926 5559->5561 5560->5561 5562 46a92a GetStringTypeA 5560->5562 5564 46a951 GetStringTypeA 5561->5564 5565 46a975 5561->5565 5562->5561 5566 46aa12 5562->5566 5564->5566 5565->5566 5567 46a98b MultiByteToWideChar 5565->5567 5566->5544 5567->5566 5568 46a9af 5567->5568 5568->5566 5569 46a9e9 MultiByteToWideChar 5568->5569 5569->5566 5570 46aa02 GetStringTypeW 5569->5570 5570->5566 5572 46860d 5571->5572 5573 46864b EnterCriticalSection 5571->5573 5593 468c80 5572->5593 5573->5548 5576 468623 5578 4685f5 27 API calls 5576->5578 5579 46862b 5578->5579 5580 468632 InitializeCriticalSection 5579->5580 5581 46863c 5579->5581 5582 468641 5580->5582 5602 468aa1 5581->5602 5619 468656 LeaveCriticalSection 5582->5619 5585 468649 5585->5573 5587 46ab4b 5586->5587 5591 46ab02 5586->5591 5588 46ab67 5587->5588 5589 46abec 6 API calls 5587->5589 5588->5591 5706 46a68e 5588->5706 5589->5588 5591->5552 5591->5553 5592->5555 5620 468c92 5593->5620 5596 4676a0 5597 4676ae 5596->5597 5598 4676a9 5596->5598 5665 468479 5597->5665 5659 468440 5598->5659 5603 468acf 5602->5603 5604 468b7b 5602->5604 5605 468b14 5603->5605 5606 468ad9 5603->5606 5604->5582 5607 468b05 5605->5607 5610 4685f5 28 API calls 5605->5610 5608 4685f5 28 API calls 5606->5608 5607->5604 5609 468b6d HeapFree 5607->5609 5611 468ae0 5608->5611 5609->5604 5612 468b20 5610->5612 5613 468afa 5611->5613 5679 469702 5611->5679 5615 468b4c 5612->5615 5688 46a193 5612->5688 5685 468b0b 5613->5685 5692 468b63 5615->5692 5619->5585 5621 468615 5620->5621 5622 468c99 5620->5622 5621->5576 5621->5596 5622->5621 5624 468cbe 5622->5624 5625 468d2e 5624->5625 5626 468ceb 5624->5626 5633 4685f5 28 API calls 5625->5633 5636 468d19 5625->5636 5627 4685f5 28 API calls 5626->5627 5626->5636 5629 468d01 5627->5629 5628 468d9d HeapAlloc 5631 468d20 5628->5631 5640 469a2b 5629->5640 5631->5622 5635 468d57 5633->5635 5649 46a1d8 5635->5649 5636->5628 5636->5631 5638 468d6a 5656 468d84 5638->5656 5643 469a5d 5640->5643 5641 469afc 5642 469de5 VirtualAlloc 5641->5642 5645 468d0c 5641->5645 5642->5645 5643->5641 5644 469d34 HeapReAlloc HeapAlloc VirtualAlloc HeapFree 5643->5644 5643->5645 5644->5641 5646 468d25 5645->5646 5647 468656 LeaveCriticalSection 5646->5647 5648 468d2c 5647->5648 5648->5636 5650 46a1e6 5649->5650 5651 46a2d2 VirtualAlloc 5650->5651 5652 46a3a7 5650->5652 5655 46a2a3 5650->5655 5651->5655 5653 469ee0 HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 5652->5653 5653->5655 5655->5638 5657 468656 LeaveCriticalSection 5656->5657 5658 468d8b 5657->5658 5658->5636 5660 46844a 5659->5660 5661 468479 7 API calls 5660->5661 5664 468477 5660->5664 5662 468461 5661->5662 5663 468479 7 API calls 5662->5663 5663->5664 5664->5597 5667 46848c 5665->5667 5666 4685a3 5669 4685b6 GetStdHandle WriteFile 5666->5669 5667->5666 5668 4684cc 5667->5668 5673 4676b7 5667->5673 5670 4684d8 GetModuleFileNameA 5668->5670 5668->5673 5669->5673 5671 4684f0 5670->5671 5674 46a504 5671->5674 5673->5576 5675 46a511 LoadLibraryA 5674->5675 5676 46a553 5674->5676 5675->5676 5677 46a522 GetProcAddress 5675->5677 5676->5673 5677->5676 5678 46a539 GetProcAddress GetProcAddress 5677->5678 5678->5676 5680 469740 5679->5680 5684 4699f6 5679->5684 5681 46993c VirtualFree 5680->5681 5680->5684 5682 4699a0 5681->5682 5683 4699af VirtualFree HeapFree 5682->5683 5682->5684 5683->5684 5684->5613 5695 468656 LeaveCriticalSection 5685->5695 5687 468b12 5687->5607 5689 46a1d6 5688->5689 5690 46a1c0 5688->5690 5689->5615 5690->5689 5696 46a07a 5690->5696 5705 468656 LeaveCriticalSection 5692->5705 5694 468b6a 5694->5607 5695->5687 5698 46a087 5696->5698 5697 46a137 5697->5689 5698->5697 5699 46a0a8 VirtualFree 5698->5699 5701 46a024 VirtualFree 5698->5701 5699->5698 5702 46a041 5701->5702 5703 46a071 5702->5703 5704 46a051 HeapFree 5702->5704 5703->5698 5704->5698 5705->5694 5707 46a6be LCMapStringW 5706->5707 5709 46a6da 5706->5709 5708 46a6e2 LCMapStringA 5707->5708 5707->5709 5708->5709 5712 46a81c 5708->5712 5710 46a723 LCMapStringA 5709->5710 5711 46a740 5709->5711 5710->5712 5711->5712 5713 46a756 MultiByteToWideChar 5711->5713 5712->5591 5713->5712 5714 46a780 5713->5714 5714->5712 5715 46a7b6 MultiByteToWideChar 5714->5715 5715->5712 5716 46a7cf LCMapStringW 5715->5716 5716->5712 5717 46a7ea 5716->5717 5718 46a7f0 5717->5718 5720 46a830 5717->5720 5718->5712 5719 46a7fe LCMapStringW 5718->5719 5719->5712 5720->5712 5721 46a868 