Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SAMPLE_1.exe.bin.exe

Overview

General Information

Sample name:SAMPLE_1.exe.bin.exe
Analysis ID:1589195
MD5:f02542574ac338840d4b35d2ee561054
SHA1:7db77726c130fc3a9c2cfd5d8104814d057d984a
SHA256:8db2fa5d8f7fb779c30dc96a1b2822243cc3b08bd596744fa7a62adc80a46fcc
Tags:diablonetexeuser-notscamguru
Infos:

Detection

STRRAT
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected STRRAT
AI detected suspicious sample
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SAMPLE_1.exe.bin.exe (PID: 6948 cmdline: "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe" MD5: F02542574AC338840D4B35D2EE561054)
    • javaw.exe (PID: 6996 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
      • icacls.exe (PID: 7152 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: javaw.exe PID: 6996JoeSecurity_STRRATYara detected STRRATJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SAMPLE_1.exe.bin.exeReversingLabs: Detection: 79%
    Source: SAMPLE_1.exe.bin.exeVirustotal: Detection: 67%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.5% probability
    Source: SAMPLE_1.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
    Source: SAMPLE_1.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: s3.timeweb.cloud
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.CHAMBERSIGN.ORG
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
    Source: javaw.exe, 00000001.00000002.1715443108.00000000099FF000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: javaw.exe, 00000001.00000002.1715443108.00000000099FF000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: javaw.exe, 00000001.00000002.1715443108.00000000099FF000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificat
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009C57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009B0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009C57000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009A10000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009B0C000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1717292928.0000000014E66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
    Source: javaw.exe, 00000001.00000002.1715443108.00000000099FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
    Source: javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1717292928.0000000014F78000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.00000000047ED000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/;
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm3
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps;
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009B0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
    Source: javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
    Source: javaw.exe, 00000001.00000002.1714718163.0000000004699000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s3.timeweb.cloud
    Source: javaw.exe, 00000001.00000002.1715443108.0000000009A25000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004699000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s3.timeweb.cloud/dfd5ba43-9bd2500b-6a85-46a4-9e9c-1edaaf0ff6b9/latest.jar
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B98FD00_2_00B98FD0
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: String function: 00B9B758 appears 40 times
    Source: SAMPLE_1.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
    Source: classification engineClassification label: mal60.troj.winEXE@6/3@1/1
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91F36 GetLastError,fprintf,FormatMessageA,fprintf,strcat,strcat,LocalFree,fprintf,ShellExecuteA,0_2_00B91F36
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B9206E fprintf,FindResourceExA,LoadResource,LockResource,fprintf,SetLastError,fputs,0_2_00B9206E
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7132:120:WilError_03
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
    Source: SAMPLE_1.exe.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SAMPLE_1.exe.bin.exeReversingLabs: Detection: 79%
    Source: SAMPLE_1.exe.bin.exeVirustotal: Detection: 67%
    Source: unknownProcess created: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
    Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"Jump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: SAMPLE_1.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
    Source: SAMPLE_1.exe.bin.exeStatic PE information: real checksum: 0x1f2cc should be: 0x189d9
    Source: SAMPLE_1.exe.bin.exeStatic PE information: section name: .eh_fram
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91803 push edi; mov dword ptr [esp], ebx0_2_00B91842
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91803 push eax; mov dword ptr [esp], 00000000h0_2_00B91A6A
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91803 push ebx; mov dword ptr [esp], eax0_2_00B91AEB
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91803 push esi; mov dword ptr [esp], ebx0_2_00B91BC8
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B9E827 push esi; ret 0_2_00B9E83A
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B915D0 push eax; mov dword ptr [esp], 00000000h0_2_00B916BB
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B9F96A push ebx; ret 0_2_00B9F96B
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91F36 push ecx; mov dword ptr [esp], 00BA9168h0_2_00B91FF7
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B9DB23 push es; iretd 0_2_00B9DC34
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02302608 push es; retn 0024h1_2_0230260B
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_022F8A11 push cs; retf 1_2_022F8A31
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_022FD07B push es; retn 0001h1_2_022FD17F
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225D8F7 push 00000000h; mov dword ptr [esp], esp1_2_0225D921
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225A20A push ecx; ret 1_2_0225A21A
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225A21B push ecx; ret 1_2_0225A225
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225BB67 push 00000000h; mov dword ptr [esp], esp1_2_0225BB8D
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225B3B7 push 00000000h; mov dword ptr [esp], esp1_2_0225B3DD
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225D8E0 push 00000000h; mov dword ptr [esp], esp1_2_0225D921
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225B947 push 00000000h; mov dword ptr [esp], esp1_2_0225B96D
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_0225C477 push 00000000h; mov dword ptr [esp], esp1_2_0225C49D
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
    Source: javaw.exe, 00000001.00000003.1682187273.000000001486B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
    Source: javaw.exe, 00000001.00000003.1682187273.000000001486B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
    Source: javaw.exe, 00000001.00000002.1714200579.0000000000978000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
    Source: javaw.exe, 00000001.00000003.1682187273.000000001486B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
    Source: javaw.exe, 00000001.00000002.1714200579.0000000000978000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
    Source: javaw.exe, 00000001.00000003.1682187273.000000001486B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
    Source: javaw.exe, 00000001.00000002.1714200579.0000000000978000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeCode function: 0_2_00B91180 SetUnhandledExceptionFilter,GetCommandLineA,_iob,_setmode,_setmode,_setmode,__p__fmode,__p__environ,_cexit,ExitProcess,__getmainargs,0_2_00B91180
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMemory protected: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\SAMPLE_1.exe.bin.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"Jump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_022503C0 cpuid 1_2_022503C0
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\6996 VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: javaw.exe PID: 6996, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: javaw.exe PID: 6996, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    Services File Permissions Weakness
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    12
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Services File Permissions Weakness
    1
    Disable or Modify Tools
    LSASS Memory22
    System Information Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    11
    Process Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Services File Permissions Weakness
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589195 Sample: SAMPLE_1.exe.bin.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 60 18 s3.timeweb.cloud 2->18 22 Multi AV Scanner detection for submitted file 2->22 24 Yara detected STRRAT 2->24 26 AI detected suspicious sample 2->26 9 SAMPLE_1.exe.bin.exe 2->9         started        signatures3 process4 process5 11 javaw.exe 21 9->11         started        dnsIp6 20 s3.timeweb.cloud 217.78.234.244, 443, 49730 SKYLINEWIMAXRU Russian Federation 11->20 14 icacls.exe 1 11->14         started        process7 process8 16 conhost.exe 14->16         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SAMPLE_1.exe.bin.exe79%ReversingLabsWin32.Trojan.Generic
    SAMPLE_1.exe.bin.exe68%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    HTTP://WWW.CHAMBERSIGN.ORG0%Avira URL Cloudsafe
    http://repository.swisssign.com/;0%Avira URL Cloudsafe
    http://www.quovadis.bm30%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    s3.timeweb.cloud
    217.78.234.244
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.xrampsecurity.com/XGCA.crljavaw.exe, 00000001.00000002.1715443108.0000000009C57000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://crl.chambersign.org/chambersroot.crl0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://repository.luxtrust.lu0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://bugreport.sun.com/bugreport/javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009969000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://cps.chambersign.org/cps/chambersroot.html0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://s3.timeweb.cloudjavaw.exe, 00000001.00000002.1714718163.0000000004699000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://java.oracle.com/javaw.exe, 00000001.00000002.1715443108.000000000999A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://null.oracle.com/javaw.exe, 00000001.00000002.1715443108.0000000009B0C000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1717292928.0000000014E66000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.chambersign.org1javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://repository.swisssign.com/0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.00000000047ED000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          HTTP://WWW.CHAMBERSIGN.ORGjavaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://policy.camerfirma.comjavaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://ocsp.quovadisoffshore.comjavaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://crl.securetrust.com/STCA.crl0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.quovadisglobal.com/cpsjavaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://cps.chambersign.org/cps/chambersroot.htmljavaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://repository.swisssign.com/;javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://crl.securetrust.com/STCA.crljavaw.exe, 00000001.00000002.1715443108.0000000009B0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://repository.luxtrust.lujavaw.exe, 00000001.00000002.1715443108.0000000009B0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.quovadisglobal.com/cps;javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.quovadisglobal.com/cps0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.xrampsecurity.com/XGCA.crl0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://s3.timeweb.cloud/dfd5ba43-9bd2500b-6a85-46a4-9e9c-1edaaf0ff6b9/latest.jarjavaw.exe, 00000001.00000002.1715443108.0000000009A25000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004699000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.quovadis.bm3javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.quovadis.bmjavaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.quovadis.bm0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ocsp.quovadisoffshore.com0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.chambersign.org/chambersroot.crljavaw.exe, 00000001.00000002.1715443108.0000000009C50000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://repository.swisssign.com/javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.chambersign.orgjavaw.exe, 00000001.00000002.1714718163.0000000004400000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://policy.camerfirma.com0javaw.exe, 00000001.00000002.1714718163.00000000048AA000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1717292928.0000000014F78000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1715443108.0000000009B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              217.78.234.244
                                                              s3.timeweb.cloudRussian Federation
                                                              197349SKYLINEWIMAXRUfalse
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1589195
                                                              Start date and time:2025-01-11 16:23:05 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 2m 50s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:4
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:SAMPLE_1.exe.bin.exe
                                                              Detection:MAL
                                                              Classification:mal60.troj.winEXE@6/3@1/1
                                                              EGA Information:
                                                              • Successful, ratio: 50%
                                                              HCA Information:
                                                              • Successful, ratio: 90%
                                                              • Number of executed functions: 37
                                                              • Number of non-executed functions: 44
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Stop behavior analysis, all processes terminated
                                                              • Execution Graph export aborted for target javaw.exe, PID 6996 because it is empty
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                                              No simulations
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              217.78.234.244https://s3.timeweb.cloud/8df544ea-67s89du678we90alkfdxzmndeoiewzxcfd/unlimitedscalabilitypossibilities%20/staff-payroll-review.html#sbarnes@clc.org.auGet hashmaliciousUnknownBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                s3.timeweb.cloudhttps://s3.timeweb.cloud/8df544ea-67s89du678we90alkfdxzmndeoiewzxcfd/unlimitedscalabilitypossibilities%20/staff-payroll-review.html#sbarnes@clc.org.auGet hashmaliciousUnknownBrowse
                                                                • 217.78.234.244
                                                                https://zapp-p.com/qouta/#test@test.comGet hashmaliciousUnknownBrowse
                                                                • 217.78.234.243
                                                                https://tas-pe.com/ahowe@europait.net#ahowe@europait.netGet hashmaliciousHTMLPhisherBrowse
                                                                • 217.78.234.243
                                                                https://s3.timeweb.cloud/d2247a8d-ceb09c71-57ee-4411-a590-e4de8ca5cf86/Contract/contract.htm#andrew.wise@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                                • 217.78.234.243
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                SKYLINEWIMAXRUmips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                • 91.105.196.145
                                                                https://s3.timeweb.cloud/8df544ea-67s89du678we90alkfdxzmndeoiewzxcfd/unlimitedscalabilitypossibilities%20/staff-payroll-review.html#sbarnes@clc.org.auGet hashmaliciousUnknownBrowse
                                                                • 217.78.234.244
                                                                https://zapp-p.com/qouta/#test@test.comGet hashmaliciousUnknownBrowse
                                                                • 217.78.234.243
                                                                https://tas-pe.com/ahowe@europait.net#ahowe@europait.netGet hashmaliciousHTMLPhisherBrowse
                                                                • 217.78.234.243
                                                                https://s3.timeweb.cloud/d2247a8d-ceb09c71-57ee-4411-a590-e4de8ca5cf86/Contract/contract.htm#andrew.wise@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                                • 217.78.234.243
                                                                http://storage.googleapis.com/dfg153erh35ef1gdr/dfgremjflmgr.html#file.html?cbbbbcccXBYFczBrVcdc9kc8cJhS7ckzFcbbbbcGet hashmaliciousUnknownBrowse
                                                                • 217.78.233.205
                                                                http://decreesling.comGet hashmaliciousUnknownBrowse
                                                                • 217.78.233.53
                                                                fps-booster.exeGet hashmaliciousStormKittyBrowse
                                                                • 217.78.239.114
                                                                gO6RAJaFXe.elfGet hashmaliciousMiraiBrowse
                                                                • 91.105.196.153
                                                                https://sbatlahfirahfoudggetgd.blob.core.windows.net/sbatlahfirahfoudggetgd/1.html?4x7m3FDkTJEczP1p2GRZZoiIdhHjYH24UjAz6N4wmzBMUGDTAWle1uoy4RUBNdG4utah6kZSk2nPrPIYhawSIHt5qk2ermrWyswH#cl/26427_md/7/21449/5023/19036/1614238Get hashmaliciousHTMLPhisherBrowse
                                                                • 217.78.233.95
                                                                No context
                                                                No context
                                                                Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):52
                                                                Entropy (8bit):4.950063756436211
                                                                Encrypted:false
                                                                SSDEEP:3:oFj4I5vpm4USIr4vn:oJ5bIr4v
                                                                MD5:EDC5292C8C0EBA0E4F3E13DD7280672D
                                                                SHA1:6FBAF9759C05C0074A14FC0BC8A3D92CFE4CFC0C
                                                                SHA-256:3B0377DC5D6D63397A833F6014956E3AF31E37E06E1F70890652A711D675F14D
                                                                SHA-512:AFB9E1277115CA1BDF688B28A78627FB5872725ED6D1B1FB47EEABC23F0FC78454749089C57B29A2990A910A7FC682FD7F927C3FB904357367CDD68A56AD86D7
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:C:\Program Files (x86)\Java\jre-1.8..1736609037522..
                                                                Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):1.2841784882305851
                                                                Encrypted:false
                                                                SSDEEP:96:X/9VrhX8Gic8ksGiD6BEMlwxUA6erQeSTTHG1bowm:X/h8Gic8ksGiD6bAkFfHGd
                                                                MD5:19F3AA9F412CDCE00116ACD12B22CE6B
                                                                SHA1:81A8BDE03043B0922FC32C89E033BCC9F7DF9898
                                                                SHA-256:75A50F67EBC90515D1805195A68F829A75F8B4614C95252D86911A07DAABA3E0
                                                                SHA-512:E0FBB1665A27CDE447E046E6A4F8CCE31BE232A5D6A42D79A1A10B434FCF9CC3F62810735EA6B83863534D82708E659E4189D932C50053A9BCDF412BD69373AF
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:.........9........?..... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):45
                                                                Entropy (8bit):0.9111711733157262
                                                                Encrypted:false
                                                                SSDEEP:3:/lwlt7n:WNn
                                                                MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                                                SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                                                SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                                                SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:........................................J2SE.
                                                                File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Entropy (8bit):6.379871493676221
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:SAMPLE_1.exe.bin.exe
                                                                File size:69'759 bytes
                                                                MD5:f02542574ac338840d4b35d2ee561054
                                                                SHA1:7db77726c130fc3a9c2cfd5d8104814d057d984a
                                                                SHA256:8db2fa5d8f7fb779c30dc96a1b2822243cc3b08bd596744fa7a62adc80a46fcc
                                                                SHA512:909d152a058310c12c783a2b9ef3606707c748a582d6c577b697c1e5a7e4f89b31a991ac5ab74484ae1246eb71dbfe43ac1b982a3ac08b12d35d1b82278ef607
                                                                SSDEEP:1536:ir3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/E0+:m7PEg3qcv5PvB/Eh
                                                                TLSH:34637D0AFA07A0F6EF37513445CFE67F8638A612C421DD6AFF0E6B59F9235526818213
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...O=wg...............".....R....................@.......................................@... ............................
                                                                Icon Hash:90cececece8e8eb0
                                                                Entrypoint:0x401590
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                                                                Time Stamp:0x67773D4F [Fri Jan 3 01:28:47 2025 UTC]
                                                                TLS Callbacks:0x404fe0, 0x404f90
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:1f2702872592229d2f4cb1162cfbc55b
                                                                Instruction
                                                                sub esp, 1Ch
