Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SAMPLE_5.exe.bin.exe

Overview

General Information

Sample name:SAMPLE_5.exe.bin.exe
Analysis ID:1589201
MD5:9257746613b453f9e58797bcdf604bf3
SHA1:7105aa28f9d501b5ce04dbde25c9a98907ee6761
SHA256:acaaf2f5f88f9d877d5a35f384bc8cb962561366007613aa3f91304ddbf77354
Tags:diablonetexeuser-notscamguru
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Queries the volume information (name, serial number etc) of a device
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SAMPLE_5.exe.bin.exe (PID: 5500 cmdline: "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe" MD5: 9257746613B453F9E58797BCDF604BF3)
    • javaw.exe (PID: 7192 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
      • icacls.exe (PID: 7552 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SAMPLE_5.exe.bin.exeReversingLabs: Detection: 75%
Source: SAMPLE_5.exe.bin.exeVirustotal: Detection: 52%Perma Link
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 4x nop then cmp eax, dword ptr [ecx+04h]1_2_02CDF818
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: s3.timeweb.cloud
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.CHAMBERSIGN.ORG
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
Source: javaw.exe, 00000001.00000002.1337741540.000000000A3FF000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
Source: javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: javaw.exe, 00000001.00000002.1337741540.000000000A3FF000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
Source: javaw.exe, 00000001.00000002.1337741540.000000000A369000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A3FF000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
Source: javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificat
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: javaw.exe, 00000001.00000002.1337741540.000000000A51A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A409000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
Source: javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A409000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
Source: javaw.exe, 00000001.00000002.1337741540.000000000A369000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A409000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
Source: javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
Source: javaw.exe, 00000001.00000002.1337741540.000000000A51A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1339127798.00000000154A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
Source: javaw.exe, 00000001.00000002.1339127798.00000000154A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/B
Source: javaw.exe, 00000001.00000002.1337741540.000000000A3FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
Source: javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
Source: javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: javaw.exe, 00000001.00000002.1337741540.000000000A369000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1339444828.00000000158F5000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/;
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/k
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm#
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
Source: javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu#
Source: javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
Source: javaw.exe, 00000001.00000002.1337098125.0000000005082000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s3.timeweb.cloud
Source: javaw.exe, 00000001.00000002.1337741540.000000000A424000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.0000000005082000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s3.timeweb.cloud/dfd5ba43-9bd2500b-6a85-46a4-9e9c-1edaaf0ff6b9/latest.jar
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B8FD00_2_004B8FD0
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: String function: 004BB758 appears 40 times
Source: classification engineClassification label: mal48.winEXE@6/3@1/1
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1F36 GetLastError,fprintf,FormatMessageA,fprintf,strcat,strcat,LocalFree,fprintf,ShellExecuteA,0_2_004B1F36
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B206E fprintf,FindResourceExA,LoadResource,LockResource,fprintf,SetLastError,fputs,0_2_004B206E
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SAMPLE_5.exe.bin.exeReversingLabs: Detection: 75%
Source: SAMPLE_5.exe.bin.exeVirustotal: Detection: 52%
Source: unknownProcess created: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1803 push edi; mov dword ptr [esp], ebx0_2_004B1842
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1803 push eax; mov dword ptr [esp], 00000000h0_2_004B1A6A
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1803 push ebx; mov dword ptr [esp], eax0_2_004B1AEB
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1803 push esi; mov dword ptr [esp], ebx0_2_004B1BC8
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004BE827 push esi; ret 0_2_004BE83A
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004BF96A push ebx; ret 0_2_004BF96B
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B15D0 push eax; mov dword ptr [esp], 00000000h0_2_004B16BB
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004BDB23 push es; iretd 0_2_004BDC34
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1F36 push ecx; mov dword ptr [esp], 004C9168h0_2_004B1FF7
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CD8EBB push es; retn 0001h1_2_02CD8FBF
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CDC24A push eax; ret 1_2_02CDC24D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CDC246 push eax; ret 1_2_02CDC249
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CDC9C8 pushad ; retf 1_2_02CDC9D5
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CDC9D7 pushad ; retf 1_2_02CDC9DD
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CDC1EC push eax; ret 1_2_02CDC245
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CE11F2 push esp; ret 1_2_02CE11F9
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02CDE548 push es; retn 0024h1_2_02CDE54B
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3D8F7 push 00000000h; mov dword ptr [esp], esp1_2_02C3D921
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3A20A push ecx; ret 1_2_02C3A21A
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3A21B push ecx; ret 1_2_02C3A225
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3B3B7 push 00000000h; mov dword ptr [esp], esp1_2_02C3B3DD
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3BB67 push 00000000h; mov dword ptr [esp], esp1_2_02C3BB8D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3D8E0 push 00000000h; mov dword ptr [esp], esp1_2_02C3D921
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3B947 push 00000000h; mov dword ptr [esp], esp1_2_02C3B96D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C3C477 push 00000000h; mov dword ptr [esp], esp1_2_02C3C49D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: javaw.exe, 00000001.00000003.1306657494.0000000015261000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: javaw.exe, 00000001.00000003.1306657494.0000000015261000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: javaw.exe, 00000001.00000002.1336306752.00000000011D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
Source: javaw.exe, 00000001.00000003.1306657494.0000000015261000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
Source: javaw.exe, 00000001.00000002.1336306752.00000000011D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
Source: javaw.exe, 00000001.00000003.1306657494.0000000015261000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
Source: javaw.exe, 00000001.00000002.1336306752.00000000011D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeCode function: 0_2_004B1180 SetUnhandledExceptionFilter,GetCommandLineA,_iob,_setmode,_setmode,_setmode,__p__fmode,__p__environ,_cexit,ExitProcess,__getmainargs,0_2_004B1180
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SAMPLE_5.exe.bin.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe "C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeCode function: 1_2_02C303C0 cpuid 1_2_02C303C0
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7192 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Services File Permissions Weakness
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Services File Permissions Weakness
1
Disable or Modify Tools
LSASS Memory22
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Services File Permissions Weakness
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589201 Sample: SAMPLE_5.exe.bin.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 48 18 s3.timeweb.cloud 2->18 22 Multi AV Scanner detection for submitted file 2->22 9 SAMPLE_5.exe.bin.exe 2->9         started        signatures3 process4 process5 11 javaw.exe 21 9->11         started        dnsIp6 20 s3.timeweb.cloud 217.78.234.243, 443, 49726 SKYLINEWIMAXRU Russian Federation 11->20 14 icacls.exe 1 11->14         started        process7 process8 16 conhost.exe 14->16         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SAMPLE_5.exe.bin.exe75%ReversingLabsWin32.Trojan.Generic
SAMPLE_5.exe.bin.exe53%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://repository.luxtrust.lu#0%Avira URL Cloudsafe
http://null.oracle.com/B0%Avira URL Cloudsafe
http://repository.swisssign.com/k0%Avira URL Cloudsafe
http://repository.swisssign.com/;0%Avira URL Cloudsafe
http://www.quovadis.bm#0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    s3.timeweb.cloud
    217.78.234.243
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.xrampsecurity.com/XGCA.crljavaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://crl.chambersign.org/chambersroot.crl0javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://repository.luxtrust.lu0javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://bugreport.sun.com/bugreport/javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://cps.chambersign.org/cps/chambersroot.html0javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://s3.timeweb.cloudjavaw.exe, 00000001.00000002.1337098125.0000000005082000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://java.oracle.com/javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A39A000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://null.oracle.com/javaw.exe, 00000001.00000002.1337741540.000000000A51A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1339127798.00000000154A8000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.chambersign.org1javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://repository.swisssign.com/0javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          HTTP://WWW.CHAMBERSIGN.ORGjavaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://policy.camerfirma.comjavaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://repository.luxtrust.lu#javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://ocsp.quovadisoffshore.comjavaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://crl.securetrust.com/STCA.crl0javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.quovadisglobal.com/cpsjavaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://cps.chambersign.org/cps/chambersroot.htmljavaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://repository.swisssign.com/;javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.quovadis.bm#javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://crl.securetrust.com/STCA.crljavaw.exe, 00000001.00000002.1337741540.000000000A51A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://repository.luxtrust.lujavaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.quovadisglobal.com/cps0javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://null.oracle.com/Bjavaw.exe, 00000001.00000002.1339127798.00000000154A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://crl.xrampsecurity.com/XGCA.crl0javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://s3.timeweb.cloud/dfd5ba43-9bd2500b-6a85-46a4-9e9c-1edaaf0ff6b9/latest.jarjavaw.exe, 00000001.00000002.1337741540.000000000A424000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.0000000005082000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://repository.swisssign.com/kjavaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.quovadis.bmjavaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.quovadis.bm0javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ocsp.quovadisoffshore.com0javaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.chambersign.org/chambersroot.crljavaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://repository.swisssign.com/javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.chambersign.orgjavaw.exe, 00000001.00000002.1337098125.0000000004E00000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://policy.camerfirma.com0javaw.exe, 00000001.00000002.1337098125.00000000052AB000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1339444828.00000000158F5000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000001.00000002.1337741540.000000000A5A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              217.78.234.243
                                                              s3.timeweb.cloudRussian Federation
                                                              197349SKYLINEWIMAXRUfalse
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1589201
                                                              Start date and time:2025-01-11 16:25:10 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 3m 4s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:5
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:SAMPLE_5.exe.bin.exe
                                                              Detection:MAL
                                                              Classification:mal48.winEXE@6/3@1/1
                                                              EGA Information:
                                                              • Successful, ratio: 50%
                                                              HCA Information:
                                                              • Successful, ratio: 90%
                                                              • Number of executed functions: 39
                                                              • Number of non-executed functions: 46
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Stop behavior analysis, all processes terminated
                                                              • Exclude process from analysis (whitelisted): dllhost.exe
                                                              • Excluded IPs from analysis (whitelisted): 13.107.246.45
                                                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
                                                              • Execution Graph export aborted for target javaw.exe, PID 7192 because it is empty
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                                              No simulations
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              217.78.234.243https://zapp-p.com/qouta/#test@test.comGet hashmaliciousUnknownBrowse
                                                                https://tas-pe.com/ahowe@europait.net#ahowe@europait.netGet hashmaliciousHTMLPhisherBrowse
                                                                  https://s3.timeweb.cloud/d2247a8d-ceb09c71-57ee-4411-a590-e4de8ca5cf86/Contract/contract.htm#andrew.wise@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    s-part-0017.t-0009.t-msedge.netdrW0xB3OBb.dllGet hashmaliciousUnknownBrowse
                                                                    • 13.107.246.45
                                                                    FEdTp2g4xD.exeGet hashmaliciousFormBookBrowse
                                                                    • 13.107.246.45
                                                                    305861283730376077.jsGet hashmaliciousStrela DownloaderBrowse
                                                                    • 13.107.246.45
                                                                    1274320496157183071.jsGet hashmaliciousStrela DownloaderBrowse
                                                                    • 13.107.246.45
                                                                    944924352317221058.jsGet hashmaliciousStrela DownloaderBrowse
                                                                    • 13.107.246.45
                                                                    kzQ25HVUbf.exeGet hashmaliciousLokibotBrowse
                                                                    • 13.107.246.45
                                                                    huuG7N3jOv.exeGet hashmaliciousFormBookBrowse
                                                                    • 13.107.246.45
                                                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 13.107.246.45
                                                                    4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 13.107.246.45
                                                                    Yv24LkKBY6.exeGet hashmaliciousUnknownBrowse
                                                                    • 13.107.246.45
                                                                    s3.timeweb.cloudSAMPLE_1.exe.bin.exeGet hashmaliciousSTRRATBrowse
                                                                    • 217.78.234.244
                                                                    https://s3.timeweb.cloud/8df544ea-67s89du678we90alkfdxzmndeoiewzxcfd/unlimitedscalabilitypossibilities%20/staff-payroll-review.html#sbarnes@clc.org.auGet hashmaliciousUnknownBrowse
                                                                    • 217.78.234.244
                                                                    https://zapp-p.com/qouta/#test@test.comGet hashmaliciousUnknownBrowse
                                                                    • 217.78.234.243
                                                                    https://tas-pe.com/ahowe@europait.net#ahowe@europait.netGet hashmaliciousHTMLPhisherBrowse
                                                                    • 217.78.234.243
                                                                    https://s3.timeweb.cloud/d2247a8d-ceb09c71-57ee-4411-a590-e4de8ca5cf86/Contract/contract.htm#andrew.wise@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                                    • 217.78.234.243
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    SKYLINEWIMAXRUSAMPLE_1.exe.bin.exeGet hashmaliciousSTRRATBrowse
                                                                    • 217.78.234.244
                                                                    mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    • 91.105.196.145
                                                                    https://s3.timeweb.cloud/8df544ea-67s89du678we90alkfdxzmndeoiewzxcfd/unlimitedscalabilitypossibilities%20/staff-payroll-review.html#sbarnes@clc.org.auGet hashmaliciousUnknownBrowse
                                                                    • 217.78.234.244
                                                                    https://zapp-p.com/qouta/#test@test.comGet hashmaliciousUnknownBrowse
                                                                    • 217.78.234.243
                                                                    https://tas-pe.com/ahowe@europait.net#ahowe@europait.netGet hashmaliciousHTMLPhisherBrowse
                                                                    • 217.78.234.243
                                                                    https://s3.timeweb.cloud/d2247a8d-ceb09c71-57ee-4411-a590-e4de8ca5cf86/Contract/contract.htm#andrew.wise@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                                    • 217.78.234.243
                                                                    http://storage.googleapis.com/dfg153erh35ef1gdr/dfgremjflmgr.html#file.html?cbbbbcccXBYFczBrVcdc9kc8cJhS7ckzFcbbbbcGet hashmaliciousUnknownBrowse
                                                                    • 217.78.233.205
                                                                    http://decreesling.comGet hashmaliciousUnknownBrowse
                                                                    • 217.78.233.53
                                                                    fps-booster.exeGet hashmaliciousStormKittyBrowse
                                                                    • 217.78.239.114
                                                                    gO6RAJaFXe.elfGet hashmaliciousMiraiBrowse
                                                                    • 91.105.196.153
                                                                    No context
                                                                    No context
                                                                    Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):52
                                                                    Entropy (8bit):4.7652629780816556
                                                                    Encrypted:false
                                                                    SSDEEP:3:oFj4I5vpm4USqv:oJ5bqv
                                                                    MD5:C4F25E2F0AED63D02A14C1CA6E509A1C
                                                                    SHA1:39C64A0BBC08770C7C80B124B2F2339740220DE8
                                                                    SHA-256:361E599E1C12BE96A67C017DF99199B94B44170E0F84570A47099F4612AD72FA
                                                                    SHA-512:FD722D24B91F372C1F9A38869C95F0CC18C502C4C772E363E3D3AE81CFD1E746168D4563C8B31A1C5CFA7198485F9F39C455D7415A14B4D2FDCBDED5D9AC69B3
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:C:\Program Files (x86)\Java\jre-1.8..1736609168836..
                                                                    Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):1.2856878153717106
                                                                    Encrypted:false
                                                                    SSDEEP:96:f/rrrd8GegqLZq5FuX6ohwOg4p/v2k3SCLHG1bowUt:f/Z8Geg4ZyFuX6H4ATuHGd
                                                                    MD5:722B89CFE25271A816F932B268B5B437
                                                                    SHA1:68ED6155919EF3648E71CCB245F4FD2CFF94CBC0
                                                                    SHA-256:8FEAB07D09C2DE3921E70E366FB77C797C9CDDA97A7B6D8940356682050BDC43
                                                                    SHA-512:8D9D7F18FDB01BF89C192BFF400790A8952F9CBA0D6251370FE6451915028714D9B441BC8FC5A8F99DAB2EEC1E4C6EFDA1101E209A4E1CA5F165BD529816CA2C
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:.........9......+.9..... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                    Process:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):45
                                                                    Entropy (8bit):0.9111711733157262
                                                                    Encrypted:false
                                                                    SSDEEP:3:/lwlt7n:WNn
                                                                    MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                                                    SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                                                    SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                                                    SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                                                    Malicious:false
                                                                    Reputation:high, very likely benign file
                                                                    Preview:........................................J2SE.
                                                                    File type:
                                                                    Entropy (8bit):6.384286201146826
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:SAMPLE_5.exe.bin.exe
                                                                    File size:69'878 bytes
                                                                    MD5:9257746613b453f9e58797bcdf604bf3
                                                                    SHA1:7105aa28f9d501b5ce04dbde25c9a98907ee6761