LCMapStringW 5720->5721 5721->5712 5722 46a880 WideCharToMultiByte 5721->5722 5722->5712 5725 468050 5724->5725 5726 46808f SetLastError 5724->5726 5735 469175 5725->5735 5726->5558 5729 468087 5731 4676a0 7 API calls 5729->5731 5730 468061 TlsSetValue 5730->5729 5732 468072 5730->5732 5733 46808e 5731->5733 5734 468078 GetCurrentThreadId 5732->5734 5733->5726 5734->5726 5736 4691aa 5735->5736 5737 4685f5 29 API calls 5736->5737 5738 469262 HeapAlloc 5736->5738 5739 469a2b 5 API calls 5736->5739 5740 468059 5736->5740 5741 46a1d8 6 API calls 5736->5741 5744 46920e 5736->5744 5747 469297 5736->5747 5737->5736 5738->5736 5739->5736 5740->5729 5740->5730 5741->5736 5750 468656 LeaveCriticalSection 5744->5750 5746 469215 5746->5736 5751 468656 LeaveCriticalSection 5747->5751 5749 46929e 5749->5736 5750->5746 5751->5749 5752->5414 5754 468a95 5753->5754 5755 468a8e 5753->5755 5754->5461 5757 4686ad 5755->5757 5758 4685f5 29 API calls 5757->5758 5759 4686bd 5758->5759 5768 46885a 5759->5768 5763 468852 5763->5754 5764 4686f9 GetCPInfo 5767 46870f 5764->5767 5766 4686d4 5781 468656 LeaveCriticalSection 5766->5781 5767->5766 5773 468900 GetCPInfo 5767->5773 5769 46887a 5768->5769 5770 46886a GetOEMCP 5768->5770 5771 46887f GetACP 5769->5771 5772 4686c5 5769->5772 5770->5769 5771->5772 5772->5764 5772->5766 5772->5767 5777 468923 5773->5777 5780 4689eb 5773->5780 5774 46a8dd 6 API calls 5775 46899f 5774->5775 5776 46a68e 9 API calls 5775->5776 5778 4689c3 5776->5778 5777->5774 5779 46a68e 9 API calls 5778->5779 5779->5780 5780->5766 5781->5763 5783 46754a 5782->5783 5788 466b6a 5783->5788 5785 467550 5787 467584 5785->5787 5807 46732f 5785->5807 5787->5494 5818 4668c0 GetModuleHandleA GetProcAddress 5788->5818 5791 4668c0 4 API calls 5792 466c38 5791->5792 5793 4668c0 4 API calls 5792->5793 5794 466c71 5793->5794 5795 466c96 VirtualAlloc 5794->5795 5805 466d75 5794->5805 5796 466cad 5795->5796 5797 466cd0 VirtualAlloc 5796->5797 5796->5805 5798 466cfd 5797->5798 5824 466d84 5798->5824 5800 466d2e 5829 4670b7 5800->5829 5804 46732f 4 API calls 5804->5805 5805->5785 5806 466d52 5806->5804 5806->5805 5808 4668c0 4 API calls 5807->5808 5809 4673a9 5808->5809 5810 4668c0 4 API calls 5809->5810 5811 4673e9 5810->5811 5812 4668c0 4 API calls 5811->5812 5813 467435 5812->5813 5814 4668c0 4 API calls 5813->5814 5815 467469 5814->5815 5817 4674b7 5815->5817 5852 466a9d 5815->5852 5817->5787 5819 466952 5818->5819 5820 46695c GetModuleHandleA 5818->5820 5821 466958 GetProcAddress 5819->5821 5823 466974 5819->5823 5820->5819 5822 466976 5821->5822 5822->5791 5823->5822 5825 4668c0 4 API calls 5824->5825 5828 466e05 5825->5828 5826 466eac 5826->5800 5827 466e6a VirtualAlloc 5827->5828 5828->5826 5828->5827 5830 4668c0 4 API calls 5829->5830 5831 467138 5830->5831 5832 4668c0 4 API calls 5831->5832 5835 46717c 5832->5835 5833 4671c4 LoadLibraryA 5833->5835 5837 466d47 5833->5837 5835->5833 5836 467238 GetProcAddress 5835->5836 5835->5837 5845 46697b 5835->5845 5836->5835 5837->5806 5838 466eb1 5837->5838 5839 4668c0 4 API calls 5838->5839 5840 466f2a 5839->5840 5841 4668c0 4 API calls 5840->5841 5844 466f76 5841->5844 5842 467038 5842->5806 5843 46700e VirtualProtect 5843->5844 5844->5842 5844->5843 5846 4668c0 4 API calls 5845->5846 5847 466a02 5846->5847 5848 4668c0 4 API calls 5847->5848 5849 466a41 5848->5849 5850 4668c0 4 API calls 5849->5850 5851 466a78 5850->5851 5851->5835 5853 4668c0 4 API calls 5852->5853 5854 466b24 5853->5854 5855 4668c0 4 API calls 5854->5855 5856 466b57 5855->5856 5856->5817 5866 4677dd 5857->5866 5860 467749 GetCurrentProcess TerminateProcess 5863 46775a 5860->5863 5861 4677c4 5869 4677e6 5861->5869 5862 4677cb ExitProcess 5863->5861 5863->5862 5867 4685f5 29 API calls 5866->5867 5868 46773e 5867->5868 5868->5860 5868->5863 5872 468656 LeaveCriticalSection 5869->5872 5871 467681 5871->5497 5872->5871

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 466b6a-466c7f call 4668c0 * 3 7 466d76-466d78 0->7 8 466c85-466c90 0->8 9 466d7f-466d83 7->9 8->7 10 466c96-466cab VirtualAlloc 8->10 11 466cc6-466d36 VirtualAlloc call 466d84 10->11 12 466cad-466cc0 10->12 19 466d41-466d4a call 4670b7 11->19 20 466d38-466d40 call 46703d 11->20 12->7 12->11 25 466d6f-466d75 call 46732f 19->25 26 466d4c-466d5a call 466eb1 19->26 20->19 25->7 31 466d5c-466d60 26->31 32 466d7d 26->32 31->25 33 466d62-466d68 31->33 32->9 34 466d6b-466d6d 33->34 34->25 35 466d7a 34->35 35->32