                                                                mov dword ptr [esp], 00000002h
                                                                call dword ptr [0041A36Ch]
                                                                call 00007F3F7C7EB480h
                                                                lea esi, dword ptr [esi+00h]
                                                                lea edi, dword ptr [edi+00000000h]
                                                                mov eax, dword ptr [0041A3B4h]
                                                                jmp eax
                                                                mov esi, esi
                                                                lea edi, dword ptr [edi+00000000h]
                                                                mov eax, dword ptr [0041A398h]
                                                                jmp eax
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 18h
                                                                cmp dword ptr [0041000Ch], 00000000h
                                                                je 00007F3F7C7EB932h
                                                                mov eax, dword ptr [0040C000h]
                                                                test eax, eax
                                                                jne 00007F3F7C7EB8FEh
                                                                mov eax, dword ptr [00410A24h]
                                                                mov dword ptr [esp+04h], 00000000h
                                                                mov dword ptr [0041000Ch], 00000000h
                                                                mov dword ptr [esp], eax
                                                                call 00007F3F7C7F5C02h
                                                                cmp dword ptr [00410A20h], 00000000h
                                                                push eax
                                                                push eax
                                                                je 00007F3F7C7EB8FBh
                                                                cmp dword ptr [00410A28h], 00000000h
                                                                je 00007F3F7C7EB8F2h
                                                                mov eax, dword ptr [ebp+08h]
                                                                mov dword ptr [esp+04h], 00000001h
                                                                mov dword ptr [esp], eax
                                                                call 00007F3F7C7F5C1Bh
                                                                push eax
                                                                push eax
                                                                call 00007F3F7C7EC1A2h
                                                                mov dword ptr [esp], 00000000h
                                                                call 00007F3F7C7F5BF0h
                                                                push eax
                                                                jmp 00007F3F7C7EB8C9h
                                                                sub eax, 64h
                                                                cmp dword ptr [00410A20h], 00000000h
                                                                mov dword ptr [0040C000h], eax
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1a0000xe28.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x4e0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000x714.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x1c0040x18.tls
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x1a29c0x210.idata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xab200xac00a8d7ee6c93480cc7f0558d955ddad8a6False0.5515307049418605data6.253230225914212IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .data0xc0000x280x2005a57f321ae6f68794e78fba852a0ca30False0.08203125data0.3124291846600516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0xd0000xf180x100038fcaadbc82d759c822735974f5e0045False0.426025390625data5.553999411863391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                .eh_fram0xe0000x1d100x1e009e2ddb9db862af03aae6cf976d81070cFalse0.33359375data4.882088912516699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                .bss0x100000x96680x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0x1a0000xe280x1000f3f34beb12ab4e6fa44d8ec2bd39e3b3False0.369873046875PGP symmetric key encrypted data - Plaintext or unencrypted data4.922852717723951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .CRT0x1b0000x180x200680b5a97669538b6c270dcf63aeae555False0.04296875data0.11446338125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0x1c0000x200x2001d22717eb27005d2f0f43537e6a1e267False0.05859375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x1d0000x4e00x600bd00a480ffee7c64641e8527e855c647False0.3665364583333333data3.8151140241026646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .reloc0x1e0000x7140x80001dcc9956cb8440cd1d331bd3ac2957fFalse0.78271484375data6.201148186844163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_RCDATA0x1d1f00x26data1.2105263157894737
                                                                RT_RCDATA0x1d2180x6data2.3333333333333335
                                                                RT_RCDATA0x1d2200x5ASCII text, with no line terminators2.6
                                                                RT_RCDATA0x1d2280x3ASCII text, with no line terminators3.6666666666666665
                                                                RT_RCDATA0x1d2300x32data1.16
                                                                RT_RCDATA0x1d2680x36data1.1296296296296295
                                                                RT_RCDATA0x1d2a00x35ASCII text, with no line terminators1.1320754716981132
                                                                RT_RCDATA0x1d2d80x68data0.875
                                                                RT_MANIFEST0x1d3400x19dXML 1.0 document, ASCII text0.5520581113801453
                                                                DLLImport
                                                                advapi32.dllRegCloseKey, RegEnumKeyExA, RegOpenKeyExA, RegQueryValueExA
                                                                kernel32.dllCloseHandle, CreateMutexA, CreatePipe, CreateProcessA, DeleteCriticalSection, EnterCriticalSection, ExitProcess, FindResourceExA, FormatMessageA, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetEnvironmentVariableA, GetExitCodeProcess, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GlobalMemoryStatusEx, InitializeCriticalSection, InterlockedExchange, IsDBCSLeadByteEx, LeaveCriticalSection, LoadResource, LocalFree, LockResource, MultiByteToWideChar, ReadFile, SetEnvironmentVariableA, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte
                                                                msvcrt.dll_strdup, _stricoll
                                                                msvcrt.dll__getmainargs, __mb_cur_max, __p__environ, __p__fmode, __set_app_type, _cexit, _chdir, _close, _errno, _findclose, _findfirst, _findnext, _fullpath, _iob, _itoa, _onexit, _open, _read, _setmode, _stat64, _stricmp, abort, atexit, atoi, calloc, fclose, fopen, fprintf, fputc, fputs, free, fwrite, getenv, isspace, localeconv, malloc, mbstowcs, memcpy, printf, puts, realloc, setlocale, signal, strcat, strchr, strcmp, strcoll, strcpy, strlen, strncat, strncpy, strpbrk, strrchr, strstr, strtok, tolower, vfprintf, wcslen, wcstombs
                                                                shell32.dllShellExecuteA
                                                                user32.dllCreateWindowExA, DispatchMessageA, EnumWindows, FindWindowExA, GetMessageA, GetSystemMetrics, GetWindowLongA, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, KillTimer, LoadImageA, MessageBoxA, PostQuitMessage, SendMessageA, SetForegroundWindow, SetTimer, SetWindowPos, ShowWindow, TranslateMessage, UpdateWindow
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 11, 2025 16:24:00.063337088 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.063391924 CET44349730217.78.234.244192.168.2.4
                                                                Jan 11, 2025 16:24:00.063509941 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.189841032 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.189862967 CET44349730217.78.234.244192.168.2.4
                                                                Jan 11, 2025 16:24:00.882973909 CET44349730217.78.234.244192.168.2.4
                                                                Jan 11, 2025 16:24:00.883064032 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.903944969 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.903976917 CET44349730217.78.234.244192.168.2.4
                                                                Jan 11, 2025 16:24:00.978401899 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.978418112 CET44349730217.78.234.244192.168.2.4
                                                                Jan 11, 2025 16:24:00.978609085 CET49730443192.168.2.4217.78.234.244
                                                                Jan 11, 2025 16:24:00.978852987 CET44349730217.78.234.244192.168.2.4
                                                                Jan 11, 2025 16:24:00.978923082 CET49730443192.168.2.4217.78.234.244
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 11, 2025 16:24:00.052258968 CET6006653192.168.2.41.1.1.1
                                                                Jan 11, 2025 16:24:00.060075998 CET53600661.1.1.1192.168.2.4
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jan 11, 2025 16:24:00.052258968 CET192.168.2.41.1.1.10xba1Standard query (0)s3.timeweb.cloudA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jan 11, 2025 16:24:00.060075998 CET1.1.1.1192.168.2.40xba1No error (0)s3.timeweb.cloud217.78.234.244A (IP address)IN (0x0001)false
                                                                Jan 11, 2025 16:24:00.060075998 CET1.1.1.1192.168.2.40xba1No error (0)s3.timeweb.cloud217.78.234.243A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:10:23:56
                                                                Start date:11/01/2025
                                                                Path:C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"
                                                                Imagebase:0xb90000
                                                                File size:69'759 bytes
                                                                MD5 hash:F02542574AC338840D4B35D2EE561054
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:1
                                                                Start time:10:23:57
                                                                Start date:11/01/2025
                                                                Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"
                                                                Imagebase:0x450000
                                                                File size:257'664 bytes
                                                                MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:10:23:57
                                                                Start date:11/01/2025
                                                                Path:C:\Windows\SysWOW64\icacls.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                                                Imagebase:0x850000
                                                                File size:29'696 bytes
                                                                MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:10:23:57
                                                                Start date:11/01/2025
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff7699e0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:9.7%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:5.1%
                                                                  Total number of Nodes:1404
                                                                  Total number of Limit Nodes:40
                                                                  execution_graph 5801 b912b9 5803 b91235 5801->5803 5802 b91422 5803->5802 5804 b9137a 5803->5804 5805 b95e70 61 API calls 5803->5805 5806 b913d8 __p__fmode 5804->5806 5807 b91396 _setmode _setmode _setmode 5804->5807 5805->5804 5808 b94cd0 13 API calls 5806->5808 5807->5806 5809 b913ea 5808->5809 5810 b913f2 __p__environ 5809->5810 5811 b9ba30 265 API calls 5810->5811 5812 b91413 _cexit ExitProcess 5811->5812 5813 b9aab9 5814 b9aac0 LeaveCriticalSection 5813->5814 6149 b97039 6150 b97040 6149->6150 6151 b972ee 6150->6151 6152 b96ba0 fputc 6150->6152 6156 b9719f 6150->6156 6152->6150 6153 b971c3 6154 b971e6 6153->6154 6157 b96ba0 fputc 6153->6157 6155 b96ba0 fputc 6155->6156 6156->6153 6156->6155 6157->6153 6158 b94e39 6159 b94d45 6158->6159 6160 b94ddf 6159->6160 6161 b94be0 13 API calls 6159->6161 6162 b94d84 6159->6162 6161->6159 6163 b94b90 13 API calls 6162->6163 6164 b94d9c 6163->6164 6164->6160 6165 b94be0 13 API calls 6164->6165 6165->6164 6360 b9adb9 6364 b9ad76 6360->6364 6361 b9a880 5 API calls 6361->6364 6362 b9abf0 7 API calls 6362->6364 6363 b9addf LeaveCriticalSection 6363->6364 6364->6361 6364->6362 6364->6363 6365 b9adaf 6364->6365 6366 b9aa70 6 API calls 6364->6366 6366->6364 5815 b970bc 5818 b970c0 5815->5818 5816 b972ee 5817 b96ba0 fputc 5817->5818 5818->5816 5818->5817 5822 b9719f 5818->5822 5819 b971c3 5820 b971e6 5819->5820 5823 b96ba0 fputc 5819->5823 5822->5819 5824 b96ba0 5822->5824 5823->5819 5825 b96bac 5824->5825 5826 b96bb9 5825->5826 5827 b96bd0 fputc 5825->5827 5826->5822 5827->5822 6388 b965bc 6389 b965c0 _errno 6388->6389 6390 b96603 _errno 6389->6390 6391 b965e2 free 6389->6391 6390->6391 6392 b9653f 6391->6392 6507 b9113c 6508 b91140 signal 6507->6508 6509 b91052 6508->6509 6510 b9813c 6512 b98090 6510->6512 6511 b96ba0 fputc 6511->6512 6512->6511 6513 b9812c 6512->6513 6393 b985b5 6394 b985bd 6393->6394 6397 b96c00 6394->6397 6396 b985dc 6396->6396 6398 b98e00 5 API calls 6397->6398 6399 b96c2b 6398->6399 6402 b96ba0 fputc 6399->6402 6405 b96c51 6399->6405 6400 b96ca1 6401 b96cba 6400->6401 6404 b96ba0 fputc 6400->6404 6401->6396 6402->6399 6403 b98e00 5 API calls 6403->6405 6404->6400 6405->6400 6405->6403 6406 b96ba0 fputc 6405->6406 6406->6405 6166 b9a029 6180 b993b8 6166->6180 6167 b9aae0 9 API calls 6167->6180 6168 b9990b 6169 b9aa70 6 API calls 6170 b99856 6169->6170 6171 b9aed0 8 API calls 6171->6180 6172 b9975b 6172->6168 6173 b9aae0 9 API calls 6172->6173 6174 b9977f 6173->6174 6174->6168 6179 b9aa70 6 API calls 6174->6179 6175 b9a9a0 7 API calls 6176 b9a1d1 memcpy 6175->6176 6177 b9aed0 8 API calls 6176->6177 6177->6180 6178 b9b030 7 API calls 6178->6180 6182 b9982e 6179->6182 6180->6167 6180->6168 6180->6171 6180->6172 6180->6174 6180->6175 6180->6178 6185 b9abc0 7 API calls 6180->6185 6186 b994aa 6180->6186 6187 b9ad40 11 API calls 6180->6187 6188 b9abf0 7 API calls 6180->6188 6189 b9aa70 6 API calls 6180->6189 6181 b9aa70 6 API calls 6181->6186 6183 b9aa70 6 API calls 6182->6183 6184 b99842 6182->6184 6182->6186 6183->6184 6184->6181 6185->6180 6186->6169 6187->6180 6188->6180 6189->6180 5828 b914ac 5829 b91235 5828->5829 5829->5829 5830 b91422 5829->5830 5831 b9137a 5829->5831 5832 b95e70 61 API calls 5829->5832 5833 b913d8 __p__fmode 5831->5833 5834 b91396 _setmode _setmode _setmode 5831->5834 5832->5831 5835 b94cd0 13 API calls 5833->5835 5834->5833 5836 b913ea 5835->5836 5837 b913f2 __p__environ 5836->5837 5838 b9ba30 265 API calls 5837->5838 5839 b91413 _cexit ExitProcess 5838->5839 6190 b9682c 6191 b96830 _findfirst 6190->6191 6192 b9684d strncpy 6191->6192 6193 b96821 6191->6193 6193->6191 6407 b983ac 6408 b98408 6407->6408 6409 b983c3 6407->6409 6409->6408 6410 b96e20 fputc 6409->6410 6410->6408 6411 b94fac 6412 b94fb0 6411->6412 6415 b95220 6412->6415 6414 b94fc8 6416 b9522e 6415->6416 6417 b95273 6415->6417 6420 b95230 6416->6420 6421 b95245 6416->6421 6418 b9527c 6417->6418 6419 b95290 InitializeCriticalSection 6417->6419 6418->6414 6419->6418 6426 b9523e 6420->6426 6427 b95080 EnterCriticalSection 6420->6427 6422 b9524e 6421->6422 6423 b95080 4 API calls 6421->6423 6424 b95258 DeleteCriticalSection 6422->6424 6422->6426 6423->6422 6424->6426 6426->6414 6428 b950cc LeaveCriticalSection 6427->6428 6429 b950a1 TlsGetValue GetLastError 6427->6429 6428->6426 6430 b950b9 6429->6430 6430->6428 6430->6429 5840 b982a0 5841 b982c7 5840->5841 5842 b982b3 5840->5842 5844 b977c0 26 API calls 5841->5844 5846 b977c0 5842->5846 5845 b98601 5844->5845 5845->5845 5847 b977d3 5846->5847 5858 b96aa0 5847->5858 5850 b97881 5883 b96d90 5850->5883 5851 b97826 5862 b97310 5851->5862 5854 b96ba0 fputc 5857 b97834 5854->5857 5855 b9785a 5855->5841 5856 b9788e 5856->5841 5857->5854 5857->5855 5859 b96ad6 5858->5859 5887 b98fd0 5859->5887 5861 b96b4c 5861->5850 5861->5851 5863 b9732e 5862->5863 5863->5857 5864 b9761a 5863->5864 5865 b973e8 5863->5865 5866 b96ba0 fputc 5863->5866 5868 b97406 5863->5868 5864->5857 5867 b96ba0 fputc 5865->5867 5865->5868 5866->5863 5867->5865 5869 b97564 localeconv 5868->5869 5874 b97434 5868->5874 5879 b9741b 5868->5879 5986 b98ad0 setlocale strchr 5869->5986 5870 b97440 5871 b97466 5870->5871 5877 b96ba0 fputc 5870->5877 5871->5857 5873 b97428 5875 b96ba0 fputc 5873->5875 5874->5870 5876 b96ba0 fputc 5874->5876 5875->5874 5876->5874 5877->5870 5879->5873 5880 b974e3 5879->5880 5881 b96ba0 fputc 5879->5881 5981 b98e00 setlocale strchr 5879->5981 5880->5874 5882 b96ba0 fputc 5880->5882 5881->5879 5882->5880 5884 b96da2 5883->5884 5884->5884 6006 b96cf0 5884->6006 5888 b98ffc 5887->5888 5902 b99940 5887->5902 5889 b990c8 5888->5889 5890 b990f4 5888->5890 5891 b99003 5888->5891 5892 b99134 5888->5892 5941 b9a610 5889->5941 5890->5861 5894 b9a610 7 API calls 5890->5894 5928 b9a9a0 5891->5928 5895 b9a610 7 API calls 5892->5895 5897 b9912c 5894->5897 5898 b99160 5895->5898 5897->5861 5898->5861 5899 b99029 5900 b990c0 5899->5900 5909 b99168 5899->5909 5927 b99322 5899->5927 5935 b9aa70 5900->5935 5902->5861 5903 b9aa70 6 API calls 5908 b9982e 5903->5908 5904 b99842 5906 b9aa70 6 API calls 5904->5906 5905 b9aa70 6 API calls 5907 b99856 5905->5907 5912 b994aa 5906->5912 5907->5861 5908->5904 5910 b9aa70 6 API calls 5908->5910 5908->5912 5909->5902 5909->5927 5944 b9a5d0 5909->5944 5910->5904 5912->5905 5913 b9aed0 8 API calls 5913->5927 5914 b9abc0 7 API calls 5914->5927 5915 b9ad40 11 API calls 5915->5927 5917 b9aa70 6 API calls 5917->5927 5918 b9975b 5926 b998e4 5918->5926 5952 b9aae0 5918->5952 5920 b9a9a0 7 API calls 5922 b9a1d1 memcpy 5920->5922 5921 b9977f 5921->5903 5921->5926 5966 b9aed0 5922->5966 5925 b9aae0 9 API calls 5925->5927 5926->5861 5927->5912 5927->5913 5927->5914 5927->5915 5927->5917 5927->5918 5927->5920 5927->5921 5927->5925 5927->5926 5948 b9abf0 5927->5948 5959 b9b030 5927->5959 5972 b9a880 5928->5972 5930 b9a9b3 5931 b9a9c3 5930->5931 5932 b9a9f9 malloc 5930->5932 5933 b9aa19 5931->5933 5934 b9a9d5 LeaveCriticalSection 5931->5934 5932->5931 5932->5933 5933->5899 5934->5933 5936 b9aa7e 5935->5936 5937 b9aaa7 5935->5937 5936->5937 5938 b9a880 5 API calls 5936->5938 5937->5889 5939 b9aa8b 5938->5939 5939->5937 5940 b9aac0 LeaveCriticalSection 5939->5940 5940->5889 5942 b9a5d0 7 API calls 5941->5942 5943 b9a629 5942->5943 5943->5890 5945 b9a5df 5944->5945 5946 b9a9a0 7 API calls 5945->5946 5947 b9a5f8 5946->5947 5947->5927 5949 b9ac09 5948->5949 5950 b9a9a0 7 API calls 5949->5950 5951 b9ac30 5950->5951 5951->5927 5954 b9ab13 5952->5954 5953 b9ab4a 5953->5921 5954->5953 5955 b9a9a0 7 API calls 5954->5955 5956 b9ab78 5955->5956 5956->5953 5957 b9ab7e memcpy 5956->5957 5958 b9aa70 6 API calls 5957->5958 5958->5953 5960 b9b04b 5959->5960 5961 b9b053 5960->5961 5962 b9b172 5960->5962 5964 b9a9a0 7 API calls 5961->5964 5965 b9b066 5961->5965 5963 b9a9a0 7 API calls 5962->5963 5963->5965 5964->5965 5965->5927 5965->5965 5967 b9aefc 5966->5967 5968 b9a9a0 7 API calls 5967->5968 5970 b9af11 5968->5970 5969 b9afbc 5969->5927 5970->5969 5970->5970 5971 b9aa70 6 API calls 5970->5971 5971->5969 5973 b9a913 EnterCriticalSection 5972->5973 5974 b9a894 5972->5974 5973->5930 5975 b9a8af 5974->5975 5976 b9a8c4 InterlockedExchange 5974->5976 5977 b9a8a0 Sleep 5975->5977 5980 b9a8ba 5975->5980 5976->5975 5978 b9a8df InitializeCriticalSection InitializeCriticalSection 5976->5978 5977->5975 5978->5980 5979 b9a8bf 5979->5930 5980->5973 5980->5979 5982 b98e48 atoi 5981->5982 5983 b98e55 5981->5983 5982->5983 5991 b98d70 5983->5991 5985 b98e6c 5985->5879 5987 b98b2c 5986->5987 5988 b98b1f atoi 5986->5988 5996 b98950 5987->5996 5988->5987 5990 b98b5a 5990->5879 5992 b98d96 WideCharToMultiByte 5991->5992 5995 b98d84 5991->5995 5994 b98de7 _errno 5992->5994 5992->5995 5993 b98d8a 5993->5985 5994->5985 5995->5993 5995->5994 5997 b98a20 5996->5997 5998 b98966 5996->5998 5997->5990 5998->5997 5999 b989f0 5998->5999 6002 b98997 IsDBCSLeadByteEx 5998->6002 6005 b989ad 5998->6005 5999->5990 6000 b98a57 MultiByteToWideChar 5999->6000 6001 b98a07 5999->6001 6000->5997 6004 b98aa7 _errno 6000->6004 6001->5990 6002->5999 6002->6005 6003 b989d2 MultiByteToWideChar 6003->5999 6003->6004 6004->5997 6005->5997 6005->6003 6007 b96d00 6006->6007 6008 b96d3a 6007->6008 6010 b96ba0 fputc 6007->6010 6011 b96ba0 fputc 6008->6011 6013 b96d53 6008->6013 6009 b96d79 6009->5856 6010->6007 6011->6008 6012 b96ba0 fputc 6012->6013 6013->6009 6013->6012 6514 b96920 6515 b96935 _errno 6514->6515 6516 b9692b 6514->6516 6515->6516 6194 b91424 6195 b9142d 6194->6195 6199 b91481 6194->6199 6196 b91442 isspace 6195->6196 6195->6199 6197 b9144e 6196->6197 6196->6199 6198 b95e70 61 API calls 6197->6198 6197->6199 6198->6199 6014 b95699 6016 b95549 6014->6016 6015 b955e8 6017 b95530 2 API calls 6015->6017 6019 b955d6 6015->6019 6016->6015 6018 b955b2 tolower tolower 6016->6018 6016->6019 6017->6015 6018->6016 6020 b9b299 6021 b9a9a0 7 API calls 6020->6021 6022 b9b2bb 6021->6022 6517 b98318 6518 b98724 6517->6518 6519 b98325 6517->6519 6519->6518 6520 b98377 6519->6520 6521 b97040 fputc 6519->6521 6522 b96e20 fputc 6520->6522 6521->6520 6523 b98408 6522->6523 5029 b91590 __set_app_type 5032 b91180 5029->5032 5033 b911ae SetUnhandledExceptionFilter 5032->5033 5034 b91192 5032->5034 5035 b911c2 5033->5035 5034->5033 5036 b91511 __getmainargs 5035->5036 5037 b911d4 GetCommandLineA 5035->5037 5038 b911f5 5036->5038 5037->5038 5039 b91422 5038->5039 5040 b9137a 5038->5040 5049 b95e70 5038->5049 5042 b913d8 __p__fmode 5040->5042 5043 b91396 _setmode _setmode _setmode 5040->5043 5061 b94cd0 5042->5061 5043->5042 5045 b913ea 5046 b913f2 __p__environ 5045->5046 5076 b9ba30 5046->5076 5050 b95e94 5049->5050 5051 b95e87 5049->5051 5083 b95880 strlen 5050->5083 5124 b954d0 5051->5124 5055 b95ea4 5056 b95eab 5055->5056 5057 b95ebb strlen 5055->5057 5056->5040 5059 b95ed1 5057->5059 5058 b95f08 _strdup 5060 b95f1a 5058->5060 