                                                                    SHA256:acaaf2f5f88f9d877d5a35f384bc8cb962561366007613aa3f91304ddbf77354
                                                                    SHA512:f14fc77098bbf08e9e455a90f631e3e464f842bdf35ad6f60ef9980ff0be85da28e2a564c9f6cc7557f3f6b77dc1ee69939a8f6ef3429b1d3f2a2070d5dd108a
                                                                    SSDEEP:1536:Hr3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/E0xEHc:L7PEg3qcv5PvB/EnHc
                                                                    TLSH:E2636D0AF607A0F6EF37513545CFE67F8638A612C421DD6AFF0E6B5AF9235426818213
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'..g...............".....R....................@.................................=G....@... ............................
                                                                    Icon Hash:90cececece8e8eb0
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 11, 2025 16:26:11.174632072 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:11.174669027 CET44349726217.78.234.243192.168.2.10
                                                                    Jan 11, 2025 16:26:11.174742937 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:11.281903982 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:11.281939983 CET44349726217.78.234.243192.168.2.10
                                                                    Jan 11, 2025 16:26:11.982682943 CET44349726217.78.234.243192.168.2.10
                                                                    Jan 11, 2025 16:26:11.982759953 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:12.002583981 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:12.002604961 CET44349726217.78.234.243192.168.2.10
                                                                    Jan 11, 2025 16:26:12.079730034 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:12.079742908 CET44349726217.78.234.243192.168.2.10
                                                                    Jan 11, 2025 16:26:12.080001116 CET49726443192.168.2.10217.78.234.243
                                                                    Jan 11, 2025 16:26:12.080045938 CET44349726217.78.234.243192.168.2.10
                                                                    Jan 11, 2025 16:26:12.080107927 CET49726443192.168.2.10217.78.234.243
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 11, 2025 16:26:11.164783001 CET5636953192.168.2.101.1.1.1
                                                                    Jan 11, 2025 16:26:11.171895027 CET53563691.1.1.1192.168.2.10
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 11, 2025 16:26:11.164783001 CET192.168.2.101.1.1.10xc4ebStandard query (0)s3.timeweb.cloudA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 11, 2025 16:26:05.483741999 CET1.1.1.1192.168.2.100x16bfNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                    Jan 11, 2025 16:26:05.483741999 CET1.1.1.1192.168.2.100x16bfNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 16:26:11.171895027 CET1.1.1.1192.168.2.100xc4ebNo error (0)s3.timeweb.cloud217.78.234.243A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 16:26:11.171895027 CET1.1.1.1192.168.2.100xc4ebNo error (0)s3.timeweb.cloud217.78.234.244A (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:10:26:08
                                                                    Start date:11/01/2025
                                                                    Path:C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"
                                                                    Imagebase:0x4b0000
                                                                    File size:69'878 bytes
                                                                    MD5 hash:9257746613B453F9E58797BCDF604BF3
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:10:26:08
                                                                    Start date:11/01/2025
                                                                    Path:C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"
                                                                    Imagebase:0x3f0000
                                                                    File size:257'664 bytes
                                                                    MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:10:26:08
                                                                    Start date:11/01/2025
                                                                    Path:C:\Windows\SysWOW64\icacls.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                                                    Imagebase:0xa60000
                                                                    File size:29'696 bytes
                                                                    MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:10:26:08
                                                                    Start date:11/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff620390000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:9.7%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:5.2%
                                                                      Total number of Nodes:1371
                                                                      Total number of Limit Nodes:40
                                                                      execution_graph 5784 4b5c4c 5785 4b5c50 5784->5785 5786 4b5c59 5785->5786 5787 4b5880 59 API calls 5785->5787 5790 4b59ac 5787->5790 5788 4b58db 5789 4b5d40 strlen 5791 4b5d55 5789->5791 5790->5788 5790->5789 5805 4b59dd 5790->5805 5792 4b5c1a free 5793 4b5c36 free 5792->5793 5792->5805 5794 4b63f0 11 API calls 5794->5805 5795 4b5a3f strlen 5795->5805 5796 4b5d16 _errno 5796->5805 5797 4b67a0 3 API calls 5797->5805 5798 4b5530 2 API calls 5798->5805 5799 4b5840 free 5799->5792 5800 4b5a91 strlen 5800->5805 5801 4b5c82 memcpy 5801->5805 5802 4b5ac1 memcpy strlen 5802->5805 5803 4b5b28 _strdup 5803->5805 5804 4b6640 7 API calls 5804->5805 5805->5791 5805->5792 5805->5794 5805->5795 5805->5796 5805->5797 5805->5798 5805->5799 5805->5800 5805->5801 5805->5802 5805->5803 5805->5804 5806 4b5b91 _stricoll 5805->5806 5807 4b5b70 strcoll 5805->5807 5806->5805 5808 4b5ba2 malloc 5806->5808 5807->5805 5807->5808 5808->5805 6188 4b16cc GetWindowThreadProcessId 6189 4b16f9 GetWindowLongA 6188->6189 6190 4b16f2 6188->6190 6189->6190 6191 4b1712 ShowWindow 6189->6191 6191->6190 6192 4b82cc 6194 4b82d8 6192->6194 6195 4b7040 6194->6195 6198 4b709e 6195->6198 6196 4b72ee 6197 4b71c3 6199 4b71e6 6197->6199 6203 4b6ba0 fputc 6197->6203 6198->6196 6200 4b6ba0 fputc 6198->6200 6202 4b719f 6198->6202 6199->6194 6200->6198 6201 4b6ba0 fputc 6201->6202 6202->6197 6202->6201 6203->6197 6344 4b754c 6345 4b7550 6344->6345 6347 4b7564 localeconv 6345->6347 6350 4b7434 6345->6350 6356 4b741b 6345->6356 6346 4b7440 6349 4b7466 6346->6349 6353 4b6ba0 fputc 6346->6353 6348 4b8ad0 7 API calls 6347->6348 6348->6356 6350->6346 6354 4b6ba0 fputc 6350->6354 6351 4b7428 6352 4b6ba0 fputc 6351->6352 6352->6350 6353->6346 6354->6350 6355 4b8e00 5 API calls 6355->6356 6356->6351 6356->6355 6357 4b74e3 6356->6357 6358 4b6ba0 fputc 6356->6358 6357->6350 6359 4b6ba0 fputc 6357->6359 6358->6356 6359->6357 5809 4b8640 5811 4b812c 5809->5811 5812 4b8090 5809->5812 5810 4b6ba0 fputc 5810->5812 5812->5810 5812->5811 6360 4b6947 6361 4b6970 6360->6361 6362 4b6a67 _errno 6360->6362 6368 4b67f0 6361->6368 6364 4b6978 6365 4b6a08 _findnext 6364->6365 6367 4b6a25 6364->6367 6366 4b69a0 strncpy 6365->6366 6365->6367 6366->6364 6366->6367 6369 4b6816 _errno 6368->6369 6370 4b6804 _findclose 6368->6370 6373 4b6821 6369->6373 6370->6369 6371 4b6830 _findfirst 6370->6371 6372 4b684d strncpy 6371->6372 6371->6373 6372->6364 6373->6364 6373->6371 6374 4ba945 6375 4ba950 InterlockedExchange 6374->6375 6376 4ba972 6375->6376 6377 4ba974 DeleteCriticalSection DeleteCriticalSection 6375->6377 5813 4b1059 5814 4b1060 5813->5814 5815 4b106e 5814->5815 5816 4b10ba signal 5814->5816 5817 4b1082 signal 5815->5817 5820 4b1050 5815->5820 5818 4b111f signal 5816->5818 5816->5820 5819 4b1140 signal 5817->5819 5817->5820 5818->5820 5819->5820 6500 4b4fd9 6501 4b4ff2 6500->6501 6502 4b5006 6501->6502 6504 4b5220 6501->6504 6505 4b522e 6504->6505 6506 4b5273 6504->6506 6509 4b5230 6505->6509 6510 4b5245 6505->6510 6507 4b527c 6506->6507 6508 4b5290 InitializeCriticalSection 6506->6508 6507->6502 6508->6507 6515 4b523e 6509->6515 6516 4b5080 EnterCriticalSection 6509->6516 6511 4b524e 6510->6511 6513 4b5080 4 API calls 6510->6513 6512 4b5258 DeleteCriticalSection 6511->6512 6511->6515 6512->6515 6513->6511 6515->6502 6517 4b50cc LeaveCriticalSection 6516->6517 6518 4b50a1 TlsGetValue GetLastError 6516->6518 6517->6515 6519 4b50b9 6518->6519 6519->6517 6519->6518 6204 4b5edc 6205 4b5ee0 _strdup 6204->6205 6207 4b5f1a 6205->6207 6378 4b7d5c 6379 4b7d6d 6378->6379 6380 4b6ba0 fputc 6379->6380 6381 4b7d90 6380->6381 6382 4b6ba0 fputc 6381->6382 6384 4b7da0 6382->6384 6383 4b7dd7 6386 4b6ba0 fputc 6383->6386 6385 4b6ba0 fputc 6384->6385 6391 4b7dcc 6384->6391 6385->6384 6387 4b7e9a 6386->6387 6388 4b6e20 fputc 6387->6388 6390 4b7eb2 6388->6390 6389 4b8e00 5 API calls 6389->6391 6391->6383 6391->6389 6392 4b6ba0 fputc 6391->6392 6392->6391 6393 4b855c 6394 4b6ba0 fputc 6393->6394 6395 4b856b 6394->6395 6395->6395 6520 4b7ddc 6528 4b7de0 6520->6528 6521 4b6ba0 fputc 6521->6528 6522 4b7e7d 6523 4b6ba0 fputc 6522->6523 6524 4b7e9a 6523->6524 6525 4b6e20 fputc 6524->6525 6526 4b7eb2 6525->6526 6527 4b8e00 5 API calls 6527->6528 6528->6521 6528->6522 6528->6527 6396 4ba950 InterlockedExchange 6397 4ba972 6396->6397 6398 4ba974 DeleteCriticalSection DeleteCriticalSection 6396->6398 6399 4b8150 6400 4b86a8 wcslen 6399->6400 6401 4b8162 6399->6401 6409 4b6c00 6400->6409 6402 4b816f strlen 6401->6402 6403 4b86cf 6401->6403 6405 4b6cf0 fputc 6402->6405 6407 4b8090 6405->6407 6406 4b6ba0 fputc 6406->6407 6407->6406 6408 4b812c 6407->6408 6410 4b8e00 5 API calls 6409->6410 6411 4b6c2b 6410->6411 6414 4b6ba0 fputc 6411->6414 6417 4b6c51 6411->6417 6412 4b6ca1 6413 4b6cba 6412->6413 6416 4b6ba0 fputc 6412->6416 6413->6403 6414->6411 6415 4b8e00 5 API calls 6415->6417 6416->6412 6417->6412 6417->6415 6418 4b6ba0 fputc 6417->6418 6418->6417 6529 4b15d0 6530 4b166f GetExitCodeProcess 6529->6530 6531 4b15e3 6529->6531 6534 4b1692 6530->6534 6535 4b16a4 KillTimer PostQuitMessage 6530->6535 6532 4b1648 6531->6532 6533 4b15ec ShowWindow 6531->6533 6532->6530 6537 4b1659 EnumWindows 6532->6537 6533->6530 6536 4b1616 6533->6536 6534->6535 6538 4b16c8 6534->6538 6535->6538 6536->6530 6539 4b161f KillTimer 6536->6539 6537->6530 6540 4b1f36 13 API calls 6539->6540 6541 4b1639 PostQuitMessage 6540->6541 6541->6530 5821 4b7869 5822 4b77d3 5821->5822 5833 4b6aa0 5822->5833 5825 4b7881 5862 4b6d90 5825->5862 5826 4b7826 5837 4b7310 5826->5837 5829 4b788e 5831 4b785a 5832 4b7834 5832->5831 5858 4b6ba0 5832->5858 5834 4b6ad6 5833->5834 5866 4b8fd0 5834->5866 5836 4b6b4c 5836->5825 5836->5826 5842 4b732e 5837->5842 5838 4b761a 5838->5832 5839 4b73e8 5840 4b6ba0 fputc 5839->5840 5846 4b7406 5839->5846 5840->5839 5841 4b6ba0 fputc 5841->5842 5842->5832 5842->5838 5842->5839 5842->5841 5842->5846 5843 4b7564 localeconv 5964 4b8ad0 setlocale strchr 5843->5964 5845 4b7466 5845->5832 5846->5843 5852 4b7434 5846->5852 5857 4b741b 5846->5857 5847 4b7428 5848 4b6ba0 fputc 5847->5848 5848->5852 5849 4b7440 5849->5845 5850 4b6ba0 fputc 5849->5850 5850->5849 5851 4b6ba0 fputc 5851->5852 5852->5849 5852->5851 5854 4b74e3 5854->5852 5856 4b6ba0 fputc 5854->5856 5855 4b6ba0 fputc 5855->5857 5856->5854 5857->5847 5857->5854 5857->5855 5959 4b8e00 setlocale strchr 5857->5959 5859 4b6bac 5858->5859 5860 4b6bb9 5859->5860 5861 4b6bd0 fputc 5859->5861 5860->5832 5861->5832 5863 4b6da2 5862->5863 5984 4b6cf0 5863->5984 5867 4b8ffc 5866->5867 5881 4b98e4 5866->5881 5868 4b90c8 5867->5868 5869 4b9003 5867->5869 5870 4b90f4 5867->5870 5871 4b9134 5867->5871 5919 4ba610 5868->5919 5906 4ba9a0 5869->5906 5870->5836 5873 4ba610 7 API calls 5870->5873 5872 4ba610 7 API calls 5871->5872 5876 4b9160 5872->5876 5877 4b912c 5873->5877 5876->5836 5877->5836 5878 4b9029 5879 4b90c0 5878->5879 5882 4b9168 5878->5882 5905 4b9322 5878->5905 5913 4baa70 5879->5913 5881->5836 5882->5881 5882->5905 5922 4ba5d0 5882->5922 5883 4baa70 6 API calls 5886 4b982e 5883->5886 5884 4baa70 6 API calls 5885 4b9856 5884->5885 5885->5836 5888 4baa70 6 API calls 5886->5888 5890 4b9842 5886->5890 5896 4b94aa 5886->5896 5887 4baa70 6 API calls 5887->5896 5888->5890 5890->5887 5891 4babc0 7 API calls 5891->5905 5892 4bad40 11 API calls 5892->5905 5894 4baa70 6 API calls 5894->5905 5895 4baed0 8 API calls 5895->5905 5896->5884 5897 4b975b 5897->5881 5930 4baae0 5897->5930 5899 4ba9a0 7 API calls 5900 4ba1d1 memcpy 5899->5900 5944 4baed0 5900->5944 5902 4b977f 5902->5881 5902->5883 5904 4baae0 9 API calls 5904->5905 5905->5881 5905->5891 5905->5892 5905->5894 5905->5895 5905->5896 5905->5897 5905->5899 5905->5902 5905->5904 5926 4babf0 5905->5926 5937 4bb030 5905->5937 5950 4ba880 5906->5950 5908 4ba9b3 5909 4ba9c3 5908->5909 5910 4ba9f9 malloc 5908->5910 5911 4ba9d5 LeaveCriticalSection 5909->5911 5912 4baa19 5909->5912 5910->5909 5910->5912 5911->5912 5912->5878 5914 4baa7e 5913->5914 5915 4baaa7 5913->5915 5916 4baa8b 5914->5916 5917 4ba880 5 API calls 5914->5917 5915->5868 5916->5915 5918 4baac0 LeaveCriticalSection 5916->5918 5917->5916 5918->5868 5920 4ba5d0 7 API calls 5919->5920 5921 4ba629 5920->5921 5921->5870 5923 4ba5df 5922->5923 5924 4ba9a0 7 API calls 5923->5924 5925 4ba5f8 5924->5925 5925->5905 5927 4bac09 5926->5927 5928 4ba9a0 7 API calls 5927->5928 5929 4bac30 5928->5929 5929->5905 5929->5929 5932 4bab13 5930->5932 5931 4bab4a 5931->5902 5932->5931 5933 4ba9a0 7 API calls 5932->5933 5934 4bab78 5933->5934 5934->5931 5935 4bab7e memcpy 5934->5935 5936 4baa70 6 API calls 5935->5936 5936->5931 5938 4bb04b 5937->5938 5939 4bb053 5938->5939 5940 4bb172 5938->5940 5942 4ba9a0 7 API calls 5939->5942 5943 4bb066 5939->5943 5941 4ba9a0 7 API calls 5940->5941 5941->5943 5942->5943 5943->5905 5945 4baefc 5944->5945 5946 4ba9a0 7 API calls 5945->5946 5947 4baf11 5946->5947 5947->5947 5948 4baa70 6 API calls 5947->5948 5949 4bafbc 5947->5949 5948->5949 5949->5905 5951 4ba913 EnterCriticalSection 5950->5951 5952 4ba894 5950->5952 5951->5908 5953 4ba8af 5952->5953 5954 4ba8c4 InterlockedExchange 5952->5954 5955 4ba8a0 Sleep 5953->5955 5958 4ba8ba 5953->5958 5954->5953 5956 4ba8df InitializeCriticalSection InitializeCriticalSection 5954->5956 5955->5953 5956->5958 5957 4ba8bf 5957->5908 5958->5951 5958->5957 5960 4b8e48 atoi 5959->5960 5961 4b8e55 5959->5961 5960->5961 5969 4b8d70 5961->5969 5963 4b8e6c 5963->5857 5965 4b8b1f atoi 5964->5965 5966 4b8b2c 5964->5966 5965->5966 5974 4b8950 5966->5974 5968 4b8b5a 5968->5857 5970 4b8d96 WideCharToMultiByte 5969->5970 5971 4b8d84 5969->5971 5970->5971 5973 4b8de7 _errno 5970->5973 5972 4b8d8a 5971->5972 5971->5973 5972->5963 5973->5963 5975 4b8a07 5974->5975 5976 4b8966 5974->5976 5975->5968 5976->5975 5977 4b8a00 5976->5977 5978 4b8997 IsDBCSLeadByteEx 5976->5978 5981 4b89ad 5976->5981 5977->5975 5979 4b8a57 MultiByteToWideChar 5977->5979 5978->5977 5978->5981 5979->5975 5980 4b8aa7 _errno 5979->5980 5980->5975 5981->5975 5982 4b89d2 MultiByteToWideChar 5981->5982 5982->5980 5983 4b89f0 5982->5983 5983->5968 5985 4b6d00 5984->5985 5988 4b6d3a 5985->5988 5990 4b6ba0 fputc 5985->5990 5986 4b6d53 5987 4b6d79 5986->5987 5989 4b6ba0 fputc 5986->5989 5987->5829 5988->5986 5991 4b6ba0 fputc 5988->5991 5989->5986 5990->5985 5991->5988 6208 4bbae9 6209 4bba90 GetModuleHandleA 6208->6209 6211 4b1803 262 API calls 6209->6211 6212 4bbadb 6211->6212 6419 4baf69 6420 4baf70 6419->6420 6421 4baa70 6 API calls 6420->6421 6422 4bafbc 6421->6422 5992 4b5c6c 5998 4b5900 5992->5998 5993 4b5c7d 5994 4b593c strlen 5993->5994 5999 4b5954 5994->5999 5995 4b5c50 5996 4b5c59 5995->5996 5997 4b5880 59 API calls 5995->5997 6003 4b59ac 5997->6003 5998->5993 5998->5994 5998->5995 6001 4b5989 _strdup 5999->6001 6000 4b58db 6001->6000 6004 4b59a2 6001->6004 6002 4b5d40 strlen 6006 4b5d55 6002->6006 6003->6000 6003->6002 6020 4b59dd 6003->6020 6005 4b57b0 realloc 6004->6005 6005->6003 6007 4b5c1a free 6008 4b5c36 free 6007->6008 6007->6020 6009 4b63f0 11 API calls 6009->6020 6010 4b5a3f strlen 6010->6020 6011 4b5d16 _errno 6011->6020 6012 4b6640 7 API calls 6012->6020 6013 4b67a0 3 API calls 6013->6020 6014 4b5530 2 API calls 6014->6020 6015 4b5840 free 6015->6007 6016 4b5a91 strlen 6016->6020 6017 4b5c82 memcpy 6017->6020 6018 4b5ac1 memcpy strlen 6018->6020 6019 4b5b28 _strdup 6019->6020 6020->6006 6020->6007 6020->6009 6020->6010 6020->6011 6020->6012 6020->6013 6020->6014 6020->6015 6020->6016 6020->6017 6020->6018 6020->6019 6021 4b5b91 _stricoll 6020->6021 6022 4b5b70 strcoll 6020->6022 6021->6020 6023 4b5ba2 malloc 6021->6023 6022->6020 6022->6023 6023->6020 6423 4b156c __set_app_type 6424 4b1180 349 API calls 6423->6424 6425 4b1585 6424->6425 6426 4b8f6c 6427 4b8f70 6426->6427 6428 4b8f23 6427->6428 6429 4b8d70 2 API calls 6427->6429 6429->6427 6542 4b79ec 6543 4b79f0 6542->6543 6544 4b6d90 fputc 6543->6544 6545 4b79a4 6544->6545 6213 4b50e2 6214 4b50f0 6213->6214 6215 4b5103 6214->6215 6216 4b5110 calloc 6214->6216 6216->6215 6217 4b512a EnterCriticalSection LeaveCriticalSection 6216->6217 6430 4b8b61 6431 4b8b70 setlocale strchr 6430->6431 6432 4b8bc7 atoi 6431->6432 6433 4b8bd6 6431->6433 6432->6433 6434 4b8c4f 6433->6434 6437 4b8c67 6433->6437 6438 4b8bf7 6433->6438 6435 4b8950 4 API calls 6435->6437 6436 4b8950 4 API calls 6436->6438 6437->6434 6437->6435 6438->6434 6438->6436 6218 4b8ce0 setlocale strchr 6219 4b8d2e 6218->6219 6220 4b8d21 atoi 6218->6220 6221 4b8950 4 API calls 6219->6221 6220->6219 6222 4b8d60 6221->6222 6439 4b5760 6440 4b5799 free 6439->6440 6441 4b577c 6439->6441 6442 4b5780 free 6441->6442 6442->6440 6442->6442 6024 4b8e79 setlocale strchr 6025 4b8ec2 6024->6025 6026 4b8eb5 atoi 6024->6026 6027 4b8fa7 6025->6027 6028 4b8f57 6025->6028 6029 4b8ee1 6025->6029 6026->6025 6030 4b8d70 2 API calls 6028->6030 6032 4b8f23 6028->6032 6031 4b8d70 2 API calls 6029->6031 6029->6032 6030->6028 6031->6029 6033 4b107c 6034 4b1080 signal 6033->6034 6036 4b1140 signal 6034->6036 6037 4b1050 6034->6037 6036->6037 6038 4b627c 6039 4b620d 6038->6039 6039->6039 6040 4b6233 wcstombs 6039->6040 6041 4b6253 6040->6041 6042 4b6257 setlocale free 6040->6042 6041->6042 6242 4b90fc 6243 4b9100 6242->6243 6244 4ba610 7 API calls 6243->6244 6245 4b912c 6244->6245 6246 4b80fc 6248 4b8090 6246->6248 6247 4b6ba0 fputc 6247->6248 6248->6247 6249 4b812c 6248->6249 6250 4b5afc 6255 4b5a18 6250->6255 6251 4b5b28 _strdup 6251->6255 6252 4b5d99 6253 4b5b91 _stricoll 6253->6255 6256 4b5ba2 malloc 6253->6256 6254 4b5b70 strcoll 6254->6255 6254->6256 6255->6251 6255->6252 6255->6253 6255->6254 6257 4b5c1a free 6255->6257 6258 4b5d16 _errno 6255->6258 6260 4b63f0 11 API calls 6255->6260 6261 4b5530 2 API calls 6255->6261 6262 4b67a0 3 API calls 6255->6262 6263 4b6640 7 API calls 6255->6263 6264 4b5a91 strlen 6255->6264 6265 4b5a3f strlen 6255->6265 6266 4b5840 free 6255->6266 6267 4b5c82 memcpy 6255->6267 6268 4b5ac1 memcpy strlen 6255->6268 6256->6255 6257->6255 6259 4b5c36 free 6257->6259 6258->6255 6260->6255 6261->6255 6262->6255 6263->6255 6264->6255 6265->6255 6266->6257 6267->6255 6268->6255 6443 4b837c 6444 4b8393 6443->6444 6448 4b83a7 6443->6448 6449 4b7710 6444->6449 6445 4b7710 26 API calls 6447 4b85b0 6445->6447 6447->6447 6448->6445 6450 4b771e 6449->6450 6451 4b6aa0 12 API calls 6450->6451 6452 4b7766 6451->6452 6453 4b77a0 6452->6453 6454 4b7774 6452->6454 6456 4b6d90 fputc 6453->6456 6455 4b7640 14 API calls 6454->6455 6458 4b7782 6455->6458 6457 4b77ad 6456->6457 6457->6448 6458->6448 6552 4b89fc 6553 4b8a00 6552->6553 6554 4b8a57 MultiByteToWideChar 6553->6554 6555 4b8a07 6553->6555 6554->6555 6556 4b8aa7 _errno 6554->6556 6556->6555 6269 4b50f0 6270 4b5103 6269->6270 6271 4b5110 calloc 6269->6271 6271->6270 6272 4b512a EnterCriticalSection LeaveCriticalSection 6271->6272 6043 4b8274 6044 4b8287 6043->6044 6047 4b829b 6043->6047 6049 4b78a0 6044->6049 6046 4b78a0 28 API calls 6048 4b84b0 6046->6048 6047->6046 6048->6048 6050 4b78b3 6049->6050 6065 4b793b 6049->6065 6051 4b7994 6050->6051 6052 4b6aa0 12 API calls 6050->6052 6067 4b7640 6051->6067 6053 4b78fe 6052->6053 6054 4b79f0 6053->6054 6055 4b7910 6053->6055 6057 4b6d90 fputc 6054->6057 6059 4b7980 6055->6059 6062 4b791c 6055->6062 6056 4b7310 14 API calls 6060 4b794b 6056->6060 6066 4b7971 6057->6066 6059->6051 6061 4b7986 strlen 6059->6061 6064 4b6ba0 fputc 6060->6064 6060->6066 6061->6051 6063 4b7926 strlen 6062->6063 6062->6065 6063->6065 6064->6060 6065->6056 6066->6047 6068 4b767b 6067->6068 6069 4b7310 14 API calls 6068->6069 6070 4b76c2 6069->6070 6071 4b6ba0 fputc 6070->6071 6072 4b76e3 6071->6072 6075 4b6e20 6072->6075 6076 4b6e55 6075->6076 6080 4b6ba0 fputc 6076->6080 6081 4b6f5f 6076->6081 6077 4b6f85 6078 4b6fab 6077->6078 6082 4b6ba0 fputc 6077->6082 6078->6066 6079 4b6ba0 fputc 6079->6081 6080->6076 6081->6077 6081->6079 6082->6077 6459 4b7309 6465 4b7310 6459->6465 6460 4b761a 6461 4b73e8 6463 4b6ba0 fputc 6461->6463 6469 4b7406 6461->6469 6462 4b6ba0 fputc 6462->6465 6463->6461 6464 4b7440 6468 4b7466 6464->6468 6473 4b6ba0 fputc 6464->6473 6465->6460 6465->6461 6465->6462 6465->6469 6466 4b7564 localeconv 6467 4b8ad0 7 API calls 6466->6467 6476 4b741b 6467->6476 6469->6466 6470 4b7434 6469->6470 6469->6476 6470->6464 6474 4b6ba0 fputc 6470->6474 6471 4b7428 6472 4b6ba0 fputc 6471->6472 6472->6470 6473->6464 6474->6470 6475 4b8e00 5 API calls 6475->6476 6476->6471 6476->6475 6477 4b74e3 6476->6477 6478 4b6ba0 fputc 6476->6478 6477->6470 6479 4b6ba0 fputc 6477->6479 6478->6476 6479->6477 6557 4b8189 6558 4b81aa 6557->6558 6559 4b81c5 6557->6559 6560 4b6cf0 fputc 6558->6560 6561 4b6c00 6 API calls 6559->6561 6560->6559 6562 4b85dc 6561->6562 6562->6562 6104 4b600c 6105 4b6010 mbstowcs 6104->6105 6107 4b607c 6105->6107 6106 4b6039 mbstowcs 6106->6107 6107->6106 6108 4b5f9d wcstombs realloc wcstombs setlocale free 6107->6108 6110 4b60ad 6107->6110 6114 4b6253 6107->6114 6108->6105 6109 4b6257 setlocale free 6111 4b6103 wcstombs realloc wcstombs 6110->6111 6115 4b6179 6110->6115 6111->6109 6113 4b6233 wcstombs 6113->6109 6113->6114 6114->6109 6115->6113 6115->6115 6116 4b720c 6117 4b7210 6116->6117 6118 4b6ba0 fputc 6117->6118 6120 4b719f 6117->6120 6118->6117 6119 4b71c3 6121 4b71e6 6119->6121 6123 4b6ba0 fputc 6119->6123 6120->6119 6122 4b6ba0 fputc 6120->6122 6122->6120 6123->6119 6480 4b510c 6481 4b5110 calloc 6480->6481 6482 4b512a EnterCriticalSection LeaveCriticalSection 6481->6482 6483 4b5103 6481->6483 6124 4b1000 6125 4b1013 6124->6125 6126 4b1060 6124->6126 6127 4b106e 6125->6127 6128 4b101a 6125->6128 6126->6127 6129 4b10ba signal 6126->6129 6130 4b1082 signal 6127->6130 6136 4b1042 6127->6136 6131 4b10b3 6128->6131 6132 4b1025 signal 6128->6132 6133 4b111f signal 6129->6133 6129->6136 6134 4b1140 signal 6130->6134 6130->6136 6131->6129 6131->6136 6135 4b1103 signal 6132->6135 6132->6136 6133->6136 6134->6136 6135->6136 6563 4b5180 6564 4b5193 6563->6564 6565 4b51a0 EnterCriticalSection 6563->6565 6566 4b51d0 LeaveCriticalSection 6565->6566 6567 4b51b9 6565->6567 6569 4b51df 6566->6569 6567->6566 6568 4b51bf free LeaveCriticalSection 6567->6568 6568->6569 6273 4b5699 6274 4b5549 6273->6274 6275 4b55e8 6274->6275 6277 4b55b2 tolower tolower 6274->6277 6278 4b55d6 6274->6278 6276 4b5530 2 API calls 6275->6276 6275->6278 6276->6275 6277->6274 6279 4bb299 6280 4ba9a0 7 API calls 6279->6280 6281 4bb2bb 6280->6281 6484 4b8318 6485 4b8408 6484->6485 6486 4b8325 6484->6486 6486->6485 6487 4b7040 fputc 6486->6487 6489 4b8377 6486->6489 6487->6489 6488 4b6e20 fputc 6488->6485 6489->6488 5012 4b1590 __set_app_type 5015 4b1180 5012->5015 5016 4b11ae SetUnhandledExceptionFilter 5015->5016 5017 4b1192 5015->5017 5018 4b11c2 5016->5018 5017->5016 5019 4b1511 __getmainargs 5018->5019 5020 4b11d4 GetCommandLineA 5018->5020 5021 4b11f5 5019->5021 5020->5021 5021->5021 5022 4b1422 5021->5022 5023 4b137a 5021->5023 5032 4b5e70 5021->5032 5025 4b13d8 __p__fmode 5023->5025 5026 4b1396 _setmode _setmode _setmode 5023->5026 5044 4b4cd0 5025->5044 5026->5025 5028 4b13ea 5029 4b13f2 __p__environ 5028->5029 5059 4bba30 5029->5059 5033 4b5e87 5032->5033 5034 4b5e94 5032->5034 5107 4b54d0 5033->5107 5066 4b5880 strlen 5034->5066 5038 4b5ea4 5039 4b5eab 5038->5039 5040 4b5ebb strlen 5038->5040 5039->5023 5041 4b5ed1 5040->5041 5042 4b5f08 _strdup 5041->5042 5043 4b5f1a 5042->5043 5043->5023 5045 4b4cd9 5044->5045 5047 4b4ce0 5044->5047 5045->5028 5046 4b4da0 5048 4b4ddf 5046->5048 5054 4b4d9c 5046->5054 5047->5045 5047->5046 5049 4b4e97 5047->5049 5050 4b4d45 5047->5050 5048->5028 5051 4b4b90 13 API calls 5049->5051 5050->5048 5058 4b4d54 5050->5058 5053 4b4ea7 5051->5053 5054->5046 5054->5048 5187 4b4be0 VirtualQuery 5054->5187 5055 4b4be0 13 API calls 