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,?,?,?,?,?,?,004010F0), ref: 00466CA3
                • VirtualAlloc.KERNEL32(00000016,?,00001000,00000004,?,?,?,?,?,?,?,004010F0), ref: 00466CEE
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressAllocHandleModuleProcVirtual
                • String ID: A$A$G$H$H$HeapAlloc$KERNEL32.dll$P$V$VirtualAlloc$a$a$a$c$c$c$e$e$e$e$i$l$l$l$l$l$o$o$o$p$p$r$r$s$s$t$t$u
                • API String ID: 3695083113-2890414303
                • Opcode ID: eea5828057d8a8a3ca217eb1021cde760f26655aafc521580391e7091950ef6c
                • Instruction ID: 56dfe851e749cfa52889f2bfcfc8cef8fedfa8cb50ddae72ef14544c6a3e4736
                • Opcode Fuzzy Hash: eea5828057d8a8a3ca217eb1021cde760f26655aafc521580391e7091950ef6c
                • Instruction Fuzzy Hash: 06814271D08288DEEB11DBA8C844BDEBFF55F16708F084089E5807B282D7BE5549C77A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 36 466eb1-466f90 call 4668c0 * 2 41 466f96-466f9b 36->41 42 46703a-46703c 36->42 43 466f9e-466fbf 41->43 44 466fd1-466fe5 43->44 45 466fc1-466fcf 43->45 46 466fe7 44->46 47 466fed-466ff4 44->47 53 46701a 45->53 46->47 49 466ff6-466ffa 47->49 50 46700c 47->50 54 467001-467005 49->54 55 466ffc-466fff 49->55 51 46700e-467017 VirtualProtect 50->51 52 46701d-467032 50->52 51->53 52->43 57 467038-467039 52->57 53->52 54->52 56 467007 54->56 58 46700a 55->58 56->58 57->42 58->50
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • VirtualProtect.KERNEL32(?,?,00000000,?,00000016,00000000,?,?,?,?,?,?), ref: 00467017
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressHandleModuleProc$ProtectVirtual
                • String ID: @$F$KERNEL32.dll$P$RmF$RmF$V$V$a$a$c$e$e$e$i$i$l$l$o$r$r$r$r$t$t$t$t$u$u
                • API String ID: 2080333215-3833892956
                • Opcode ID: cb608eef3711ebfc93400a4942087660b63e14b03940701ee4406093afd551ff
                • Instruction ID: 72b4ce0505e3628847bb6db0ce6ea59a5e3d376deda158c5c7a16eff45700afd
                • Opcode Fuzzy Hash: cb608eef3711ebfc93400a4942087660b63e14b03940701ee4406093afd551ff
                • Instruction Fuzzy Hash: 60513270C082C8DEDB02CBA8D5887DEBFB56F16348F184099D5847B292D3BE5A09C776

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 59 4670b7-46719c call 4668c0 * 2 64 467272-467279 59->64 65 4671a2-4671ae 59->65 65->64 67 4671b4 65->67 68 4671b9-4671be 67->68 68->64 69 4671c4-4671d0 LoadLibraryA 68->69 70 4671d6-4671f0 call 46697b 69->70 71 46726e 69->71 70->71 74 4671f2-467202 70->74 71->64 75 467204-46720f 74->75 76 467211-467216 74->76 77 467219-467220 75->77 76->77 78 467255-467259 77->78 79 467222-467227 77->79 78->64 80 46725b-467266 78->80 81 467230-467235 79->81 82 467229-46722e 79->82 87 4671b6 80->87 88 46726c 80->88 83 467238-467246 GetProcAddress 81->83 82->83 85 467251 83->85 86 467248-46724f 83->86 85->78 86->77 87->68 88->64
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                • LoadLibraryA.KERNEL32(?,?,?,?,00000016,00000000,?), ref: 004671C7
                • GetProcAddress.KERNEL32(?,GmF), ref: 0046723C
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressProc$HandleModule$LibraryLoad
                • String ID: A$B$GmF$GmF$I$KERNEL32.dll$L$L$P$R$a$a$a$a$b$d$d$d$e$i$o$r$r$r$s$t$y
                • API String ID: 551388010-1369886350
                • Opcode ID: 9146fd96053e2050b3294d5e699eb0beb02dc719ea692024da2c8e9b1210d4cc
                • Instruction ID: 73e0fe1b8e5c6c9f5f942eac17084d9bf6255d1aace67817413c182afa2f5bd3
                • Opcode Fuzzy Hash: 9146fd96053e2050b3294d5e699eb0beb02dc719ea692024da2c8e9b1210d4cc
                • Instruction Fuzzy Hash: 30615470D08289DEEB11CBA8C8447DEBFF56F15358F184099E584A7382D3BD9944C776

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 89 466d84-466e25 call 4668c0 92 466eac-466eb0 89->92 93 466e2b 89->93 94 466e2e-466e31 93->94 95 466e33-466e3b 94->95 96 466e6a-466e98 VirtualAlloc 94->96 97 466e3d-466e68 95->97 98 466e9b-466eaa 95->98 96->98 97->98 98->92 98->94
                APIs
                  • Part of subcall function 004668C0: GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000), ref: 00466948
                  • Part of subcall function 004668C0: GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                • VirtualAlloc.KERNEL32(?,?,00001000,00000004,00000016,00000000,?), ref: 00466E7A