5059->5058 5060->5040 5062 b94cd9 5061->5062 5065 b94ce0 5061->5065 5062->5045 5063 b94da0 5064 b94ddf 5063->5064 5070 b94d9c 5063->5070 5064->5045 5065->5062 5065->5063 5066 b94d45 5065->5066 5067 b94e97 5065->5067 5066->5064 5073 b94d54 5066->5073 5069 b94b90 13 API calls 5067->5069 5071 b94ea7 5069->5071 5070->5063 5070->5064 5204 b94be0 VirtualQuery 5070->5204 5072 b94be0 13 API calls 5072->5073 5073->5066 5073->5072 5074 b94d84 5073->5074 5182 b94b90 fwrite vfprintf abort 5074->5182 5225 b94b60 5076->5225 5078 b9ba48 GetCommandLineA GetStartupInfoA 5081 b9ba61 GetModuleHandleA 5078->5081 5227 b91803 5081->5227 5127 b9b3d0 5083->5127 5085 b958a7 memcpy 5129 b95f50 setlocale 5085->5129 5087 b958c5 5088 b954d0 malloc 5087->5088 5089 b958d7 5088->5089 5090 b958db 5089->5090 5091 b9593c strlen 5089->5091 5092 b958ea 5089->5092 5090->5055 5094 b95954 5091->5094 5092->5091 5093 b95c50 5092->5093 5096 b95c7d 5092->5096 5095 b95c59 5093->5095 5098 b95880 42 API calls 5093->5098 5097 b95989 _strdup 5094->5097 5095->5055 5096->5091 5097->5090 5099 b959a2 5097->5099 5100 b95df9 5098->5100 5173 b957b0 realloc 5099->5173 5103 b959ac 5100->5103 5102 b95d40 strlen 5104 b95d55 5102->5104 5103->5090 5103->5102 5111 b959dd 5103->5111 5104->5055 5105 b95c1a free 5106 b95c36 free 5105->5106 5105->5111 5106->5055 5108 b95a3f strlen 5108->5111 5109 b95d16 _errno 5123 b95a70 5109->5123 5111->5104 5111->5105 5111->5108 5111->5123 5143 b963f0 5111->5143 5158 b96640 5111->5158 5168 b967a0 5111->5168 5115 b95a91 strlen 5115->5123 5116 b95ac1 memcpy strlen 5116->5123 5117 b95c82 memcpy 5117->5123 5118 b95b28 _strdup 5118->5123 5119 b96640 7 API calls 5119->5123 5120 b95b91 _stricoll 5122 b95ba2 malloc 5120->5122 5120->5123 5121 b95b70 strcoll 5121->5122 5121->5123 5122->5123 5123->5104 5123->5105 5123->5109 5123->5111 5123->5115 5123->5116 5123->5117 5123->5118 5123->5119 5123->5120 5123->5121 5175 b95530 5123->5175 5179 b95840 5123->5179 5125 b954dd malloc 5124->5125 5126 b95500 5124->5126 5125->5126 5126->5050 5128 b9b3dd 5127->5128 5128->5085 5128->5128 5130 b95f80 setlocale 5129->5130 5131 b95f76 _strdup 5129->5131 5132 b95f9d wcstombs realloc wcstombs setlocale free 5130->5132 5135 b95f98 5130->5135 5131->5130 5132->5087 5133 b96010 mbstowcs 5132->5133 5133->5135 5134 b96039 mbstowcs 5134->5135 5135->5132 5135->5133 5135->5134 5136 b96253 5135->5136 5138 b960ad 5135->5138 5137 b96257 setlocale free 5136->5137 5137->5087 5139 b96103 wcstombs realloc wcstombs 5138->5139 5142 b96179 5138->5142 5139->5137 5141 b96233 wcstombs 5141->5136 5141->5137 5142->5141 5142->5142 5144 b96409 5143->5144 5145 b96622 _errno 5143->5145 5146 b965f1 _errno 5144->5146 5147 b96412 _fullpath 5144->5147 5148 b9653f 5145->5148 5146->5148 5149 b96437 5147->5149 5148->5111 5150 b96467 malloc 5149->5150 5151 b96595 5149->5151 5152 b96488 memcpy _findfirst 5150->5152 5153 b96610 _errno 5150->5153 5155 b965c0 _errno 5151->5155 5154 b964bf strncpy 5152->5154 5152->5155 5153->5148 5154->5148 5156 b96603 _errno 5155->5156 5157 b965e2 free 5155->5157 5156->5157 5157->5148 5159 b96659 5158->5159 5160 b9678d _errno 5158->5160 5161 b966eb strlen 5159->5161 5162 b9666f _errno _findnext 5159->5162 5165 b966ff 5160->5165 5161->5165 5163 b96697 strncpy 5162->5163 5167 b96728 5162->5167 5163->5161 5164 b9675f GetLastError 5163->5164 5164->5165 5166 b9676b _errno 5164->5166 5165->5111 5166->5165 5167->5164 5169 b967ad _findclose 5168->5169 5170 b967d1 _errno 5168->5170 5169->5170 5172 b967c1 free 5169->5172 5171 b967c9 5170->5171 5171->5123 5172->5171 5174 b957dc 5173->5174 5174->5103 5176 b95546 5175->5176 5177 b955d6 5176->5177 5178 b955b2 tolower tolower 5176->5178 5177->5123 5178->5176 5181 b9584f 5179->5181 5180 b9586c free 5180->5105 5181->5180 5183 b94be0 VirtualQuery 5182->5183 5184 b94cab 5183->5184 5185 b94c11 5183->5185 5186 b94b90 5 API calls 5184->5186 5187 b94c19 memcpy 5185->5187 5189 b94c36 VirtualProtect memcpy 5185->5189 5193 b94cc3 5186->5193 5188 b94c29 5187->5188 5188->5070 5189->5188 5190 b94c7b 5189->5190 5190->5188 5191 b94c80 VirtualProtect 5190->5191 5191->5070 5192 b94cd9 5192->5070 5193->5192 5195 b94d9c 5193->5195 5196 b94e97 5193->5196 5200 b94d45 5193->5200 5194 b94ddf 5194->5070 5195->5194 5197 b94be0 5 API calls 5195->5197 5198 b94b90 5 API calls 5196->5198 5197->5195 5199 b94ea7 5198->5199 5200->5194 5201 b94d84 5200->5201 5202 b94be0 VirtualQuery memcpy VirtualProtect memcpy VirtualProtect 5200->5202 5203 b94b90 5 API calls 5201->5203 5202->5200 5203->5195 5205 b94cab 5204->5205 5206 b94c11 5204->5206 5207 b94b90 8 API calls 5205->5207 5208 b94c19 memcpy 5206->5208 5210 b94c36 VirtualProtect memcpy 5206->5210 5214 b94cc3 5207->5214 5209 b94c29 5208->5209 5209->5070 5210->5209 5211 b94c7b 5210->5211 5211->5209 5212 b94c80 VirtualProtect 5211->5212 5212->5070 5213 b94cd9 5213->5070 5214->5213 5215 b94d9c 5214->5215 5217 b94e97 5214->5217 5221 b94d45 5214->5221 5216 b94ddf 5215->5216 5218 b94be0 8 API calls 5215->5218 5216->5070 5219 b94b90 8 API calls 5217->5219 5218->5215 5220 b94ea7 5219->5220 5221->5216 5222 b94d84 5221->5222 5223 b94be0 8 API calls 5221->5223 5224 b94b90 8 API calls 5222->5224 5223->5221 5224->5215 5226 b94b10 5225->5226 5226->5078 5280 b94890 5227->5280 5230 b91829 5343 b9173c 5230->5343 5231 b9185a 5233 b91b35 5231->5233 5332 b92168 5231->5332 5366 b91f36 GetLastError 5233->5366 5238 b9186d 5240 b9188a 5238->5240 5241 b91873 strstr 5238->5241 5239 b91413 _cexit ExitProcess 5242 b92168 8 API calls 5240->5242 5241->5240 5243 b9189c 5242->5243 5244 b918d3 5243->5244 5245 b92168 8 API calls 5243->5245 5246 b918ea CreateWindowExA 5244->5246 5268 b91af4 5244->5268 5247 b918b6 5245->5247 5248 b9195f 5246->5248 5246->5268 5247->5244 5249 b918bc strstr 5247->5249 5354 b9206e 5248->5354 5249->5244 5251 b91b09 SetTimer 5251->5233 5251->5268 5253 b919a1 5256 b92168 8 API calls 5253->5256 5254 b91982 atoi 5254->5253 5257 b919bc 5256->5257 5258 b919d9 5257->5258 5259 b919c2 strstr 5257->5259 5261 b92168 8 API calls 5258->5261 5259->5258 5260 b91b98 GetMessageA 5264 b91bbf TranslateMessage DispatchMessageA 5260->5264 5260->5268 5263 b919eb LoadImageA 5261->5263 5262 b91b6e 5265 b91b87 5262->5265 5266 b91b77 fputs 5262->5266 5263->5233 5267 b91a2b 7 API calls 5263->5267 5264->5260 5380 b939ed CloseHandle CloseHandle 5265->5380 5266->5265 5267->5268 5268->5233 5268->5251 5268->5260 5268->5262 5270 b91be6 5268->5270 5335 b93a11 5268->5335 5270->5268 5273 b91bef fprintf 5270->5273 5274 b91c1e 5270->5274 5381 b939ed CloseHandle CloseHandle 5270->5381 5272 b91b8c 5275 b91d21 fclose 5272->5275 5273->5270 5276 b91c41 5274->5276 5277 b91c27 fprintf 5274->5277 5278 b91850 5275->5278 5279 b91d21 fclose 5276->5279 5277->5276 5278->5239 5279->5278 5281 b948a0 5280->5281 5382 b91c58 GetModuleHandleA 5281->5382 5284 b91822 5284->5230 5284->5231 5289 b948fd fprintf 5290 b94925 5289->5290 5404 b91e4d GetModuleHandleA GetProcAddress 5290->5404 5293 b9206e 7 API calls 5294 b9493e 5293->5294 5295 b9206e 7 API calls 5294->5295 5296 b94952 5295->5296 5297 b9206e 7 API calls 5296->5297 5298 b94966 5297->5298 5299 b9496c 5298->5299 5300 b94996 5298->5300 5299->5284 5301 b94979 fprintf 5299->5301 5409 b93001 5300->5409 5301->5284 5313 b949f3 5475 b92629 5313->5475 5333 b9206e 7 API calls 5332->5333 5334 b9218d strcmp 5333->5334 5334->5238 5336 b9b3d0 5335->5336 5337 b93a21 strcpy strcat strcat strcat CreateProcessA 5336->5337 5338 b93af2 5337->5338 5339 b93b29 5337->5339 5338->5339 5340 b93af8 WaitForSingleObject GetExitCodeProcess 5338->5340 5339->5268 5793 b939ed CloseHandle CloseHandle 5340->5793 5342 b93b27 5342->5339 5344 b9206e 7 API calls 5343->5344 5345 b9176d 5344->5345 5346 b91778 FindWindowExA 5345->5346 5347 b91771 ShowWindow SetForegroundWindow 5345->5347 5348 b917a7 5346->5348 5351 b91d21 5347->5351 5348->5347 5349 b917ab GetWindowTextA strstr 5348->5349 5349->5347 5350 b917d2 FindWindowExA 5349->5350 5350->5348 5352 b91d39 5351->5352 5353 b91d2a fclose 5351->5353 5352->5278 5353->5352 5355 b920a2 FindResourceExA 5354->5355 5356 b92085 5354->5356 5358 b9212b SetLastError 5355->5358 5359 b920cd LoadResource 5355->5359 5356->5355 5357 b9208e fprintf 5356->5357 5357->5355 5360 b9213b 5358->5360 5359->5360 5361 b920e4 LockResource 5359->5361 5362 b9197e 5360->5362 5364 b9214f fputs 5360->5364 5361->5360 5363 b920f1 5361->5363 5362->5253 5362->5254 5363->5362 5365 b92115 fprintf 5363->5365 5364->5362 5365->5362 5367 b91f4d fprintf 5366->5367 5368 b91f65 5366->5368 5367->5368 5369 b91f6d FormatMessageA 5368->5369 5370 b91ff7 5368->5370 5371 b91fb0 fprintf 5369->5371 5372 b91fc7 strcat strcat LocalFree 5369->5372 5794 b91ed3 5370->5794 5371->5372 5372->5370 5375 b92064 5376 b91d21 fclose 5375->5376 5379 b92069 5376->5379 5377 b9202d ShellExecuteA 5377->5375 5378 b92015 fprintf 5378->5377 5379->5278 5380->5272 5381->5270 5383 b91c7c strcpy 5382->5383 5384 b91cbf 5382->5384 5383->5384 5384->5284 5385 b925a0 GetModuleFileNameA 5384->5385 5386 b925ca strrchr 5385->5386 5387 b925de 5385->5387 5386->5387 5387->5284 5388 b91d3a 5387->5388 5389 b9b3d0 5388->5389 5390 b91d4a GetEnvironmentVariableA strstr 5389->5390 5391 b91daa 5390->5391 5392 b91d96 strstr 5390->5392 5553 b91cc3 strncpy strcat fopen 5391->5553 5392->5391 5393 b91df8 5392->5393 5395 b91e19 5393->5395 5396 b91e01 fprintf 5393->5396 5398 b91e22 fprintf 5395->5398 5403 b91e40 5395->5403 5396->5395 5397 b91db9 5399 b91e3c 5397->5399 5400 b91dc2 strstr 5397->5400 5398->5403 5399->5403 5401 b91ddb strstr 5400->5401 5402 b91df2 5400->5402 5401->5402 5402->5393 5403->5284 5403->5289 5403->5290 5405 b91e79 GetCurrentProcess 5404->5405 5406 b91e8b 5404->5406 5405->5406 5407 b91ebf 5406->5407 5408 b91e97 fprintf 5406->5408 5407->5293 5408->5407 5410 b9206e 7 API calls 5409->5410 5411 b93030 5410->5411 5412 b930ce 5411->5412 5413 b93042 5411->5413 5412->5284 5419 b930d5 GetCurrentDirectoryA 5412->5419 5414 b9304b fprintf 5413->5414 5415 b9305f CreateMutexA GetLastError 5413->5415 5414->5415 5415->5412 5416 b930ab 5415->5416 5417 b930cc 5416->5417 5418 b930b4 fprintf 5416->5418 5417->5412 5418->5417 5420 b9206e 7 API calls 5419->5420 5421 b9312b 5420->5421 5422 b9312f strncpy 5421->5422 5423 b93176 5421->5423 5554 b925e6 5422->5554 5427 b94726 5423->5427 5428 b9474f 5427->5428 5429 b94736 5427->5429 5430 b92168 8 API calls 5428->5430 5429->5428 5431 b9473f fputs 5429->5431 5432 b9475b 5430->5432 5431->5428 5433 b9476a fprintf 5432->5433 5434 b9478d 5432->5434 5433->5434 5435 b92168 8 API calls 5434->5435 5436 b94799 5435->5436 5437 b947a8 fprintf 5436->5437 5438 b947cb 5436->5438 5437->5438 5439 b9206e 7 API calls 5438->5439 5440 b947df 5439->5440 5557 b923b8 strcpy 5440->5557 5443 b947fc fprintf 5444 b94814 5443->5444 5445 b9206e 7 API calls 5444->5445 5446 b94828 5445->5446 5447 b923b8 15 API calls 5446->5447 5448 b9483c 5447->5448 5449 b9485d 5448->5449 5450 b94845 fprintf 5448->5450 5572 b9449f 5449->5572 5450->5449 5453 b94888 5453->5284 5457 b93352 strcpy strcat 5453->5457 5763 b932b9 5457->5763 5460 b933c3 5460->5284 5462 b933d0 5460->5462 5461 b933ab fprintf 5461->5460 5463 b933e0 5462->5463 5464 b9206e 7 API calls 5463->5464 5465 b93413 strtok 5464->5465 5469 b9342b 5465->5469 5466 b934ab 5472 b921ab 5466->5472 5467 b9342f strchr 5468 b92a7b 27 API calls 5467->5468 5468->5469 5469->5466 5469->5467 5470 b9346d fprintf 5469->5470 5471 b93485 SetEnvironmentVariableA strtok 5469->5471 5470->5471 5471->5469 5473 b9206e 7 API calls 5472->5473 5474 b921d0 atoi 5473->5474 5474->5313 5476 b9263b 5475->5476 5477 b925e6 strcat 5476->5477 5478 b92655 5477->5478 5479 b92e1f GlobalMemoryStatusEx 5478->5479 5768 b92cce 5479->5768 5482 b92cce 12 API calls 5483 b92e98 5482->5483 5484 b92e9d 5483->5484 5485 b9206e 7 API calls 5484->5485 5486 b92ebf 5485->5486 5487 b92ec3 strcat 5486->5487 5488 b92ed6 strncpy strcat _open 5486->5488 5487->5488 5489 b92f34 5488->5489 5490 b92ff6 5488->5490 5491 b92f3d fprintf 5489->5491 5492 b92f51 _read 5489->5492 5496 b92a7b 5490->5496 5491->5492 5494 b92f89 5492->5494 5493 b92fe8 _close 5493->5490 5494->5493 5495 b92fd5 strcat 5494->5495 5495->5493 5497 b92a8b 5496->5497 5498 b92cbd 5497->5498 5499 b92abd strchr 5497->5499 5506 b92c8d fprintf 5497->5506 5509 b92c7c strcat 5497->5509 5513 b92c51 GetEnvironmentVariableA 5497->5513 5778 b921de strstr 5497->5778 5514 b934b3 5498->5514 5500 b92cb1 strcat 5499->5500 5501 b92ae3 strchr 5499->5501 5500->5498 5501->5498 5502 b92b10 strncat strncat strcmp 5501->5502 5503 b92b8e strcmp 5502->5503 5504 b92b73 strncat 5502->5504 5503->5497 5505 b92baa strcmp 5503->5505 5504->5497 5507 b92bbe GetCurrentDirectoryA 5505->5507 5508 b92bd5 strcmp 5505->5508 5506->5497 5507->5497 5508->5497 5510 b92bf6 strcmp 5508->5510 5509->5497 5510->5497 5511 b92c14 strstr 5510->5511 5511->5497 5513->5497 5515 b934c3 5514->5515 5516 b92168 8 API calls 5515->5516 5517 b93518 5516->5517 5518 b9206e 7 API calls 5517->5518 5519 b9352e 5518->5519 5520 b9206e 7 API calls 5519->5520 5521 b93542 5520->5521 5522 b93888 5521->5522 5523 b9354a 5521->5523 5526 b938a0 strcat strcat 5522->5526 5527 b938b7 strcat strncat 5522->5527 5524 b9356b 5523->5524 5525 b93553 fprintf 5523->5525 5528 b9206e 7 API calls 5524->5528 5525->5524 5529 b938e6 5526->5529 5530 b925e6 strcat 5527->5530 5531 b9357b 5528->5531 5530->5529 5532 b93598 5531->5532 5533 b93588 fputs 5531->5533 5534 b92a7b 27 API calls 5532->5534 5533->5532 5535 b935b8 strcat 5534->5535 5536 b935d5 5535->5536 5543 b935fa 5536->5543 5790 b92a4e strcat 5536->5790 5537 b9360b strtok 5539 b93856 strcat 5537->5539 5537->5543 5539->5529 5540 b93623 fprintf 5541 b93637 strpbrk 5540->5541 5542 b9364f strrchr 5541->5542 5541->5543 5542->5543 5543->5537 5543->5540 5543->5541 5545 b9366c strncpy _findfirst 5543->5545 5548 b937a1 _findclose 5543->5548 5550 b93779 _findnext 5543->5550 5551 b93765 fprintf 5543->5551 5792 b92a4e strcat 5543->5792 5545->5543 5546 b936c3 strncpy 5545->5546 5547 b9373a strcpy 5546->5547 5791 b92a4e strcat 5547->5791 5548->5543 5550->5543 5552 b937ae strncpy 5550->5552 5551->5550 5552->5543 5552->5547 5553->5397 5555 b92617 5554->5555 5556 b92607 strcat 5554->5556 5556->5555 5558 b92598 5557->5558 5560 b923de 5557->5560 5558->5443 5558->5444 5560->5558 5562 b9241d strncpy 5560->5562 5563 b92457 strcpy 5560->5563 5564 b92476 strcat 5560->5564 5565 b924f4 strcat 5560->5565 5566 b924b8 strcat 5560->5566 5567 b92531 5560->5567 5568 b9254a 5560->5568 5570 b92499 strcat 5560->5570 5571 b924db strcat 5560->5571 5620 b92356 5560->5620 5561 b92553 strcat strcat strcat strcat 5561->5568 5562->5560 5563->5564 5564->5560 5565->5560 5565->5568 5566->5560 5567->5568 5569 b9253a fputs 5567->5569 5568->5558 5568->5561 5569->5568 5570->5560 5571->5560 5573 b944af 5572->5573 5574 b944c3 fputs 5573->5574 5576 b944d3 5573->5576 5574->5576 5575 b9451c 5578 b9206e 7 API calls 5575->5578 5576->5575 5577 b944fa 5576->5577 5579 b94719 5577->5579 5580 b94507 fputs 5577->5580 5581 b9452c 5578->5581 5579->5453 5600 b94214 5579->5600 5580->5579 5581->5579 5582 b92a7b 27 API calls 5581->5582 5583 b94563 5582->5583 5584 b9456c fprintf 5583->5584 5585 b94580 strtok 5583->5585 5584->5585 5593 b94598 5585->5593 5586 b945a0 strrchr strrchr 5587 b945d7 _stricmp 5586->5587 5586->5593 5587->5593 5588 b9462b strcpy 5588->5593 5589 b945fd _stricmp 5589->5588 5589->5593 5590 b9461d strncpy 5590->5593 5591 b9465e strcpy 5591->5593 5592 b94670 strncpy 5594 b925e6 strcat 5592->5594 5593->5579 5593->5586 5593->5588 5593->5589 5593->5590 5593->5591 5593->5592 5596 b946fe strtok 5593->5596 5597 b946b4 5593->5597 5624 b92657 5593->5624 5594->5593 5596->5593 5597->5596 5599 b946ce strcpy 5597->5599 5639 b9425d 5597->5639 5599->5579 5601 b9423c 5600->5601 5602 b94223 5600->5602 5604 b94253 5601->5604 5710 b940f7 5601->5710 5602->5601 5603 b9422c fputs 5602->5603 5603->5601 5604->5453 5606 b9319c 5604->5606 5607 b931bb 5606->5607 5608 b93293 5606->5608 5609 b9206e 7 API calls 5607->5609 5610 b9206e 7 API calls 5608->5610 5611 b931c7 strcat strcat 5609->5611 5612 b932b0 5610->5612 5613 b931f8 strcat strcat 5611->5613 5614 b93220 5611->5614 5612->5453 5613->5614 5615 b93229 strcat 5614->5615 5616 b9323d 5614->5616 5615->5616 5616->5608 5617 b9206e 7 API calls 5616->5617 5618 b9326b 5617->5618 5618->5608 5619 b9326f strcat strcat 5618->5619 5619->5608 5621 b92367 5620->5621 5623 b92392 5620->5623 5622 b9236c strchr strchr 5621->5622 5621->5623 5622->5623 5623->5560 5625 b92694 strcpy 5624->5625 5638 b927e6 5624->5638 5626 b92629 strcat 5625->5626 5627 b926ab _stat64 5626->5627 5628 b926c2 5627->5628 5629 b9279e fprintf 5628->5629 5630 b927c5 5628->5630 5629->5630 5631 b927c9 SetLastError 5630->5631 5632 b927dd 5630->5632 5631->5638 5633 b927f0 strcpy 5632->5633 5632->5638 5634 b925e6 strcat 5633->5634 5635 b9280f _stat64 5634->5635 5636 b92826 5635->5636 5637 b92902 fprintf 5636->5637 5636->5638 5637->5638 5638->5593 5640 b9426d 5639->5640 5641 b942bf CreatePipe 5640->5641 5642 b9429b fprintf 5640->5642 5643 b9432e SetHandleInformation 5641->5643 5644 b9430e 5641->5644 5642->5641 5647 b94353 5643->5647 5648 b94386 strcpy 5643->5648 5645 b94327 5644->5645 5646 b94317 fputs 5644->5646 5645->5597 5646->5645 5649 b9436c CloseHandle 5647->5649 5650 b9435c fputs 5647->5650 5651 b92629 strcat 5648->5651 5652 b94410 CloseHandle 5649->5652 5650->5649 5653 b943b9 5651->5653 5652->5645 5668 b96350 5653->5668 5657 b943ed 5658 b9441e 5657->5658 5659 b943f1 5657->5659 5679 b93b64 5658->5679 5660 b9440a 5659->5660 5661 b943fa fputs 5659->5661 5660->5652 5661->5660 5664 b9447d 5665 b923b8 15 API calls 5664->5665 5666 b94489 5665->5666 5692 b93dc7 5666->5692 5699 b96380 5668->5699 5670 b943db 5671 b93cc0 5670->5671 5672 b93d29 CreateProcessA 5671->5672 5673 b93d06 5671->5673 5675 b93d99 CloseHandle CloseHandle 5672->5675 5676 b93d7a 5672->5676 5673->5672 5674 b93d0f fprintf 5673->5674 5674->5672 5677 b93db1 CloseHandle 5675->5677 5676->5677 5678 b93d83 fprintf 5676->5678 5677->5657 5678->5677 5680 b93b90 ReadFile 5679->5680 5681 b93bb6 5680->5681 5683 b93bc6 5680->5683 5681->5680 5681->5683 5682 b93bf2 strchr 5685 b93c26 strchr 5682->5685 5689 b93c0c 5682->5689 5683->5682 5684 b93bde fprintf 5683->5684 5684->5682 5687 b93c53 5685->5687 5685->5689 5686 b93cb3 CloseHandle 5686->5645 5686->5664 5687->5689 5690 b93c75 strstr 5687->5690 5688 b93c6e fputs 5688->5686 5689->5686 5689->5688 5690->5686 5691 b93c9c strstr 5690->5691 5691->5686 5693 b93ddf strcmp 5692->5693 5694 b93df3 5692->5694 5693->5694 5696 b93e12 5693->5696 5695 b93dfc strcmp 5694->5695 5694->5696 5695->5696 5697 b93e7e 5696->5697 5698 b93e44 fprintf 5696->5698 5697->5645 5698->5697 5700 b96399 5699->5700 5701 b963c7 5699->5701 5706 b98000 getenv 5700->5706 5703 b98000 2 API calls 5701->5703 5705 b963e7 5703->5705 5705->5670 5707 b9806d 5706->5707 5708 b96ba0 fputc 5707->5708 5709 b963b8 5707->5709 5708->5707 5709->5670 5711 b9411f 5710->5711 5712 b94106 5710->5712 5714 b94134 5711->5714 5733 b94098 5711->5733 5712->5711 5713 b9410f fputs 5712->5713 5713->5711 5716 b94098 39 API calls 5714->5716 5717 b94140 5716->5717 5718 b94155 5717->5718 5719 b94098 39 API calls 5717->5719 5720 b94098 39 API calls 5718->5720 5719->5718 5721 b94161 5720->5721 5722 b9418b 5721->5722 5723 b9417f 5721->5723 5725 b94098 39 API calls 5721->5725 5724 b941b5 5722->5724 5727 b941a9 5722->5727 5729 b94098 39 API calls 5722->5729 5726 b94098 39 API calls 5723->5726 5728 b941c0 strcpy 5724->5728 5731 b9420d 5724->5731 5725->5723 5726->5722 5730 b94098 39 API calls 5727->5730 5728->5731 5732 b941dd fprintf 5728->5732 5729->5727 5730->5724 5731->5604 5732->5731 5734 b940ab 5733->5734 5735 b940cd 5733->5735 5736 b940b4 5734->5736 5737 b93e88 39 API calls 5734->5737 5735->5714 5736->5735 5739 b93e88 5736->5739 5737->5736 5740 b93ed1 RegOpenKeyExA 5739->5740 5741 b93ea7 fprintf 5739->5741 5742 b93f0c 5740->5742 5743 b94090 5740->5743 5741->5740 5744 b93f37 RegEnumKeyExA 5742->5744 5748 b93fbd fprintf 5742->5748 5749 b923b8 15 API calls 5742->5749 5750 b93dc7 3 API calls 5742->5750 5752 b94052 fprintf 5742->5752 5753 b94012 strcpy 5742->5753 5755 b9293e RegOpenKeyExA 5742->5755 5743->5735 5745 b94081 RegCloseKey 5744->5745 5746 b93f93 strcpy 5744->5746 5745->5743 5747 b925e6 strcat 5746->5747 5747->5742 5748->5742 5749->5742 5750->5742 5752->5742 5753->5745 5754 b94033 fprintf 5753->5754 5754->5745 5756 b92a38 5755->5756 5757 b929a2 RegQueryValueExA 5755->5757 5756->5742 5758 b929fe 5757->5758 5759 b92a13 RegCloseKey 5757->5759 5758->5758 5761 b92657 8 API calls 5758->5761 5759->5756 5760 b92a26 strcpy 5759->5760 5760->5756 5762 b92a11 5761->5762 5762->5759 5764 b9b3d0 5763->5764 5765 b932c9 GetEnvironmentVariableA 5764->5765 5766 b93319 strcat strcat SetEnvironmentVariableA 5765->5766 5767 b9334a 5765->5767 5766->5767 5767->5460 5767->5461 5769 b921ab 8 API calls 5768->5769 5770 b92cfd 5769->5770 5771 b921ab 8 API calls 5770->5771 5775 b92d08 5771->5775 5772 b92e17 5772->5482 5773 b92dc8 strcat _itoa 5773->5772 5774 b92d94 fprintf 5774->5773 5775->5772 5776 b92d6a fprintf 5775->5776 5777 b92d86 5775->5777 5776->5777 5777->5773 5777->5774 5779 b921fe strstr 5778->5779 5784 b92254 strchr strrchr 5778->5784 5781 b92212 strstr 5779->5781 5779->5784 5781->5784 5785 b92226 strstr 5781->5785 5782 b922a9 RegOpenKeyExA 5787 b92349 5782->5787 5788 b922d2 5782->5788 5783 b922d4 RegOpenKeyExA 5783->5782 5789 b92301 RegQueryValueExA RegCloseKey 5783->5789 5784->5782 5784->5783 5785->5784 5786 b9223a strstr 5785->5786 5786->5784 5786->5787 5787->5497 5788->5789 5789->5787 5793->5342 5795 b91f11 MessageBoxA 5794->5795 5796 b91ee5 5794->5796 5799 b91f34 5795->5799 5797 b91f08 puts 5796->5797 5798 b91eee printf 5796->5798 5798->5799 5799->5375 5799->5377 5799->5378 6023 b98490 6024 b9849c 6023->6024 6025 b98287 6023->6025 6026 b978a0 28 API calls 6024->6026 6025->6023 6029 b978a0 6025->6029 6028 b984b0 6026->6028 6028->6028 6030 b978b3 6029->6030 6045 b9793b 6029->6045 6031 b97994 6030->6031 6032 b96aa0 12 API calls 6030->6032 6047 b97640 6031->6047 6033 b978fe 6032->6033 6035 b979f0 6033->6035 6036 b97910 6033->6036 6034 b97310 14 API calls 6037 b9794b 6034->6037 6038 b96d90 fputc 6035->6038 6040 b97980 6036->6040 6042 b9791c 6036->6042 6043 b96ba0 fputc 6037->6043 6046 b97971 6037->6046 6038->6046 6040->6031 6041 b97986 strlen 6040->6041 6041->6031 6044 b97926 strlen 6042->6044 6042->6045 6043->6037 6044->6045 6045->6034 6046->6025 6048 b9767b 6047->6048 6049 b97310 14 API calls 6048->6049 6050 b976c2 6049->6050 6051 b96ba0 fputc 6050->6051 6052 b976e3 6051->6052 6055 b96e20 6052->6055 6060 b96e55 6055->6060 6056 b96f5f 6057 b96f85 6056->6057 6058 b96ba0 fputc 6056->6058 6059 b96fab 6057->6059 6061 b96ba0 fputc 6057->6061 6058->6056 6059->6046 6060->6056 6062 b96ba0 fputc 6060->6062 6061->6057 6062->6060 6431 b98590 6432 b9859c 6431->6432 6433 b98393 6431->6433 6434 b97710 26 API calls 6432->6434 6433->6431 6437 b97710 6433->6437 6436 b985b0 6434->6436 6436->6436 6438 b9771e 6437->6438 6439 b96aa0 12 API calls 6438->6439 6440 b97766 6439->6440 6441 b977a0 6440->6441 6442 b97774 6440->6442 6444 b96d90 fputc 6441->6444 6443 b97640 14 API calls 6442->6443 6445 b97782 6443->6445 6446 b977ad 6444->6446 6445->6433 6446->6433 6447 b94f90 6448 b94f9b 6447->6448 6449 b95220 6 API calls 6448->6449 6450 b94fc8 6449->6450 6451 b98189 6452 b981aa 6451->6452 6456 b981c5 6451->6456 6454 b96cf0 fputc 6452->6454 6453 b96c00 6 API calls 6455 b985dc 6453->6455 6454->6456 6455->6455 6456->6453 6524 b97309 6526 b97310 6524->6526 6525 b96ba0 fputc 6525->6526 6526->6525 6527 b973e8 6526->6527 6528 b9761a 6526->6528 6530 b97406 6526->6530 6529 b96ba0 fputc 6527->6529 6527->6530 6529->6527 6531 b97564 localeconv 6530->6531 6536 b97434 6530->6536 6541 b9741b 