5055->5058 5056 4b4d84 5165 4b4b90 fwrite vfprintf abort 5056->5165 5058->5050 5058->5055 5058->5056 5208 4b4b60 5059->5208 5061 4bba48 GetCommandLineA GetStartupInfoA 5065 4bba61 GetModuleHandleA 5061->5065 5210 4b1803 5065->5210 5110 4bb3d0 5066->5110 5068 4b58a7 memcpy 5112 4b5f50 setlocale 5068->5112 5070 4b58c5 5071 4b54d0 malloc 5070->5071 5072 4b58d7 5071->5072 5073 4b58db 5072->5073 5074 4b593c strlen 5072->5074 5075 4b58ea 5072->5075 5073->5038 5077 4b5954 5074->5077 5075->5074 5076 4b5c50 5075->5076 5079 4b5c7d 5075->5079 5078 4b5c59 5076->5078 5081 4b5880 42 API calls 5076->5081 5080 4b5989 _strdup 5077->5080 5078->5038 5079->5074 5080->5073 5082 4b59a2 5080->5082 5084 4b5df9 5081->5084 5156 4b57b0 realloc 5082->5156 5086 4b59ac 5084->5086 5085 4b5d40 strlen 5087 4b5d55 5085->5087 5086->5073 5086->5085 5094 4b59dd 5086->5094 5087->5038 5088 4b5c1a free 5089 4b5c36 free 5088->5089 5088->5094 5089->5038 5091 4b5a3f strlen 5091->5094 5092 4b5d16 _errno 5106 4b5a70 5092->5106 5094->5087 5094->5088 5094->5091 5094->5106 5126 4b63f0 5094->5126 5141 4b6640 5094->5141 5151 4b67a0 5094->5151 5098 4b5a91 strlen 5098->5106 5099 4b5c82 memcpy 5099->5106 5100 4b5ac1 memcpy strlen 5100->5106 5101 4b5b28 _strdup 5101->5106 5102 4b6640 7 API calls 5102->5106 5103 4b5b91 _stricoll 5105 4b5ba2 malloc 5103->5105 5103->5106 5104 4b5b70 strcoll 5104->5105 5104->5106 5105->5106 5106->5087 5106->5088 5106->5092 5106->5094 5106->5098 5106->5099 5106->5100 5106->5101 5106->5102 5106->5103 5106->5104 5158 4b5530 5106->5158 5162 4b5840 5106->5162 5108 4b54dd malloc 5107->5108 5109 4b5500 5107->5109 5108->5109 5109->5034 5111 4bb3dd 5110->5111 5111->5068 5111->5111 5113 4b5f80 setlocale 5112->5113 5114 4b5f76 _strdup 5112->5114 5115 4b5f98 5113->5115 5116 4b5f9d wcstombs realloc wcstombs setlocale free 5113->5116 5114->5113 5115->5116 5117 4b6010 mbstowcs 5115->5117 5118 4b6039 mbstowcs 5115->5118 5119 4b6253 5115->5119 5121 4b60ad 5115->5121 5116->5070 5116->5117 5117->5115 5118->5115 5120 4b6257 setlocale free 5119->5120 5120->5070 5122 4b6103 wcstombs realloc wcstombs 5121->5122 5125 4b6179 5121->5125 5122->5120 5124 4b6233 wcstombs 5124->5119 5124->5120 5125->5124 5125->5125 5127 4b6409 5126->5127 5128 4b6622 _errno 5126->5128 5129 4b6412 _fullpath 5127->5129 5130 4b65f1 _errno 5127->5130 5131 4b653f 5128->5131 5132 4b6437 5129->5132 5130->5131 5131->5094 5132->5132 5133 4b6467 malloc 5132->5133 5134 4b6595 5132->5134 5135 4b6488 memcpy _findfirst 5133->5135 5136 4b6610 _errno 5133->5136 5138 4b65c0 _errno 5134->5138 5137 4b64bf strncpy 5135->5137 5135->5138 5136->5131 5137->5131 5139 4b6603 _errno 5138->5139 5140 4b65e2 free 5138->5140 5139->5140 5140->5131 5142 4b6659 5141->5142 5143 4b678d _errno 5141->5143 5144 4b66eb strlen 5142->5144 5145 4b666f _errno _findnext 5142->5145 5147 4b66ff 5143->5147 5144->5147 5146 4b6697 strncpy 5145->5146 5150 4b6728 5145->5150 5146->5144 5148 4b675f GetLastError 5146->5148 5147->5094 5148->5147 5149 4b676b _errno 5148->5149 5149->5147 5150->5148 5152 4b67ad _findclose 5151->5152 5153 4b67d1 _errno 5151->5153 5152->5153 5154 4b67c1 free 5152->5154 5155 4b67c9 5153->5155 5154->5155 5155->5106 5157 4b57dc 5156->5157 5157->5086 5159 4b5546 5158->5159 5160 4b55b2 tolower tolower 5159->5160 5161 4b55d6 5159->5161 5160->5159 5161->5106 5164 4b584f 5162->5164 5163 4b586c free 5163->5088 5164->5163 5166 4b4be0 VirtualQuery 5165->5166 5167 4b4cab 5166->5167 5168 4b4c11 5166->5168 5170 4b4b90 5 API calls 5167->5170 5169 4b4c19 memcpy 5168->5169 5172 4b4c36 VirtualProtect memcpy 5168->5172 5171 4b4c29 5169->5171 5176 4b4cc3 5170->5176 5171->5054 5172->5171 5173 4b4c7b 5172->5173 5173->5171 5174 4b4c80 VirtualProtect 5173->5174 5174->5054 5175 4b4cd9 5175->5054 5176->5175 5178 4b4e97 5176->5178 5179 4b4d9c 5176->5179 5184 4b4d45 5176->5184 5177 4b4ddf 5177->5054 5180 4b4b90 5 API calls 5178->5180 5179->5177 5181 4b4be0 5 API calls 5179->5181 5182 4b4ea7 5180->5182 5181->5179 5183 4b4be0 VirtualQuery memcpy VirtualProtect memcpy VirtualProtect 5183->5184 5184->5177 5184->5183 5185 4b4d84 5184->5185 5186 4b4b90 5 API calls 5185->5186 5186->5179 5188 4b4cab 5187->5188 5189 4b4c11 5187->5189 5191 4b4b90 8 API calls 5188->5191 5190 4b4c19 memcpy 5189->5190 5193 4b4c36 VirtualProtect memcpy 5189->5193 5192 4b4c29 5190->5192 5197 4b4cc3 5191->5197 5192->5054 5193->5192 5194 4b4c7b 5193->5194 5194->5192 5195 4b4c80 VirtualProtect 5194->5195 5195->5054 5196 4b4cd9 5196->5054 5197->5196 5198 4b4d9c 5197->5198 5200 4b4e97 5197->5200 5205 4b4d45 5197->5205 5199 4b4ddf 5198->5199 5202 4b4be0 8 API calls 5198->5202 5199->5054 5201 4b4b90 8 API calls 5200->5201 5203 4b4ea7 5201->5203 5202->5198 5204 4b4be0 8 API calls 5204->5205 5205->5199 5205->5204 5206 4b4d84 5205->5206 5207 4b4b90 8 API calls 5206->5207 5207->5198 5209 4b4b10 5208->5209 5209->5061 5263 4b4890 5210->5263 5213 4b185a 5216 4b1b35 5213->5216 5315 4b2168 5213->5315 5214 4b1829 5326 4b173c 5214->5326 5349 4b1f36 GetLastError 5216->5349 5221 4b1850 5223 4b1413 _cexit ExitProcess 5221->5223 5222 4b186d 5224 4b188a 5222->5224 5225 4b1873 strstr 5222->5225 5226 4b2168 8 API calls 5224->5226 5225->5224 5227 4b189c 5226->5227 5228 4b18d3 5227->5228 5229 4b2168 8 API calls 5227->5229 5230 4b18ea CreateWindowExA 5228->5230 5250 4b1af4 5228->5250 5231 4b18b6 5229->5231 5232 4b195f 5230->5232 5230->5250 5231->5228 5233 4b18bc strstr 5231->5233 5337 4b206e 5232->5337 5233->5228 5235 4b1b09 SetTimer 5235->5216 5235->5250 5237 4b1982 atoi 5238 4b19a1 5237->5238 5240 4b2168 8 API calls 5238->5240 5241 4b19bc 5240->5241 5242 4b19d9 5241->5242 5243 4b19c2 strstr 5241->5243 5245 4b2168 8 API calls 5242->5245 5243->5242 5244 4b1b98 GetMessageA 5247 4b1bbf TranslateMessage DispatchMessageA 5244->5247 5244->5250 5246 4b19eb LoadImageA 5245->5246 5246->5216 5249 4b1a2b 7 API calls 5246->5249 5247->5244 5248 4b1b6e 5252 4b1b87 5248->5252 5253 4b1b77 fputs 5248->5253 5249->5250 5250->5216 5250->5235 5250->5244 5250->5248 5251 4b1be6 5250->5251 5318 4b3a11 5250->5318 5251->5250 5257 4b1bef fprintf 5251->5257 5259 4b1c1e 5251->5259 5364 4b39ed CloseHandle CloseHandle 5251->5364 5363 4b39ed CloseHandle CloseHandle 5252->5363 5253->5252 5256 4b1b8c 5258 4b1d21 fclose 5256->5258 5257->5251 5258->5221 5260 4b1c41 5259->5260 5261 4b1c27 fprintf 5259->5261 5262 4b1d21 fclose 5260->5262 5261->5260 5262->5221 5264 4b48a0 5263->5264 5365 4b1c58 GetModuleHandleA 5264->5365 5267 4b1822 5267->5213 5267->5214 5272 4b48fd fprintf 5273 4b4925 5272->5273 5387 4b1e4d GetModuleHandleA GetProcAddress 5273->5387 5276 4b206e 7 API calls 5277 4b493e 5276->5277 5278 4b206e 7 API calls 5277->5278 5279 4b4952 5278->5279 5280 4b206e 7 API calls 5279->5280 5281 4b4966 5280->5281 5282 4b496c 5281->5282 5283 4b4996 5281->5283 5282->5267 5284 4b4979 fprintf 5282->5284 5392 4b3001 5283->5392 5284->5267 5296 4b49f3 5458 4b2629 5296->5458 5316 4b206e 7 API calls 5315->5316 5317 4b218d strcmp 5316->5317 5317->5222 5319 4bb3d0 5318->5319 5320 4b3a21 strcpy strcat strcat strcat CreateProcessA 5319->5320 5321 4b3af2 5320->5321 5322 4b3b29 5320->5322 5321->5322 5323 4b3af8 WaitForSingleObject GetExitCodeProcess 5321->5323 5322->5250 5776 4b39ed CloseHandle CloseHandle 5323->5776 5325 4b3b27 5325->5322 5327 4b206e 7 API calls 5326->5327 5328 4b176d 5327->5328 5329 4b1778 FindWindowExA 5328->5329 5330 4b1771 ShowWindow SetForegroundWindow 5328->5330 5331 4b17a7 5329->5331 5334 4b1d21 5330->5334 5331->5330 5332 4b17ab GetWindowTextA strstr 5331->5332 5332->5330 5333 4b17d2 FindWindowExA 5332->5333 5333->5331 5335 4b1d2a fclose 5334->5335 5336 4b1d39 5334->5336 5335->5336 5336->5221 5338 4b20a2 FindResourceExA 5337->5338 5339 4b2085 5337->5339 5341 4b212b SetLastError 5338->5341 5342 4b20cd LoadResource 5338->5342 5339->5338 5340 4b208e fprintf 5339->5340 5340->5338 5343 4b213b 5341->5343 5342->5343 5344 4b20e4 LockResource 5342->5344 5345 4b197e 5343->5345 5346 4b214f fputs 5343->5346 5344->5343 5347 4b20f1 5344->5347 5345->5237 5345->5238 5346->5345 5347->5345 5348 4b2115 fprintf 5347->5348 5348->5345 5350 4b1f4d fprintf 5349->5350 5351 4b1f65 5349->5351 5350->5351 5352 4b1f6d FormatMessageA 5351->5352 5353 4b1ff7 5351->5353 5354 4b1fb0 fprintf 5352->5354 5355 4b1fc7 strcat strcat LocalFree 5352->5355 5777 4b1ed3 5353->5777 5354->5355 5355->5353 5358 4b2064 5361 4b1d21 fclose 5358->5361 5359 4b202d ShellExecuteA 5359->5358 5360 4b2015 fprintf 5360->5359 5362 4b2069 5361->5362 5362->5221 5363->5256 5364->5251 5366 4b1cbf 5365->5366 5367 4b1c7c strcpy 5365->5367 5366->5267 5368 4b25a0 GetModuleFileNameA 5366->5368 5367->5366 5369 4b25ca strrchr 5368->5369 5370 4b25de 5368->5370 5369->5370 5370->5267 5371 4b1d3a 5370->5371 5372 4bb3d0 5371->5372 5373 4b1d4a GetEnvironmentVariableA strstr 5372->5373 5374 4b1daa 5373->5374 5375 4b1d96 strstr 5373->5375 5536 4b1cc3 strncpy strcat fopen 5374->5536 5375->5374 5376 4b1df8 5375->5376 5378 4b1e19 5376->5378 5379 4b1e01 fprintf 5376->5379 5381 4b1e22 fprintf 5378->5381 5386 4b1e40 5378->5386 5379->5378 5380 4b1db9 5382 4b1e3c 5380->5382 5383 4b1dc2 strstr 5380->5383 5381->5386 5382->5386 5384 4b1ddb strstr 5383->5384 5385 4b1df2 5383->5385 5384->5385 5385->5376 5386->5267 5386->5272 5386->5273 5388 4b1e79 GetCurrentProcess 5387->5388 5389 4b1e8b 5387->5389 5388->5389 5390 4b1ebf 5389->5390 5391 4b1e97 fprintf 5389->5391 5390->5276 5391->5390 5393 4b206e 7 API calls 5392->5393 5394 4b3030 5393->5394 5395 4b30ce 5394->5395 5396 4b3042 5394->5396 5395->5267 5402 4b30d5 GetCurrentDirectoryA 5395->5402 5397 4b304b fprintf 5396->5397 5398 4b305f CreateMutexA GetLastError 5396->5398 5397->5398 5398->5395 5399 4b30ab 5398->5399 5400 4b30cc 5399->5400 5401 4b30b4 fprintf 5399->5401 5400->5395 5401->5400 5403 4b206e 7 API calls 5402->5403 5404 4b312b 5403->5404 5405 4b312f strncpy 5404->5405 5406 4b3176 5404->5406 5537 4b25e6 5405->5537 5410 4b4726 5406->5410 5411 4b474f 5410->5411 5412 4b4736 5410->5412 5414 4b2168 8 API calls 5411->5414 5412->5411 5413 4b473f fputs 5412->5413 5413->5411 5415 4b475b 5414->5415 5416 4b476a fprintf 5415->5416 5417 4b478d 5415->5417 5416->5417 5418 4b2168 8 API calls 5417->5418 5419 4b4799 5418->5419 5420 4b47cb 5419->5420 5421 4b47a8 fprintf 5419->5421 5422 4b206e 7 API calls 5420->5422 5421->5420 5423 4b47df 5422->5423 5540 4b23b8 strcpy 5423->5540 5426 4b47fc fprintf 5427 4b4814 5426->5427 5428 4b206e 7 API calls 5427->5428 5429 4b4828 5428->5429 5430 4b23b8 15 API calls 5429->5430 5431 4b483c 5430->5431 5432 4b485d 5431->5432 5433 4b4845 fprintf 5431->5433 5555 4b449f 5432->5555 5433->5432 5436 4b4888 5436->5267 5440 4b3352 strcpy strcat 5436->5440 5746 4b32b9 5440->5746 5443 4b33c3 5443->5267 5445 4b33d0 5443->5445 5444 4b33ab fprintf 5444->5443 5446 4b33e0 5445->5446 5447 4b206e 7 API calls 5446->5447 5448 4b3413 strtok 5447->5448 5449 4b342b 5448->5449 5450 4b34ab 5449->5450 5451 4b342f strchr 5449->5451 5453 4b346d fprintf 5449->5453 5454 4b3485 SetEnvironmentVariableA strtok 5449->5454 5455 4b21ab 5450->5455 5452 4b2a7b 27 API calls 5451->5452 5452->5449 5453->5454 5454->5449 5456 4b206e 7 API calls 5455->5456 5457 4b21d0 atoi 5456->5457 5457->5296 5459 4b263b 5458->5459 5460 4b25e6 strcat 5459->5460 5461 4b2655 5460->5461 5462 4b2e1f GlobalMemoryStatusEx 5461->5462 5751 4b2cce 5462->5751 5465 4b2cce 12 API calls 5466 4b2e98 5465->5466 5467 4b2e9d 5466->5467 5468 4b206e 7 API calls 5467->5468 5469 4b2ebf 5468->5469 5470 4b2ec3 strcat 5469->5470 5471 4b2ed6 strncpy strcat _open 5469->5471 5470->5471 5472 4b2ff6 5471->5472 5473 4b2f34 5471->5473 5479 4b2a7b 5472->5479 5474 4b2f3d fprintf 5473->5474 5475 4b2f51 _read 5473->5475 5474->5475 5476 4b2f89 5475->5476 5477 4b2fe8 _close 5476->5477 5478 4b2fd5 strcat 5476->5478 5477->5472 5478->5477 5480 4b2a8b 5479->5480 5481 4b2cbd 5480->5481 5482 4b2abd strchr 5480->5482 5489 4b2c8d fprintf 5480->5489 5492 4b2c7c strcat 5480->5492 5496 4b2c51 GetEnvironmentVariableA 5480->5496 5761 4b21de strstr 5480->5761 5497 4b34b3 5481->5497 5483 4b2ae3 strchr 5482->5483 5484 4b2cb1 strcat 5482->5484 5483->5481 5485 4b2b10 strncat strncat strcmp 5483->5485 5484->5481 5486 4b2b8e strcmp 5485->5486 5487 4b2b73 strncat 5485->5487 5486->5480 5488 4b2baa strcmp 5486->5488 5487->5480 5490 4b2bbe GetCurrentDirectoryA 5488->5490 5491 4b2bd5 strcmp 5488->5491 5489->5480 5490->5480 5491->5480 5493 4b2bf6 strcmp 5491->5493 5492->5480 5493->5480 5494 4b2c14 strstr 5493->5494 5494->5480 5496->5480 5498 4b34c3 5497->5498 5499 4b2168 8 API calls 5498->5499 5500 4b3518 5499->5500 5501 4b206e 7 API calls 5500->5501 5502 4b352e 5501->5502 5503 4b206e 7 API calls 5502->5503 5504 4b3542 5503->5504 5505 4b354a 5504->5505 5506 4b3888 5504->5506 5507 4b356b 5505->5507 5508 4b3553 fprintf 5505->5508 5509 4b38a0 strcat strcat 5506->5509 5510 4b38b7 strcat strncat 5506->5510 5511 4b206e 7 API calls 5507->5511 5508->5507 5512 4b38e6 5509->5512 5513 4b25e6 strcat 5510->5513 5514 4b357b 5511->5514 5513->5512 5515 4b3598 5514->5515 5516 4b3588 fputs 5514->5516 5517 4b2a7b 27 API calls 5515->5517 5516->5515 5518 4b35b8 strcat 5517->5518 5519 4b35d5 5518->5519 5532 4b35fa 5519->5532 5773 4b2a4e strcat 5519->5773 5520 4b360b strtok 5522 4b3856 strcat 5520->5522 5520->5532 5522->5512 5523 4b3623 fprintf 5524 4b3637 strpbrk 5523->5524 5525 4b364f strrchr 5524->5525 5524->5532 5525->5532 5527 4b366c strncpy _findfirst 5528 4b36c3 strncpy 5527->5528 5527->5532 5529 4b373a strcpy 5528->5529 5774 4b2a4e strcat 5529->5774 5530 4b37a1 _findclose 5530->5532 5532->5520 5532->5523 5532->5524 5532->5527 5532->5530 5533 4b3779 _findnext 5532->5533 5534 4b3765 fprintf 5532->5534 5775 4b2a4e strcat 5532->5775 5533->5532 5535 4b37ae strncpy 5533->5535 5534->5533 5535->5529 5535->5532 5536->5380 5538 4b2617 5537->5538 5539 4b2607 strcat 5537->5539 5539->5538 5541 4b2598 5540->5541 5547 4b23de 5540->5547 5541->5426 5541->5427 5543 4b254a 5543->5541 5544 4b2553 strcat strcat strcat strcat 5543->5544 5544->5543 5545 4b241d strncpy 5545->5547 5546 4b2476 strcat 5546->5547 5547->5541 5547->5543 5547->5545 5547->5546 5548 4b2457 strcpy 5547->5548 5549 4b24b8 strcat 5547->5549 5550 4b2531 5547->5550 5551 4b24f4 strcat 5547->5551 5552 4b2499 strcat 5547->5552 5554 4b24db strcat 5547->5554 5603 4b2356 5547->5603 5548->5546 5549->5547 5550->5543 5553 4b253a fputs 5550->5553 5551->5543 5551->5547 5552->5547 5553->5543 5554->5547 5556 4b44af 5555->5556 5557 4b44d3 5556->5557 5558 4b44c3 fputs 5556->5558 5559 4b451c 5557->5559 5560 4b44fa 5557->5560 5558->5557 5561 4b206e 7 API calls 5559->5561 5562 4b4719 5560->5562 5563 4b4507 fputs 5560->5563 5564 4b452c 5561->5564 5562->5436 5583 4b4214 5562->5583 5563->5562 5564->5562 5565 4b2a7b 27 API calls 5564->5565 5566 4b4563 5565->5566 5567 4b456c fprintf 5566->5567 5568 4b4580 strtok 5566->5568 5567->5568 5575 4b4598 5568->5575 5569 4b45a0 strrchr strrchr 5570 4b45d7 _stricmp 5569->5570 5569->5575 5570->5575 5571 4b462b strcpy 5571->5575 5572 4b45fd _stricmp 5572->5571 5572->5575 5573 4b461d strncpy 5573->5575 5574 4b465e strcpy 5574->5575 5575->5562 5575->5569 5575->5571 5575->5572 5575->5573 5575->5574 5576 4b4670 strncpy 5575->5576 5579 4b46fe strtok 5575->5579 5580 4b46b4 5575->5580 5607 4b2657 5575->5607 5577 4b25e6 strcat 5576->5577 5577->5575 5579->5575 5580->5579 5582 4b46ce strcpy 5580->5582 5622 4b425d 5580->5622 5582->5562 5584 4b423c 5583->5584 5585 4b4223 5583->5585 5587 4b4253 5584->5587 5693 4b40f7 5584->5693 5585->5584 5586 4b422c fputs 5585->5586 5586->5584 5587->5436 5589 4b319c 5587->5589 5590 4b31bb 5589->5590 5599 4b3293 5589->5599 5591 4b206e 7 API calls 5590->5591 5593 4b31c7 strcat strcat 5591->5593 5592 4b206e 7 API calls 5594 4b32b0 5592->5594 5595 4b31f8 strcat strcat 5593->5595 5596 4b3220 5593->5596 5594->5436 5595->5596 5597 4b3229 strcat 5596->5597 5598 4b323d 5596->5598 5597->5598 5598->5599 5600 4b206e 7 API calls 5598->5600 5599->5592 5601 4b326b 5600->5601 5601->5599 5602 4b326f strcat strcat 5601->5602 5602->5599 5604 4b2367 5603->5604 5606 4b2392 5603->5606 5605 4b236c strchr strchr 5604->5605 5604->5606 5605->5606 5606->5547 5608 4b2694 strcpy 5607->5608 5617 4b27e6 5607->5617 5609 4b2629 strcat 5608->5609 5610 4b26ab _stat64 5609->5610 5611 4b26c2 5610->5611 5612 4b279e fprintf 5611->5612 5613 4b27c5 5611->5613 5612->5613 5614 4b27c9 SetLastError 5613->5614 5615 4b27dd 5613->5615 5614->5617 5616 4b27f0 strcpy 5615->5616 5615->5617 5618 4b25e6 strcat 5616->5618 5617->5575 5619 4b280f _stat64 5618->5619 5620 4b2826 5619->5620 5620->5617 5621 4b2902 fprintf 5620->5621 5621->5617 5623 4b426d 5622->5623 5624 4b42bf CreatePipe 5623->5624 5625 4b429b fprintf 5623->5625 5626 4b432e SetHandleInformation 5624->5626 5627 4b430e 5624->5627 5625->5624 5630 4b4353 5626->5630 5631 4b4386 strcpy 5626->5631 5628 4b4327 5627->5628 5629 4b4317 fputs 5627->5629 5628->5580 5629->5628 5632 4b436c CloseHandle 5630->5632 5633 4b435c fputs 5630->5633 5634 4b2629 strcat 5631->5634 5635 4b4410 CloseHandle 5632->5635 5633->5632 5636 4b43b9 5634->5636 5635->5628 5651 4b6350 5636->5651 5640 4b43ed 5641 4b441e 5640->5641 5642 4b43f1 5640->5642 5662 4b3b64 5641->5662 5643 4b440a 5642->5643 5644 4b43fa fputs 5642->5644 5643->5635 5644->5643 5647 4b447d 5648 4b23b8 15 API calls 5647->5648 5649 4b4489 5648->5649 5675 4b3dc7 5649->5675 5682 4b6380 5651->5682 5653 4b43db 5654 4b3cc0 5653->5654 5655 4b3d29 CreateProcessA 5654->5655 5656 4b3d06 5654->5656 5658 4b3d7a 5655->5658 5659 4b3d99 CloseHandle CloseHandle 5655->5659 5656->5655 5657 4b3d0f fprintf 5656->5657 5657->5655 5660 4b3d83 fprintf 5658->5660 5661 4b3db1 CloseHandle 5658->5661 5659->5661 5660->5661 5661->5640 5663 4b3b90 ReadFile 5662->5663 5664 4b3bc6 5663->5664 5665 4b3bb6 5663->5665 5666 4b3bf2 strchr 5664->5666 5667 4b3bde fprintf 5664->5667 5665->5663 5665->5664 5668 4b3c26 strchr 5666->5668 5671 4b3c0c 5666->5671 5667->5666 5669 4b3c53 5668->5669 5668->5671 5669->5671 5672 4b3c75 strstr 5669->5672 5670 4b3c6e fputs 5674 4b3cb3 CloseHandle 5670->5674 5671->5670 5671->5674 5673 4b3c9c strstr 5672->5673 5672->5674 5673->5674 5674->5628 5674->5647 5676 4b3ddf strcmp 5675->5676 5677 4b3df3 5675->5677 5676->5677 5679 4b3e12 5676->5679 5678 4b3dfc strcmp 5677->5678 5677->5679 5678->5679 5680 4b3e7e 5679->5680 5681 4b3e44 fprintf 5679->5681 5680->5628 5681->5680 5683 4b6399 5682->5683 5684 4b63c7 5682->5684 5689 4b8000 getenv 5683->5689 5686 4b8000 2 API calls 5684->5686 5688 4b63e7 5686->5688 5688->5653 5690 4b806d 5689->5690 5691 4b6ba0 fputc 5690->5691 5692 4b63b8 5690->5692 5691->5690 5692->5653 5694 4b411f 5693->5694 5695 4b4106 5693->5695 5697 4b4134 5694->5697 5716 4b4098 5694->5716 5695->5694 5696 4b410f fputs 5695->5696 5696->5694 5699 4b4098 39 API calls 5697->5699 5700 4b4140 5699->5700 5701 4b4155 5700->5701 5702 4b4098 39 API calls 5700->5702 5703 4b4098 39 API calls 5701->5703 5702->5701 5704 4b4161 5703->5704 5705 4b418b 5704->5705 5706 4b417f 5704->5706 5710 4b4098 39 API calls 5704->5710 5707 4b41b5 5705->5707 5712 4b41a9 5705->5712 5714 4b4098 39 API calls 5705->5714 5711 4b4098 39 API calls 5706->5711 5708 4b420d 5707->5708 5709 4b41c0 strcpy 5707->5709 5708->5587 5709->5708 5713 4b41dd fprintf 5709->5713 5710->5706 5711->5705 5715 4b4098 39 API calls 5712->5715 5713->5708 5714->5712 5715->5707 5717 4b40ab 5716->5717 5720 4b40cd 5716->5720 5719 4b3e88 39 API calls 5717->5719 5721 4b40b4 5717->5721 5719->5721 5720->5697 5721->5720 5722 4b3e88 5721->5722 5723 4b3ed1 RegOpenKeyExA 5722->5723 5724 4b3ea7 fprintf 5722->5724 5725 4b4090 5723->5725 5732 4b3f0c 5723->5732 5724->5723 5725->5720 5726 4b3f37 RegEnumKeyExA 5727 4b3f93 strcpy 5726->5727 5728 4b4081 RegCloseKey 5726->5728 5729 4b25e6 strcat 5727->5729 5728->5725 5729->5732 5730 4b3fbd fprintf 5730->5732 5731 4b23b8 15 API calls 5731->5732 5732->5726 5732->5730 5732->5731 5733 4b3dc7 3 API calls 5732->5733 5735 4b4052 fprintf 5732->5735 5736 4b4012 strcpy 5732->5736 5738 4b293e RegOpenKeyExA 5732->5738 5733->5732 5735->5732 5736->5728 5737 4b4033 fprintf 5736->5737 5737->5728 5739 4b2a38 5738->5739 5740 4b29a2 RegQueryValueExA 5738->5740 5739->5732 5741 4b29fe 5740->5741 5742 4b2a13 RegCloseKey 5740->5742 5741->5741 5744 4b2657 8 API calls 5741->5744 5742->5739 5743 4b2a26 strcpy 5742->5743 5743->5739 5745 4b2a11 5744->5745 5745->5742 5747 4bb3d0 5746->5747 5748 4b32c9 GetEnvironmentVariableA 5747->5748 5749 4b334a 5748->5749 5750 4b3319 strcat strcat SetEnvironmentVariableA 5748->5750 5749->5443 5749->5444 5750->5749 5752 4b21ab 8 API calls 5751->5752 5753 4b2cfd 5752->5753 5754 4b21ab 8 API calls 5753->5754 5755 4b2d08 5754->5755 5756 4b2e17 5755->5756 5757 4b2d86 5755->5757 5760 4b2d6a fprintf 5755->5760 5756->5465 5758 4b2dc8 strcat _itoa 5757->5758 5759 4b2d94 fprintf 5757->5759 5758->5756 5759->5758 5760->5757 5762 4b21fe strstr 5761->5762 5772 4b2254 strchr strrchr 5761->5772 5763 4b2212 strstr 5762->5763 5762->5772 5767 4b2226 strstr 5763->5767 5763->5772 5765 4b22a9 RegOpenKeyExA 5768 4b22d2 5765->5768 5771 4b2349 5765->5771 5766 4b22d4 RegOpenKeyExA 5766->5765 5769 4b2301 RegQueryValueExA RegCloseKey 5766->5769 5770 4b223a strstr 5767->5770 5767->5772 5768->5769 5769->5771 5770->5771 5770->5772 5771->5480 5772->5765 5772->5766 5776->5325 5778 4b1f11 MessageBoxA 5777->5778 5779 4b1ee5 5777->5779 5782 4b1f34 5778->5782 5780 4b1f08 puts 5779->5780 5781 4b1eee printf 5779->5781 5781->5782 5782->5358 5782->5359 5782->5360 6282 4b8490 6283 4b829b 6282->6283 6284 4b8287 6282->6284 6286 4b78a0 28 API calls 6283->6286 6285 4b78a0 28 API calls 6284->6285 6285->6283 6287 4b84b0 6286->6287 6287->6287 6571 4b8590 6572 4b83a7 6571->6572 6573 4b8393 6571->6573 6574 4b7710 26 API calls 6572->6574 6575 4b7710 26 API calls 6573->6575 6576 4b85b0 6574->6576 6575->6572 6576->6576 6577 4b4f90 6578 4b4f9b 6577->6578 6579 4b4fa0 6578->6579 6580 4b5220 6 API calls 6578->6580 6581 4b4fc8 6580->6581 6137 4ba029 6158 4b93b8 6137->6158 6138 4baae0 9 API calls 6138->6158 6139 4baa70 6 API calls 6140 4b9856 6139->6140 6141 4b975b 6142 4b990b 6141->6142 6143 4baae0 9 API calls 6141->6143 6155 4b977f 6143->6155 6144 4ba9a0 7 API calls 6145 4ba1d1 memcpy 6144->6145 6146 4baed0 8 API calls 6145->6146 6146->6158 6147 4baa70 6 API calls 6150 4b982e 6147->6150 6148 4bb030 7 API calls 6148->6158 6149 4b9842 6151 4baa70 6 API calls 6149->6151 6150->6149 6152 4baa70 6 API calls 6150->6152 6153 4b94aa 6150->6153 6151->6153 6152->6149 6153->6139 6154 4baed0 8 API calls 6154->6158 6155->6142 6155->6147 6156 4babc0 7 API calls 6156->6158 6157 4bad40 11 API calls 6157->6158 6158->6138 6158->6141 6158->6142 6158->6144 6158->6148 6158->6153 6158->6154 6158->6155 6158->6156 6158->6157 6159 4babf0 7 API calls 6158->6159 6160 4baa70 6 API calls 6158->6160 6159->6158 6160->6158 6161 4b682c 6162 4b6830 _findfirst 6161->6162 6163 4b684d strncpy 6162->6163 6164 4b6821 6162->6164 6164->6162 6300 4baaac 6301 4baab0 LeaveCriticalSection 6300->6301 6582 4b83ac 6583 4b870e 6582->6583 6584 4b83c3 6582->6584 6584->6583 6585 4b6e20 fputc 6584->6585 6586 4b8408 6585->6586 6587 4b4fac 6588 4b4fb0 6587->6588 6589 4b5220 6 API calls 6588->6589 6590 4b4fc8 6589->6590 6303 4b82a0 6304 4b82b3 6303->6304 6307 4b82c7 6303->6307 6309 4b77c0 6304->6309 6306 4b77c0 26 API calls 6308 4b8601 6306->6308 6307->6306 6308->6308 6310 4b77d3 6309->6310 6311 4b6aa0 12 API calls 6310->6311 6312 4b7818 6311->6312 6313 4b7881 6312->6313 6314 4b7826 6312->6314 6315 4b6d90 fputc 6313->6315 6316 4b7310 14 API calls 6314->6316 6317 4b788e 6315->6317 6318 4b7834 6316->6318 6317->6307 6319 4b785a 6318->6319 6320 4b6ba0 fputc 6318->6320 6319->6307 6320->6318 6490 4b6920 6491 4b692b 6490->6491 6492 4b6935 _errno 6490->6492 6492->6491 6165 4b1424 6166 4b142d 6165->6166 6170 4b1481 6165->6170 6167 4b1442 isspace 6166->6167 6166->6170 6168 4b144e 6167->6168 6167->6170 6169 4b5e70 61 API calls 6168->6169 6168->6170 6169->6170 6171 4b7039 6173 4b7040 6171->6173 6172 4b72ee 6173->6172 6176 4b6ba0 fputc 6173->6176 6179 4b719f 6173->6179 6174 4b71c3 6175 4b71e6 6174->6175 6178 4b6ba0 fputc 6174->6178 6176->6173 6177 4b6ba0 fputc 6177->6179 6178->6174 6179->6174 6179->6177 6180 4b4e39 6181 4b4d45 6180->6181 6182 4b4be0 13 API calls 6181->6182 6183 4b4ddf 6181->6183 6184 4b4d84 6181->6184 6182->6181 6185 4b4b90 13 API calls 6184->6185 6186 4b4d9c 6185->6186 6186->6183 6187 4b4be0 13 API calls 6186->6187 6187->6186 6321 4b12b9 6323 4b1235 6321->6323 6322 4b1422 6323->6322 6324 4b137a 6323->6324 6325 4b5e70 61 API calls 6323->6325 6326 4b13d8 __p__fmode 6324->6326 6327 4b1396 _setmode _setmode _setmode 6324->6327 6325->6324 6328 4b4cd0 13 API calls 6326->6328 6327->6326 6329 4b13ea 6328->6329 6330 4b13f2 __p__environ 6329->6330 6331 4bba30 265 API calls 6330->6331 6332 4b1413 _cexit ExitProcess 6331->6332 6591 4badb9 6594 4bad76 6591->6594 6592 4ba880 5 API calls 6592->6594 6593 4baddf LeaveCriticalSection 6593->6594 6594->6592 6594->6593 6595 4babf0 7 API calls 6594->6595 6596 4badaf 6594->6596 6597 4baa70 6 API calls 6594->6597 6595->6594 6597->6594 6493 4b113c 6494 4b1140 signal 6493->6494 6495 4b1052 6494->6495 6619 4b65bc 6620 4b65c0 _errno 6619->6620 6621 4b6603 _errno 6620->6621 6622 4b65e2 free 6620->6622 6621->6622 6623 4b653f 6622->6623 6624 4b85b5 6625 4b85bd 6624->6625 6626 4b6c00 6 API calls 6625->6626 6627 4b85dc 6626->6627 6627->6627