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressProc$AllocHandleModuleVirtual
                • String ID: .$2$3$A$E$E$K$L$N$R$V$a$c$d$i$l$l$l$l$l$o$r$t$u
                • API String ID: 3787274985-1410553462
                • Opcode ID: 9a20da68c6a90be79534ff80353c2f0603882a79139077a3888f10a88befb3b9
                • Instruction ID: b7ee7351b5069f9bbbcd0e3288277ca9420c032c07cd61825cf92ba50ad0a3c8
                • Opcode Fuzzy Hash: 9a20da68c6a90be79534ff80353c2f0603882a79139077a3888f10a88befb3b9
                • Instruction Fuzzy Hash: 02416171D04288DBDF01CBA8C448BDEBFF1AF55704F084099D584AB382D3BA5A58C779

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 46a68e-46a6bc 101 46a704-46a707 100->101 102 46a6be-46a6d8 LCMapStringW 100->102 105 46a719-46a721 101->105 106 46a709-46a716 call 46a8b2 101->106 103 46a6e2-46a6f4 LCMapStringA 102->103 104 46a6da-46a6e0 102->104 107 46a81c 103->107 108 46a6fa 103->108 104->101 110 46a723-46a73b LCMapStringA 105->110 111 46a740-46a743 105->111 106->105 113 46a81e-46a82f 107->113 108->101 110->113 111->107 114 46a749-46a74c 111->114 115 46a756-46a77a MultiByteToWideChar 114->115 116 46a74e-46a753 114->116 115->107 117 46a780-46a7b4 call 469660 115->117 116->115 117->107 121 46a7b6-46a7cd MultiByteToWideChar 117->121 121->107 122 46a7cf-46a7e8 LCMapStringW 121->122 122->107 123 46a7ea-46a7ee 122->123 124 46a830-46a866 call 469660 123->124 125 46a7f0-46a7f3 123->125 124->107 132 46a868-46a87e LCMapStringW 124->132 126 46a8ab-46a8ad 125->126 127 46a7f9-46a7fc 125->127 126->113 127->107 129 46a7fe-46a816 LCMapStringW 127->129 129->107 129->126 132->107 133 46a880-46a885 132->133 134 46a887-46a889 133->134 135 46a88b-46a88e 133->135 136 46a891-46a8a5 WideCharToMultiByte 134->136 135->136 136->107 136->126
                APIs
                • LCMapStringW.KERNEL32(00000000,00000100,00466730,00000001,00000000,00000000,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A6D0
                • LCMapStringA.KERNEL32(00000000,00000100,0046672C,00000001,00000000,00000000,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A6EC
                • LCMapStringA.KERNEL32(?,?,?,0046AB02,?,?,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A735
                • MultiByteToWideChar.KERNEL32(?,0046B7E5,?,0046AB02,00000000,00000000,7591E860,0046B7E4,?,?,?,0046AB02,?,?,?,00000000), ref: 0046A76D
                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,0046AB02,?,00000000,?,?,0046AB02,?), ref: 0046A7C5
                • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0046AB02,?), ref: 0046A7DB
                • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,0046AB02,?), ref: 0046A80E
                • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,0046AB02,?), ref: 0046A876
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: String$ByteCharMultiWide
                • String ID:
                • API String ID: 352835431-0
                • Opcode ID: a28fd5e3e5a475bf9b6a264a68c1a845a1e8dddc284e8329ea69289aa823242b
                • Instruction ID: 12cc6b9feb3d9a71118cc58f801efc8483379fe271ac96587175e3a828ac97c7
                • Opcode Fuzzy Hash: a28fd5e3e5a475bf9b6a264a68c1a845a1e8dddc284e8329ea69289aa823242b
                • Instruction Fuzzy Hash: F4516B71900649ABCF219F94CD49AAF7FB9FB48750F10412AF910B2261E3398C61DF6B

                Control-flow Graph

                APIs
                • GetVersion.KERNEL32 ref: 004675BE
                  • Part of subcall function 00468210: HeapCreate.KERNEL32(00000000,00001000,00000000,004675F6,00000001), ref: 00468221
                  • Part of subcall function 00468210: HeapDestroy.KERNEL32 ref: 00468260
                • GetCommandLineA.KERNEL32 ref: 0046761E
                • GetStartupInfoA.KERNEL32(?), ref: 00467649
                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 0046766C
                  • Part of subcall function 004676C5: ExitProcess.KERNEL32 ref: 004676E2
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                • String ID:
                • API String ID: 2057626494-0
                • Opcode ID: 74ae398f86775484538032804f60e5769ebf57acb35412f92e8c4fd7a89ff731
                • Instruction ID: f877db75b34aef535155fa93e1ad8a33f9cc10bfb3bd4b0f6148cfe794d3ada0
                • Opcode Fuzzy Hash: 74ae398f86775484538032804f60e5769ebf57acb35412f92e8c4fd7a89ff731