6530->6541 6534 b98ad0 7 API calls 6531->6534 6532 b97440 6533 b97466 6532->6533 6539 b96ba0 fputc 6532->6539 6534->6541 6535 b97428 6537 b96ba0 fputc 6535->6537 6536->6532 6538 b96ba0 fputc 6536->6538 6537->6536 6538->6536 6539->6532 6540 b98e00 5 API calls 6540->6541 6541->6535 6541->6540 6542 b974e3 6541->6542 6543 b96ba0 fputc 6541->6543 6542->6536 6544 b96ba0 fputc 6542->6544 6543->6541 6544->6542 6221 b9600c 6222 b96010 mbstowcs 6221->6222 6224 b9607c 6222->6224 6223 b96039 mbstowcs 6223->6224 6224->6223 6225 b95f9d wcstombs realloc wcstombs setlocale free 6224->6225 6226 b96253 6224->6226 6228 b960ad 6224->6228 6225->6222 6227 b96257 setlocale free 6226->6227 6229 b96103 wcstombs realloc wcstombs 6228->6229 6232 b96179 6228->6232 6229->6227 6231 b96233 wcstombs 6231->6226 6231->6227 6232->6231 6232->6232 6233 b9720c 6234 b97210 6233->6234 6235 b96ba0 fputc 6234->6235 6236 b9719f 6234->6236 6235->6234 6237 b971c3 6236->6237 6239 b96ba0 fputc 6236->6239 6238 b971e6 6237->6238 6240 b96ba0 fputc 6237->6240 6239->6236 6240->6237 6545 b9510c 6546 b95110 calloc 6545->6546 6547 b95103 6546->6547 6548 b9512a EnterCriticalSection LeaveCriticalSection 6546->6548 6241 b91000 6242 b91060 6241->6242 6243 b91013 6241->6243 6245 b9106e 6242->6245 6248 b910ba signal 6242->6248 6244 b9101a 6243->6244 6243->6245 6246 b910b3 6244->6246 6247 b91025 signal 6244->6247 6249 b91082 signal 6245->6249 6252 b91042 6245->6252 6246->6248 6246->6252 6250 b91103 signal 6247->6250 6247->6252 6251 b9111f signal 6248->6251 6248->6252 6249->6252 6253 b91140 signal 6249->6253 6250->6252 6251->6252 6253->6252 6457 b95180 6458 b951a0 EnterCriticalSection 6457->6458 6459 b95193 6457->6459 6460 b951b9 6458->6460 6461 b951d0 LeaveCriticalSection 6458->6461 6460->6461 6462 b951bf free LeaveCriticalSection 6460->6462 6463 b951df 6461->6463 6462->6463 6254 b98e79 setlocale strchr 6255 b98ec2 6254->6255 6256 b98eb5 atoi 6254->6256 6257 b98fa7 6255->6257 6258 b98f57 6255->6258 6261 b98ee1 6255->6261 6256->6255 6259 b98d70 2 API calls 6258->6259 6262 b98f23 6258->6262 6259->6258 6260 b98d70 2 API calls 6260->6261 6261->6260 6261->6262 6082 b990fc 6083 b99100 6082->6083 6084 b9a610 7 API calls 6083->6084 6085 b9912c 6084->6085 6086 b980fc 6088 b98090 6086->6088 6087 b96ba0 fputc 6087->6088 6088->6086 6088->6087 6089 b9812c 6088->6089 6090 b95afc 6095 b95a18 6090->6095 6091 b95b28 _strdup 6091->6095 6092 b95d99 6093 b95b91 _stricoll 6093->6095 6096 b95ba2 malloc 6093->6096 6094 b95b70 strcoll 6094->6095 6094->6096 6095->6091 6095->6092 6095->6093 6095->6094 6097 b95c1a free 6095->6097 6098 b95d16 _errno 6095->6098 6100 b95530 2 API calls 6095->6100 6101 b963f0 11 API calls 6095->6101 6102 b967a0 3 API calls 6095->6102 6103 b96640 7 API calls 6095->6103 6104 b95a91 strlen 6095->6104 6105 b95840 free 6095->6105 6106 b95a3f strlen 6095->6106 6107 b95ac1 memcpy strlen 6095->6107 6108 b95c82 memcpy 6095->6108 6096->6095 6097->6095 6099 b95c36 free 6097->6099 6098->6095 6100->6095 6101->6095 6102->6095 6103->6095 6104->6095 6105->6097 6106->6095 6107->6095 6108->6095 6263 b9107c 6264 b91080 signal 6263->6264 6266 b91140 signal 6264->6266 6267 b91050 6264->6267 6266->6267 6268 b9627c 6269 b9620d 6268->6269 6269->6269 6270 b96233 wcstombs 6269->6270 6271 b96253 6270->6271 6272 b96257 setlocale free 6270->6272 6271->6272 6465 b989fc 6466 b98a00 6465->6466 6467 b98a57 MultiByteToWideChar 6466->6467 6468 b98a07 6466->6468 6469 b98a2a 6467->6469 6470 b98aa7 _errno 6467->6470 6470->6469 6549 b9837c 6550 b9859c 6549->6550 6551 b98393 6549->6551 6552 b97710 26 API calls 6550->6552 6551->6550 6553 b97710 26 API calls 6551->6553 6554 b985b0 6552->6554 6553->6551 6554->6554 6109 b950f0 6110 b95110 calloc 6109->6110 6111 b95103 6109->6111 6110->6111 6112 b9512a EnterCriticalSection LeaveCriticalSection 6110->6112 6273 b98274 6274 b9849c 6273->6274 6275 b98287 6273->6275 6276 b978a0 28 API calls 6274->6276 6275->6274 6277 b978a0 28 API calls 6275->6277 6278 b984b0 6276->6278 6277->6275 6278->6278 6113 b9bae9 6114 b9ba90 GetModuleHandleA 6113->6114 6116 b91803 262 API calls 6114->6116 6117 b9badb 6116->6117 6279 b97869 6280 b977d3 6279->6280 6281 b96aa0 12 API calls 6280->6281 6282 b97818 6281->6282 6283 b97881 6282->6283 6284 b97826 6282->6284 6285 b96d90 fputc 6283->6285 6286 b97310 14 API calls 6284->6286 6288 b9788e 6285->6288 6287 b97834 6286->6287 6289 b9785a 6287->6289 6290 b96ba0 fputc 6287->6290 6290->6287 6555 b9af69 6556 b9af70 6555->6556 6557 b9aa70 6 API calls 6556->6557 6558 b9afbc 6557->6558 6291 b95c6c 6295 b95900 6291->6295 6292 b95c7d 6294 b9593c strlen 6292->6294 6293 b95c50 6296 b95c59 6293->6296 6297 b95880 59 API calls 6293->6297 6298 b95954 6294->6298 6295->6292 6295->6293 6295->6294 6302 b959ac 6297->6302 6299 b95989 _strdup 6298->6299 6300 b958db 6299->6300 6303 b959a2 6299->6303 6301 b95d40 strlen 6305 b95d55 6301->6305 6302->6300 6302->6301 6322 b959dd 6302->6322 6304 b957b0 realloc 6303->6304 6304->6302 6306 b95c1a free 6307 b95c36 free 6306->6307 6306->6322 6308 b963f0 11 API calls 6308->6322 6309 b95a3f strlen 6309->6322 6310 b95d16 _errno 6310->6322 6311 b96640 7 API calls 6311->6322 6312 b967a0 3 API calls 6312->6322 6313 b95530 2 API calls 6313->6322 6314 b95840 free 6314->6306 6315 b95a91 strlen 6315->6322 6316 b95ac1 memcpy strlen 6316->6322 6317 b95c82 memcpy 6317->6322 6318 b95b28 _strdup 6318->6322 6319 b95b91 _stricoll 6321 b95ba2 malloc 6319->6321 6319->6322 6320 b95b70 strcoll 6320->6321 6320->6322 6321->6322 6322->6305 6322->6306 6322->6308 6322->6309 6322->6310 6322->6311 6322->6312 6322->6313 6322->6314 6322->6315 6322->6316 6322->6317 6322->6318 6322->6319 6322->6320 6471 b979ec 6472 b979f0 6471->6472 6473 b96d90 fputc 6472->6473 6474 b979a4 6473->6474 6559 b9156c __set_app_type 6560 b91180 349 API calls 6559->6560 6561 b91585 6560->6561 6562 b98f6c 6563 b98f70 6562->6563 6564 b98f23 6563->6564 6565 b98d70 2 API calls 6563->6565 6565->6563 6475 b985e1 6476 b982b3 6475->6476 6479 b982c7 6475->6479 6477 b977c0 26 API calls 6476->6477 6477->6479 6478 b977c0 26 API calls 6480 b98601 6478->6480 6479->6478 6480->6480 6566 b98b61 6567 b98b70 setlocale strchr 6566->6567 6568 b98bc7 atoi 6567->6568 6569 b98bd6 6567->6569 6568->6569 6570 b98c67 6569->6570 6571 b98bf7 6569->6571 6574 b98c4f 6569->6574 6573 b98950 4 API calls 6570->6573 6570->6574 6572 b98950 4 API calls 6571->6572 6571->6574 6572->6571 6573->6570 6118 b98ce0 setlocale strchr 6119 b98d2e 6118->6119 6120 b98d21 atoi 6118->6120 6121 b98950 4 API calls 6119->6121 6120->6119 6122 b98d60 6121->6122 6575 b95760 6576 b95799 free 6575->6576 6577 b9577c 6575->6577 6578 b95780 free 6577->6578 6578->6576 6578->6578 6123 b950e2 6124 b950f0 6123->6124 6125 b95110 calloc 6124->6125 6126 b95103 6124->6126 6125->6126 6127 b9512a EnterCriticalSection LeaveCriticalSection 6125->6127 6323 b91059 6324 b91060 6323->6324 6325 b9106e 6324->6325 6326 b910ba signal 6324->6326 6327 b91082 signal 6325->6327 6330 b91050 6325->6330 6328 b9111f signal 6326->6328 6326->6330 6329 b91140 signal 6327->6329 6327->6330 6328->6330 6329->6330 6481 b94fd9 6482 b94ff2 6481->6482 6483 b95006 6482->6483 6484 b95220 6 API calls 6482->6484 6484->6483 6128 b95edc 6129 b95ee0 _strdup 6128->6129 6131 b95f1a 6129->6131 6485 b97ddc 6493 b97de0 6485->6493 6486 b96ba0 fputc 6486->6493 6487 b97e7d 6488 b96ba0 fputc 6487->6488 6489 b97e9a 6488->6489 6490 b96e20 fputc 6489->6490 6491 b97eb2 6490->6491 6492 b98e00 5 API calls 6492->6493 6493->6486 6493->6487 6493->6492 6579 b97d5c 6580 b97d6d 6579->6580 6581 b96ba0 fputc 6580->6581 6582 b97d90 6581->6582 6583 b96ba0 fputc 6582->6583 6584 b97da0 6583->6584 6586 b96ba0 fputc 6584->6586 6593 b97dcc 6584->6593 6585 b97dd7 6587 b96ba0 fputc 6585->6587 6586->6584 6588 b97e9a 6587->6588 6589 b96e20 fputc 6588->6589 6591 b97eb2 6589->6591 6590 b98e00 5 API calls 6590->6593 6592 b96ba0 fputc 6592->6593 6593->6585 6593->6590 6593->6592 6594 b9855c 6595 b96ba0 fputc 6594->6595 6596 b9856b 6595->6596 6596->6596 6494 b915d0 6495 b9166f GetExitCodeProcess 6494->6495 6496 b915e3 6494->6496 6499 b91692 6495->6499 6500 b916a4 KillTimer PostQuitMessage 6495->6500 6497 b91648 6496->6497 6498 b915ec ShowWindow 6496->6498 6497->6495 6503 b91659 EnumWindows 6497->6503 6498->6495 6502 b91616 6498->6502 6499->6500 6501 b916c8 6499->6501 6500->6501 6502->6495 6504 b9161f KillTimer 6502->6504 6503->6495 6505 b91f36 13 API calls 6504->6505 6506 b91639 PostQuitMessage 6505->6506 6506->6495 6597 b9a950 InterlockedExchange 6598 b9a972 6597->6598 6599 b9a974 DeleteCriticalSection DeleteCriticalSection 6597->6599 6600 b98150 6601 b986a8 wcslen 6600->6601 6602 b98162 6600->6602 6605 b96c00 6 API calls 6601->6605 6603 b9816f strlen 6602->6603 6604 b986cf 6602->6604 6606 b96cf0 fputc 6603->6606 6605->6604 6608 b98090 6606->6608 6607 b96ba0 fputc 6607->6608 6608->6607 6609 b9812c 6608->6609 6132 b982d7 6133 b98313 6132->6133 6134 b982e6 6132->6134 6136 b97040 6134->6136 6138 b9709e 6136->6138 6137 b972ee 6138->6137 6139 b96ba0 fputc 6138->6139 6143 b9719f 6138->6143 6139->6138 6140 b971c3 6141 b971e6 6140->6141 6144 b96ba0 fputc 6140->6144 6141->6133 6142 b96ba0 fputc 6142->6143 6143->6140 6143->6142 6144->6140 6145 b916cc GetWindowThreadProcessId 6146 b916f9 GetWindowLongA 6145->6146 6148 b916f2 6145->6148 6147 b91712 ShowWindow 6146->6147 6146->6148 6147->6148 6331 b95c4c 6332 b95c50 6331->6332 6333 b95c59 6332->6333 6334 b95880 59 API calls 6332->6334 6337 b959ac 6334->6337 6335 b958db 6336 b95d40 strlen 6338 b95d55 6336->6338 6337->6335 6337->6336 6355 b959dd 6337->6355 6339 b95c1a free 6340 b95c36 free 6339->6340 6339->6355 6341 b963f0 11 API calls 6341->6355 6342 b95a3f strlen 6342->6355 6343 b95d16 _errno 6343->6355 6344 b96640 7 API calls 6344->6355 6345 b967a0 3 API calls 6345->6355 6346 b95530 2 API calls 6346->6355 6347 b95840 free 6347->6339 6348 b95a91 strlen 6348->6355 6349 b95ac1 memcpy strlen 6349->6355 6350 b95c82 memcpy 6350->6355 6351 b95b28 _strdup 6351->6355 6352 b95b91 _stricoll 6354 b95ba2 malloc 6352->6354 6352->6355 6353 b95b70 strcoll 6353->6354 6353->6355 6354->6355 6355->6338 6355->6339 6355->6341 6355->6342 6355->6343 6355->6344 6355->6345 6355->6346 6355->6347 6355->6348 6355->6349 6355->6350 6355->6351 6355->6352 6355->6353 6610 b9754c 6611 b97550 6610->6611 6612 b97564 localeconv 6611->6612 6619 b97434 6611->6619 6622 b9741b 6611->6622 6614 b98ad0 7 API calls 6612->6614 6613 b97466 6614->6622 6615 b97428 6616 b96ba0 fputc 6615->6616 6616->6619 6617 b96ba0 fputc 6617->6619 6618 b96ba0 fputc 6621 b97440 6618->6621 6619->6617 6619->6621 6620 b98e00 5 API calls 6620->6622 6621->6613 6621->6618 6622->6615 6622->6620 6623 b974e3 6622->6623 6624 b96ba0 fputc 6622->6624 6623->6619 6625 b96ba0 fputc 6623->6625 6624->6622 6625->6623 6356 b98640 6358 b98090 6356->6358 6359 b9812c 6356->6359 6357 b96ba0 fputc 6357->6358 6358->6357 6358->6359 6626 b9a945 6627 b9a950 InterlockedExchange 6626->6627 6628 b9a972 6627->6628 6629 b9a974 DeleteCriticalSection DeleteCriticalSection 6627->6629 6630 b96947 6631 b96970 6630->6631 6632 b96a67 _errno 6630->6632 6638 b967f0 6631->6638 6634 b96978 6635 b96a08 _findnext 6634->6635 6637 b96a25 6634->6637 6636 b969a0 strncpy 6635->6636 6635->6637 6636->6634 6636->6637 6639 b96804 _findclose 6638->6639 6640 b96816 _errno 6638->6640 6639->6640 6641 b96830 _findfirst 6639->6641 6643 b96821 6640->6643 6642 b9684d strncpy 6641->6642 6641->6643 6642->6634 6643->6634 6643->6641

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 460 b91180-b91190 461 b911ae-b911ce SetUnhandledExceptionFilter call b94eb0 call b94b80 460->461 462 b91192-b911ab 460->462 468 b91511-b9153c __getmainargs 461->468 469 b911d4-b9122e GetCommandLineA call b9b3d0 461->469 462->461 472 b91556 468->472 473 b91235-b91241 469->473 474 b9155d-b9155f 472->474 475 b91247-b9124a 473->475 476 b91336-b91338 473->476 481 b91565-b91567 474->481 478 b91500-b91504 475->478 479 b91250 475->479 476->474 477 b9133e 476->477 480 b91340-b91349 477->480 484 b9150a-b9150c 478->484 485 b912f2 478->485 482 b912c0-b912c3 479->482 483 b91252-b91255 479->483 480->480 486 b9134b-b9134f 480->486 487 b914dc-b914de 481->487 488 b912c9-b912cc 482->488 489 b914b0-b914b3 482->489 490 b914b8-b914bf 483->490 491 b9125b-b91260 483->491 493 b912ff-b91304 484->493 492 b912f4-b912fd 485->492 494 b91351-b91354 486->494 495 b91356-b91375 call b95e70 486->495 499 b914ea-b914f9 487->499 500 b914e0-b914e4 487->500 488->478 498 b912d2-b912d5 488->498 489->473 496 b91422 490->496 497 b914c5-b914c9 490->497 491->478 501 b91266-b91269 491->501 492->492 492->493 502 b9130a-b9130e 493->502 503 b914a1-b914a4 493->503 494->495 504 b9137a-b91394 494->504 495->504 497->481 506 b914cf 497->506 498->496 507 b912db-b912ec 498->507 499->473 500->499 508 b91295-b912a3 500->508 501->496 509 b9126f-b91273 501->509 502->503 510 b91314-b91317 502->510 503->489 511 b913d8-b9141d __p__fmode call b94cd0 call b94b60 __p__environ call b9ba30 _cexit ExitProcess 504->511 512 b91396-b913d3 _setmode * 3 504->512 513 b914d1-b914da 506->513 507->484 507->485 508->473 509->472 514 b91279-b9127c 509->514 510->503 515 b9131d-b91330 510->515 512->511 513->487 513->513 517 b91280-b91289 514->517 515->475 515->476 517->517 519 b9128b-b9128d 517->519 521 b9128f-b91293 519->521 522 b912a5-b912b4 519->522 521->508 521->522 522->473 522->482
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00B911B5
                                                                  • GetCommandLineA.KERNEL32 ref: 00B911D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CommandExceptionFilterLineUnhandled
                                                                  • String ID: "
                                                                  • API String ID: 3189701131-123907689
                                                                  • Opcode ID: 3f62b84786dc569236daeaa5c9a58d9f83c5e232de710c89f80a01d7f5435f54
                                                                  • Instruction ID: c155eaf34e3df0d40192cc4e59689398e3fea6e78d75661522a06851192402a2
                                                                  • Opcode Fuzzy Hash: 3f62b84786dc569236daeaa5c9a58d9f83c5e232de710c89f80a01d7f5435f54
                                                                  • Instruction Fuzzy Hash: 9791BE70E083068FDF20EFACC98576EBBE1EB99350F0989B9D449C7341E77498459B12

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 b91803-b91827 call b94890 3 b91829-b91855 call b9173c ShowWindow SetForegroundWindow call b91d21 0->3 4 b9185a-b9185b 0->4 15 b91c4b-b91c52 3->15 6 b91861-b91871 call b92168 4->6 7 b91b35-b91b3f call b91f36 4->7 16 b9188a-b918a8 call b92168 6->16 17 b91873-b91887 strstr 6->17 7->15 20 b918aa-b918ba call b92168 16->20 21 b918d3-b918e0 16->21 17->16 20->21 28 b918bc-b918d0 strstr 20->28 23 b918ea-b91959 CreateWindowExA 21->23 24 b918e2-b918e4 21->24 26 b91af4 23->26 27 b9195f-b91980 call b9206e 23->27 24->23 24->26 29 b91af7-b91afe 26->29 35 b919a1-b919c0 call b92168 27->35 36 b91982-b9199b atoi 27->36 28->21 31 b91b09-b91b33 SetTimer 29->31 32 b91b00-b91b07 29->32 31->7 34 b91b44-b91b53 call b93a11 31->34 32->31 32->34 39 b91b58-b91b5a 34->39 41 b919d9-b91a25 call b92168 LoadImageA 35->41 42 b919c2-b919d6 strstr 35->42 36->35 39->7 43 b91b5c-b91b63 39->43 41->7 53 b91a2b-b91af3 SendMessageA GetWindowRect GetSystemMetrics * 2 SetWindowPos ShowWindow UpdateWindow 41->53 42->41 44 b91b98-b91bbd GetMessageA 43->44 45 b91b65-b91b6c 43->45 49 b91bbf-b91bd1 TranslateMessage DispatchMessageA 44->49 50 b91bd3-b91bda 44->50 45->44 47 b91b6e-b91b75 45->47 51 b91b87-b91b93 call b939ed call b91d21 47->51 52 b91b77-b91b82 fputs 47->52 49->44 54 b91bdc-b91be4 50->54 55 b91c03-b91c0f call b939ed 50->55 51->15 52->51 53->26 54->55 57 b91be6-b91bed 54->57 62 b91c1e-b91c25 55->62 63 b91c11-b91c18 55->63 57->55 61 b91bef-b91bfe fprintf 57->61 61->55 65 b91c41-b91c46 call b91d21 62->65 66 b91c27-b91c3c fprintf 62->66 63->29 63->62 65->15 66->65
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Windowstrstr$CreateForegroundImageLoadShowatoifclose
                                                                  • String ID: --l4j-dont-wait$--l4j-no-splash$--l4j-no-splash-err$@$Exit code:%d$Exit code:%d, restarting the application!$Exit code:0$STATIC$d
                                                                  • API String ID: 326098631-3010709316
                                                                  • Opcode ID: d1104ae2bce292b91d34bf2ea1c2f65bb04e61cff9f60839e020e21397f8f63e
                                                                  • Instruction ID: f2a6a8bd270ab7b1215424b64a0a485457cf863b70812144a8e8599ae92cb839
                                                                  • Opcode Fuzzy Hash: d1104ae2bce292b91d34bf2ea1c2f65bb04e61cff9f60839e020e21397f8f63e
                                                                  • Instruction Fuzzy Hash: 3CB157B05193069FEB10FF69DA9571EBBE4EF84304F018CBDE4849B251DBB98844EB52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 70 b9449f-b944b8 call b9b3d0 73 b944ba-b944c1 70->73 74 b944d3-b944ef 70->74 73->74 75 b944c3-b944ce fputs 73->75 76 b9451c-b9452e call b9206e 74->76 77 b944f1-b944f8 74->77 75->74 80 b94719 76->80 84 b94534-b9456a call b92a7b 76->84 77->76 78 b944fa-b94501 77->78 78->80 81 b94507-b94517 fputs 78->81 83 b9471b-b94725 80->83 81->80 87 b9456c-b9457b fprintf 84->87 88 b94580-b94596 strtok 84->88 87->88 89 b94598-b9459a 88->89 89->80 90 b945a0-b945d5 strrchr * 2 89->90 91 b945f3-b945fb 90->91 92 b945d7-b945e9 _stricmp 90->92 94 b9462b-b94632 strcpy 91->94 95 b945fd-b9460f _stricmp 91->95 92->91 93 b945eb-b945f1 92->93 96 b9461d-b94629 strncpy 93->96 98 b94637-b9464f call b9317d 94->98 95->94 97 b94611-b94619 95->97 96->98 97->96 101 b9465e-b9466e strcpy 98->101 102 b94651-b94653 98->102 105 b946a4-b946ab call b92657 101->105 103 b94670-b9469f strncpy call b925e6 102->103 104 b94655-b9465c 102->104 103->105 104->101 104->103 108 b946b0-b946b2 105->108 109 b946fe-b94714 strtok 108->109 110 b946b4-b946cc call b9425d 108->110 109->89 110->109 113 b946ce-b946fc strcpy 110->113 113->83
                                                                  APIs
                                                                  • fputs.MSVCRT ref: 00B944CE
                                                                  • fputs.MSVCRT ref: 00B94512
                                                                  • fprintf.MSVCRT ref: 00B9457B
                                                                  • strtok.MSVCRT(00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94591
                                                                  • strrchr.MSVCRT ref: 00B945B6
                                                                  • strrchr.MSVCRT ref: 00B945C8
                                                                  • _stricmp.MSVCRT(00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B945E2
                                                                  • _stricmp.MSVCRT(00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94608
                                                                  • strncpy.MSVCRT ref: 00B94624
                                                                  • strcpy.MSVCRT(00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94632
                                                                  • strcpy.MSVCRT(00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94669
                                                                  • strncpy.MSVCRT ref: 00B94685
                                                                  • strcpy.MSVCRT ref: 00B946F2
                                                                  • strtok.MSVCRT(00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B9470D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcpy$_stricmpfputsstrncpystrrchrstrtok$fprintf
                                                                  • String ID: "$/bin$:$C:\Program Files (x86)\Java\jre-1.8$JRE paths:%s$JRE:Cannot use 64-bit runtime on 32-bit OS.$\bin$pathJreSearch()
                                                                  • API String ID: 851780383-1987966701
                                                                  • Opcode ID: adfb7cfbfdfa09e12cce9432e9812a7d87704f896a6b08ac03b1a73539c9a973
                                                                  • Instruction ID: 0feb05f8a2a7b55ccf640a2ae207d6f847386d698e53927b998d6341388cbccc
                                                                  • Opcode Fuzzy Hash: adfb7cfbfdfa09e12cce9432e9812a7d87704f896a6b08ac03b1a73539c9a973
                                                                  • Instruction Fuzzy Hash: 316158B15097049BDF10AF65D684A69BBE0FF49744F0188FDE4C887211DB78D986CF52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 114 b95880-b958cf strlen call b9b3d0 memcpy call b95f50 119 b958d2 call b954d0 114->119 120 b958d7-b958d9 119->120 121 b958db-b958e2 120->121 122 b958e3-b958e8 120->122 123 b958ea-b958fa 122->123 124 b9593c-b9595f strlen call b9b3d0 122->124 123->124 126 b958fc 123->126 131 b9596e-b95973 124->131 128 b95900-b95902 126->128 129 b9590d-b95910 128->129 130 b95904-b95907 128->130 133 b95c50-b95c53 129->133 134 b95916-b95919 129->134 130->129 132 b95c70-b95c77 130->132 135 b95961-b9596c 131->135 136 b95975-b95987 131->136 132->129 141 b95c7d 132->141 139 b95dd9-b95ddc 133->139 140 b95c59-b95c66 133->140 137 b9591f-b95922 134->137 138 b95de2-b95df9 call b95880 134->138 135->131 142 b95989-b9599c _strdup 135->142 136->131 136->142 137->138 143 b95928-b9593a 137->143 148 b959ac-b959ae 138->148 139->138 139->140 141->124 142->121 145 b959a2-b959a7 call b957b0 142->145 143->124 143->128 145->148 148->121 149 b959b4-b959ba 148->149 150 b95d40-b95d4f strlen 149->150 151 b959c0-b959c2 149->151 153 b95e4c-b95e55 150->153 154 b95d55-b95d5b 150->154 151->150 152 b959c8-b959d7 151->152 152->150 155 b959dd-b959f5 152->155 156 b95d99-b95d9d 153->156 157 b95e5a-b95e60 154->157 158 b95d61-b95d64 154->158 161 b959fb-b95a15 155->161 162 b95e2a-b95e2d 155->162 159 b95e39-b95e3d 156->159 160 b95da3-b95db3 156->160 157->156 163 b95d88-b95d8d 158->163 164 b95d66 158->164 159->160 167 b95e43 159->167 165 b95dc2-b95dc5 160->165 166 b95db5-b95dc0 160->166 168 b95a18-b95a1c 161->168 162->159 169 b95d8f-b95d96 163->169 170 b95d70-b95d76 163->170 164->157 165->166 171 b95dc7-b95dcd 165->171 166->165 166->166 167->153 172 b95c1a-b95c30 free 168->172 173 b95a22-b95a2e call b963f0 168->173 169->156 174 b95d7c-b95d80 170->174 175 b95e1f-b95e25 170->175 172->168 176 b95c36-b95c4b free 172->176 180 b95d00-b95d05 173->180 181 b95a34-b95a39 173->181 174->175 178 b95d86 174->178 175->156 178->163 182 b95d0b-b95d10 180->182 183 b95e0a-b95e11 180->183 184 b95a3f-b95a5f strlen 181->184 185 b95dfe 181->185 182->172 186 b95d16-b95d39 _errno 182->186 183->172 187 b95a60-b95a6a call b96640 184->187 185->183 186->172 191 b95c00-b95c03 call b967a0 187->191 192 b95a70-b95a75 187->192 197 b95c08-b95c0d 191->197 194 b95a7d-b95a8f call b95530 192->194 195 b95a77-b95a7b 192->195 194->187 201 b95a91-b95abb strlen call b9b3d0 194->201 195->187 195->194 197->172 199 b95c0f-b95c15 call b95840 197->199 199->172 204 b95ac1-b95af9 memcpy strlen call b9b3d0 201->204 205 b95c82-b95cb0 memcpy 201->205 211 b95b0d-b95b12 204->211 207 b95cf1 205->207 208 b95cb2-b95cb4 205->208 207->180 208->207 210 b95cb6-b95cce 208->210 214 b95cd6-b95ce0 call b95820 210->214 212 b95b00-b95b0b 211->212 213 b95b14-b95b26 211->213 212->211 215 b95b28-b95b36 _strdup 212->215 213->211 213->215 221 b95be7-b95bf4 call b96640 214->221 217 b95b3c-b95b52 215->217 218 b95ce5 215->218 217->214 220 b95b58-b95b5d 217->220 218->207 223 b95b63-b95b6d 220->223 224 b95e16-b95e18 220->224 221->192 229 b95bfa 221->229 226 b95b83-b95b8f 223->226 224->175 227 b95b91-b95ba0 _stricoll 226->227 228 b95b70-b95b7f strcoll 226->228 230 b95b81 227->230 231 b95ba2-b95bb8 malloc 227->231 228->230 228->231 229->191 230->226 232 b95bba-b95bcc 231->232 233 b95bdc-b95be4 231->233 232->233 234 b95bce-b95bd3 232->234 233->221 235 b95bd9 234->235 236 b95dd2-b95dd4 234->236 235->233 236->233