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 421 4b1180-4b1190 422 4b11ae-4b11ce SetUnhandledExceptionFilter call 4b4eb0 call 4b4b80 421->422 423 4b1192-4b11ab 421->423 429 4b1511-4b153c __getmainargs 422->429 430 4b11d4-4b122e GetCommandLineA call 4bb3d0 422->430 423->422 433 4b1556 429->433 434 4b1235-4b1241 430->434 437 4b155d-4b155f 433->437 435 4b1247-4b124a 434->435 436 4b1336-4b1338 434->436 438 4b1500-4b1504 435->438 439 4b1250 435->439 436->437 440 4b133e 436->440 443 4b1565-4b1567 437->443 444 4b150a-4b150c 438->444 445 4b12f2 438->445 441 4b1252-4b1255 439->441 442 4b12c0-4b12c3 439->442 446 4b1340-4b1349 440->446 448 4b125b-4b1260 441->448 449 4b14b8-4b14bf 441->449 451 4b12c9-4b12cc 442->451 452 4b14b0-4b14b3 442->452 450 4b14dc-4b14de 443->450 454 4b12ff-4b1304 444->454 453 4b12f4-4b12fd 445->453 446->446 447 4b134b-4b134f 446->447 455 4b1351-4b1354 447->455 456 4b1356-4b1375 call 4b5e70 447->456 448->438 457 4b1266-4b1269 448->457 458 4b1422 449->458 459 4b14c5-4b14c9 449->459 461 4b14ea-4b14f9 450->461 462 4b14e0-4b14e4 450->462 451->438 460 4b12d2-4b12d5 451->460 452->434 453->453 453->454 463 4b130a-4b130e 454->463 464 4b14a1-4b14a4 454->464 455->456 465 4b137a-4b1394 455->465 456->465 457->458 467 4b126f-4b1273 457->467 459->443 468 4b14cf 459->468 460->458 469 4b12db-4b12ec 460->469 461->434 462->461 470 4b1295-4b12a3 462->470 463->464 471 4b1314-4b1317 463->471 464->452 472 4b13d8-4b141d __p__fmode call 4b4cd0 call 4b4b60 __p__environ call 4bba30 _cexit ExitProcess 465->472 473 4b1396-4b13d3 _setmode * 3 465->473 467->433 474 4b1279-4b127c 467->474 475 4b14d1-4b14da 468->475 469->444 469->445 470->434 471->464 476 4b131d-4b1330 471->476 473->472 478 4b1280-4b1289 474->478 475->450 475->475 476->435 476->436 478->478 480 4b128b-4b128d 478->480 482 4b128f-4b1293 480->482 483 4b12a5-4b12b4 480->483 482->470 482->483 483->434 483->442
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 004B11B5
                                                                      • GetCommandLineA.KERNEL32 ref: 004B11D4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CommandExceptionFilterLineUnhandled
                                                                      • String ID: "$OK
                                                                      • API String ID: 3189701131-3985578168
                                                                      • Opcode ID: a47ec0c93a8f58f0517f5f6b2eacf7f667387b1ad1b148506963a9ef6d15f978
                                                                      • Instruction ID: 04f04734af0cbb6200f13a640ca917f791f611e2ee0452db7db881ed83922399
                                                                      • Opcode Fuzzy Hash: a47ec0c93a8f58f0517f5f6b2eacf7f667387b1ad1b148506963a9ef6d15f978
                                                                      • Instruction Fuzzy Hash: 9991CF70E08304CFDB24DF79D8947DEBBE1AB99318F49852AD844D7361E37C98418B6A