                • Instruction Fuzzy Hash: 902165B19447059ED704AFB5DD46A6E7BA8EF0471CF10452FF501972A2FB784880CB9B

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 171 468900-46891d GetCPInfo 172 468923-468925 171->172 173 468a39-468a3b 171->173 175 46892a-468934 172->175 174 468a40-468a43 173->174 176 468a45-468a48 174->176 177 468a5e-468a61 174->177 175->175 178 468936-468942 175->178 176->177 179 468a4a-468a53 176->179 180 468a76 177->180 181 468a63-468a66 177->181 182 468944-468946 178->182 183 46897b-4689be call 46a8dd call 46a68e 178->183 185 468a56-468a5c 179->185 187 468a7d-468a80 180->187 181->180 186 468a68-468a74 181->186 188 468949-468951 182->188 195 4689c3-4689f0 call 46a68e 183->195 185->187 186->185 187->174 190 468a82-468a84 187->190 191 468953-46896e 188->191 192 468970-468977 188->192 191->192 192->188 194 468979-46897a 192->194 194->183 198 4689f6-4689fc 195->198 199 468a14-468a17 198->199 200 4689fe-468a05 198->200 202 468a29 199->202 203 468a19-468a27 199->203 201 468a0c-468a12 200->201 204 468a30-468a35 201->204 202->204 203->201 204->198 205 468a37 204->205 205->190
                APIs
                • GetCPInfo.KERNEL32(?,00000000), ref: 00468914
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: Info
                • String ID: $
                • API String ID: 1807457897-3032137957
                • Opcode ID: 8a739a128cb405312d00240f0076b108f8cfc1bf0800c8ea65d5b8b068e5d4fd
                • Instruction ID: b91b7a80f5c212ae6bf3e4eeca3f6c145e7dbed152764a56bdc0ce5edf8456d9
                • Opcode Fuzzy Hash: 8a739a128cb405312d00240f0076b108f8cfc1bf0800c8ea65d5b8b068e5d4fd
                • Instruction Fuzzy Hash: 1D4156310042581AEB119694CD59BF63FE8DB06700F1801EBDA85D7152FB7A49989BFF

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 206 468210-46822e HeapCreate 207 468266-468268 206->207 208 468230-46823d call 4680c8 206->208 211 46823f-46824a call 46968f 208->211 212 46824c-46824f 208->212 218 468256-468258 211->218 214 468251 call 469ee0 212->214 215 468269-46826c 212->215 214->218 218->215 219 46825a-468260 HeapDestroy 218->219 219->207
                APIs
                • HeapCreate.KERNEL32(00000000,00001000,00000000,004675F6,00000001), ref: 00468221
                  • Part of subcall function 004680C8: GetVersionExA.KERNEL32 ref: 004680E7
                • HeapDestroy.KERNEL32 ref: 00468260
                  • Part of subcall function 0046968F: HeapAlloc.KERNEL32(00000000,00000140,00468249,000003F8), ref: 0046969C
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: Heap$AllocCreateDestroyVersion
                • String ID:
                • API String ID: 2507506473-0
                • Opcode ID: 00308e250556f24be53d22c4c1e5b2513877d9e21008081d955c28075247dc7a
                • Instruction ID: 6e6482bd650207ad86c54233ac2670d8762018555e74c8298600f12d13cd5025
                • Opcode Fuzzy Hash: 00308e250556f24be53d22c4c1e5b2513877d9e21008081d955c28075247dc7a
                • Instruction Fuzzy Hash: D1F0ED70B58B019BEB206B719C4133A3794DB44792F104A7FF500D81A0FFB888C0965F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 233 4686ad-4686d2 call 4685f5 call 46885a 238 4686d4-4686d6 233->238 239 4686db-4686dd 233->239 240 46884b-468859 call 468656 238->240 241 4686e3-4686e5 239->241 242 468839 call 4688d7 239->242 245 4686ea-4686ec 241->245 247 46883e call 468900 242->247 248 468762-468779 245->248 249 4686ee-4686f7 245->249 253 468843 247->253 251 46877f-468784 248->251 249->245 250 4686f9-468709 GetCPInfo 249->250 254 468830-468837 250->254 255 46870f-46872c 250->255 256 468786-46878b 251->256 257 4687b2-4687bc 251->257 262 468848 253->262 254->242 254->262 259 468732-468736 255->259 260 46881d 255->260 256->257 261 46878d-468795 256->261 257->251 258 4687be-4687ea call 4688a4 257->258 258->247 264 46873c 259->264 265 4687f8 259->265 266 468824-46882e 260->266 267 468797-46879a 261->267 268 4687ab-4687b0 261->268 262->240 270 46873f-468743 264->270 271 4687fa-468807 265->271 266->247 272 4687a0-4687a9 267->272 268->256 268->257 270->265 273 468749-46874d 270->273 271->271 274 468809-46881b call 4688a4 271->274 272->268 272->272 275 468750-468752 273->275 274->266 277 4687ec-4687f2 275->277 278 468758-468760 275->278 277->265 277->270 278->275
                APIs
                  • Part of subcall function 004685F5: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 00468632