                                                                  APIs
                                                                  • strlen.MSVCRT ref: 00B95894
                                                                  • memcpy.MSVCRT ref: 00B958B8
                                                                    • Part of subcall function 00B95F50: setlocale.MSVCRT ref: 00B95F6B
                                                                    • Part of subcall function 00B95F50: _strdup.MSVCRT ref: 00B95F79
                                                                    • Part of subcall function 00B95F50: setlocale.MSVCRT ref: 00B95F8F
                                                                    • Part of subcall function 00B95F50: wcstombs.MSVCRT ref: 00B95FB4
                                                                    • Part of subcall function 00B95F50: realloc.MSVCRT ref: 00B95FC8
                                                                    • Part of subcall function 00B95F50: wcstombs.MSVCRT ref: 00B95FE1
                                                                    • Part of subcall function 00B95F50: setlocale.MSVCRT ref: 00B95FF1
                                                                    • Part of subcall function 00B95F50: free.MSVCRT ref: 00B95FF9
                                                                    • Part of subcall function 00B954D0: malloc.MSVCRT ref: 00B954ED
                                                                  • strlen.MSVCRT ref: 00B95944
                                                                  • _strdup.MSVCRT ref: 00B9598C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: setlocale$_strdupstrlenwcstombs$freemallocmemcpyrealloc
                                                                  • String ID: \
                                                                  • API String ID: 1024038994-2967466578
                                                                  • Opcode ID: da90e0c67056dd01a88ecb7fc55e7a5d58667241552077ce2ddc202f01351434
                                                                  • Instruction ID: 8bd3aafcce3cfb83bd7786aea7d890afc66e686b8a1439615bc191dcf5182c29
                                                                  • Opcode Fuzzy Hash: da90e0c67056dd01a88ecb7fc55e7a5d58667241552077ce2ddc202f01351434
                                                                  • Instruction Fuzzy Hash: F602AC71A48B188FDF25DFA8D4847ADBBF1EF49300F1885B9E885AB346E7349841CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 237 b95f50-b95f74 setlocale 238 b95f80-b95f96 setlocale 237->238 239 b95f76-b95f7e _strdup 237->239 240 b95f98-b95f9b 238->240 241 b95f9d-b9600a wcstombs realloc wcstombs setlocale free 238->241 239->238 240->241 242 b96010-b96076 mbstowcs call b9b3d0 mbstowcs 240->242 241->242 245 b9607c-b96080 242->245 246 b9616e-b96174 242->246 247 b9608c-b9609a 245->247 248 b96082-b96086 245->248 249 b960a0-b960a7 246->249 247->249 251 b962ef-b962f5 247->251 248->247 250 b96196-b961a5 248->250 252 b960ad-b960b2 249->252 253 b962a7-b962aa 249->253 250->249 254 b961ab-b961c0 250->254 251->249 256 b962fb-b96300 251->256 255 b960c8-b960cc 252->255 253->241 254->249 257 b960ce-b960d5 255->257 258 b960b4-b960b8 255->258 259 b96257-b9627b setlocale free 256->259 260 b960e3-b960e7 257->260 261 b960d7 257->261 262 b960da-b960e1 258->262 263 b960ba-b960c4 258->263 260->261 264 b960e9-b960ec 260->264 261->262 262->260 262->261 265 b960fc-b96101 263->265 266 b960c6 263->266 264->265 267 b960ee-b960fa 264->267 268 b96181-b96186 265->268 269 b96103-b96108 265->269 266->255 267->265 267->266 272 b96188-b96190 268->272 273 b961c5-b961c8 268->273 270 b9610a-b9610f 269->270 271 b96115-b96118 269->271 270->271 278 b962cf-b962df 270->278 279 b9611b-b96169 wcstombs realloc wcstombs 271->279 274 b96179-b9617d 272->274 275 b96192-b96194 272->275 276 b961ce-b961e2 273->276 277 b96305-b9630a 273->277 274->273 282 b9617f 274->282 275->268 280 b961e8-b961f2 276->280 281 b962af-b962b3 276->281 283 b9631a-b96325 277->283 284 b9630c-b96314 277->284 278->279 279->259 280->280 286 b961f4-b961f8 280->286 281->280 285 b962b9-b962c1 281->285 282->268 283->276 287 b9632b-b96333 283->287 284->276 284->283 289 b96208 285->289 290 b962c7-b962ca 285->290 286->280 291 b961fa-b96202 286->291 287->276 288 b96339-b96340 287->288 288->276 292 b9620b 289->292 290->292 291->285 291->289 293 b9620d-b96210 292->293 294 b96233-b96251 wcstombs 293->294 295 b96212-b9621d 293->295 294->259 298 b96253 294->298 296 b9621f-b96226 295->296 297 b96282-b96289 295->297 301 b96228-b96231 296->301 302 b96280 296->302 299 b9628b-b9628c 297->299 300 b962e4-b962e8 297->300 298->259 303 b96290-b9629a 299->303 300->303 304 b962ea 300->304 301->294 301->295 302->297 303->303 305 b9629c-b962a0 303->305 304->293 305->303 306 b962a2 305->306 306->293
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: setlocale$wcstombs$_strdupfreerealloc
                                                                  • String ID: /
                                                                  • API String ID: 2293806352-2043925204
                                                                  • Opcode ID: 9cacd5619bc5f0850fcef367972c77eb4db01cfa7fa31b704a8c3739afe9e277
                                                                  • Instruction ID: 6c09aa133f63438f1bab54fa07d5370efde46bab2823ac10de1d5cdd8fff126f
                                                                  • Opcode Fuzzy Hash: 9cacd5619bc5f0850fcef367972c77eb4db01cfa7fa31b704a8c3739afe9e277
                                                                  • Instruction Fuzzy Hash: 65B15971904229CBCF20AFA8C485AAEFBF1FF48740F5585BEE485A7251E3759C81CB61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 307 b91d3a-b91d94 call b9b3d0 GetEnvironmentVariableA strstr 310 b91daa-b91dc0 call b91cc3 307->310 311 b91d96-b91da8 strstr 307->311 319 b91e3c-b91e3e 310->319 320 b91dc2-b91dd9 strstr 310->320 311->310 312 b91df8-b91dff 311->312 314 b91e19-b91e20 312->314 315 b91e01-b91e14 fprintf 312->315 317 b91e40 314->317 318 b91e22-b91e3a fprintf 314->318 315->314 323 b91e45-b91e4c 317->323 318->317 319->323 321 b91ddb-b91def strstr 320->321 322 b91df2 320->322 321->322 322->312
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strstr$fprintf$EnvironmentVariable
                                                                  • String ID: Version:%s$--l4j-debug$--l4j-debug-all$3.50$CmdLine:%s %s$Launch4j$debug$debug-all
                                                                  • API String ID: 1078084263-4240183270
                                                                  • Opcode ID: 93c889d32692d83db93f98794837d306b1a7360826ee6909064f4da4a100320a
                                                                  • Instruction ID: cd2a7ab003fdb0cebc22f382604f35e5c0e2d29f3083336b17acbe9c6fe2f313
                                                                  • Opcode Fuzzy Hash: 93c889d32692d83db93f98794837d306b1a7360826ee6909064f4da4a100320a
                                                                  • Instruction Fuzzy Hash: AB217AB15187029BCF10AF3ADA8556EBBE4EF84740F01CCBDE88887300DB74D8459B52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 324 b94890-b948af call b9b3d0 call b91c58 329 b948b8-b948da call b925a0 324->329 330 b948b1-b948b3 324->330 329->330 334 b948dc-b948f1 call b91d3a 329->334 331 b94ace-b94ada 330->331 334->330 337 b948f3-b948fb 334->337 338 b948fd-b94920 fprintf 337->338 339 b94925-b9496a call b91e4d call b9206e * 3 337->339 338->339 348 b9496c-b94973 339->348 349 b94996-b949a2 call b93001 339->349 348->330 350 b94979-b94991 fprintf 348->350 349->331 353 b949a8-b949c2 call b930d5 call b94726 349->353 350->331 353->330 358 b949c8-b949cf call b93352 353->358 358->330 361 b949d5-b94a26 call b933d0 call b921ab call b92629 call b92e1f call b92e9d 358->361 371 b94a2b-b94a61 call b92a7b call b934b3 call b93903 361->371 378 b94a7b-b94a82 371->378 379 b94a63-b94a76 fprintf 371->379 380 b94a9c-b94aa4 378->380 381 b94a84-b94a97 fprintf 378->381 379->378 382 b94ac9 380->382 383 b94aa6-b94ac4 fprintf 380->383 381->380 382->331 383->382
                                                                  APIs
                                                                    • Part of subcall function 00B91C58: GetModuleHandleA.KERNEL32 ref: 00B91C6D
                                                                    • Part of subcall function 00B91C58: strcpy.MSVCRT ref: 00B91C8B
                                                                  • fprintf.MSVCRT ref: 00B94920
                                                                  • fprintf.MSVCRT ref: 00B9498C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$HandleModulestrcpy
                                                                  • String ID: -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"$Args length:%d/32768 chars$Error:%s$JNI:%s$Launcher args:%s$Launcher:%s$Startup error message not defined.$Yes
                                                                  • API String ID: 3713479259-718770430
                                                                  • Opcode ID: ada656a6a73661fa6f18661f4c1488cae3e05f1e815e27ebb79adb6ec746696d
                                                                  • Instruction ID: 23e6e13cba1930cf828daee0e5317b8e5be78bd552f15dcf105faaccfa09bf9c
                                                                  • Opcode Fuzzy Hash: ada656a6a73661fa6f18661f4c1488cae3e05f1e815e27ebb79adb6ec746696d
                                                                  • Instruction Fuzzy Hash: 935167B19087019BDF10BF75C981A1EBAE4EF85750F1189BDE8C88B351DBB4C986CB52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 384 b93e88-b93ea5 385 b93ed1-b93f06 RegOpenKeyExA 384->385 386 b93ea7-b93ecc fprintf 384->386 387 b93f0c-b93f35 385->387 388 b94090-b94097 385->388 386->385 389 b93f37-b93f8d RegEnumKeyExA 387->389 390 b94081-b9408f RegCloseKey 389->390 391 b93f93-b93fbb strcpy call b925e6 389->391 390->388 394 b93fbd-b93fcc fprintf 391->394 395 b93fd1-b93ff7 call b923b8 call b93dc7 391->395 394->395 400 b94049-b94050 395->400 401 b93ff9-b94009 call b9293e 395->401 403 b9406c-b9407c 400->403 404 b94052-b94067 fprintf 400->404 405 b9400e-b94010 401->405 403->389 404->403 405->400 406 b94012-b94031 strcpy 405->406 406->390 407 b94033-b94047 fprintf 406->407 407->390
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$strcpy$CloseEnumOpen
                                                                  • String ID: %s-bit search:%s...$Check:%s$Ignore:%s$Match:%s
                                                                  • API String ID: 3338988320-103288940
                                                                  • Opcode ID: 8ed59a61a3a7da2d6eb38528c857487351fc78854cc0aa8e897d6b4e30f33a08
                                                                  • Instruction ID: 854f9091ad05a9419194c34e02082e08ddc83a297da06988271e8d2a2591b965
                                                                  • Opcode Fuzzy Hash: 8ed59a61a3a7da2d6eb38528c857487351fc78854cc0aa8e897d6b4e30f33a08
                                                                  • Instruction Fuzzy Hash: 7D5118B19083149BCB10EF65D58569EBBF4FF88704F4188BDE88897311D7749A85CF82

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 408 b940f7-b94104 409 b9411f-b94126 408->409 410 b94106-b9410d 408->410 412 b94128-b9412f call b94098 409->412 413 b94134-b94147 call b94098 409->413 410->409 411 b9410f-b9411a fputs 410->411 411->409 412->413 417 b94149-b94150 call b94098 413->417 418 b94155-b94168 call b94098 413->418 417->418 422 b9418b-b94192 418->422 423 b9416a-b94171 418->423 426 b941b5-b941be 422->426 427 b94194-b9419b 422->427 424 b9417f-b94186 call b94098 423->424 425 b94173-b9417a call b94098 423->425 424->422 425->424 432 b941c0-b941db strcpy 426->432 433 b94212-b94213 426->433 430 b941a9-b941b0 call b94098 427->430 431 b9419d-b941a4 call b94098 427->431 430->426 431->430 436 b9420d 432->436 437 b941dd-b94208 fprintf 432->437 436->433 437->436
                                                                  APIs
                                                                  • fputs.MSVCRT ref: 00B9411A
                                                                  • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00B9487D,?,?,00000000,?), ref: 00B941CE
                                                                  • fprintf.MSVCRT ref: 00B94208
                                                                  Strings
                                                                  • C:\Program Files (x86)\Java\jre-1.8, xrefs: 00B941C3
                                                                  • SOFTWARE\IBM\Java Development Kit, xrefs: 00B9417F, 00B941A9
                                                                  • SOFTWARE\JavaSoft\JRE, xrefs: 00B94149
                                                                  • SOFTWARE\JavaSoft\Java Development Kit, xrefs: 00B94134
                                                                  • SOFTWARE\JavaSoft\Java Runtime Environment, xrefs: 00B94128
                                                                  • SOFTWARE\IBM\Java Runtime Environment, xrefs: 00B94173
                                                                  • SOFTWARE\JavaSoft\JDK, xrefs: 00B94155
                                                                  • findRegistryJavaHome(), xrefs: 00B94113
                                                                  • SOFTWARE\IBM\Java2 Runtime Environment, xrefs: 00B9419D
                                                                  • Runtime used:%s (%s-bit), xrefs: 00B941FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintffputsstrcpy
                                                                  • String ID: C:\Program Files (x86)\Java\jre-1.8$Runtime used:%s (%s-bit)$SOFTWARE\IBM\Java Development Kit$SOFTWARE\IBM\Java Runtime Environment$SOFTWARE\IBM\Java2 Runtime Environment$SOFTWARE\JavaSoft\JDK$SOFTWARE\JavaSoft\JRE$SOFTWARE\JavaSoft\Java Development Kit$SOFTWARE\JavaSoft\Java Runtime Environment$findRegistryJavaHome()
                                                                  • API String ID: 1909795467-2117825052
                                                                  • Opcode ID: 2a4f71a160adc2247e23e918922a7ea95ad197882581ccdc99a6eb526b34c7b5
                                                                  • Instruction ID: 8289aff9581d17237d862935611ebf9bc300a42871e3cf3ffb32211bdb5c1a48
                                                                  • Opcode Fuzzy Hash: 2a4f71a160adc2247e23e918922a7ea95ad197882581ccdc99a6eb526b34c7b5
                                                                  • Instruction Fuzzy Hash: 32213C715193048EDF147F65D406B187BE0EB56318F4289BCA5C457652DFB844C5CF12

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 438 b92657-b9268e 439 b92694-b926c0 strcpy call b92629 _stat64 438->439 440 b92936-b9293d 438->440 443 b926db-b92784 439->443 444 b926c2-b926d6 439->444 445 b9278a-b9279c 443->445 444->445 446 b9279e-b927c0 fprintf 445->446 447 b927c5-b927c7 445->447 446->447 448 b927c9-b927d8 SetLastError 447->448 449 b927dd-b927e4 447->449 448->440 450 b927f0-b92824 strcpy call b925e6 _stat64 449->450 451 b927e6-b927eb 449->451 454 b9283f-b928e8 450->454 455 b92826-b9283a 450->455 451->440 456 b928ee-b92900 454->456 455->456 457 b92929-b9292b 456->457 458 b92902-b92924 fprintf 456->458 457->451 459 b92931 457->459 458->457 459->440
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _stat64fprintfstrcpy$ErrorLast
                                                                  • String ID: (OK)$(not found)$Check javac:%s %s$Check launcher:%s %s$bin\javac.exe
                                                                  • API String ID: 2531230949-2473518738
                                                                  • Opcode ID: 4ce279bde88609066b6f272bf536a23ab8b01eaf3972ba552185b46a89932603
                                                                  • Instruction ID: 2b7251e43662fe5647f90969c9b39d6e17d889cfb1d9ca1520053c3f68cdeb3b
                                                                  • Opcode Fuzzy Hash: 4ce279bde88609066b6f272bf536a23ab8b01eaf3972ba552185b46a89932603
                                                                  • Instruction Fuzzy Hash: A2810274D056289BCF60DF29C888699B7F1EF98310F1086E9E84CA3354EB749E85DF41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 526 b94726-b94734 527 b9474f-b94768 call b92168 526->527 528 b94736-b9473d 526->528 532 b9476a-b94788 fprintf 527->532 533 b9478d-b947a6 call b92168 527->533 528->527 530 b9473f-b9474a fputs 528->530 530->527 532->533 536 b947a8-b947c6 fprintf 533->536 537 b947cb-b947fa call b9206e call b923b8 533->537 536->537 542 b947fc-b9480f fprintf 537->542 543 b94814-b94843 call b9206e call b923b8 537->543 542->543 548 b9485d-b94876 call b9449f 543->548 549 b94845-b94858 fprintf 543->549 552 b94888-b9488f 548->552 553 b94878 call b94214 548->553 549->548 555 b9487d-b94881 553->555 555->552 556 b94883 call b9319c 555->556 556->552
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$fputs
                                                                  • String ID: Java max ver:%s$Java min ver:%s$Requires 64-Bit: %s$Requires JDK:%s$Yes$jreSearch()
                                                                  • API String ID: 1801251168-2968954267
                                                                  • Opcode ID: 54731310bd895bf04f6442b0e4f5046a97a15b2db43976679e84fcf494937caa
                                                                  • Instruction ID: 0b66b81a756685b8ff4dff56e2357342fee53fa3ff360e361d15ff0cad1a547f
                                                                  • Opcode Fuzzy Hash: 54731310bd895bf04f6442b0e4f5046a97a15b2db43976679e84fcf494937caa
                                                                  • Instruction Fuzzy Hash: 89312BB16193049FDF04BFB9D545A2EBAE4EF86704F1088BCE4988B751EB78C841CB12

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 558 b92e9d-b92ec1 call b9206e 561 b92ec3-b92ed1 strcat 558->561 562 b92ed6-b92f2e strncpy strcat _open 558->562 561->562 563 b92f34-b92f3b 562->563 564 b92ff6-b93000 562->564 565 b92f3d-b92f4c fprintf 563->565 566 b92f51-b92f87 _read 563->566 565->566 567 b92f89-b92f8b 566->567 568 b92fc8-b92fcd 567->568 569 b92f8d-b92f93 567->569 572 b92fe8-b92ff1 _close 568->572 573 b92fcf-b92fd3 568->573 570 b92fc3 569->570 571 b92f95-b92f98 569->571 576 b92fc5-b92fc6 570->576 574 b92f9a-b92f9d 571->574 575 b92f9f-b92fa7 571->575 572->564 573->572 577 b92fd5-b92fe3 strcat 573->577 574->575 578 b92fb5-b92fb7 574->578 575->576 579 b92fa9-b92fad 575->579 576->567 577->572 578->576 581 b92fb9-b92fc1 578->581 579->576 580 b92faf-b92fb3 579->580 580->576 581->576
                                                                  APIs
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • strcat.MSVCRT ref: 00B92ED1
                                                                  • strncpy.MSVCRT ref: 00B92F02
                                                                  • strcat.MSVCRT ref: 00B92F12
                                                                  • _open.MSVCRT ref: 00B92F22
                                                                  • fprintf.MSVCRT ref: 00B92F4C
                                                                  • _read.MSVCRT ref: 00B92F82
                                                                  • strcat.MSVCRT ref: 00B92FE3
                                                                  • _close.MSVCRT ref: 00B92FF1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Resourcefprintfstrcat$FindLoadLock_close_open_readstrncpy
                                                                  • String ID: Loading:%s$l4j.ini
                                                                  • API String ID: 1951458220-28774081
                                                                  • Opcode ID: 65f8b6ab321c19bfb9af0320196c090609fda076d786f245a18047ee17dae575
                                                                  • Instruction ID: bb464f92c4946abb67c662629b0461e0729349be964a6ee2494bde14522bffe5
                                                                  • Opcode Fuzzy Hash: 65f8b6ab321c19bfb9af0320196c090609fda076d786f245a18047ee17dae575
                                                                  • Instruction Fuzzy Hash: EA41A271D08704ABDF109F74D5847AEBBE0EB85350F1589BDE8889B381D778D8808B92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 582 b963f0-b96403 583 b96409-b9640c 582->583 584 b96622-b9662f _errno 582->584 585 b965f1-b965fe _errno 583->585 586 b96412-b96431 _fullpath 583->586 587 b9653f-b96549 584->587 585->587 588 b96550-b96564 586->588 589 b96437-b9644b 586->589 588->588 590 b96566-b96587 588->590 589->589 591 b9644d-b96465 589->591 592 b9658d-b9658f 590->592 593 b96467-b96482 malloc 590->593 591->593 592->593 594 b96595-b9659e 592->594 595 b96488-b964b9 memcpy _findfirst 593->595 596 b96610-b9661d _errno 593->596 599 b965a0-b965b4 594->599 597 b964bf-b96539 strncpy 595->597 598 b965c0-b965e0 _errno 595->598 596->587 597->587 600 b96603-b9660e _errno 598->600 601 b965e2-b965ec free 598->601 599->599 602 b965b6 599->602 600->601 601->587 602->598
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _errno$_findfirst_fullpathmallocmemcpystrncpy
                                                                  • String ID:
                                                                  • API String ID: 114964343-0
                                                                  • Opcode ID: 617703f76fd749dff74b2c6018ee418b6078d3074324700df7586d43ea141d78
                                                                  • Instruction ID: 2be24919a08d8fb9840cb89b6d25f414fed7ad3c09a5d81b19dc58117e88ac12
                                                                  • Opcode Fuzzy Hash: 617703f76fd749dff74b2c6018ee418b6078d3074324700df7586d43ea141d78
                                                                  • Instruction Fuzzy Hash: 3C51A0B01047048FDB20DF68C88579AB7E1EF89300F498ABDE4D9C7255E778E884CB52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 603 b93a11-b93af0 call b9b3d0 strcpy strcat * 3 CreateProcessA 606 b93af2-b93af6 603->606 607 b93b36-b93b3c 603->607 608 b93b29 606->608 609 b93af8-b93b27 WaitForSingleObject GetExitCodeProcess call b939ed 606->609 610 b93b3e-b93b45 607->610 612 b93b2f-b93b34 608->612 609->612 612->610
                                                                  APIs
                                                                  • strcpy.MSVCRT ref: 00B93A69
                                                                  • strcat.MSVCRT ref: 00B93A79