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 4b1803-4b1827 call 4b4890 3 4b185a-4b185b 0->3 4 4b1829-4b1855 call 4b173c ShowWindow SetForegroundWindow call 4b1d21 0->4 6 4b1861-4b1871 call 4b2168 3->6 7 4b1b35-4b1b3f call 4b1f36 3->7 15 4b1c4b-4b1c52 4->15 16 4b188a-4b18a8 call 4b2168 6->16 17 4b1873-4b1887 strstr 6->17 7->15 20 4b18aa-4b18ba call 4b2168 16->20 21 4b18d3-4b18e0 16->21 17->16 20->21 28 4b18bc-4b18d0 strstr 20->28 23 4b18ea-4b1959 CreateWindowExA 21->23 24 4b18e2-4b18e4 21->24 26 4b1af4 23->26 27 4b195f-4b1980 call 4b206e 23->27 24->23 24->26 29 4b1af7-4b1afe 26->29 35 4b1982-4b199b atoi 27->35 36 4b19a1-4b19c0 call 4b2168 27->36 28->21 31 4b1b09-4b1b33 SetTimer 29->31 32 4b1b00-4b1b07 29->32 31->7 34 4b1b44-4b1b53 call 4b3a11 31->34 32->31 32->34 39 4b1b58-4b1b5a 34->39 35->36 42 4b19d9-4b1a25 call 4b2168 LoadImageA 36->42 43 4b19c2-4b19d6 strstr 36->43 39->7 41 4b1b5c-4b1b63 39->41 44 4b1b98-4b1bbd GetMessageA 41->44 45 4b1b65-4b1b6c 41->45 42->7 51 4b1a2b-4b1af3 SendMessageA GetWindowRect GetSystemMetrics * 2 SetWindowPos ShowWindow UpdateWindow 42->51 43->42 48 4b1bbf-4b1bd1 TranslateMessage DispatchMessageA 44->48 49 4b1bd3-4b1bda 44->49 45->44 50 4b1b6e-4b1b75 45->50 48->44 52 4b1bdc-4b1be4 49->52 53 4b1c03-4b1c0f call 4b39ed 49->53 54 4b1b87-4b1b93 call 4b39ed call 4b1d21 50->54 55 4b1b77-4b1b82 fputs 50->55 51->26 52->53 57 4b1be6-4b1bed 52->57 63 4b1c1e-4b1c25 53->63 64 4b1c11-4b1c18 53->64 54->15 55->54 57->53 60 4b1bef-4b1bfe fprintf 57->60 60->53 65 4b1c41-4b1c46 call 4b1d21 63->65 66 4b1c27-4b1c3c fprintf 63->66 64->29 64->63 65->15 66->65
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Windowstrstr$CreateForegroundImageLoadShowatoifclose
                                                                      • String ID: --l4j-dont-wait$--l4j-no-splash$--l4j-no-splash-err$@$Exit code:%d$Exit code:%d, restarting the application!$Exit code:0$STATIC$d
                                                                      • API String ID: 326098631-3010709316
                                                                      • Opcode ID: bb50326811ba3d1e273142be6419f1ac37e2b8b636d1cf87d794e94f936fd581
                                                                      • Instruction ID: efa6f94cf001294ed7e640645aa56e62fca939c4a5d5cb77d5fbeae9a2649865
                                                                      • Opcode Fuzzy Hash: bb50326811ba3d1e273142be6419f1ac37e2b8b636d1cf87d794e94f936fd581
                                                                      • Instruction Fuzzy Hash: 3AB15DB0508305DFE700AF66D99579FBBE4EB84308F41882EE48487261D7BD9944DFAA

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 70 4b449f-4b44b8 call 4bb3d0 73 4b44ba-4b44c1 70->73 74 4b44d3-4b44ef 70->74 73->74 75 4b44c3-4b44ce fputs 73->75 76 4b451c-4b452e call 4b206e 74->76 77 4b44f1-4b44f8 74->77 75->74 80 4b4719 76->80 84 4b4534-4b456a call 4b2a7b 76->84 77->76 78 4b44fa-4b4501 77->78 78->80 81 4b4507-4b4517 fputs 78->81 83 4b471b-4b4725 80->83 81->80 87 4b456c-4b457b fprintf 84->87 88 4b4580-4b4596 strtok 84->88 87->88 89 4b4598-4b459a 88->89 89->80 90 4b45a0-4b45d5 strrchr * 2 89->90 91 4b45f3-4b45fb 90->91 92 4b45d7-4b45e9 _stricmp 90->92 94 4b462b-4b4632 strcpy 91->94 95 4b45fd-4b460f _stricmp 91->95 92->91 93 4b45eb-4b45f1 92->93 96 4b461d-4b4629 strncpy 93->96 98 4b4637-4b464f call 4b317d 94->98 95->94 97 4b4611-4b4619 95->97 96->98 97->96 101 4b465e-4b466e strcpy 98->101 102 4b4651-4b4653 98->102 103 4b46a4-4b46ab call 4b2657 101->103 104 4b4670-4b469f strncpy call 4b25e6 102->104 105 4b4655-4b465c 102->105 108 4b46b0-4b46b2 103->108 104->103 105->101 105->104 109 4b46fe-4b4714 strtok 108->109 110 4b46b4-4b46cc call 4b425d 108->110 109->89 110->109 113 4b46ce-4b46fc strcpy 110->113 113->83
                                                                      APIs
                                                                      • fputs.MSVCRT ref: 004B44CE
                                                                      • fputs.MSVCRT ref: 004B4512
                                                                      • fprintf.MSVCRT ref: 004B457B
                                                                      • strtok.MSVCRT(00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4591
                                                                      • strrchr.MSVCRT ref: 004B45B6
                                                                      • strrchr.MSVCRT ref: 004B45C8
                                                                      • _stricmp.MSVCRT(00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B45E2
                                                                      • _stricmp.MSVCRT(00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4608
                                                                      • strncpy.MSVCRT ref: 004B4624
                                                                      • strcpy.MSVCRT(00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4632
                                                                      • strcpy.MSVCRT(00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4669
                                                                      • strncpy.MSVCRT ref: 004B4685
                                                                      • strcpy.MSVCRT ref: 004B46F2
                                                                      • strtok.MSVCRT(00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B470D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcpy$_stricmpfputsstrncpystrrchrstrtok$fprintf
                                                                      • String ID: "$/bin$:$C:\Program Files (x86)\Java\jre-1.8$JRE paths:%s$JRE:Cannot use 64-bit runtime on 32-bit OS.$\bin$pathJreSearch()
                                                                      • API String ID: 851780383-1987966701
                                                                      • Opcode ID: 7aa31a3a92d95a2af09b93d4be87ec9d65f3349bfa3e548c18c7ea5fc6aaa049
                                                                      • Instruction ID: 9374b3d422e50824c0b20226db93dc54babd0515794800cc79579aa959234275
                                                                      • Opcode Fuzzy Hash: 7aa31a3a92d95a2af09b93d4be87ec9d65f3349bfa3e548c18c7ea5fc6aaa049
                                                                      • Instruction Fuzzy Hash: 2E612EB0909704AFDB50AF65D5446DABBE0AF84748F01C86FE4C887301DBBC9945DB6A

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 114 4b5880-4b58cf strlen call 4bb3d0 memcpy call 4b5f50 119 4b58d2 call 4b54d0 114->119 120 4b58d7-4b58d9 119->120 121 4b58db-4b58e2 120->121 122 4b58e3-4b58e8 120->122 123 4b58ea-4b58fa 122->123 124 4b593c-4b595f strlen call 4bb3d0 122->124 123->124 125 4b58fc 123->125 131 4b596e-4b5973 124->131 127 4b5900-4b5902 125->127 129 4b590d-4b5910 127->129 130 4b5904-4b5907 127->130 133 4b5c50-4b5c53 129->133 134 4b5916-4b5919 129->134 130->129 132 4b5c70-4b5c77 130->132 135 4b5961-4b596c 131->135 136 4b5975-4b5987 131->136 132->129 139 4b5c7d 132->139 137 4b5dd9-4b5ddc 133->137 138 4b5c59-4b5c66 133->138 140 4b591f-4b5922 134->140 141 4b5de2-4b5df9 call 4b5880 134->141 135->131 142 4b5989-4b599c _strdup 135->142 136->131 136->142 137->138 137->141 139->124 140->141 144 4b5928-4b593a 140->144 148 4b59ac-4b59ae 141->148 142->121 145 4b59a2-4b59a7 call 4b57b0 142->145 144->124 144->127 145->148 148->121 149 4b59b4-4b59ba 148->149 150 4b5d40-4b5d4f strlen 149->150 151 4b59c0-4b59c2 149->151 153 4b5e4c-4b5e55 150->153 154 4b5d55-4b5d5b 150->154 151->150 152 4b59c8-4b59d7 151->152 152->150 156 4b59dd-4b59f5 152->156 155 4b5d99-4b5d9d 153->155 157 4b5e5a-4b5e60 154->157 158 4b5d61-4b5d64 154->158 163 4b5e39-4b5e3d 155->163 164 4b5da3-4b5db3 155->164 159 4b59fb-4b5a15 156->159 160 4b5e2a-4b5e2d 156->160 157->155 161 4b5d88-4b5d8d 158->161 162 4b5d66 158->162 168 4b5a18-4b5a1c 159->168 160->163 169 4b5d8f-4b5d96 161->169 170 4b5d70-4b5d76 161->170 162->157 163->164 167 4b5e43 163->167 165 4b5dc2-4b5dc5 164->165 166 4b5db5-4b5dc0 164->166 165->166 171 4b5dc7-4b5dcd 165->171 166->165 166->166 167->153 172 4b5c1a-4b5c30 free 168->172 173 4b5a22-4b5a2e call 4b63f0 168->173 169->155 174 4b5e1f-4b5e25 170->174 175 4b5d7c-4b5d80 170->175 172->168 176 4b5c36-4b5c4b free 172->176 180 4b5d00-4b5d05 173->180 181 4b5a34-4b5a39 173->181 174->155 175->174 178 4b5d86 175->178 178->161 182 4b5d0b-4b5d10 180->182 183 4b5e0a-4b5e11 180->183 184 4b5a3f-4b5a5f strlen 181->184 185 4b5dfe 181->185 182->172 186 4b5d16-4b5d39 _errno 182->186 183->172 187 4b5a60-4b5a6a call 4b6640 184->187 185->183 186->172 191 4b5c00-4b5c03 call 4b67a0 187->191 192 4b5a70-4b5a75 187->192 197 4b5c08-4b5c0d 191->197 193 4b5a7d-4b5a8f call 4b5530 192->193 194 4b5a77-4b5a7b 192->194 193->187 201 4b5a91-4b5abb strlen call 4bb3d0 193->201 194->187 194->193 197->172 199 4b5c0f-4b5c15 call 4b5840 197->199 199->172 204 4b5c82-4b5cb0 memcpy 201->204 205 4b5ac1-4b5af9 memcpy strlen call 4bb3d0 201->205 206 4b5cb2-4b5cb4 204->206 207 4b5cf1 204->207 211 4b5b0d-4b5b12 205->211 206->207 209 4b5cb6-4b5cce 206->209 207->180 212 4b5cd6-4b5ce0 call 4b5820 209->212 213 4b5b00-4b5b0b 211->213 214 4b5b14-4b5b26 211->214 220 4b5be7-4b5bf4 call 4b6640 212->220 213->211 215 4b5b28-4b5b36 _strdup 213->215 214->211 214->215 218 4b5b3c-4b5b52 215->218 219 4b5ce5 215->219 218->212 221 4b5b58-4b5b5d 218->221 219->207 220->192 229 4b5bfa 220->229 222 4b5b63-4b5b6d 221->222 223 4b5e16-4b5e18 221->223 225 4b5b83-4b5b8f 222->225 223->174 227 4b5b91-4b5ba0 _stricoll 225->227 228 4b5b70-4b5b7f strcoll 225->228 230 4b5ba2-4b5bb8 malloc 227->230 231 4b5b81 227->231 228->230 228->231 229->191 232 4b5bba-4b5bcc 230->232 233 4b5bdc-4b5be4 230->233 231->225 232->233 234 4b5bce-4b5bd3 232->234 233->220 235 4b5bd9 234->235 236 4b5dd2-4b5dd4 234->236 235->233 236->233
                                                                      APIs
                                                                      • strlen.MSVCRT ref: 004B5894
                                                                      • memcpy.MSVCRT ref: 004B58B8
                                                                        • Part of subcall function 004B5F50: setlocale.MSVCRT ref: 004B5F6B
                                                                        • Part of subcall function 004B5F50: _strdup.MSVCRT ref: 004B5F79
                                                                        • Part of subcall function 004B5F50: setlocale.MSVCRT ref: 004B5F8F
                                                                        • Part of subcall function 004B5F50: wcstombs.MSVCRT ref: 004B5FB4
                                                                        • Part of subcall function 004B5F50: realloc.MSVCRT ref: 004B5FC8
                                                                        • Part of subcall function 004B5F50: wcstombs.MSVCRT ref: 004B5FE1
                                                                        • Part of subcall function 004B5F50: setlocale.MSVCRT ref: 004B5FF1
                                                                        • Part of subcall function 004B5F50: free.MSVCRT ref: 004B5FF9
                                                                        • Part of subcall function 004B54D0: malloc.MSVCRT ref: 004B54ED
                                                                      • strlen.MSVCRT ref: 004B5944
                                                                      • _strdup.MSVCRT ref: 004B598C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: setlocale$_strdupstrlenwcstombs$freemallocmemcpyrealloc
                                                                      • String ID: \
                                                                      • API String ID: 1024038994-2967466578
                                                                      • Opcode ID: 635461fa9cb70f27255b1a02c0e126d6185405f16f3458d9672664c2f9204f4a
                                                                      • Instruction ID: d4fff53e13fb685c496ce6507869baf3351be9ce1d8fdd2e151e6293defe9723
                                                                      • Opcode Fuzzy Hash: 635461fa9cb70f27255b1a02c0e126d6185405f16f3458d9672664c2f9204f4a
                                                                      • Instruction Fuzzy Hash: 4A027D71A04B588FCB14DFA9D4857EEFBF1AF49304F18852ED885AB341E7389841CB69