                  • Part of subcall function 004685F5: EnterCriticalSection.KERNEL32(?,?,?,0046922B,00000009,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046864D
                • GetCPInfo.KERNEL32(00000000,?,?,00000000,00000000,?,?,00467638), ref: 004686FE
                  • Part of subcall function 00468656: LeaveCriticalSection.KERNEL32(?,00468D8B,00000009,00468D77,00000000,?,00000000,00000000,00000000), ref: 00468663
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: CriticalSection$EnterInfoInitializeLeave
                • String ID:
                • API String ID: 1866836854-0
                • Opcode ID: d544553c3794957d79ceab9ece9c6795c21eceff83caea486740067c3f9cd554
                • Instruction ID: 72f3e8e95f47c0a7d074f3bfbe55f138b4f0ed167d66031de908a5d040259cbe
                • Opcode Fuzzy Hash: d544553c3794957d79ceab9ece9c6795c21eceff83caea486740067c3f9cd554
                • Instruction Fuzzy Hash: 294144719142509EEB10EBA4CC8436A7BA1DB05316F28423FD245CB292FF794986878F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 288 4668c0-466950 GetModuleHandleA GetProcAddress 289 466952-466955 288->289 290 46695c-466963 GetModuleHandleA 288->290 291 466958-46695a GetProcAddress 289->291 292 466965-46696c 290->292 293 46696e-466972 290->293 294 466976-46697a 291->294 292->293 296 466974 292->296 293->291 296->294
                APIs
                • GetModuleHandleA.KERNEL32(?,00062000,00000000,004010F0), ref: 0046693F
                • GetProcAddress.KERNEL32(00000000), ref: 00466948
                • GetProcAddress.KERNEL32(00000000,?), ref: 00466958
                • GetModuleHandleA.KERNEL32(Libr), ref: 0046695F
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: .$2$3$A$E$E$K$L$L$L$Libr$LoadLibr$LoadLibr$N$R$a$a$b$d$d$i$l$l$o$r$r$y
                • API String ID: 1646373207-713136220
                • Opcode ID: ab11df402e6262a6cd0bd32f4206eccbc3d47516eb2c55da4dfc699759f1ff03
                • Instruction ID: 408384f28f9ef53e4cf42fff1d531f2f4c792ab3fc2232b330d19c68f6871aa3
                • Opcode Fuzzy Hash: ab11df402e6262a6cd0bd32f4206eccbc3d47516eb2c55da4dfc699759f1ff03
                • Instruction Fuzzy Hash: D621DF519082DDEDEF0297A8C8087EEBFA65F12348F184099D58476292D3FE4658C7BA
                APIs
                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467CFA
                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467D0E
                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467D3A
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0046762E), ref: 00467D72
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0046762E), ref: 00467D94
                • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,0046762E), ref: 00467DAD
                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0046762E), ref: 00467DC0
                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00467DFE
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                • String ID: .vF
                • API String ID: 1823725401-726173741
                • Opcode ID: 21081ef7853c4b6e1e71b35f9d3aba763abd31334b7cf08a66a00147fecdca15
                • Instruction ID: e0ff4c1f4c83d16eda3da060816b460531535d088a5a1c2de0a90e5b0c67148f
                • Opcode Fuzzy Hash: 21081ef7853c4b6e1e71b35f9d3aba763abd31334b7cf08a66a00147fecdca15
                • Instruction Fuzzy Hash: E93103B250D2656FD7217F789C8487B7A9CEE4535C7150E3BF582C3200FA298C8182AB
                APIs
                • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,0046859D,?,Microsoft Visual C++ Runtime Library,00012010,?,00466618,?,00466668,?,?,?,Runtime Error!Program: ), ref: 0046A516
                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0046A52E
                • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0046A53F
                • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0046A54C
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AddressProc$LibraryLoad
                • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$hfF$user32.dll
                • API String ID: 2238633743-3168188537
                • Opcode ID: cfa0cc50ece0866b78a170ab5342ea6b85cd7e283ba0fb2aa1623d024210fd94
                • Instruction ID: 744f6a593e7a9add090b9772e32a29f883b75c07cff326d20426f5d76b4cd1ff
                • Opcode Fuzzy Hash: cfa0cc50ece0866b78a170ab5342ea6b85cd7e283ba0fb2aa1623d024210fd94