                                                                  • strcat.MSVCRT ref: 00B93A89
                                                                  • strcat.MSVCRT ref: 00B93A99
                                                                  • CreateProcessA.KERNEL32 ref: 00B93AE6
                                                                  • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,00000000,?,00B91B58), ref: 00B93B08
                                                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00B93B1B
                                                                    • Part of subcall function 00B939ED: CloseHandle.KERNEL32 ref: 00B939FB
                                                                    • Part of subcall function 00B939ED: CloseHandle.KERNEL32(00000000), ref: 00B93A09
                                                                  Strings
                                                                  • D, xrefs: 00B93A48
                                                                  • -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe", xrefs: 00B93A8E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcat$CloseHandleProcess$CodeCreateExitObjectSingleWaitstrcpy
                                                                  • String ID: -jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"$D
                                                                  • API String ID: 3105771607-2552213272
                                                                  • Opcode ID: 710d6ec9df540c7ee16fedede21152fbaebda433385fc053d40fe7c22d07e697
                                                                  • Instruction ID: b1080a52377796b619d4fdec0616b777837df1bec128d0f6b040da8a73207263
                                                                  • Opcode Fuzzy Hash: 710d6ec9df540c7ee16fedede21152fbaebda433385fc053d40fe7c22d07e697
                                                                  • Instruction Fuzzy Hash: F731A2B1409304DFDB10AF14D58475EFBE4FB85724F4089ADE4885B340CB759649CF92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 614 b96640-b96653 615 b96659-b9666d 614->615 616 b9678d-b96798 _errno 614->616 618 b966eb-b966fd strlen 615->618 619 b9666f-b96691 _errno _findnext 615->619 617 b9670b-b96717 616->617 622 b96718-b96727 618->622 623 b966ff-b96702 618->623 620 b96728-b96736 619->620 621 b96697-b966e9 strncpy 619->621 626 b96738-b9673e 620->626 627 b96782-b9678b 620->627 621->618 624 b9675f-b96769 GetLastError 621->624 623->622 625 b96704 623->625 624->617 630 b9676b-b96772 _errno 624->630 625->617 628 b96740-b9674c 626->628 629 b96774-b96780 626->629 627->626 631 b9674e-b96753 628->631 632 b96757-b9675a 628->632 629->628 630->617 631->632 632->624 633 b9675c 632->633 633->624
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _errno$ErrorLast_findnextstrlenstrncpy
                                                                  • String ID:
                                                                  • API String ID: 2306919634-0
                                                                  • Opcode ID: 91a493b97e1567579b3ad9968e914a421ba7be3c6a2e9bf5d9fabaac9b9aaaf8
                                                                  • Instruction ID: 49d7b3fc014d680615eff7b957050c5a8a3ed40614bb08cf1bc9cb7ec43d352b
                                                                  • Opcode Fuzzy Hash: 91a493b97e1567579b3ad9968e914a421ba7be3c6a2e9bf5d9fabaac9b9aaaf8
                                                                  • Instruction Fuzzy Hash: C6415B756042018BCF10DFA8C5C569ABBE1EF85318F1986B9EC488F346D738DD45CBA2
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _setmode$ExitProcess__getmainargs__p__environ__p__fmode_cexit
                                                                  • String ID:
                                                                  • API String ID: 2438820944-0
                                                                  • Opcode ID: 55b7f865036942288a5f7755d87b8eb8580f25884ddd16a5d3e3e26469a52574
                                                                  • Instruction ID: 312b223e8486f5b990080cce90b9d9d48bb9ad1279e99167b4bdb16d90b1aeb5
                                                                  • Opcode Fuzzy Hash: 55b7f865036942288a5f7755d87b8eb8580f25884ddd16a5d3e3e26469a52574
                                                                  • Instruction Fuzzy Hash: 68414774E153058FDF60EF69D981B5EBBE1EB99310F0A89B9E848C7311EB349840DB12
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValuestrcpy
                                                                  • String ID: C:\Program Files (x86)\Java\jre-1.8$JavaHome
                                                                  • API String ID: 1410419071-2792304130
                                                                  • Opcode ID: 179a35c42cf1bd21b90a478ff6f0e0d559b6e4e3203c48616acb991fbafca404
                                                                  • Instruction ID: 2acb252433f312be28edf6064972d6a1c2e8723d0c1187f8c7a54bb8fb4e3e4d
                                                                  • Opcode Fuzzy Hash: 179a35c42cf1bd21b90a478ff6f0e0d559b6e4e3203c48616acb991fbafca404
                                                                  • Instruction Fuzzy Hash: 8A217171909319AFDF20DF68D88479AFBF4EB48304F0084BDE98897201D7709A888F92
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32 ref: 00B92E36
                                                                    • Part of subcall function 00B92CCE: fprintf.MSVCRT ref: 00B92D81
                                                                    • Part of subcall function 00B92CCE: fprintf.MSVCRT ref: 00B92DC3
                                                                    • Part of subcall function 00B92CCE: strcat.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,00B92E6A), ref: 00B92DD5
                                                                    • Part of subcall function 00B92CCE: _itoa.MSVCRT ref: 00B92DFC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$GlobalMemoryStatus_itoastrcat
                                                                  • String ID: -Xms$-Xmx$@
                                                                  • API String ID: 1064291243-2676391021
                                                                  • Opcode ID: d57c4b041cf42196409a1331823de75b3eab5bf64ba3e316b01768f781b08447
                                                                  • Instruction ID: 60ddf123f6a22305919ea589125a419a4ec239c0048053b71e26288d72090b1a
                                                                  • Opcode Fuzzy Hash: d57c4b041cf42196409a1331823de75b3eab5bf64ba3e316b01768f781b08447
                                                                  • Instruction Fuzzy Hash: 350180B0909309AFDB00EF55D185A8EFBF4EF88308F50886CE588A7340D3B499499B56
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _strdupmallocstrlen
                                                                  • String ID: glob-1.0-mingw32
                                                                  • API String ID: 3776109042-3253302226
                                                                  • Opcode ID: e9f8f8359af05a6e336df1f4b2dc35b06bb979f03f132406ae931d0df05d57f2
                                                                  • Instruction ID: 477121202564cf44ae54c58e9b1e23276485ccd81c12446760265a2a9ac226c4
                                                                  • Opcode Fuzzy Hash: e9f8f8359af05a6e336df1f4b2dc35b06bb979f03f132406ae931d0df05d57f2
                                                                  • Instruction Fuzzy Hash: D2115EB2A54A044BCF21AF69D88129DBBE1EF51310F5845F9EC9047346E3329A45C7A1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CommandHandleInfoLineModuleStartup
                                                                  • String ID:
                                                                  • API String ID: 1628297973-0
                                                                  • Opcode ID: 24ab8eb71bb645cf36de499fa8a534a93647ab79a2c1463b5c0ad30472aac9a0
                                                                  • Instruction ID: 8425b8e9033cd6c07a7139d64c6fa861a9b7a135918ec7d51c61e8a1f307a7aa
                                                                  • Opcode Fuzzy Hash: 24ab8eb71bb645cf36de499fa8a534a93647ab79a2c1463b5c0ad30472aac9a0
                                                                  • Instruction Fuzzy Hash: 572107B284432849DF305BA9BBC5BF8BFE1DB16310F8400FADCD046195EB615986D66B
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _errno_findclosefree
                                                                  • String ID:
                                                                  • API String ID: 531968878-0
                                                                  • Opcode ID: c384672c9782469b7d01815495fe31bd96caf040fa83a3d94504463f27ecc95e
                                                                  • Instruction ID: 2775f22003250b58ec5c250b50c2d37653c12a8474f68d1bb573d77b08a4efc4
                                                                  • Opcode Fuzzy Hash: c384672c9782469b7d01815495fe31bd96caf040fa83a3d94504463f27ecc95e
                                                                  • Instruction Fuzzy Hash: C6E04F756063544BCF107EA8A9D1A6677D4AB45764F160BF8EC848B282E73C8C008761
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fputs
                                                                  • String ID: registryJreSearch()
                                                                  • API String ID: 1795875747-1180825924
                                                                  • Opcode ID: 4323711717822b72b35fb9e2216574406d4b6d025ac59fd8c7b41061df7c968b
                                                                  • Instruction ID: 47480eff331f9d426d15c0b41801a7643e10809df1e78b02a755a80b908b43d8
                                                                  • Opcode Fuzzy Hash: 4323711717822b72b35fb9e2216574406d4b6d025ac59fd8c7b41061df7c968b
                                                                  • Instruction Fuzzy Hash: 48E08C215243418FEB107FBA9906B257BE4AB09704F8448FDA5C0C32A1DBB8C882CB22
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: c8171771f55805592ee4753954c1db0c6697d052e603e55c123443acfda92c2c
                                                                  • Instruction ID: 8a04d0efe737ab2824dd14dd324a9454fd9528a24dc4e3fb3af95caca7246ebf
                                                                  • Opcode Fuzzy Hash: c8171771f55805592ee4753954c1db0c6697d052e603e55c123443acfda92c2c
                                                                  • Instruction Fuzzy Hash: 3E01F4B3C083684DDF305B69A6857F8BFE0EB06300F8844EAECD556186D7751985EB52
                                                                  APIs
                                                                  • __set_app_type.MSVCRT ref: 00B9159A
                                                                    • Part of subcall function 00B91180: SetUnhandledExceptionFilter.KERNEL32 ref: 00B911B5
                                                                    • Part of subcall function 00B91180: GetCommandLineA.KERNEL32 ref: 00B911D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CommandExceptionFilterLineUnhandled__set_app_type
                                                                  • String ID:
                                                                  • API String ID: 3309298700-0
                                                                  • Opcode ID: bb18bae7cf66ee7ad3bb2fb4a23018036787893b722fc14b32e48946aaa12cff
                                                                  • Instruction ID: 6be9e8d424601d3a483a3d7efce66ee435a1899d523f162e37c6f2a7c2349e44
                                                                  • Opcode Fuzzy Hash: bb18bae7cf66ee7ad3bb2fb4a23018036787893b722fc14b32e48946aaa12cff
                                                                  • Instruction Fuzzy Hash: F4C04C314005169BCB007F24D406355B7E4BF01344F414958D59527011C77435158BA6
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$strcat$ErrorExecuteFormatFreeLastLocalMessageShell
                                                                  • String ID: Error msg:%s$Error:%s$Open URL:%s$open
                                                                  • API String ID: 623906192-1000128352
                                                                  • Opcode ID: b458de0c7df4d4b9e308ddc6947591c8969b6af5dea3ac5e8c8e39e90113a5a6
                                                                  • Instruction ID: 1ccb976ef5793048f09e4abc5c70fd1c656efea92779ec0a5062a61ea930d104
                                                                  • Opcode Fuzzy Hash: b458de0c7df4d4b9e308ddc6947591c8969b6af5dea3ac5e8c8e39e90113a5a6
                                                                  • Instruction Fuzzy Hash: 213119B1908306AFDB00FF65D58971EBBE4EF85744F0088BCE5D46B251C7B48848DB52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$fprintf$ErrorFindLastLoadLockfputs
                                                                  • String ID: %s$<NULL>$Resource %d:
                                                                  • API String ID: 2361679423-125972688
                                                                  • Opcode ID: 1cebc2ba232b9dbb4d35826d5c3437eeac5e353f6e67b762761e32e829cf82ae
                                                                  • Instruction ID: 8e26e2915fe4cf74757bf84fcc6867d360aa7ba4e51aae7a0040a81ebc3cab14
                                                                  • Opcode Fuzzy Hash: 1cebc2ba232b9dbb4d35826d5c3437eeac5e353f6e67b762761e32e829cf82ae
                                                                  • Instruction Fuzzy Hash: 2B218171914324AFEF10BF69DA85B2A7BE5EB49740F0484BDE68897311E7B48841CB52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $9$Infinity$NaN
                                                                  • API String ID: 0-197352145
                                                                  • Opcode ID: 97c57375b0a8b4440b1a7619e7d182b4d2c9a8534e05e7c221f3f7c7148b4f0a
                                                                  • Instruction ID: eabeb719a637e0fbd17cb4d1751ebb234e2092ef25e283c46f92700434515777
                                                                  • Opcode Fuzzy Hash: 97c57375b0a8b4440b1a7619e7d182b4d2c9a8534e05e7c221f3f7c7148b4f0a
                                                                  • Instruction Fuzzy Hash: 1FC222B1A083418FCB55DF29C58431ABBE0FF84384F258DADE89997252E776D944CF82
                                                                  APIs
                                                                    • Part of subcall function 00B92168: strcmp.MSVCRT ref: 00B92198
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                    • Part of subcall function 00B9206E: SetLastError.KERNEL32 ref: 00B92132
                                                                    • Part of subcall function 00B9206E: fputs.MSVCRT ref: 00B9215A
                                                                  • fprintf.MSVCRT ref: 00B93566
                                                                  • fputs.MSVCRT ref: 00B93593
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B935C7
                                                                  • strtok.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B9360B
                                                                  • fprintf.MSVCRT ref: 00B93632
                                                                  • strpbrk.MSVCRT ref: 00B93642
                                                                  • strrchr.MSVCRT ref: 00B9365A
                                                                  • strncpy.MSVCRT ref: 00B93684
                                                                  • _findfirst.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B936A7
                                                                  • strncpy.MSVCRT ref: 00B93735
                                                                  • strcpy.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B93747
                                                                  • fprintf.MSVCRT ref: 00B93774
                                                                  • _findnext.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B93786
                                                                  • _findclose.MSVCRT ref: 00B937A4
                                                                  • strncpy.MSVCRT ref: 00B9381A
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B9387A
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B938A0
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B938B0
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A4F,?,?,00000000,?,00B91822), ref: 00B938B7
                                                                  • strncat.MSVCRT ref: 00B938D1
                                                                    • Part of subcall function 00B925E6: strcat.MSVCRT(?,?,?,?,00B93151,?,?), ref: 00B92612
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcat$fprintf$Resourcestrncpy$fputs$ErrorFindLastLoadLock_findclose_findfirst_findnextstrcmpstrcpystrncatstrpbrkstrrchrstrtok
                                                                  • String ID: " :%s$-classpath "$-jar "$-jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"$Add classpath:%s$Info:Classpath not defined.$Main class:%s$\
                                                                  • API String ID: 613304418-1310111744
                                                                  • Opcode ID: eb9e57ce23849cd14dad1d85e4a2cf3689906ca8617fae2d1660e9b863db8435
                                                                  • Instruction ID: 95b0a29a5d744663b77a2735a6817f00490e1e6b3032c92c711ca2d9d200b24f
                                                                  • Opcode Fuzzy Hash: eb9e57ce23849cd14dad1d85e4a2cf3689906ca8617fae2d1660e9b863db8435
                                                                  • Instruction Fuzzy Hash: 10B1E6B59193189BCB20AF25C984999FBF0BF89714F0189EDE4C8A7311E7B496C4CF52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcmp$strncat$strcatstrchr$CurrentDirectoryfprintf
                                                                  • String ID: %$C:\Program Files (x86)\Java\jre-1.8$EXEDIR$EXEFILE$HKEY$JREHOMEDIR$OLDPWD$PWD$Substitute:%s = %s
                                                                  • API String ID: 54753763-1518370859
                                                                  • Opcode ID: 1bb7d783e38966fb11fc4f5663e42bf44967d560fb82067d6dd1c8cfc46cab4e
                                                                  • Instruction ID: bb8637654861624e78cee8bec40f2c055059f871f94fad48e31d635ffd686c4c
                                                                  • Opcode Fuzzy Hash: 1bb7d783e38966fb11fc4f5663e42bf44967d560fb82067d6dd1c8cfc46cab4e
                                                                  • Instruction Fuzzy Hash: 8A5127B0909305ABDF60AF25DA8466EFBF4FF84740F11C8BDE48897211DB70D9889B52
                                                                  APIs
                                                                  • strstr.MSVCRT ref: 00B921F5
                                                                  • strstr.MSVCRT ref: 00B92209
                                                                  • strstr.MSVCRT ref: 00B9221D
                                                                  • strstr.MSVCRT ref: 00B92231
                                                                  • strstr.MSVCRT ref: 00B92247
                                                                  • strchr.MSVCRT ref: 00B92280
                                                                  • strrchr.MSVCRT ref: 00B92293
                                                                  • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00B922C6
                                                                  • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,00000000,?,?,00B94563,00000001,00000000,000000B7,?), ref: 00B922F2
                                                                  • RegQueryValueExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00B94563), ref: 00B9232B
                                                                  • RegCloseKey.ADVAPI32 ref: 00B92343
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strstr$Open$CloseQueryValuestrchrstrrchr
                                                                  • String ID: HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$\
                                                                  • API String ID: 356245303-3439841907
                                                                  • Opcode ID: 5807f8dc781117a259231e98cf6554669b82b49b858d5401e3285f5b8c393346
                                                                  • Instruction ID: caa50b615e8cd027c6e04043c2655e29a26ff0e04c73eab1c9aac8341705ced2
                                                                  • Opcode Fuzzy Hash: 5807f8dc781117a259231e98cf6554669b82b49b858d5401e3285f5b8c393346
                                                                  • Instruction Fuzzy Hash: F5413BB1909315EFDF10AFA5D98475EFBE4AF44740F0189BEE88497211D77898488F92
                                                                  APIs
                                                                  • fprintf.MSVCRT ref: 00B942BA
                                                                  • CreatePipe.KERNEL32 ref: 00B94302
                                                                  • fputs.MSVCRT ref: 00B94322
                                                                  • SetHandleInformation.KERNEL32(?,?,?,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94347
                                                                  • fputs.MSVCRT ref: 00B94367
                                                                  • CloseHandle.KERNEL32 ref: 00B94375
                                                                  • strcpy.MSVCRT ref: 00B943AC
                                                                  • fputs.MSVCRT ref: 00B94405
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94413
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00B94874,?,?,00000000,?,00B91822), ref: 00B94464
                                                                  Strings
                                                                  • Cannot set handle information, xrefs: 00B94360
                                                                  • Cannot create pipe, xrefs: 00B9431B
                                                                  • Cannot run java(w) -version, xrefs: 00B943FE
                                                                  • Check Java Version: %s min=%s max=%s, xrefs: 00B942AF
                                                                  • "%s" -version, xrefs: 00B943C3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Handle$Closefputs$CreateInformationPipefprintfstrcpy