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 237 4b5f50-4b5f74 setlocale 238 4b5f80-4b5f96 setlocale 237->238 239 4b5f76-4b5f7e _strdup 237->239 240 4b5f98-4b5f9b 238->240 241 4b5f9d-4b600a wcstombs realloc wcstombs setlocale free 238->241 239->238 240->241 242 4b6010-4b6076 mbstowcs call 4bb3d0 mbstowcs 240->242 241->242 245 4b616e-4b6174 242->245 246 4b607c-4b6080 242->246 247 4b60a0-4b60a7 245->247 248 4b608c-4b609a 246->248 249 4b6082-4b6086 246->249 250 4b60ad-4b60b2 247->250 251 4b62a7-4b62aa 247->251 248->247 253 4b62ef-4b62f5 248->253 249->248 252 4b6196-4b61a5 249->252 254 4b60c8-4b60cc 250->254 251->241 252->247 256 4b61ab-4b61c0 252->256 253->247 255 4b62fb-4b6300 253->255 257 4b60ce-4b60d5 254->257 258 4b60b4-4b60b8 254->258 259 4b6257-4b627b setlocale free 255->259 256->247 260 4b60e3-4b60e7 257->260 261 4b60d7 257->261 262 4b60da-4b60e1 258->262 263 4b60ba-4b60c4 258->263 260->261 264 4b60e9-4b60ec 260->264 261->262 262->260 262->261 265 4b60fc-4b6101 263->265 266 4b60c6 263->266 264->265 267 4b60ee-4b60fa 264->267 268 4b6103-4b6108 265->268 269 4b6181-4b6186 265->269 266->254 267->265 267->266 270 4b610a-4b610f 268->270 271 4b6115-4b6118 268->271 272 4b6188-4b6190 269->272 273 4b61c5-4b61c8 269->273 270->271 276 4b62cf-4b62df 270->276 277 4b611b-4b6169 wcstombs realloc wcstombs 271->277 278 4b6179-4b617d 272->278 279 4b6192-4b6194 272->279 274 4b61ce-4b61e2 273->274 275 4b6305-4b630a 273->275 280 4b61e8-4b61f2 274->280 281 4b62af-4b62b3 274->281 282 4b631a-4b6325 275->282 283 4b630c-4b6314 275->283 276->277 277->259 278->273 284 4b617f 278->284 279->269 280->280 286 4b61f4-4b61f8 280->286 281->280 285 4b62b9-4b62c1 281->285 282->274 287 4b632b-4b6333 282->287 283->274 283->282 284->269 288 4b6208 285->288 289 4b62c7-4b62ca 285->289 286->280 290 4b61fa-4b6202 286->290 287->274 291 4b6339-4b6340 287->291 292 4b620b 288->292 289->292 290->285 290->288 291->274 293 4b620d-4b6210 292->293 294 4b6233-4b6251 wcstombs 293->294 295 4b6212-4b621d 293->295 294->259 298 4b6253 294->298 296 4b621f-4b6226 295->296 297 4b6282-4b6289 295->297 301 4b6228-4b6231 296->301 302 4b6280 296->302 299 4b628b-4b628c 297->299 300 4b62e4-4b62e8 297->300 298->259 303 4b6290-4b629a 299->303 300->303 304 4b62ea 300->304 301->294 301->295 302->297 303->303 305 4b629c-4b62a0 303->305 304->293 305->303 306 4b62a2 305->306 306->293
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: setlocale$wcstombs$_strdupfreerealloc
                                                                      • String ID: /
                                                                      • API String ID: 2293806352-2043925204
                                                                      • Opcode ID: bd78d9fd7b7b4ebe79aad9702dee96c1f27c38f1306bc01305ff032ab7447d1f
                                                                      • Instruction ID: a249ed98255d9e5f81dac8e0820fdd7acc11b4ef8fb23df0ca5cf6cbdf253902
                                                                      • Opcode Fuzzy Hash: bd78d9fd7b7b4ebe79aad9702dee96c1f27c38f1306bc01305ff032ab7447d1f
                                                                      • Instruction Fuzzy Hash: A2B14771904219CACB24EFA9C4456EEB7F1FF58304F46846FE485A7351E37C9C818BAA

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 307 4b4890-4b48af call 4bb3d0 call 4b1c58 312 4b48b8-4b48da call 4b25a0 307->312 313 4b48b1-4b48b3 307->313 312->313 317 4b48dc-4b48f1 call 4b1d3a 312->317 314 4b4ace-4b4ada 313->314 317->313 320 4b48f3-4b48fb 317->320 321 4b48fd-4b4920 fprintf 320->321 322 4b4925-4b496a call 4b1e4d call 4b206e * 3 320->322 321->322 331 4b496c-4b4973 322->331 332 4b4996-4b49a2 call 4b3001 322->332 331->313 333 4b4979-4b4991 fprintf 331->333 332->314 336 4b49a8-4b49c2 call 4b30d5 call 4b4726 332->336 333->314 336->313 341 4b49c8-4b49cf call 4b3352 336->341 341->313 344 4b49d5-4b4a26 call 4b33d0 call 4b21ab call 4b2629 call 4b2e1f call 4b2e9d 341->344 354 4b4a2b-4b4a61 call 4b2a7b call 4b34b3 call 4b3903 344->354 361 4b4a7b-4b4a82 354->361 362 4b4a63-4b4a76 fprintf 354->362 363 4b4a9c-4b4aa4 361->363 364 4b4a84-4b4a97 fprintf 361->364 362->361 365 4b4ac9 363->365 366 4b4aa6-4b4ac4 fprintf 363->366 364->363 365->314 366->365
                                                                      APIs
                                                                        • Part of subcall function 004B1C58: GetModuleHandleA.KERNEL32 ref: 004B1C6D
                                                                        • Part of subcall function 004B1C58: strcpy.MSVCRT ref: 004B1C8B
                                                                      • fprintf.MSVCRT ref: 004B4920
                                                                      • fprintf.MSVCRT ref: 004B498C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$HandleModulestrcpy
                                                                      • String ID: -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"$Args length:%d/32768 chars$Error:%s$JNI:%s$Launcher args:%s$Launcher:%s$Startup error message not defined.$Yes
                                                                      • API String ID: 3713479259-2217183246
                                                                      • Opcode ID: b44727b6f0b5367cd99728045f3d0550404f996490ecdcb20d9ae4a21aba9fa8
                                                                      • Instruction ID: ae2ec3c149d1a69571df5a76c4e8cf02a7d3c56069ad1d8582bd62bffd8badd4
                                                                      • Opcode Fuzzy Hash: b44727b6f0b5367cd99728045f3d0550404f996490ecdcb20d9ae4a21aba9fa8
                                                                      • Instruction Fuzzy Hash: 5F515DB49087009AD750BF36C5856AEBAE4EF84744F11C82FE48887342DBBDC945CB6A

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 367 4b3e88-4b3ea5 368 4b3ed1-4b3f06 RegOpenKeyExA 367->368 369 4b3ea7-4b3ecc fprintf 367->369 370 4b3f0c-4b3f35 368->370 371 4b4090-4b4097 368->371 369->368 372 4b3f37-4b3f8d RegEnumKeyExA 370->372 373 4b3f93-4b3fbb strcpy call 4b25e6 372->373 374 4b4081-4b408f RegCloseKey 372->374 377 4b3fbd-4b3fcc fprintf 373->377 378 4b3fd1-4b3ff7 call 4b23b8 call 4b3dc7 373->378 374->371 377->378 383 4b4049-4b4050 378->383 384 4b3ff9-4b4009 call 4b293e 378->384 386 4b406c-4b407c 383->386 387 4b4052-4b4067 fprintf 383->387 388 4b400e-4b4010 384->388 386->372 387->386 388->383 389 4b4012-4b4031 strcpy 388->389 389->374 390 4b4033-4b4047 fprintf 389->390 390->374
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$strcpy$CloseEnumOpen
                                                                      • String ID: %s-bit search:%s...$Check:%s$Ignore:%s$Match:%s
                                                                      • API String ID: 3338988320-103288940
                                                                      • Opcode ID: 960e523f689437cada4d7ae4aa69871949e53db0fa435e1935412167641aea6e
                                                                      • Instruction ID: 8d11746ae01428443a792ea50d80efabc13af8ed582d6ad36b8fc9e1e79baeb2
                                                                      • Opcode Fuzzy Hash: 960e523f689437cada4d7ae4aa69871949e53db0fa435e1935412167641aea6e
                                                                      • Instruction Fuzzy Hash: 5D51F8B09043159BCB10EF26C58569EBBF4EF88304F40C8AEE98897311D7789A85CF96

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 391 4b40f7-4b4104 392 4b411f-4b4126 391->392 393 4b4106-4b410d 391->393 395 4b4128-4b412f call 4b4098 392->395 396 4b4134-4b4147 call 4b4098 392->396 393->392 394 4b410f-4b411a fputs 393->394 394->392 395->396 400 4b4149-4b4150 call 4b4098 396->400 401 4b4155-4b4168 call 4b4098 396->401 400->401 405 4b418b-4b4192 401->405 406 4b416a-4b4171 401->406 409 4b41b5-4b41be 405->409 410 4b4194-4b419b 405->410 407 4b417f-4b4186 call 4b4098 406->407 408 4b4173-4b417a call 4b4098 406->408 407->405 408->407 411 4b4212-4b4213 409->411 412 4b41c0-4b41db strcpy 409->412 415 4b41a9-4b41b0 call 4b4098 410->415 416 4b419d-4b41a4 call 4b4098 410->416 417 4b420d 412->417 418 4b41dd-4b4208 fprintf 412->418 415->409 416->415 417->411 418->417
                                                                      APIs
                                                                      • fputs.MSVCRT ref: 004B411A
                                                                      • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,004B487D,?,?,00000000,?), ref: 004B41CE
                                                                      • fprintf.MSVCRT ref: 004B4208
                                                                      Strings
                                                                      • findRegistryJavaHome(), xrefs: 004B4113
                                                                      • SOFTWARE\JavaSoft\Java Development Kit, xrefs: 004B4134
                                                                      • SOFTWARE\JavaSoft\JDK, xrefs: 004B4155
                                                                      • SOFTWARE\IBM\Java Development Kit, xrefs: 004B417F, 004B41A9
                                                                      • SOFTWARE\JavaSoft\JRE, xrefs: 004B4149
                                                                      • SOFTWARE\IBM\Java Runtime Environment, xrefs: 004B4173
                                                                      • SOFTWARE\IBM\Java2 Runtime Environment, xrefs: 004B419D
                                                                      • SOFTWARE\JavaSoft\Java Runtime Environment, xrefs: 004B4128
                                                                      • C:\Program Files (x86)\Java\jre-1.8, xrefs: 004B41C3
                                                                      • Runtime used:%s (%s-bit), xrefs: 004B41FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintffputsstrcpy
                                                                      • String ID: C:\Program Files (x86)\Java\jre-1.8$Runtime used:%s (%s-bit)$SOFTWARE\IBM\Java Development Kit$SOFTWARE\IBM\Java Runtime Environment$SOFTWARE\IBM\Java2 Runtime Environment$SOFTWARE\JavaSoft\JDK$SOFTWARE\JavaSoft\JRE$SOFTWARE\JavaSoft\Java Development Kit$SOFTWARE\JavaSoft\Java Runtime Environment$findRegistryJavaHome()
                                                                      • API String ID: 1909795467-2117825052
                                                                      • Opcode ID: dfc89a2b05e76453d8002cb543121d5f255aa14783f2fb7ef3b6a6d307a95b1f
                                                                      • Instruction ID: ba4dc8aa210425d6ea627cd94068284ae1487a8ce234e741a2a9c5ba4150568a
                                                                      • Opcode Fuzzy Hash: dfc89a2b05e76453d8002cb543121d5f255aa14783f2fb7ef3b6a6d307a95b1f
                                                                      • Instruction Fuzzy Hash: 6221FA709193049EDB607FA9D4097A977E0ABA0308F42886FA5C486352DBBD48C4DF7F

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 487 4b2657-4b268e 488 4b2936-4b293d 487->488 489 4b2694-4b26c0 strcpy call 4b2629 _stat64 487->489 492 4b26db-4b2784 489->492 493 4b26c2-4b26d6 489->493 494 4b278a-4b279c 492->494 493->494 495 4b279e-4b27c0 fprintf 494->495 496 4b27c5-4b27c7 494->496 495->496 497 4b27c9-4b27d8 SetLastError 496->497 498 4b27dd-4b27e4 496->498 497->488 499 4b27f0-4b2824 strcpy call 4b25e6 _stat64 498->499 500 4b27e6-4b27eb 498->500 503 4b283f-4b28e8 499->503 504 4b2826-4b283a 499->504 500->488 505 4b28ee-4b2900 503->505 504->505 506 4b2929-4b292b 505->506 507 4b2902-4b2924 fprintf 505->507 506->500 508 4b2931 506->508 507->506 508->488
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _stat64fprintfstrcpy$ErrorLast
                                                                      • String ID: (OK)$(not found)$Check javac:%s %s$Check launcher:%s %s$bin\javac.exe
                                                                      • API String ID: 2531230949-2473518738
                                                                      • Opcode ID: 7d2ab7dc854d05a56c3cadefadbe17e17e20d166762a30b7122a5b7821ee3bac
                                                                      • Instruction ID: 68831be82f4d73e89c5529a8e3470a7a2014cf620ad26900854e041df1fd93b8
                                                                      • Opcode Fuzzy Hash: 7d2ab7dc854d05a56c3cadefadbe17e17e20d166762a30b7122a5b7821ee3bac
                                                                      • Instruction Fuzzy Hash: 648115749056288BCB60DF25C9886DAB7F1FF98310F1086EAD84CA3350EB749E85DF59

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 509 4b4726-4b4734 510 4b474f-4b4768 call 4b2168 509->510 511 4b4736-4b473d 509->511 515 4b476a-4b4788 fprintf 510->515 516 4b478d-4b47a6 call 4b2168 510->516 511->510 512 4b473f-4b474a fputs 511->512 512->510 515->516 519 4b47cb-4b47fa call 4b206e call 4b23b8 516->519 520 4b47a8-4b47c6 fprintf 516->520 525 4b47fc-4b480f fprintf 519->525 526 4b4814-4b4843 call 4b206e call 4b23b8 519->526 520->519 525->526 531 4b485d-4b4876 call 4b449f 526->531 532 4b4845-4b4858 fprintf 526->532 535 4b4888-4b488f 531->535 536 4b4878 call 4b4214 531->536 532->531 538 4b487d-4b4881 536->538 538->535 539 4b4883 call 4b319c 538->539 539->535
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$fputs
                                                                      • String ID: Java max ver:%s$Java min ver:%s$Requires 64-Bit: %s$Requires JDK:%s$Yes$jreSearch()
                                                                      • API String ID: 1801251168-2968954267
                                                                      • Opcode ID: 002db1b10a1996eda5c5509486eacfda8b6d1d9079dabc467919dc8396687547
                                                                      • Instruction ID: 0c1fcb70337548153d1bc9b0ab09194286f3681452ae1a29d7b84a64b22e8a6d
                                                                      • Opcode Fuzzy Hash: 002db1b10a1996eda5c5509486eacfda8b6d1d9079dabc467919dc8396687547
                                                                      • Instruction Fuzzy Hash: 81310FB46053009BDB44BF69D5456AE7AE4EB84708F01C82FE48887342EB7CC840DB7E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 541 4b2e9d-4b2ec1 call 4b206e 544 4b2ec3-4b2ed1 strcat 541->544 545 4b2ed6-4b2f2e strncpy strcat _open 541->545 544->545 546 4b2ff6-4b3000 545->546 547 4b2f34-4b2f3b 545->547 548 4b2f3d-4b2f4c fprintf 547->548 549 4b2f51-4b2f87 _read 547->549 548->549 550 4b2f89-4b2f8b 549->550 551 4b2fc8-4b2fcd 550->551 552 4b2f8d-4b2f93 550->552 553 4b2fe8-4b2ff1 _close 551->553 554 4b2fcf-4b2fd3 551->554 555 4b2fc3 552->555 556 4b2f95-4b2f98 552->556 553->546 554->553 558 4b2fd5-4b2fe3 strcat 554->558 557 4b2fc5-4b2fc6 555->557 559 4b2f9a-4b2f9d 556->559 560 4b2f9f-4b2fa7 556->560 557->550 558->553 559->560 561 4b2fb5-4b2fb7 559->561 560->557 562 4b2fa9-4b2fad 560->562 561->557 564 4b2fb9-4b2fc1 561->564 562->557 563 4b2faf-4b2fb3 562->563 563->557 564->557
                                                                      APIs
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • strcat.MSVCRT ref: 004B2ED1
                                                                      • strncpy.MSVCRT ref: 004B2F02
                                                                      • strcat.MSVCRT ref: 004B2F12
                                                                      • _open.MSVCRT ref: 004B2F22
                                                                      • fprintf.MSVCRT ref: 004B2F4C
                                                                      • _read.MSVCRT ref: 004B2F82
                                                                      • strcat.MSVCRT ref: 004B2FE3
                                                                      • _close.MSVCRT ref: 004B2FF1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Resourcefprintfstrcat$FindLoadLock_close_open_readstrncpy
                                                                      • String ID: Loading:%s$l4j.ini
                                                                      • API String ID: 1951458220-28774081
                                                                      • Opcode ID: ff23a8f85a0f9f8221ffce791e463de03fb1707bae0f0fee973aa21eff84fb30
                                                                      • Instruction ID: cd0438025359b1cb3888dcb6ece0a6a77e5fdebaa93d86e431e4c9033e8b58d3
                                                                      • Opcode Fuzzy Hash: ff23a8f85a0f9f8221ffce791e463de03fb1707bae0f0fee973aa21eff84fb30
                                                                      • Instruction Fuzzy Hash: B94183709043049BD710AF79C5843EEBBE0EB85354F14896FE9889B381D7BCD8819BA6

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 565 4b63f0-4b6403 566 4b6409-4b640c 565->566 567 4b6622-4b662f _errno 565->567 568 4b6412-4b6431 _fullpath 566->568 569 4b65f1-4b65fe _errno 566->569 570 4b653f-4b6549 567->570 571 4b6550-4b6564 568->571 572 4b6437-4b644b 568->572 569->570 571->571 573 4b6566-4b6587 571->573 572->572 574 4b644d-4b6465 572->574 575 4b658d-4b658f 573->575 576 4b6467-4b6482 malloc 573->576 574->576 575->576 577 4b6595-4b659e 575->577 578 4b6488-4b64b9 memcpy _findfirst 576->578 579 4b6610-4b661d _errno 576->579 580 4b65a0-4b65b4 577->580 581 4b64bf-4b6539 strncpy 578->581 582 4b65c0-4b65e0 _errno 578->582 579->570 580->580 583 4b65b6 580->583 581->570 584 4b6603-4b660e _errno 582->584 585 4b65e2-4b65ec free 582->585 583->582 584->585 585->570
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _errno$_findfirst_fullpathmallocmemcpystrncpy
                                                                      • String ID:
                                                                      • API String ID: 114964343-0
                                                                      • Opcode ID: 617703f76fd749dff74b2c6018ee418b6078d3074324700df7586d43ea141d78
                                                                      • Instruction ID: b1017c8aa6733b5b899a3452e2adaaf93ae4f0fb08f7c17e9c303c607d40a39c
                                                                      • Opcode Fuzzy Hash: 617703f76fd749dff74b2c6018ee418b6078d3074324700df7586d43ea141d78
                                                                      • Instruction Fuzzy Hash: 8E517DB01047058FD720DF29C8853DAB7E1EF89304F498A6EE4D9C7255E77CA485CB66

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 586 4b3a11-4b3af0 call 4bb3d0 strcpy strcat * 3 CreateProcessA 589 4b3af2-4b3af6 586->589 590 4b3b36-4b3b3c 586->590 592 4b3b29 589->592 593 4b3af8-4b3b27 WaitForSingleObject GetExitCodeProcess call 4b39ed 589->593 591 4b3b3e-4b3b45 590->591 594 4b3b2f-4b3b34 592->594 593->594 594->591
                                                                      APIs
                                                                      • strcpy.MSVCRT ref: 004B3A69
                                                                      • strcat.MSVCRT ref: 004B3A79
                                                                      • strcat.MSVCRT ref: 004B3A89
                                                                      • strcat.MSVCRT ref: 004B3A99
                                                                      • CreateProcessA.KERNEL32 ref: 004B3AE6
                                                                      • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,00000000,?,004B1B58), ref: 004B3B08
                                                                      • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 004B3B1B
                                                                        • Part of subcall function 004B39ED: CloseHandle.KERNEL32 ref: 004B39FB
                                                                        • Part of subcall function 004B39ED: CloseHandle.KERNEL32(00000000), ref: 004B3A09
                                                                      Strings
                                                                      • -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe", xrefs: 004B3A8E
                                                                      • D, xrefs: 004B3A48
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcat$CloseHandleProcess$CodeCreateExitObjectSingleWaitstrcpy
                                                                      • String ID: -jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"$D
                                                                      • API String ID: 3105771607-2527456581
                                                                      • Opcode ID: fc993daaacd0f92b341ee5a08f9cc55f4793fbe8df66cc21e02ae1c350badb7c
                                                                      • Instruction ID: d8fe2ae6f1b52e1f6a0561df22b5913a813d9f165e9f13506de1bb65b6fd2438
                                                                      • Opcode Fuzzy Hash: fc993daaacd0f92b341ee5a08f9cc55f4793fbe8df66cc21e02ae1c350badb7c
                                                                      • Instruction Fuzzy Hash: 7F3134B0409314DFD750AF19C48479EBBE4FB84318F40891EE48857351CBB99949DFA6