                • Instruction Fuzzy Hash: 02011E72600651AB8711DFB5DC80A5B7BE8EB54795714443BF102E2221F7B8CCA19FAF
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004684E6
                • GetStdHandle.KERNEL32(000000F4,00466618,00000000,00000000,00000000,?), ref: 004685BC
                • WriteFile.KERNEL32(00000000), ref: 004685C3
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: File$HandleModuleNameWrite
                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                • API String ID: 3784150691-4022980321
                • Opcode ID: e2e85c8ef0b16a8288ff27266e0de427043c067a522af83105a15374f6e707cc
                • Instruction ID: 2056a4cf523c6c61efd455e582aa4bd90fb20045327001bf824e2cedd7879936
                • Opcode Fuzzy Hash: e2e85c8ef0b16a8288ff27266e0de427043c067a522af83105a15374f6e707cc
                • Instruction Fuzzy Hash: 6631C5B2600218AFEF20EB60DD45F9A736CEB55704F10065FF545E6051FA78EA418A6F
                APIs
                • GetStringTypeW.KERNEL32(00000001,00466730,00000001,?,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A91C
                • GetStringTypeA.KERNEL32(00000000,00000001,0046672C,00000001,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A936
                • GetStringTypeA.KERNEL32(?,?,?,?,0046AB02,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A96A
                • MultiByteToWideChar.KERNEL32(?,0046B7E5,?,?,00000000,00000000,7591E860,0046B7E4,?,?,0046AB02,?,?,?,00000000,00000001), ref: 0046A9A2
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,0046AB02,?), ref: 0046A9F8
                • GetStringTypeW.KERNEL32(?,?,00000000,0046AB02,?,?,?,?,?,?,0046AB02,?), ref: 0046AA0A
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: StringType$ByteCharMultiWide
                • String ID:
                • API String ID: 3852931651-0
                • Opcode ID: ab4217411143ffe3254ca9e7388d5397779f7d60e845bb51e8d462f5dba7c91c
                • Instruction ID: 5d04ebb630ede76be34a412984aa30ef206bdfb02e237f80f5ded91fe66f7989
                • Opcode Fuzzy Hash: ab4217411143ffe3254ca9e7388d5397779f7d60e845bb51e8d462f5dba7c91c
                • Instruction Fuzzy Hash: 3F417EB1600609BFCF108F94DD85EAF3B69EB05754F204526F915F2260E3398DA4DBAB
                APIs
                • GetVersionExA.KERNEL32 ref: 004680E7
                • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 0046811C
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0046817C
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: EnvironmentFileModuleNameVariableVersion
                • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                • API String ID: 1385375860-4131005785
                • Opcode ID: 53528356a6435874c4cea8836d0c504b681df6164dbf9ca25d22a8d434fd30e9
                • Instruction ID: 5b987649a18d894d0e495aeb664bcd7067431a9f38e5e2f94aadff08a1f212ff
                • Opcode Fuzzy Hash: 53528356a6435874c4cea8836d0c504b681df6164dbf9ca25d22a8d434fd30e9
                • Instruction Fuzzy Hash: 3331F3719452886AEB3186709C51BDB37689B03308F1402DFE185E5242FE788EC7CB1B
                APIs
                • GetStartupInfoA.KERNEL32(?), ref: 00467E6F
                • GetFileType.KERNEL32(?,?,00000000), ref: 00467F1A
                • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00467F7D
                • GetFileType.KERNEL32(00000000,?,00000000), ref: 00467F8B
                • SetHandleCount.KERNEL32 ref: 00467FC2
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: FileHandleType$CountInfoStartup
                • String ID:
                • API String ID: 1710529072-0
                • Opcode ID: 34c641e5c7566a4f61e51126171c732304a31f5bcaff118d0c42436aae4cc374
                • Instruction ID: 904a1bf5860a3ccec006ab94641980349b31f95e458b6625cd4b51425871e72e
                • Opcode Fuzzy Hash: 34c641e5c7566a4f61e51126171c732304a31f5bcaff118d0c42436aae4cc374
                • Instruction Fuzzy Hash: AD5134315083058FD724CF28C884B667BA0EB1172CF2446AED5A6DB6E1F7389C49C75B
                APIs
                • GetLastError.KERNEL32(00000103,7FFFFFFF,0046AAAD,00469480,00000000,?,?,00000000,00000001), ref: 00468036
                • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 00468044
                • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 00468090
                  • Part of subcall function 00469175: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00468059,00000001,00000074,?,?,00000000,00000001), ref: 0046926B
                • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00468068
                • GetCurrentThreadId.KERNEL32 ref: 00468079
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: ErrorLastValue$AllocCurrentHeapThread
                • String ID:
                • API String ID: 2020098873-0
                • Opcode ID: 8052f77e0d2cf52281169dad796c00c49ce1532b00fa052d94a585fd97d9bf58
                • Instruction ID: b74b10b1bdd3e7229d6419e3796b190ce8a51909fc87ae4804f62f1af361191e
                • Opcode Fuzzy Hash: 8052f77e0d2cf52281169dad796c00c49ce1532b00fa052d94a585fd97d9bf58
                • Instruction Fuzzy Hash: B4F0F6316002515BD7302B75BD0956A3B649B01771B150B3EF5C2E56B0EF788CC5466A
                APIs
                • HeapAlloc.KERNEL32(00000000,00002020,00463C80,00463C80,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F01
                • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F25
                • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000), ref: 00469F3F
                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000,?), ref: 0046A000
                • HeapFree.KERNEL32(00000000,00000000,?,?,0046A3AC,00000000,00000010,00000000,00000009,00000009,?,00468D6A,00000010,00000000,?,00000000), ref: 0046A017
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AllocVirtual$FreeHeap
                • String ID:
                • API String ID: 714016831-0
                • Opcode ID: 2bf0c84c70cf4df8327d2a3aebbceef8d6b212f0e4515c6402ae096c437e29aa
                • Instruction ID: 445181fbcf65ce7e9d39d92d2b604eca806c0f8a9288605ab4d6bb1f59089151
                • Opcode Fuzzy Hash: 2bf0c84c70cf4df8327d2a3aebbceef8d6b212f0e4515c6402ae096c437e29aa
                • Instruction Fuzzy Hash: 1C31D072600701ABE3308F24DC44B66BBA8EB44755F11423BF156E7790FBB8AD409B4E
                APIs
                • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,00469AFC,00000000,00000000,00000000,00468D0C,00000000,00000000,?,00000000,00000000,00000000), ref: 00469D5C
                • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,00469AFC,00000000,00000000,00000000,00468D0C,00000000,00000000,?,00000000,00000000,00000000), ref: 00469D90
                • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 00469DAA
                • HeapFree.KERNEL32(00000000,?), ref: 00469DC1
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: AllocHeap$FreeVirtual
                • String ID:
                • API String ID: 3499195154-0
                • Opcode ID: 85db0018b5f02a0a531da6da56e99f1b82eb4dab677bd662bfc4afaa2d152d60
                • Instruction ID: a1c2a3597b2230bcaeaffa70772468b135f739cde47e51b730ca6c90506df880
                • Opcode Fuzzy Hash: 85db0018b5f02a0a531da6da56e99f1b82eb4dab677bd662bfc4afaa2d152d60
                • Instruction Fuzzy Hash: AE114F70600701EFC7218F2AEC45D627BB9FB85721711493AF1A2D65B0E3B198C2CF8A
                APIs
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685D9
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685E1
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685E9
                • InitializeCriticalSection.KERNEL32(?,00467FD3,?,00467608), ref: 004685F1
                Memory Dump Source
                • Source File: 00000003.00000002.3327356714.0000000000465000.00000008.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.3327299573.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327315119.0000000000401000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327375623.000000000046B000.00000004.00000001.01000000.00000004.sdmpDownload File
                • Associated: 00000003.00000002.3327415276.000000000046C000.00000002.00000001.01000000.00000004.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_Deuvw.jbxd
                Similarity
                • API ID: CriticalInitializeSection
                • String ID:
                • API String ID: 32694325-0
                • Opcode ID: 503c6c650575022db7612a51c23a455fa7bd590d9805bfc3dac3f36800976718
                • Instruction ID: 0ad9e4f4a03855f4481bac37ad47b37e425ca202d897247833f3bf621bba40d6
                • Opcode Fuzzy Hash: 503c6c650575022db7612a51c23a455fa7bd590d9805bfc3dac3f36800976718
                • Instruction Fuzzy Hash: 6BC002318040B49ACF126F95FE06946BF25EB447A23050077F5845143497A21D50FFD9