                                                                  • String ID: "%s" -version$Cannot create pipe$Cannot run java(w) -version$Cannot set handle information$Check Java Version: %s min=%s max=%s
                                                                  • API String ID: 571126077-3734277957
                                                                  • Opcode ID: 768d1252b6845df3f5635df276d2f91c1f337df7b4d1d979faba240324978c7f
                                                                  • Instruction ID: 4edfd25b10c14e4847caad5a5558f9e767da836399a2ae7d5c27ad924a686771
                                                                  • Opcode Fuzzy Hash: 768d1252b6845df3f5635df276d2f91c1f337df7b4d1d979faba240324978c7f
                                                                  • Instruction Fuzzy Hash: D75107B1919B149BCF10AF25D945A9DBBF4FF48740F00C8BDE888A7300DB749A858F92
                                                                  APIs
                                                                  • strcpy.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B923CF
                                                                    • Part of subcall function 00B92356: strchr.MSVCRT ref: 00B92377
                                                                    • Part of subcall function 00B92356: strchr.MSVCRT ref: 00B92389
                                                                  • strncpy.MSVCRT ref: 00B9243B
                                                                  • strcpy.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B92462
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B92481
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B924A7
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B924C3
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B924E9
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B924FE
                                                                  • fputs.MSVCRT ref: 00B92545
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B9255E
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B9256E
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B9257E
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,00B947F3,?,?,00000000,?,00B91822), ref: 00B9258E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcat$strchrstrcpy$fputsstrncpy
                                                                  • String ID: 1.0_
                                                                  • API String ID: 2030749601-2140295588
                                                                  • Opcode ID: 743f45fd53ca106c7deec1319de1378f45511c5a2b48b23a97745165dd8561a2
                                                                  • Instruction ID: 2e87dba32d17741f53f798f6a17db4071481370cb51bd2de6146146ea1f7e31a
                                                                  • Opcode Fuzzy Hash: 743f45fd53ca106c7deec1319de1378f45511c5a2b48b23a97745165dd8561a2
                                                                  • Instruction Fuzzy Hash: 16513471905208AFCF00EF75C9859AEBBF1EF88314F5189BDE895AB242D7349845CF51
                                                                  APIs
                                                                  Strings
                                                                  • Cannot get version string: cannot find quote, xrefs: 00B93C1D
                                                                  • 64-bit, xrefs: 00B93C9C
                                                                  • Java version output: %s, xrefs: 00B93BE2
                                                                  • Cannot get version string: missing end quote, xrefs: 00B93C4A
                                                                  • 64-Bit, xrefs: 00B93C83
                                                                  • Cannot get version string: data too large, xrefs: 00B93C67
                                                                  • ", xrefs: 00B93C29
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strchrstrstr$FileReadfprintffputs
                                                                  • String ID: "$64-Bit$64-bit$Cannot get version string: cannot find quote$Cannot get version string: data too large$Cannot get version string: missing end quote$Java version output: %s
                                                                  • API String ID: 654744459-1675060857
                                                                  • Opcode ID: c7a1f95d946435eebb2f94e8cab0168badfac92d34cc9c8f7bb71bdd81bad2d5
                                                                  • Instruction ID: f610de37c335aebc52ebaf7833940f34d1b153c53ad941e45f3eea8bfe78a9e3
                                                                  • Opcode Fuzzy Hash: c7a1f95d946435eebb2f94e8cab0168badfac92d34cc9c8f7bb71bdd81bad2d5
                                                                  • Instruction Fuzzy Hash: 3D413CB15087059BDF10AF39D981B5ABBF4EF44B44F4188BDE884A7310E774EA84CB92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strlen$_strdup
                                                                  • String ID: \
                                                                  • API String ID: 2848476203-2967466578
                                                                  • Opcode ID: 3e7a5f8df12acd887e948c71022f6dcbc80a5968c812c8bb9e7b8b0c9b255bab
                                                                  • Instruction ID: c9c9bfe439dfed324240d5eaf32a96ebfef05a452d250e782cf2f586e97283cf
                                                                  • Opcode Fuzzy Hash: 3e7a5f8df12acd887e948c71022f6dcbc80a5968c812c8bb9e7b8b0c9b255bab
                                                                  • Instruction Fuzzy Hash: 369157B1A45B188FDF25DFA8D4817ADBBF1EF48710F1485B8E885AB341E734A841CB91
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Protectmemcpy$Queryabortfwritevfprintf
                                                                  • String ID: @$Mingw runtime failure:
                                                                  • API String ID: 978211760-2549925133
                                                                  • Opcode ID: 0fa5c42d3f8d116a14e838c1b28955979fa402947f4e2644367c6baebf29f816
                                                                  • Instruction ID: 5e1182e97e81a133713d84c9cda9f9ff2ab84b259d8835c04d7b62d3ceb81eae
                                                                  • Opcode Fuzzy Hash: 0fa5c42d3f8d116a14e838c1b28955979fa402947f4e2644367c6baebf29f816
                                                                  • Instruction Fuzzy Hash: 9A3107B5909304AFDB00EFA9E58199EFBF4FF88350F40896EE888A3211D7749845CF52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$fprintf$CreateProcess
                                                                  • String ID: Cannot create process %s$Create process: %s$D
                                                                  • API String ID: 991247836-3672066502
                                                                  • Opcode ID: e08b2e95fe5a63660566d0038b3154663e1373fd3f6394e8cd0f35a1905067ed
                                                                  • Instruction ID: da2716a5ca6b7c58a566432b87aeb8a7a456c35ab705cfadaf01d5adcd27fd5b
                                                                  • Opcode Fuzzy Hash: e08b2e95fe5a63660566d0038b3154663e1373fd3f6394e8cd0f35a1905067ed
                                                                  • Instruction Fuzzy Hash: BD31E7B19043059BDB00EF69D494B5EFBF4EF88704F00897DE99897341D77599488F92
                                                                  APIs
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A5A,?,?,00000000,?,00B91822), ref: 00B93950
                                                                  • strcat.MSVCRT(?,00000000,?,?,00B94A5A,?,?,00000000,?,00B91822), ref: 00B93960
                                                                  • strcpy.MSVCRT(?,00000000,?,?,00B94A5A,?,?,00000000,?,00B91822), ref: 00B93971
                                                                  • strstr.MSVCRT ref: 00B93981
                                                                  • strchr.MSVCRT ref: 00B93997
                                                                  • strcat.MSVCRT ref: 00B939CD
                                                                  • strcat.MSVCRT ref: 00B939DD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcat$Resource$fprintf$FindLoadLockstrchrstrcpystrstr
                                                                  • String ID: $--l4j-$-jar "C:\Users\user\Desktop\SAMPLE_1.exe.bin.exe"
                                                                  • API String ID: 3962799999-984385548
                                                                  • Opcode ID: 1724c6949ef7c32082737a4e49f00833a8778e3209f0683afedd21b838f36aec
                                                                  • Instruction ID: b6a41a7be0123279c7e591fd4079b8ec80c653d72c918cc0469541a27454e8b5
                                                                  • Opcode Fuzzy Hash: 1724c6949ef7c32082737a4e49f00833a8778e3209f0683afedd21b838f36aec
                                                                  • Instruction Fuzzy Hash: BD214FB140D3049ADF20BF25954971DFBE0EF81B10F0588FDA4C987241D7B49A88DB63
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: wcstombs$mbstowcs$freereallocsetlocale
                                                                  • String ID: /
                                                                  • API String ID: 2027400679-2043925204
                                                                  • Opcode ID: e7dbd48533100895c2d00fa346662685d63153b07653d11aff1b8fd14f5ef817
                                                                  • Instruction ID: c0c2b18cdec5eae653d4c724ba13a0656ae1ef5bff4f509e343a71aecef55106
                                                                  • Opcode Fuzzy Hash: e7dbd48533100895c2d00fa346662685d63153b07653d11aff1b8fd14f5ef817
                                                                  • Instruction Fuzzy Hash: 634117759043198BCF24EFA8C1816AEFBF1FF88700F4585AEE888A7251E73498418B65
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCurrentHandleModuleProcProcessfprintf
                                                                  • String ID: IsWow64Process$WOW64:%s$Yes$kernel32
                                                                  • API String ID: 24026888-2598006572
                                                                  • Opcode ID: 706cd17ac688cf1afae428b54481dcdab800800f8d6e7af2bf57626980105bf8
                                                                  • Instruction ID: 9a4e382f9baa94b3c94d8e2eb62b9f2eb027c6508e27fcdd9f016a8f88ff1bba
                                                                  • Opcode Fuzzy Hash: 706cd17ac688cf1afae428b54481dcdab800800f8d6e7af2bf57626980105bf8
                                                                  • Instruction Fuzzy Hash: 76F062B16183489BDF00BF7EDA86E2A76E8EB85704F10C8BCE48487201D771DC419B62
                                                                  APIs
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • strcat.MSVCRT ref: 00B931D6
                                                                  • strcat.MSVCRT ref: 00B931EA
                                                                  • strcat.MSVCRT ref: 00B93207
                                                                  • strcat.MSVCRT ref: 00B9321B
                                                                  • strcat.MSVCRT ref: 00B93238
                                                                  • strcat.MSVCRT ref: 00B9327E
                                                                  • strcat.MSVCRT ref: 00B9328E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcat$Resource$fprintf$FindLoadLock
                                                                  • String ID: (64-bit)$ -
                                                                  • API String ID: 2267084178-2895498852
                                                                  • Opcode ID: d33e16ef5ce8c61b3cad7c9bb8016adb6452900012074ddd898bb56273f8322c
                                                                  • Instruction ID: 0f48d53eb8e0fdca9cc6dc532da16406398a95c7f74be5c47970e1d2640209e6
                                                                  • Opcode Fuzzy Hash: d33e16ef5ce8c61b3cad7c9bb8016adb6452900012074ddd898bb56273f8322c
                                                                  • Instruction Fuzzy Hash: 282129B180E305ABDB107F55D60976EBBF4EBC2704F0188EDA2C42B241DBB85484EB23
                                                                  APIs
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • strtok.MSVCRT(?,00000000,?,?,00B949E7,?,?,00000000,?,00B91822), ref: 00B93424
                                                                  • strchr.MSVCRT ref: 00B9343A
                                                                    • Part of subcall function 00B92A7B: strchr.MSVCRT ref: 00B92ACE
                                                                    • Part of subcall function 00B92A7B: strchr.MSVCRT ref: 00B92AFD
                                                                    • Part of subcall function 00B92A7B: strncat.MSVCRT ref: 00B92B25
                                                                    • Part of subcall function 00B92A7B: strncat.MSVCRT ref: 00B92B4D
                                                                    • Part of subcall function 00B92A7B: strcmp.MSVCRT ref: 00B92B6A
                                                                    • Part of subcall function 00B92A7B: strncat.MSVCRT ref: 00B92B84
                                                                    • Part of subcall function 00B92A7B: strcmp.MSVCRT ref: 00B92B99
                                                                    • Part of subcall function 00B92A7B: strcat.MSVCRT ref: 00B92C7F
                                                                    • Part of subcall function 00B92A7B: fprintf.MSVCRT ref: 00B92CA0
                                                                    • Part of subcall function 00B92A7B: strcat.MSVCRT(?,00000000,?,?,00B94563,00000001,00000000,000000B7,?,00B94874,?,?,00000000,?,00B91822), ref: 00B92CB8
                                                                  • fprintf.MSVCRT ref: 00B93480
                                                                  • SetEnvironmentVariableA.KERNEL32(?,?), ref: 00B9348C
                                                                  • strtok.MSVCRT(?,?), ref: 00B934A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$Resourcestrchrstrncat$strcatstrcmpstrtok$EnvironmentFindLoadLockVariable
                                                                  • String ID: =$Set var:%s = %s
                                                                  • API String ID: 3861738652-24686798
                                                                  • Opcode ID: 6fbe47e8dc1e5399632b5addd3862b1da4ac9d9bea4cf9ec6125f77417c123de
                                                                  • Instruction ID: 8d761684afbac4e145dd758459c368b3abd4b97d344aea42f634abc7cee5b77d
                                                                  • Opcode Fuzzy Hash: 6fbe47e8dc1e5399632b5addd3862b1da4ac9d9bea4cf9ec6125f77417c123de
                                                                  • Instruction Fuzzy Hash: AB212F71809718ABCB11AF25D584A4EFBF4FF84B50F01C8BDE48897301D7B49A45DB92
                                                                  APIs
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • fprintf.MSVCRT ref: 00B9305A
                                                                  • CreateMutexA.KERNEL32 ref: 00B93092
                                                                  • GetLastError.KERNEL32 ref: 00B9309A
                                                                  • fprintf.MSVCRT ref: 00B930C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$Resource$CreateErrorFindLastLoadLockMutex
                                                                  • String ID: Create mutex:%s$Error:%s$Instance already exists.
                                                                  • API String ID: 891584312-2614424452
                                                                  • Opcode ID: 6a80cdac9537d14f9aa555174c408721154370786834da75eadf9c8926e09a07
                                                                  • Instruction ID: 782b679900d2fcaa47ead535a7b04ebdc72a655b80dc17778cbca99bdf3069ec
                                                                  • Opcode Fuzzy Hash: 6a80cdac9537d14f9aa555174c408721154370786834da75eadf9c8926e09a07
                                                                  • Instruction Fuzzy Hash: 78111C719083049BEF20AF65D94574DFBF5EF84704F0088BDD08CA7251DBB59A89CB42
                                                                  APIs
                                                                    • Part of subcall function 00B921AB: atoi.MSVCRT ref: 00B921D3
                                                                  • fprintf.MSVCRT ref: 00B92D81
                                                                  • fprintf.MSVCRT ref: 00B92DC3
                                                                  • strcat.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,00B92E6A), ref: 00B92DD5
                                                                  • _itoa.MSVCRT ref: 00B92DFC
                                                                  Strings
                                                                  • Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB, xrefs: 00B92DB4
                                                                  • Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB, xrefs: 00B92D76
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf$_itoaatoistrcat
                                                                  • String ID: Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB$Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB
                                                                  • API String ID: 2922754228-3040617333
                                                                  • Opcode ID: 70a05de111d17bfb4aedb6148955d8b58f8038d30a850139e1283b42e8b21a6b
                                                                  • Instruction ID: 7003780212af8fc3e964fa0ae3192c22f4b56fb60925f737339252f854d23705
                                                                  • Opcode Fuzzy Hash: 70a05de111d17bfb4aedb6148955d8b58f8038d30a850139e1283b42e8b21a6b
                                                                  • Instruction Fuzzy Hash: 074113B5E047099BCB00EF69D58469EFBF4EF88360F10887EE858A7350D73898418FA1
                                                                  APIs
                                                                  • ShowWindow.USER32 ref: 00B91606
                                                                  • KillTimer.USER32(00000000,00000000), ref: 00B9162D
                                                                    • Part of subcall function 00B91F36: GetLastError.KERNEL32 ref: 00B91F3D
                                                                    • Part of subcall function 00B91F36: fprintf.MSVCRT ref: 00B91F60
                                                                    • Part of subcall function 00B91F36: FormatMessageA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B91F9F
                                                                    • Part of subcall function 00B91F36: fprintf.MSVCRT ref: 00B91FC2
                                                                    • Part of subcall function 00B91F36: strcat.MSVCRT ref: 00B91FD6
                                                                    • Part of subcall function 00B91F36: strcat.MSVCRT ref: 00B91FE9
                                                                    • Part of subcall function 00B91F36: LocalFree.KERNEL32 ref: 00B91FF1
                                                                    • Part of subcall function 00B91F36: fprintf.MSVCRT ref: 00B92028
                                                                    • Part of subcall function 00B91F36: ShellExecuteA.SHELL32 ref: 00B9205C
                                                                  • PostQuitMessage.USER32(00000000), ref: 00B91640
                                                                  • EnumWindows.USER32 ref: 00B91668
                                                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00B9167F
                                                                  • KillTimer.USER32 ref: 00B916B4
                                                                  • PostQuitMessage.USER32(00000000), ref: 00B916C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Messagefprintf$KillPostQuitTimerstrcat$CodeEnumErrorExecuteExitFormatFreeLastLocalProcessShellShowWindowWindows
                                                                  • String ID:
                                                                  • API String ID: 3625041480-0
                                                                  • Opcode ID: d8ea80ef34fa9cf9d45c189b02cf228ab6d2e830c15fd81643aa52588feff6ed
                                                                  • Instruction ID: 456b9306b6488f026612d0112d71357c0561bf3db8a7bdc0dcfee29c709518b0
                                                                  • Opcode Fuzzy Hash: d8ea80ef34fa9cf9d45c189b02cf228ab6d2e830c15fd81643aa52588feff6ed
                                                                  • Instruction Fuzzy Hash: F22133B0425305DFEF20BF18E956F2A77E8EB05749F0549BDE48097261DBB89884DF22
                                                                  APIs
                                                                  • strcpy.MSVCRT ref: 00B9337C
                                                                  • strcat.MSVCRT ref: 00B9338C
                                                                    • Part of subcall function 00B932B9: GetEnvironmentVariableA.KERNEL32(?,00000000,?,?,00B93399), ref: 00B932F5
                                                                    • Part of subcall function 00B932B9: strcat.MSVCRT(?,?,00B93399), ref: 00B93324
                                                                    • Part of subcall function 00B932B9: strcat.MSVCRT(?,?,00B93399), ref: 00B93333
                                                                    • Part of subcall function 00B932B9: SetEnvironmentVariableA.KERNEL32(?,?,00B93399), ref: 00B93343
                                                                  • fprintf.MSVCRT ref: 00B933BE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcat$EnvironmentVariable$fprintfstrcpy
                                                                  • String ID: Error:%s$\bin$appendToPathVar failed.