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 597 4b6640-4b6653 598 4b6659-4b666d 597->598 599 4b678d-4b6798 _errno 597->599 600 4b66eb-4b66fd strlen 598->600 601 4b666f-4b6691 _errno _findnext 598->601 602 4b670b-4b6717 599->602 605 4b6718-4b6727 600->605 606 4b66ff-4b6702 600->606 603 4b6728-4b6736 601->603 604 4b6697-4b66e9 strncpy 601->604 608 4b6738-4b673e 603->608 609 4b6782-4b678b 603->609 604->600 610 4b675f-4b6769 GetLastError 604->610 606->605 607 4b6704 606->607 607->602 611 4b6740-4b674c 608->611 612 4b6774-4b6780 608->612 609->608 610->602 613 4b676b-4b6772 _errno 610->613 614 4b674e-4b6753 611->614 615 4b6757-4b675a 611->615 612->611 613->602 614->615 615->610 616 4b675c 615->616 616->610
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _errno$ErrorLast_findnextstrlenstrncpy
                                                                      • String ID:
                                                                      • API String ID: 2306919634-0
                                                                      • Opcode ID: 91a493b97e1567579b3ad9968e914a421ba7be3c6a2e9bf5d9fabaac9b9aaaf8
                                                                      • Instruction ID: db4ebd29ea2aebf4d2dd8cf865ed50d30b89ac7f8e37cfe9ab019fc4f089a3cd
                                                                      • Opcode Fuzzy Hash: 91a493b97e1567579b3ad9968e914a421ba7be3c6a2e9bf5d9fabaac9b9aaaf8
                                                                      • Instruction Fuzzy Hash: 9C415D755042018FCB10DF68C4C569ABBE1EF85318F1686AEEC488F346DB78D945CBA6