                                                                  • API String ID: 4002749114-3685084685
                                                                  • Opcode ID: d27c6f8cb95b8813312061d6905662534dea2c4308854a7f888362c435e4a4c1
                                                                  • Instruction ID: d78972fb26eaf81d5c79b91c76f13756c5f835f0d199ada4def45db2e3e94624
                                                                  • Opcode Fuzzy Hash: d27c6f8cb95b8813312061d6905662534dea2c4308854a7f888362c435e4a4c1
                                                                  • Instruction Fuzzy Hash: 08F0627250C3044BDF10AF75D9456BDB7E1ABC1704F4189BCE8885B700DBB899499B86
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: signal
                                                                  • String ID:
                                                                  • API String ID: 1946981877-0
                                                                  • Opcode ID: aeec0c4a87c07f7c9f5ab1529ee77c8b59e66693d593f2f0f948f8b159f4556e
                                                                  • Instruction ID: 323b012f5c3282a82309eb9470ebb6d9a02803c59b9229aa978738bd41bf3587
                                                                  • Opcode Fuzzy Hash: aeec0c4a87c07f7c9f5ab1529ee77c8b59e66693d593f2f0f948f8b159f4556e
                                                                  • Instruction Fuzzy Hash: 8B211E701082428AEF106F7D858572AB6D0EF45368F114EB9E5E8C72D1C7BBD8D4AB53
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strcmp$fprintf
                                                                  • String ID: Ignore$Version string: %s / %s-Bit (%s)
                                                                  • API String ID: 512415533-1929821993
                                                                  • Opcode ID: dddc6df7767e73fdfa7989bce0ad3d55b788d65345d7821c8527e165efbd56cd
                                                                  • Instruction ID: ba47aa1ff33fb7031b80e49a860bde75f0519b63fa32e2ba26a90438f39062ff
                                                                  • Opcode Fuzzy Hash: dddc6df7767e73fdfa7989bce0ad3d55b788d65345d7821c8527e165efbd56cd
                                                                  • Instruction Fuzzy Hash: 2A11E772205B419BDF245F6B9585317BBE4EFD1B08F0584BDE48887350DBB1CD848B92
                                                                  APIs
                                                                  • GetEnvironmentVariableA.KERNEL32(?,00000000,?,?,00B93399), ref: 00B932F5
                                                                  • strcat.MSVCRT(?,?,00B93399), ref: 00B93324
                                                                  • strcat.MSVCRT(?,?,00B93399), ref: 00B93333
                                                                  • SetEnvironmentVariableA.KERNEL32(?,?,00B93399), ref: 00B93343
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentVariablestrcat
                                                                  • String ID: Path
                                                                  • API String ID: 194762557-2875597873
                                                                  • Opcode ID: bb43c17848dcfdb823a3bd35f071c35f57897bc5f05725b08eae84cf20b9f0da
                                                                  • Instruction ID: 088199fcc9d5672f15563e69b402a9007da29dabe75131adf68aa750222307b9
                                                                  • Opcode Fuzzy Hash: bb43c17848dcfdb823a3bd35f071c35f57897bc5f05725b08eae84cf20b9f0da
                                                                  • Instruction Fuzzy Hash: 5B0192769093189BCF10BF3AD98545EBBE8EF84760F01857DF88C97241CB7499448B92
                                                                  APIs
                                                                  • GetCurrentDirectoryA.KERNEL32 ref: 00B9310E
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • strncpy.MSVCRT ref: 00B93140
                                                                    • Part of subcall function 00B925E6: strcat.MSVCRT(?,?,?,?,00B93151,?,?), ref: 00B92612
                                                                  • _chdir.MSVCRT ref: 00B93154
                                                                  • fprintf.MSVCRT ref: 00B93171
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Resourcefprintf$CurrentDirectoryFindLoadLock_chdirstrcatstrncpy
                                                                  • String ID: Working dir:%s
                                                                  • API String ID: 3319590416-1807235602
                                                                  • Opcode ID: 8d183d44318cb0b6e9841d0242b81328ac7ca8fcd46861936705d290c3349f71
                                                                  • Instruction ID: c8543acf9df624ad2ea1350ebe3825c1a199c529a94d2d58bc00d0e6b4a47a1b
                                                                  • Opcode Fuzzy Hash: 8d183d44318cb0b6e9841d0242b81328ac7ca8fcd46861936705d290c3349f71
                                                                  • Instruction Fuzzy Hash: 00111EB1508308AFDB10AF69D98199EFBF4FF84740F418CBDE58897211D7B49984CB52
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: free$_strdup_stricollmalloc
                                                                  • String ID:
                                                                  • API String ID: 1482192206-0
                                                                  • Opcode ID: 351a2a8870e22f0329fc654e75e7251c6513b7c51ff2b9e5253af2975e1597e5
                                                                  • Instruction ID: c7b760313bc0e4cf070fde02860b7c24e620b85ef7406813e1f9c36f747124a0
                                                                  • Opcode Fuzzy Hash: 351a2a8870e22f0329fc654e75e7251c6513b7c51ff2b9e5253af2975e1597e5
                                                                  • Instruction Fuzzy Hash: CE4112B1E05A188FCF259FA4E9807ADBBF1FF54700F1585A9E895AB301E730A8408B90
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32 ref: 00B9A8D3
                                                                  • InitializeCriticalSection.KERNEL32 ref: 00B9A8E6
                                                                  • InitializeCriticalSection.KERNEL32 ref: 00B9A8F5
                                                                  • EnterCriticalSection.KERNEL32 ref: 00B9A920
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Initialize$EnterExchangeInterlocked
                                                                  • String ID:
                                                                  • API String ID: 33273390-0
                                                                  • Opcode ID: a4abf06330a88c220f22b472a07ec592420a6ddd727b4306794bb99e059bd807
                                                                  • Instruction ID: 7b0c59e7a8ee94f6b75e0fc0849fb5491f7ce115ee25b56c68a82989b0f78948
                                                                  • Opcode Fuzzy Hash: a4abf06330a88c220f22b472a07ec592420a6ddd727b4306794bb99e059bd807
                                                                  • Instruction Fuzzy Hash: EB016DB1D152008AEF90FF78E2CB61F7AF5EB81348F5245B8C48147616EB749989CB93
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: atoisetlocalestrchr
                                                                  • String ID: .
                                                                  • API String ID: 1223908000-248832578
                                                                  • Opcode ID: 9d0f3f49ce8ab93ddfcb6de35196ba47d70909b61849004233df5efe9c77d558
                                                                  • Instruction ID: de5f4e37252c908e42fb500a14cd0ecc0ec75eaa8394be187241600a6d8fb48c
                                                                  • Opcode Fuzzy Hash: 9d0f3f49ce8ab93ddfcb6de35196ba47d70909b61849004233df5efe9c77d558
                                                                  • Instruction Fuzzy Hash: 3B41C5B5A093158FCB10DFA9D88461BFBE4EF85750F05497EE998C7300EBB5D8448B92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: atoisetlocalestrchr
                                                                  • String ID: .
                                                                  • API String ID: 1223908000-248832578
                                                                  • Opcode ID: 117eead6f37c0bbe73012532780501a4045d8e88fe6430b389612fa80619fbde
                                                                  • Instruction ID: c9e4c7ef2d3cc6a56cae0bad4b80e1b12aa26f8bf28046d4a02ab47b52301494
                                                                  • Opcode Fuzzy Hash: 117eead6f37c0bbe73012532780501a4045d8e88fe6430b389612fa80619fbde
                                                                  • Instruction Fuzzy Hash: E04150766083048FCB109FA9D88476AF7E5EB96350F1948BEF888C7350EB75D844CB51
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: atoisetlocalestrchr
                                                                  • String ID: .
                                                                  • API String ID: 1223908000-248832578
                                                                  • Opcode ID: 1fc3fc44cc01f8236a8a0a37798216e9a42a5699351d436fad5dbfb6ac74c3c5
                                                                  • Instruction ID: ce829ebc4c411d65093504001f43ee93f778e889169450302c81a405aed9c2f0
                                                                  • Opcode Fuzzy Hash: 1fc3fc44cc01f8236a8a0a37798216e9a42a5699351d436fad5dbfb6ac74c3c5
                                                                  • Instruction Fuzzy Hash: A50113B5A083008FCB00AF29E58561BFBE4BFCA700F01882EE888C7310D775D800CB52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: atoisetlocalestrchr
                                                                  • String ID: .
                                                                  • API String ID: 1223908000-248832578
                                                                  • Opcode ID: 75b7116c53a2db0d16ce417eb108e9c4dac7e4639156e91237afbcb7b777befb
                                                                  • Instruction ID: 53ba5514faeb569c8f251905292fcfc68275538fb52dddcc002011b9ca204f8a
                                                                  • Opcode Fuzzy Hash: 75b7116c53a2db0d16ce417eb108e9c4dac7e4639156e91237afbcb7b777befb
                                                                  • Instruction Fuzzy Hash: AC01C4B5A093009FCB00AF28E58561BBBE4BF8A700F00896DF889C7351EB75D844CB52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: atoisetlocalestrchr
                                                                  • String ID: .
                                                                  • API String ID: 1223908000-248832578
                                                                  • Opcode ID: c3dbea6b3d49c5049a22a89bbd4f100fad72ead125856031ce5aa0dd7309d424
                                                                  • Instruction ID: 4cbeaa305229f2a3fff5005e01f31774a50fbe64cb8f330a13902f25c821a007
                                                                  • Opcode Fuzzy Hash: c3dbea6b3d49c5049a22a89bbd4f100fad72ead125856031ce5aa0dd7309d424
                                                                  • Instruction Fuzzy Hash: DAF049B2A097009FDB10AF6AE58661BFBE8FFD5700F41886EF48487251DB74D840DB92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: fopenstrcatstrncpy
                                                                  • String ID: \launch4j.log
                                                                  • API String ID: 1410583167-1044402884
                                                                  • Opcode ID: d0ba1f5a5681ca94d4fe178d04e28dc2d53395e3233fde303ed3c7b6064d5eec
                                                                  • Instruction ID: 18f9b95ffd2d5d5f11b2fd1569dbb857ed1722582373f5bda248d888fa60ceb6
                                                                  • Opcode Fuzzy Hash: d0ba1f5a5681ca94d4fe178d04e28dc2d53395e3233fde303ed3c7b6064d5eec
                                                                  • Instruction Fuzzy Hash: 5CF01CB55043089FCB20AF69E54169DFBE4AFD4704F0188ADA48C97312D7B4A9958B92
                                                                  APIs
                                                                  • IsDBCSLeadByteEx.KERNEL32 ref: 00B989A1
                                                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B98B5A), ref: 00B989E0
                                                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B98B5A), ref: 00B98A80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Byte$CharMultiWide$Lead
                                                                  • String ID:
                                                                  • API String ID: 2933009993-0
                                                                  • Opcode ID: c01dad700cd316040131830a86ddead0c57abd91402bd1c3d1d49247e91733aa
                                                                  • Instruction ID: acbcacf11545372ef88cd272fc54b8c0a8f7f708fc6ebcaefdf6346c44ae8e98
                                                                  • Opcode Fuzzy Hash: c01dad700cd316040131830a86ddead0c57abd91402bd1c3d1d49247e91733aa
                                                                  • Instruction Fuzzy Hash: 8A414970A083059FDF10DF69D48479EBBE0EF46364F0085AEE8988B381D775DA94CB92
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: _errno_findclose_findfirststrncpy
                                                                  • String ID:
                                                                  • API String ID: 1756046557-0
                                                                  • Opcode ID: 233afb7bb0cc25fe4f15c6f6278a5643bd76a5286e5f1e42dbedadc7c72b6943
                                                                  • Instruction ID: 97c201512f0b38e9fee19fce5e9c7871f57ea0b9971815f2bd2b5eb270e76f65
                                                                  • Opcode Fuzzy Hash: 233afb7bb0cc25fe4f15c6f6278a5643bd76a5286e5f1e42dbedadc7c72b6943
                                                                  • Instruction Fuzzy Hash: 56311AB19143018BDB10DF68D5C1696BBE1AF88314F1546BAEC888B386E774D944CBA2
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: strlenwcslen
                                                                  • String ID: (null)$(null)
                                                                  • API String ID: 803329031-1601437019
                                                                  • Opcode ID: aa3ebec8526963f1434d547be5fdf31c9daf946d82b097f048cfe6bb6faf08b3
                                                                  • Instruction ID: c10faf38d6cd47068fbb25cb332fb52ae22193700562adedc823ef866aa0821f
                                                                  • Opcode Fuzzy Hash: aa3ebec8526963f1434d547be5fdf31c9daf946d82b097f048cfe6bb6faf08b3
                                                                  • Instruction Fuzzy Hash: 73114F702083558FCB10DF24C5D066BB7E1EB8A340F504ABDE9959B352DB35E90A8B52
                                                                  APIs
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B9209D
                                                                    • Part of subcall function 00B9206E: FindResourceExA.KERNEL32 ref: 00B920C1
                                                                    • Part of subcall function 00B9206E: LoadResource.KERNEL32 ref: 00B920D9
                                                                    • Part of subcall function 00B9206E: LockResource.KERNEL32 ref: 00B920E7
                                                                    • Part of subcall function 00B9206E: fprintf.MSVCRT ref: 00B92124
                                                                  • FindWindowExA.USER32 ref: 00B9179D
                                                                  • GetWindowTextA.USER32 ref: 00B917BA
                                                                  • strstr.MSVCRT ref: 00B917C9
                                                                  • FindWindowExA.USER32 ref: 00B917ED
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: FindResourceWindow$fprintf$LoadLockTextstrstr
                                                                  • String ID:
                                                                  • API String ID: 2277964966-0
                                                                  • Opcode ID: 95a9f5b95524026365e8c7ac09c65ee1ba0843219f0e1703a3545d923de10726
                                                                  • Instruction ID: c7d9f277dfc80b3e93d7bf7e33a6ce3f9bb3a2a7449596bd46a443240d2e3245
                                                                  • Opcode Fuzzy Hash: 95a9f5b95524026365e8c7ac09c65ee1ba0843219f0e1703a3545d923de10726
                                                                  • Instruction Fuzzy Hash: 5A11A3B15083069ADB106FA8D54539FFFF4EF84344F008CBDE58857211D77899489B92
                                                                  APIs
                                                                  Strings
                                                                  • VirtualQuery failed for %d bytes at address %p, xrefs: 00B94CB7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Protectmemcpy$Query
                                                                  • String ID: VirtualQuery failed for %d bytes at address %p
                                                                  • API String ID: 228986436-2206166143
                                                                  • Opcode ID: 77eef2e4cc31c0581867387027ae200e9cdf75528de93c7318440654cad50449
                                                                  • Instruction ID: 00627946565579ad21d31e5a78dde5fc4b827c2d831f9876c2d32a00aed10a6a
                                                                  • Opcode Fuzzy Hash: 77eef2e4cc31c0581867387027ae200e9cdf75528de93c7318440654cad50449
                                                                  • Instruction Fuzzy Hash: 0E014B719153059FDB00AF69D581B9EFBF8FB84744F40887EE98893201D770E8058B92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: Messageprintf
                                                                  • String ID: %s: %s
                                                                  • API String ID: 351756659-482213395
                                                                  • Opcode ID: 8f6e69da11abe9f253231421aacaa515d301d89f955e4a896808675c9981fd73
                                                                  • Instruction ID: 42ce1f9a469f6da3112af0cb3a5083ba29e25790827898772859e0e5c9b4aa4a
                                                                  • Opcode Fuzzy Hash: 8f6e69da11abe9f253231421aacaa515d301d89f955e4a896808675c9981fd73
                                                                  • Instruction Fuzzy Hash: 2CF08C7140C309EFCF10AF28D14A35EBFE0AB42388F50C8ADE4894B241D7B48488EB93
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModulestrcpy
                                                                  • String ID: Launch4j
                                                                  • API String ID: 122033455-841392896
                                                                  • Opcode ID: 07535e81e10ea47550d4f5900f0f17132bc580a8982c946a57936ce48075a6a0
                                                                  • Instruction ID: 51ddcc8adf28df8b43220222cda9798dccce025cbecb2c343f718bceca0f43cb
                                                                  • Opcode Fuzzy Hash: 07535e81e10ea47550d4f5900f0f17132bc580a8982c946a57936ce48075a6a0
                                                                  • Instruction Fuzzy Hash: 78F06DB05453048BEB10AF29E95671A7BF4E702304F40486DD8808B391EFB98488EFE2
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(?,?,?,00000000,?,00B91822), ref: 00B925BE
                                                                  • strrchr.MSVCRT ref: 00B925D5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: FileModuleNamestrrchr
                                                                  • String ID: \
                                                                  • API String ID: 3219412323-2967466578
                                                                  • Opcode ID: 6c25ae0de2238cd972aa39a5d180827187f3ff1cb184da868f783a5507607426
                                                                  • Instruction ID: 150b52530d585f1e343d225b4b5e68e0a2117554d52c636dbeadab3f9c3a1f3c
                                                                  • Opcode Fuzzy Hash: 6c25ae0de2238cd972aa39a5d180827187f3ff1cb184da868f783a5507607426
                                                                  • Instruction Fuzzy Hash: 47E048B0904305ABCF00FF39DAC5509BFE4AB44754F01857DED9587286D770D944DB62
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeavefree
                                                                  • String ID:
                                                                  • API String ID: 4020351045-0
                                                                  • Opcode ID: c2a692334fd9294751f091000675dc4734fb9c6171207b68848cc22073b38b06
                                                                  • Instruction ID: cbd4e36eb32335bc2a0924725329b3aec97ac459b8d66a457451393d77558f95
                                                                  • Opcode Fuzzy Hash: c2a692334fd9294751f091000675dc4734fb9c6171207b68848cc22073b38b06
                                                                  • Instruction Fuzzy Hash: 2A014C7075420A8FCF24FF79E9C1A29BBE5AB45308F1585F8D94997202EB30ED84DB52
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1680997293.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                  • Associated: 00000000.00000002.1680568556.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681042903.0000000000B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BA8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681063794.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681137484.0000000000BAD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1681158014.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_b90000_SAMPLE_1.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                  • String ID:
                                                                  • API String ID: 682475483-0
                                                                  • Opcode ID: f59718c743259bfa57642a5f9fc172f98e92054d471ed2b37ef30339645de513
                                                                  • Instruction ID: 73420c9cf01282c71f4b1167ea5cdcfed0aa90eabf274bd923ec10c45d43b468
                                                                  • Opcode Fuzzy Hash: f59718c743259bfa57642a5f9fc172f98e92054d471ed2b37ef30339645de513
                                                                  • Instruction Fuzzy Hash: 52F090729147098B9F20BFB8E6C6A6A7BE8DE05340F0104B8DE844B206E730A808C7D3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: abdd01ce2e31ab367519a29c30f9eb595e5f148c53a716ba42d1360a204ae690
                                                                  • Instruction ID: b7563ebb0a1a3f8ca0f0d8af5d2c659a5dd6c9f25e5474bf09c47154619ebd2e
                                                                  • Opcode Fuzzy Hash: abdd01ce2e31ab367519a29c30f9eb595e5f148c53a716ba42d1360a204ae690
                                                                  • Instruction Fuzzy Hash: B5A1BA71A20612DFDB18CFA4C484BAAFBB1FF49314F08C199DD1A4B389C774A845CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70bd1b0c6f19152187b33611b112004ae167423ebbfb83ef925b7d441cc802fb
                                                                  • Instruction ID: b180736693884da922cf7fdc18a4ab1e2dd6b0a50701628939243e5bb4ba1907
                                                                  • Opcode Fuzzy Hash: 70bd1b0c6f19152187b33611b112004ae167423ebbfb83ef925b7d441cc802fb
                                                                  • Instruction Fuzzy Hash: DC61BA71620652DFEB18CF60C494BAAFBB1FB49714F08C19DEC1A4B389C774A885CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2250000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fae3b5dc420c2e90ff036e4bbd6f1fc8d2e4bea11970e70002aa4c0cb60baf18
                                                                  • Instruction ID: b27ed1e575f377653949b1f60d054c8af8bb61ee9063eb1aa170e660a63beaae
                                                                  • Opcode Fuzzy Hash: fae3b5dc420c2e90ff036e4bbd6f1fc8d2e4bea11970e70002aa4c0cb60baf18
                                                                  • Instruction Fuzzy Hash: B11149BA91023BDFCF14CF88C8854ADB7B0FB9C314B568525DC65A3349D3346A60CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2250000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a77ed7bbc9490546ac115a7c9256c203d92bf7029e0d4201081d47e65d74b7e5
                                                                  • Instruction ID: a260e5ce39583c0cde8cca10abd6b8d12c41188b006e44b98ef23476f9a2c094
                                                                  • Opcode Fuzzy Hash: a77ed7bbc9490546ac115a7c9256c203d92bf7029e0d4201081d47e65d74b7e5
                                                                  • Instruction Fuzzy Hash: AEF01576C0022ADB8B14DF88C8410EDB7B1FB48318B1AC496DC2837385D332AE62CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9804491a6be265c21f066c8a34e1ba9637122086eb74b87403f7b5a302f2d110
                                                                  • Instruction ID: 8d243dc6ca498d297f5775d6ac54a249624985d835633db766a465354963b955
                                                                  • Opcode Fuzzy Hash: 9804491a6be265c21f066c8a34e1ba9637122086eb74b87403f7b5a302f2d110
                                                                  • Instruction Fuzzy Hash: C2F079B6A00A16EBDB258F61C5447DAFBB4BB88718F14821AD82C67350D778B4698BC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4fe337c69a24e20d7fd75aabed95a402f5a17eebc0c30dc64d5f3fccd76a35b2
                                                                  • Instruction ID: b8038bead2c5feca6ee81811cc646210d10dc61e7111bd8ebbff0fa4ee9c43b4
                                                                  • Opcode Fuzzy Hash: 4fe337c69a24e20d7fd75aabed95a402f5a17eebc0c30dc64d5f3fccd76a35b2
                                                                  • Instruction Fuzzy Hash: A5F09BB6A04A16EBDB25CF61C5447CAFBB4BB88714F54821AC82C67350C778B46ACBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 02cd0c64ba38daaaaa0490e501c43b0a5d571bbdc335ecaa7e4f67e0d159b53a
                                                                  • Instruction ID: d9121b4a59725d4783032b2d705f71f1fcd9e88a3585954c748c1e2e075c1c91
                                                                  • Opcode Fuzzy Hash: 02cd0c64ba38daaaaa0490e501c43b0a5d571bbdc335ecaa7e4f67e0d159b53a
                                                                  • Instruction Fuzzy Hash: EDF0F2B5A00A06EBDB15CF60C0047DAFBB0BB88714F04420AC42C63310C3787469CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71edf5fa9be310c4122f321afcf3d1eee803e65ef87c5508a936fe4ad26270e5
                                                                  • Instruction ID: 3fe352fbf0f5702fe898b72e0e0f08e7450957e48897f118a283d10a5055223a
                                                                  • Opcode Fuzzy Hash: 71edf5fa9be310c4122f321afcf3d1eee803e65ef87c5508a936fe4ad26270e5
                                                                  • Instruction Fuzzy Hash: EAF09BB6A00A16EBDB25CF65C5447CAFBB4BB88718F54821AC82C67350D778B469CFC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7790f62720a028b3fe890bc7a5fccb6687b2d299a5cb43dab37ead666829ba57
                                                                  • Instruction ID: 37011e38e7edbe4529f47b925d5b20bca5ff1dc5994a234a146ccb7a9c0c88fb
                                                                  • Opcode Fuzzy Hash: 7790f62720a028b3fe890bc7a5fccb6687b2d299a5cb43dab37ead666829ba57
                                                                  • Instruction Fuzzy Hash: 2FF0C2B6D00A16ABDB248F61C5447DAFBB4BB48714F14821AC42D63310D3787469CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 13d4dfa39ea062b59cb4a23f191e907b94fa3ac0cac7b3c1397acd3edd22cc57
                                                                  • Instruction ID: 3c7a0370253762d3e18e699ee150eb8d79ae5522e36dd1e77f8e7d3d0edf12df
                                                                  • Opcode Fuzzy Hash: 13d4dfa39ea062b59cb4a23f191e907b94fa3ac0cac7b3c1397acd3edd22cc57
                                                                  • Instruction Fuzzy Hash: 28F0C2B6D00A16ABDB248F61C5447CAFBB4BB48714F14821AC42C67750D3787569CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6df46181704cfa03c1717ba86d96aa210a6918da0e4c8be452d25b7bba2709c
                                                                  • Instruction ID: d9998976a7e60c54caf6481ae3623d4c75950cffc546e51b29d5f4a0975ee4a3
                                                                  • Opcode Fuzzy Hash: c6df46181704cfa03c1717ba86d96aa210a6918da0e4c8be452d25b7bba2709c
                                                                  • Instruction Fuzzy Hash: 8DF0CAB6D00A16ABDB258F61C5447CAFBB4BB88714F14821AC82C67720C778B4A9CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ebbf1a7566da7d36deab00e8df207c1b6d46233ae398fa65c3a79f4bb42f4ac1
                                                                  • Instruction ID: 207e1fa55bfa6f9968c637f2c3e2d9d259751860d199470a74ab0582c61f9b26
                                                                  • Opcode Fuzzy Hash: ebbf1a7566da7d36deab00e8df207c1b6d46233ae398fa65c3a79f4bb42f4ac1
                                                                  • Instruction Fuzzy Hash: 5FF0C2B6D00A16EBDB248FA1C5447CAFBB4BB48714F14821AC42C67310D3787469CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002252000.00000040.00000800.00020000.00000000.sdmp, Offset: 02252000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2252000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ad1fb086912432efcf9e94868c8b408ac7f472657367f3ba3ba1642e84ff08ad
                                                                  • Instruction ID: c05dcc5e1b7d8a9e2417d3bd3f0a12f32f357810d11a898ee0146b8963e0047c
                                                                  • Opcode Fuzzy Hash: ad1fb086912432efcf9e94868c8b408ac7f472657367f3ba3ba1642e84ff08ad
                                                                  • Instruction Fuzzy Hash: 74F0C2B6D00A16ABDB258F61C5447CAFBB4BB48714F18821AC92C63310D3787469CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1714330918.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_2250000_javaw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                  • Instruction ID: eb872bb57dc3666d2e68c1b4e0f0030092c3fdce29bb4313657cab48196c2f55
                                                                  • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                  • Instruction Fuzzy Hash: 332106BA5142669FDB358F588C403D9B7E5FB08314F21882EDEC9EB710D3346B898B54