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 617 4b12b9 618 4b12c0-4b12c3 617->618 619 4b12c9-4b12cc 618->619 620 4b14b0-4b14b3 618->620 621 4b12d2-4b12d5 619->621 622 4b1500-4b1504 619->622 623 4b1235-4b1241 620->623 626 4b12db-4b12ec 621->626 627 4b1422 621->627 628 4b150a-4b150c 622->628 629 4b12f2 622->629 624 4b1247-4b124a 623->624 625 4b1336-4b1338 623->625 624->622 630 4b1250 624->630 633 4b133e 625->633 634 4b155d-4b155f 625->634 626->628 626->629 632 4b12ff-4b1304 628->632 631 4b12f4-4b12fd 629->631 630->618 635 4b1252-4b1255 630->635 631->631 631->632 636 4b130a-4b130e 632->636 637 4b14a1-4b14a4 632->637 638 4b1340-4b1349 633->638 640 4b1565-4b1567 634->640 641 4b125b-4b1260 635->641 642 4b14b8-4b14bf 635->642 636->637 643 4b1314-4b1317 636->643 637->620 638->638 639 4b134b-4b134f 638->639 644 4b1351-4b1354 639->644 645 4b1356-4b1375 call 4b5e70 639->645 646 4b14dc-4b14de 640->646 641->622 647 4b1266-4b1269 641->647 642->627 648 4b14c5-4b14c9 642->648 643->637 649 4b131d-4b1330 643->649 644->645 650 4b137a-4b1394 644->650 645->650 654 4b14ea-4b14f9 646->654 655 4b14e0-4b14e4 646->655 647->627 652 4b126f-4b1273 647->652 648->640 653 4b14cf 648->653 649->624 649->625 656 4b13d8-4b141d __p__fmode call 4b4cd0 call 4b4b60 __p__environ call 4bba30 _cexit ExitProcess 650->656 657 4b1396-4b13d3 _setmode * 3 650->657 658 4b1279-4b127c 652->658 659 4b1556 652->659 660 4b14d1-4b14da 653->660 654->623 655->654 661 4b1295-4b12a3 655->661 657->656 663 4b1280-4b1289 658->663 659->634 660->646 660->660 661->623 663->663 665 4b128b-4b128d 663->665 667 4b128f-4b1293 665->667 668 4b12a5-4b12b4 665->668 667->661 667->668 668->618 668->623
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _setmode$ExitProcess__getmainargs__p__environ__p__fmode_cexit
                                                                      • String ID:
                                                                      • API String ID: 2438820944-0
                                                                      • Opcode ID: cac63f0a5df829a0a52e2c47758baff1de0ca947977b6838221345e7a9b778fe
                                                                      • Instruction ID: 1076dd75e80a62626fb184eed2a71e1a7f3db391161e203f30aaf8100f627f90
                                                                      • Opcode Fuzzy Hash: cac63f0a5df829a0a52e2c47758baff1de0ca947977b6838221345e7a9b778fe
                                                                      • Instruction Fuzzy Hash: E6415E74E04304CFDB50DF79D890B9EBBE1BF99318F46856AE884D7321E73898418B69
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValuestrcpy
                                                                      • String ID: C:\Program Files (x86)\Java\jre-1.8$JavaHome
                                                                      • API String ID: 1410419071-2792304130
                                                                      • Opcode ID: 2561926f3066c133b3cf8180a97385755e437d538a7ccf61b84f78a4e962b0a6
                                                                      • Instruction ID: a378e10dd6f79e14ccf3a38bac6ddba378920671cb6820c7d04b7c826518be07
                                                                      • Opcode Fuzzy Hash: 2561926f3066c133b3cf8180a97385755e437d538a7ccf61b84f78a4e962b0a6
                                                                      • Instruction Fuzzy Hash: D72175709053599FDB20DF69D9847DAFBF4EB48304F00846ED98893300D7B499498F96
                                                                      APIs
                                                                      • GlobalMemoryStatusEx.KERNEL32 ref: 004B2E36
                                                                        • Part of subcall function 004B2CCE: fprintf.MSVCRT ref: 004B2D81
                                                                        • Part of subcall function 004B2CCE: fprintf.MSVCRT ref: 004B2DC3
                                                                        • Part of subcall function 004B2CCE: strcat.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,004B2E6A), ref: 004B2DD5
                                                                        • Part of subcall function 004B2CCE: _itoa.MSVCRT ref: 004B2DFC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$GlobalMemoryStatus_itoastrcat
                                                                      • String ID: -Xms$-Xmx$@
                                                                      • API String ID: 1064291243-2676391021
                                                                      • Opcode ID: c13f8e56175e4410722a46dcaa77d93eb6ea2fc610d9efb0a9eaf608fbee8975
                                                                      • Instruction ID: 6effd6fc5b69954c93d3030362d2b8c82546550e04dc531f5764c822179b2975
                                                                      • Opcode Fuzzy Hash: c13f8e56175e4410722a46dcaa77d93eb6ea2fc610d9efb0a9eaf608fbee8975
                                                                      • Instruction Fuzzy Hash: 830184B0909309AFDB00EF55D18568EBBF4AF88318F50881DE588A7341D3B899499FA6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _strdupmallocstrlen
                                                                      • String ID: glob-1.0-mingw32
                                                                      • API String ID: 3776109042-3253302226
                                                                      • Opcode ID: 58e2cc77ebc2e73923943afd9d1152f4352bc92e973db9bd860687428f855a7a
                                                                      • Instruction ID: 0768df3bab0c210ec5c04a90d823b9e75c45c267334c24d15bd7dfa956608430
                                                                      • Opcode Fuzzy Hash: 58e2cc77ebc2e73923943afd9d1152f4352bc92e973db9bd860687428f855a7a
                                                                      • Instruction Fuzzy Hash: 3A113BB2A046084BCF10AF29D8413EEFB61EE50314F58459FEC9487342E339DA15C7B5
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CommandHandleInfoLineModuleStartup
                                                                      • String ID:
                                                                      • API String ID: 1628297973-0
                                                                      • Opcode ID: 24ab8eb71bb645cf36de499fa8a534a93647ab79a2c1463b5c0ad30472aac9a0
                                                                      • Instruction ID: f4d57047dae7c3f23cbe7b643959c17080e408f7b018e9c35d5a3b1b5c23f767
                                                                      • Opcode Fuzzy Hash: 24ab8eb71bb645cf36de499fa8a534a93647ab79a2c1463b5c0ad30472aac9a0
                                                                      • Instruction Fuzzy Hash: BE21FBB2C4431849DF3066A984853F67BA5DB2A304F84005BDCD146245E3ED6947D6FF
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _errno_findclosefree
                                                                      • String ID:
                                                                      • API String ID: 531968878-0
                                                                      • Opcode ID: c384672c9782469b7d01815495fe31bd96caf040fa83a3d94504463f27ecc95e
                                                                      • Instruction ID: 02eda7f8ac2ce1f5e2465d55e6faee2409fe12c9192e03e83055d95e5a418561
                                                                      • Opcode Fuzzy Hash: c384672c9782469b7d01815495fe31bd96caf040fa83a3d94504463f27ecc95e
                                                                      • Instruction Fuzzy Hash: 74E04FB56043584FCB107E29988169676D4AB44368F160ABFED848B382EF7C880097B6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fputs
                                                                      • String ID: registryJreSearch()
                                                                      • API String ID: 1795875747-1180825924
                                                                      • Opcode ID: 6aa600b41215d0b2c11a396902e6993a8634f0f3e439ee670578056b4cae92ba
                                                                      • Instruction ID: 1cec9d46727728e83784888e596fcf894483679f2e85283147b35e9ed10ba85f
                                                                      • Opcode Fuzzy Hash: 6aa600b41215d0b2c11a396902e6993a8634f0f3e439ee670578056b4cae92ba
                                                                      • Instruction Fuzzy Hash: FFE04F60504341CED3447BBA9805BA676E45784344F4584AFA4C4C23A2EBBCD881DB7E
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: c8171771f55805592ee4753954c1db0c6697d052e603e55c123443acfda92c2c
                                                                      • Instruction ID: 5fe5a0c14c91497f6eb5dc5c1cff37ccf39630b875e11d480a796a5f3f9d4824
                                                                      • Opcode Fuzzy Hash: c8171771f55805592ee4753954c1db0c6697d052e603e55c123443acfda92c2c
                                                                      • Instruction Fuzzy Hash: 1F01A2B2C083684DDF305B6994853E9BBE0EB19304F88444BDCD556245D3BD1985DBAA
                                                                      APIs
                                                                      • __set_app_type.MSVCRT ref: 004B159A
                                                                        • Part of subcall function 004B1180: SetUnhandledExceptionFilter.KERNEL32 ref: 004B11B5
                                                                        • Part of subcall function 004B1180: GetCommandLineA.KERNEL32 ref: 004B11D4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CommandExceptionFilterLineUnhandled__set_app_type
                                                                      • String ID:
                                                                      • API String ID: 3309298700-0
                                                                      • Opcode ID: f71f1bdde41f994dc267a0c22ef02b59027553b9476ef57eb8e12268043e628f
                                                                      • Instruction ID: 5926610b3c5ac22b2f90000c7d7afb02347d09e36ce65aa1d0f60b4063b79708
                                                                      • Opcode Fuzzy Hash: f71f1bdde41f994dc267a0c22ef02b59027553b9476ef57eb8e12268043e628f
                                                                      • Instruction Fuzzy Hash: 26C09B314005559BC7007F24D415394F7B4FF40348F45451CD59527021C77435158BF6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$strcat$ErrorExecuteFormatFreeLastLocalMessageShell
                                                                      • String ID: Error msg:%s$Error:%s$Open URL:%s$open
                                                                      • API String ID: 623906192-1000128352
                                                                      • Opcode ID: fd4f11f9515f14a4611dab8d421211257b6dd689ae44fc5d4cf1671db0062350
                                                                      • Instruction ID: fa502354c16783e4c48d72151efd12107ca425c107f692f0b144c33707ff440a
                                                                      • Opcode Fuzzy Hash: fd4f11f9515f14a4611dab8d421211257b6dd689ae44fc5d4cf1671db0062350
                                                                      • Instruction Fuzzy Hash: 3A31E7B0908305ABD700EF65C58979EBBF4EB84748F40C89EE4C85B351D7BC8944CBAA
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$fprintf$ErrorFindLastLoadLockfputs
                                                                      • String ID: %s$<NULL>$Resource %d:
                                                                      • API String ID: 2361679423-125972688
                                                                      • Opcode ID: 701135b07c157d1c6ab9fbac5f1843ad119ad51adb30435613b687e596c842d5
                                                                      • Instruction ID: 5f44dafc459bc015240680493c61ea53dd01972e2737f53a503d90b549dbf37c
                                                                      • Opcode Fuzzy Hash: 701135b07c157d1c6ab9fbac5f1843ad119ad51adb30435613b687e596c842d5
                                                                      • Instruction Fuzzy Hash: 8B213571505311ABD710AF2ADA447AB7BE4EB45744F04C47FEA8887311D7B88841CBAA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $9$Infinity$NaN
                                                                      • API String ID: 0-197352145
                                                                      • Opcode ID: 402d001ae8b11e61839b5107dbd5ca1335434da14b4d7b3c019517b097fa2b76
                                                                      • Instruction ID: e16ca7cb7a5eb6b369bdb38c4967c118127d98724a168b8f7bd3069856d91c08
                                                                      • Opcode Fuzzy Hash: 402d001ae8b11e61839b5107dbd5ca1335434da14b4d7b3c019517b097fa2b76
                                                                      • Instruction Fuzzy Hash: 01C233B1A083419FC714EF29C48429BBBE0BB84358F148D1EE98997351E379D855CFAB
                                                                      APIs
                                                                        • Part of subcall function 004B2168: strcmp.MSVCRT ref: 004B2198
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                        • Part of subcall function 004B206E: SetLastError.KERNEL32 ref: 004B2132
                                                                        • Part of subcall function 004B206E: fputs.MSVCRT ref: 004B215A
                                                                      • fprintf.MSVCRT ref: 004B3566
                                                                      • fputs.MSVCRT ref: 004B3593
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B35C7
                                                                      • strtok.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B360B
                                                                      • fprintf.MSVCRT ref: 004B3632
                                                                      • strpbrk.MSVCRT ref: 004B3642
                                                                      • strrchr.MSVCRT ref: 004B365A
                                                                      • strncpy.MSVCRT ref: 004B3684
                                                                      • _findfirst.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B36A7
                                                                      • strncpy.MSVCRT ref: 004B3735
                                                                      • strcpy.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B3747
                                                                      • fprintf.MSVCRT ref: 004B3774
                                                                      • _findnext.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B3786
                                                                      • _findclose.MSVCRT ref: 004B37A4
                                                                      • strncpy.MSVCRT ref: 004B381A
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B387A
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B38A0
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B38B0
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A4F,?,?,00000000,?,004B1822), ref: 004B38B7
                                                                      • strncat.MSVCRT ref: 004B38D1
                                                                        • Part of subcall function 004B25E6: strcat.MSVCRT(?,?,?,?,004B3151,?,?), ref: 004B2612
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcat$fprintf$Resourcestrncpy$fputs$ErrorFindLastLoadLock_findclose_findfirst_findnextstrcmpstrcpystrncatstrpbrkstrrchrstrtok
                                                                      • String ID: " :%s$-classpath "$-jar "$-jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"$0L$0L$0L$Add classpath:%s$Info:Classpath not defined.$Main class:%s$\
                                                                      • API String ID: 613304418-3541880247
                                                                      • Opcode ID: 5a2a5a1beada6d07a565fde73b6df7626c896ef64d9268419e9593769f9b1d0b
                                                                      • Instruction ID: cff29a95efd578b30c6b9cb8da49d8e95b6d5447fbf66bba1119f0eab79a6e91
                                                                      • Opcode Fuzzy Hash: 5a2a5a1beada6d07a565fde73b6df7626c896ef64d9268419e9593769f9b1d0b
                                                                      • Instruction Fuzzy Hash: 43B1ECB49053189BCB609F2AC9849DDBBF0BF45704F0089AEE4C897311D7B896C5DF6A
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcmp$strncat$strcatstrchr$CurrentDirectoryfprintf
                                                                      • String ID: %$C:\Program Files (x86)\Java\jre-1.8$EXEDIR$EXEFILE$HKEY$JREHOMEDIR$OLDPWD$PWD$Substitute:%s = %s
                                                                      • API String ID: 54753763-1518370859
                                                                      • Opcode ID: 8af669a2995c37c499a045281c2168f74a18af592593be7de09327cfcc3c2dd6
                                                                      • Instruction ID: 6793be350c77875c8170d320c5b406f4df1bf081c2b957ff62ecd499653220ea
                                                                      • Opcode Fuzzy Hash: 8af669a2995c37c499a045281c2168f74a18af592593be7de09327cfcc3c2dd6
                                                                      • Instruction Fuzzy Hash: 5351FFB09097059FD754AF25C9441AEBBF4FF84344F00C86EE4C897311DBB8D9459BAA
                                                                      APIs
                                                                      • strstr.MSVCRT ref: 004B21F5
                                                                      • strstr.MSVCRT ref: 004B2209
                                                                      • strstr.MSVCRT ref: 004B221D
                                                                      • strstr.MSVCRT ref: 004B2231
                                                                      • strstr.MSVCRT ref: 004B2247
                                                                      • strchr.MSVCRT ref: 004B2280
                                                                      • strrchr.MSVCRT ref: 004B2293
                                                                      • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004B22C6
                                                                      • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,00000000,?,?,004B4563,00000001,00000000,000000B7,?), ref: 004B22F2
                                                                      • RegQueryValueExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,004B4563), ref: 004B232B
                                                                      • RegCloseKey.ADVAPI32 ref: 004B2343
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strstr$Open$CloseQueryValuestrchrstrrchr
                                                                      • String ID: HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$\
                                                                      • API String ID: 356245303-3439841907
                                                                      • Opcode ID: 628f704f7ffb81da23a14507b7d0db3609c9306cfbfaeb1c61f8617248949b54
                                                                      • Instruction ID: 125b847e28d407d601bd858cf860050c585028070f9932fc0e2bdd8719db975c
                                                                      • Opcode Fuzzy Hash: 628f704f7ffb81da23a14507b7d0db3609c9306cfbfaeb1c61f8617248949b54
                                                                      • Instruction Fuzzy Hash: 274118B1909715DFCB00AFA9C98429EFBE4AF44704F01896FE89497311D7BC89449FA7
                                                                      APIs
                                                                      • fprintf.MSVCRT ref: 004B42BA
                                                                      • CreatePipe.KERNEL32 ref: 004B4302
                                                                      • fputs.MSVCRT ref: 004B4322
                                                                      • SetHandleInformation.KERNEL32(?,?,?,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4347
                                                                      • fputs.MSVCRT ref: 004B4367
                                                                      • CloseHandle.KERNEL32 ref: 004B4375
                                                                      • strcpy.MSVCRT ref: 004B43AC
                                                                      • fputs.MSVCRT ref: 004B4405
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4413
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,004B4874,?,?,00000000,?,004B1822), ref: 004B4464
                                                                      Strings
                                                                      • Cannot set handle information, xrefs: 004B4360
                                                                      • Cannot run java(w) -version, xrefs: 004B43FE
                                                                      • "%s" -version, xrefs: 004B43C3
                                                                      • Cannot create pipe, xrefs: 004B431B
                                                                      • Check Java Version: %s min=%s max=%s, xrefs: 004B42AF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Handle$Closefputs$CreateInformationPipefprintfstrcpy
                                                                      • String ID: "%s" -version$Cannot create pipe$Cannot run java(w) -version$Cannot set handle information$Check Java Version: %s min=%s max=%s
                                                                      • API String ID: 571126077-3734277957
                                                                      • Opcode ID: 29cb85a8793d7d455a4334a66fd5f5f2cbc5e33c55f71a88551f486518ad4ede
                                                                      • Instruction ID: 24a24b0b4ac6f8b736e67971df3063b8189bf49e54acc3ffd9b89aaecfac4736
                                                                      • Opcode Fuzzy Hash: 29cb85a8793d7d455a4334a66fd5f5f2cbc5e33c55f71a88551f486518ad4ede
                                                                      • Instruction Fuzzy Hash: 3D510CB09057149FDB10AF25D44569EBBF4FF84744F00C8AEE88897301DB789A85CFAA
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strstr$fprintf$EnvironmentVariable
                                                                      • String ID: Version:%s$--l4j-debug$--l4j-debug-all$3.50$CmdLine:%s %s$Launch4j$debug$debug-all
                                                                      • API String ID: 1078084263-4240183270
                                                                      • Opcode ID: 266e2130839a30b1d37513d9fe2dac49ea3f919619abb46cddfc83b67acc71aa
                                                                      • Instruction ID: bd95a7b03df6f7621c3d2ee96317bbcde54b16380b6b24f5e95f2d8cdf1c9863
                                                                      • Opcode Fuzzy Hash: 266e2130839a30b1d37513d9fe2dac49ea3f919619abb46cddfc83b67acc71aa
                                                                      • Instruction Fuzzy Hash: 3D214FB09193059BC710AF36C94459EBBE4EF84348F41C87FE88887311E7B9D8459BAA
                                                                      APIs
                                                                      • strcpy.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B23CF
                                                                        • Part of subcall function 004B2356: strchr.MSVCRT ref: 004B2377
                                                                        • Part of subcall function 004B2356: strchr.MSVCRT ref: 004B2389
                                                                      • strncpy.MSVCRT ref: 004B243B
                                                                      • strcpy.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B2462
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B2481
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B24A7
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B24C3
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B24E9
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B24FE
                                                                      • fputs.MSVCRT ref: 004B2545
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B255E
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B256E
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B257E
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004B47F3,?,?,00000000,?,004B1822), ref: 004B258E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcat$strchrstrcpy$fputsstrncpy
                                                                      • String ID: 1.0_
                                                                      • API String ID: 2030749601-2140295588
                                                                      • Opcode ID: 6790027395c984c944a9a135eb5c4811e0dafdc918a6811114415e19e272420b
                                                                      • Instruction ID: 741b2148fce5d66224acd059595b00347091eb1f9828c7ed1c82e0360e7f0e11
                                                                      • Opcode Fuzzy Hash: 6790027395c984c944a9a135eb5c4811e0dafdc918a6811114415e19e272420b
                                                                      • Instruction Fuzzy Hash: E0516C709052089FCB10EF69C9845EEBBF1FF48314F50C96EE895AB241D7B89841DF6A
                                                                      APIs
                                                                      Strings
                                                                      • ", xrefs: 004B3C29
                                                                      • Java version output: %s, xrefs: 004B3BE2
                                                                      • Cannot get version string: missing end quote, xrefs: 004B3C4A
                                                                      • 64-bit, xrefs: 004B3C9C
                                                                      • Cannot get version string: data too large, xrefs: 004B3C67
                                                                      • 64-Bit, xrefs: 004B3C83
                                                                      • Cannot get version string: cannot find quote, xrefs: 004B3C1D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strchrstrstr$FileReadfprintffputs
                                                                      • String ID: "$64-Bit$64-bit$Cannot get version string: cannot find quote$Cannot get version string: data too large$Cannot get version string: missing end quote$Java version output: %s
                                                                      • API String ID: 654744459-1675060857
                                                                      • Opcode ID: 36082a193cf58a9ce42cf6aaccfd978061933c795e93c42f2eb7a0b392bbdbf9
                                                                      • Instruction ID: bc9291eb9b44e1eed3671cdcc9e3777a46f4ca0f82cde82fc5ee812f774a46a8
                                                                      • Opcode Fuzzy Hash: 36082a193cf58a9ce42cf6aaccfd978061933c795e93c42f2eb7a0b392bbdbf9
                                                                      • Instruction Fuzzy Hash: AF4141B1A083049BD7109F3AC9447DABBF4EF44705F41C86EE88897301E778E944CBAA
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strlen$_strdup
                                                                      • String ID: \
                                                                      • API String ID: 2848476203-2967466578
                                                                      • Opcode ID: 8ce9d6c2032786f2e6b85c43e24765aac631c61c687c19720561fc3cb001510f
                                                                      • Instruction ID: 96d070ca2b5dfeaa913ddcf5009f5b384c4f9485b4c744ddf21d1107668c2e7c
                                                                      • Opcode Fuzzy Hash: 8ce9d6c2032786f2e6b85c43e24765aac631c61c687c19720561fc3cb001510f
                                                                      • Instruction Fuzzy Hash: 5D914971E04B088FDB14EF69D4813EEFBF1AF48314F19852EE855AB341E77898418BA5
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Protectmemcpy$Queryabortfwritevfprintf
                                                                      • String ID: @$Mingw runtime failure:
                                                                      • API String ID: 978211760-2549925133
                                                                      • Opcode ID: 21abc95c359f6742e916b2acd8e806df07f62c6f473eb615119597a22224dfe7
                                                                      • Instruction ID: 166856742baa950dd95cc0cf88c9e091a06c145eaf95691da668243991727a56
                                                                      • Opcode Fuzzy Hash: 21abc95c359f6742e916b2acd8e806df07f62c6f473eb615119597a22224dfe7
                                                                      • Instruction Fuzzy Hash: B531F8B4905308AFDB00EF69D48059EFBF4EF88754F40882EF88893311D7789844CBA6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$fprintf$CreateProcess
                                                                      • String ID: Cannot create process %s$Create process: %s$D
                                                                      • API String ID: 991247836-3672066502
                                                                      • Opcode ID: 727eb8c50742a51dcf59c9a8fc2e6818ac775aa6d8601db12ed43da0e816916f
                                                                      • Instruction ID: b6b1ed7b9b1908a9211eecd96a3676ce17cec6f9b0c7660204060f25a830331a
                                                                      • Opcode Fuzzy Hash: 727eb8c50742a51dcf59c9a8fc2e6818ac775aa6d8601db12ed43da0e816916f
                                                                      • Instruction Fuzzy Hash: 2531DAB19043059BDB10DF6AD44479EFBF4FB88308F00892EE95897341D77995448FA6
                                                                      APIs
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A5A,?,?,00000000,?,004B1822), ref: 004B3950
                                                                      • strcat.MSVCRT(?,00000000,?,?,004B4A5A,?,?,00000000,?,004B1822), ref: 004B3960
                                                                      • strcpy.MSVCRT(?,00000000,?,?,004B4A5A,?,?,00000000,?,004B1822), ref: 004B3971
                                                                      • strstr.MSVCRT ref: 004B3981
                                                                      • strchr.MSVCRT ref: 004B3997
                                                                      • strcat.MSVCRT ref: 004B39CD
                                                                      • strcat.MSVCRT ref: 004B39DD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcat$Resource$fprintf$FindLoadLockstrchrstrcpystrstr
                                                                      • String ID: $--l4j-$-jar "C:\Users\user\Desktop\SAMPLE_5.exe.bin.exe"
                                                                      • API String ID: 3962799999-476743524
                                                                      • Opcode ID: 7143cd3b99f9d9ca80f6ae1bb6d933de1fe5760a5df12ab2d71989ef2f236911
                                                                      • Instruction ID: 6f5c12ac8f43f9b543abf3af6cc9441d14f431cbe5f37bb4e67be38537b80095
                                                                      • Opcode Fuzzy Hash: 7143cd3b99f9d9ca80f6ae1bb6d933de1fe5760a5df12ab2d71989ef2f236911
                                                                      • Instruction Fuzzy Hash: 972142B04093049ED7606F2A854979EBBE0EF85714F05C85FA4C897241D7FC8988DBBB
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: wcstombs$mbstowcs$freereallocsetlocale
                                                                      • String ID: /
                                                                      • API String ID: 2027400679-2043925204
                                                                      • Opcode ID: a629ef2b6a3aa74357a0babbe366cc469a75cde366faecfdfda3c0db8136e4bf
                                                                      • Instruction ID: 04f56da5e94ed42edd994704819c887e4b3f2f70943771e1d8ecf1819f54db78
                                                                      • Opcode Fuzzy Hash: a629ef2b6a3aa74357a0babbe366cc469a75cde366faecfdfda3c0db8136e4bf
                                                                      • Instruction Fuzzy Hash: 2641FA75D042198BCB14EFA9C0416EEB7F1FF48300F45856FE899A7351E77C98418BAA
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: AddressCurrentHandleModuleProcProcessfprintf
                                                                      • String ID: IsWow64Process$WOW64:%s$Yes$kernel32
                                                                      • API String ID: 24026888-2598006572
                                                                      • Opcode ID: 142e638adeeee39d45baf45bb28edbf4cd0f209f33c58466eb8148af1d2c036f
                                                                      • Instruction ID: 5f68d047ce68afb5f2d478ec74c800bd5b8c5e72c4c6963c4ead7b573d0f0b96
                                                                      • Opcode Fuzzy Hash: 142e638adeeee39d45baf45bb28edbf4cd0f209f33c58466eb8148af1d2c036f
                                                                      • Instruction Fuzzy Hash: 96F018B0608344EFD704BF7A9485A6B76E8EB84708F51C87EE48497201E779D8449B7E
                                                                      APIs
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • strcat.MSVCRT ref: 004B31D6
                                                                      • strcat.MSVCRT ref: 004B31EA
                                                                      • strcat.MSVCRT ref: 004B3207
                                                                      • strcat.MSVCRT ref: 004B321B
                                                                      • strcat.MSVCRT ref: 004B3238
                                                                      • strcat.MSVCRT ref: 004B327E
                                                                      • strcat.MSVCRT ref: 004B328E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcat$Resource$fprintf$FindLoadLock
                                                                      • String ID: (64-bit)$ -
                                                                      • API String ID: 2267084178-2895498852
                                                                      • Opcode ID: 9214f0365a8935e06f053b81df26eeaa87f93f5d103d53f5d53b5e3bfae989bd
                                                                      • Instruction ID: 2be4b1599664900c90ae90a4d8240a8cd1cc01716109061b93839a4310e9179a
                                                                      • Opcode Fuzzy Hash: 9214f0365a8935e06f053b81df26eeaa87f93f5d103d53f5d53b5e3bfae989bd
                                                                      • Instruction Fuzzy Hash: 5421D4B4809305AAE7506F5A950D7AEBBF4EB80708F05889F91C41A241DBBC4D85EB7B
                                                                      APIs
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • strtok.MSVCRT(?,00000000,?,?,004B49E7,?,?,00000000,?,004B1822), ref: 004B3424
                                                                      • strchr.MSVCRT ref: 004B343A
                                                                        • Part of subcall function 004B2A7B: strchr.MSVCRT ref: 004B2ACE
                                                                        • Part of subcall function 004B2A7B: strchr.MSVCRT ref: 004B2AFD
                                                                        • Part of subcall function 004B2A7B: strncat.MSVCRT ref: 004B2B25
                                                                        • Part of subcall function 004B2A7B: strncat.MSVCRT ref: 004B2B4D
                                                                        • Part of subcall function 004B2A7B: strcmp.MSVCRT ref: 004B2B6A
                                                                        • Part of subcall function 004B2A7B: strncat.MSVCRT ref: 004B2B84
                                                                        • Part of subcall function 004B2A7B: strcmp.MSVCRT ref: 004B2B99
                                                                        • Part of subcall function 004B2A7B: strcat.MSVCRT ref: 004B2C7F
                                                                        • Part of subcall function 004B2A7B: fprintf.MSVCRT ref: 004B2CA0
                                                                        • Part of subcall function 004B2A7B: strcat.MSVCRT(?,00000000,?,?,004B4563,00000001,00000000,000000B7,?,004B4874,?,?,00000000,?,004B1822), ref: 004B2CB8
                                                                      • fprintf.MSVCRT ref: 004B3480
                                                                      • SetEnvironmentVariableA.KERNEL32(?,?), ref: 004B348C
                                                                      • strtok.MSVCRT(?,?), ref: 004B34A2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$Resourcestrchrstrncat$strcatstrcmpstrtok$EnvironmentFindLoadLockVariable
                                                                      • String ID: =$Set var:%s = %s
                                                                      • API String ID: 3861738652-24686798
                                                                      • Opcode ID: d20e7417fedfed01a96dbddc5ddfe676d6e175c3db9734c2e339814ae228a7e7
                                                                      • Instruction ID: 4fa67770bd0b8938ca9d777c7f01eb10a49601c428b303a7c207546341c2e96b
                                                                      • Opcode Fuzzy Hash: d20e7417fedfed01a96dbddc5ddfe676d6e175c3db9734c2e339814ae228a7e7
                                                                      • Instruction Fuzzy Hash: 34211D71809718AFC711AF26C48469EBBE4EF84754F01C86EE4C997201D7B88A459BE6
                                                                      APIs
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • fprintf.MSVCRT ref: 004B305A
                                                                      • CreateMutexA.KERNEL32 ref: 004B3092
                                                                      • GetLastError.KERNEL32 ref: 004B309A
                                                                      • fprintf.MSVCRT ref: 004B30C7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$Resource$CreateErrorFindLastLoadLockMutex
                                                                      • String ID: Create mutex:%s$Error:%s$Instance already exists.
                                                                      • API String ID: 891584312-2614424452
                                                                      • Opcode ID: 1ef72a937afcc5ff8c8f39e61c40b3d749a4c0664d0eaa0c9ae8d0ff07c59bb2
                                                                      • Instruction ID: d77d9688f4ac5fff58c6212fcbdd026bea4a60951624ad4735791f78a1e95ac7
                                                                      • Opcode Fuzzy Hash: 1ef72a937afcc5ff8c8f39e61c40b3d749a4c0664d0eaa0c9ae8d0ff07c59bb2
                                                                      • Instruction Fuzzy Hash: 3B1112709043049AD720AF2AC84579EBBF5EF84704F40C8AED48C97355D7B99A85CB66
                                                                      APIs
                                                                        • Part of subcall function 004B21AB: atoi.MSVCRT ref: 004B21D3
                                                                      • fprintf.MSVCRT ref: 004B2D81
                                                                      • fprintf.MSVCRT ref: 004B2DC3
                                                                      • strcat.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,004B2E6A), ref: 004B2DD5
                                                                      • _itoa.MSVCRT ref: 004B2DFC
                                                                      Strings
                                                                      • Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB, xrefs: 004B2DB4
                                                                      • Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB, xrefs: 004B2D76
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fprintf$_itoaatoistrcat
                                                                      • String ID: Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB$Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB
                                                                      • API String ID: 2922754228-3040617333
                                                                      • Opcode ID: 2dbb17f8be8214dfa9178e33b0c73fa18139710334cdc20620380a614bf317b7
                                                                      • Instruction ID: 8bb3ec178afc464677d318a6e233521b4fd1a408a165ca5bc9f2c2f91876e3a6
                                                                      • Opcode Fuzzy Hash: 2dbb17f8be8214dfa9178e33b0c73fa18139710334cdc20620380a614bf317b7
                                                                      • Instruction Fuzzy Hash: 5F4105B4A047099BCB04DF69C58469EBBF4EF88364F10C82EE958E7350D77898418FA5
                                                                      APIs
                                                                      • ShowWindow.USER32 ref: 004B1606
                                                                      • KillTimer.USER32(00000000,00000000), ref: 004B162D
                                                                        • Part of subcall function 004B1F36: GetLastError.KERNEL32 ref: 004B1F3D
                                                                        • Part of subcall function 004B1F36: fprintf.MSVCRT ref: 004B1F60
                                                                        • Part of subcall function 004B1F36: FormatMessageA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004B1F9F
                                                                        • Part of subcall function 004B1F36: fprintf.MSVCRT ref: 004B1FC2
                                                                        • Part of subcall function 004B1F36: strcat.MSVCRT ref: 004B1FD6
                                                                        • Part of subcall function 004B1F36: strcat.MSVCRT ref: 004B1FE9
                                                                        • Part of subcall function 004B1F36: LocalFree.KERNEL32 ref: 004B1FF1
                                                                        • Part of subcall function 004B1F36: fprintf.MSVCRT ref: 004B2028
                                                                        • Part of subcall function 004B1F36: ShellExecuteA.SHELL32 ref: 004B205C
                                                                      • PostQuitMessage.USER32(00000000), ref: 004B1640
                                                                      • EnumWindows.USER32 ref: 004B1668
                                                                      • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 004B167F
                                                                      • KillTimer.USER32 ref: 004B16B4
                                                                      • PostQuitMessage.USER32(00000000), ref: 004B16C2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Messagefprintf$KillPostQuitTimerstrcat$CodeEnumErrorExecuteExitFormatFreeLastLocalProcessShellShowWindowWindows
                                                                      • String ID:
                                                                      • API String ID: 3625041480-0
                                                                      • Opcode ID: 3a25c40c505b5f85158e696abece4e66c02679203f450ebb0dc58c6061d44d95
                                                                      • Instruction ID: 37540541ec11881ca9bf78c94298231ba4a982b5e1645971dec14fb92d92edca
                                                                      • Opcode Fuzzy Hash: 3a25c40c505b5f85158e696abece4e66c02679203f450ebb0dc58c6061d44d95
                                                                      • Instruction Fuzzy Hash: CC213BB0004304DFD750AF65E869FAA37E8EB1030DF45892EE48486261C7BD9884CF7E
                                                                      APIs
                                                                      • strcpy.MSVCRT ref: 004B337C
                                                                      • strcat.MSVCRT ref: 004B338C
                                                                        • Part of subcall function 004B32B9: GetEnvironmentVariableA.KERNEL32(?,00000000,?,?,004B3399), ref: 004B32F5
                                                                        • Part of subcall function 004B32B9: strcat.MSVCRT(?,?,004B3399), ref: 004B3324
                                                                        • Part of subcall function 004B32B9: strcat.MSVCRT(?,?,004B3399), ref: 004B3333
                                                                        • Part of subcall function 004B32B9: SetEnvironmentVariableA.KERNEL32(?,?,004B3399), ref: 004B3343
                                                                      • fprintf.MSVCRT ref: 004B33BE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcat$EnvironmentVariable$fprintfstrcpy
                                                                      • String ID: Error:%s$\bin$appendToPathVar failed.
                                                                      • API String ID: 4002749114-3685084685
                                                                      • Opcode ID: bb7431f4b99f93a7232d6c2dd1199003c0aee66cf14af8bc150f8809e1485b1e
                                                                      • Instruction ID: c2dc618618f369bc89e5a6fa3f85221e7d8e5cd3cc05a1e5a96e6182f237ee92
                                                                      • Opcode Fuzzy Hash: bb7431f4b99f93a7232d6c2dd1199003c0aee66cf14af8bc150f8809e1485b1e
                                                                      • Instruction Fuzzy Hash: 7BF068715087049BD710AF26D4452FEB7E1DBC0704F41C86ED8885B301EBBC99559BAB
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: signal
                                                                      • String ID:
                                                                      • API String ID: 1946981877-0
                                                                      • Opcode ID: aeec0c4a87c07f7c9f5ab1529ee77c8b59e66693d593f2f0f948f8b159f4556e
                                                                      • Instruction ID: 3b3423c0b45bea64f330179494feb493cc8d5ae820ce0f276e8b179180c314a5
                                                                      • Opcode Fuzzy Hash: aeec0c4a87c07f7c9f5ab1529ee77c8b59e66693d593f2f0f948f8b159f4556e
                                                                      • Instruction Fuzzy Hash: 09212B705082408AD7107F7884A53AF76D0AF46368F914A1BE5E9C77E1C7BDC8C49B6B
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strcmp$fprintf
                                                                      • String ID: Ignore$Version string: %s / %s-Bit (%s)
                                                                      • API String ID: 512415533-1929821993
                                                                      • Opcode ID: c0591ffe09f756c2889398e16105e112254f80b5e34f697ca0375d75c7d125a1
                                                                      • Instruction ID: 14cc539f67aa80f2ea562661c9f145cd6f8d13c9963618db3d1f80c4bcfc170b
                                                                      • Opcode Fuzzy Hash: c0591ffe09f756c2889398e16105e112254f80b5e34f697ca0375d75c7d125a1
                                                                      • Instruction Fuzzy Hash: 131160B1605741ABD7615F6B9484797BBE4EF80319F05843FE44887350D7B8CD848BAA
                                                                      APIs
                                                                      • GetEnvironmentVariableA.KERNEL32(?,00000000,?,?,004B3399), ref: 004B32F5
                                                                      • strcat.MSVCRT(?,?,004B3399), ref: 004B3324
                                                                      • strcat.MSVCRT(?,?,004B3399), ref: 004B3333
                                                                      • SetEnvironmentVariableA.KERNEL32(?,?,004B3399), ref: 004B3343
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentVariablestrcat
                                                                      • String ID: Path
                                                                      • API String ID: 194762557-2875597873
                                                                      • Opcode ID: 7f97dc0dd09ea0c706beb5f87b722edd5a822761983ab7e4063d79c14251513d
                                                                      • Instruction ID: 754e33d0da61a4d334e685e3f30e2ecb00f0748d8c15506eb16926e64a79f690
                                                                      • Opcode Fuzzy Hash: 7f97dc0dd09ea0c706beb5f87b722edd5a822761983ab7e4063d79c14251513d
                                                                      • Instruction Fuzzy Hash: 65018075D052189BCB10BF6AD84549EBBE4EF80760F00897EF88897241DB7899448BE6
                                                                      APIs
                                                                      • GetCurrentDirectoryA.KERNEL32 ref: 004B310E
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • strncpy.MSVCRT ref: 004B3140
                                                                        • Part of subcall function 004B25E6: strcat.MSVCRT(?,?,?,?,004B3151,?,?), ref: 004B2612
                                                                      • _chdir.MSVCRT ref: 004B3154
                                                                      • fprintf.MSVCRT ref: 004B3171
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Resourcefprintf$CurrentDirectoryFindLoadLock_chdirstrcatstrncpy
                                                                      • String ID: Working dir:%s
                                                                      • API String ID: 3319590416-1807235602
                                                                      • Opcode ID: 0167a2d83956dd0ffc042f6cde8ccabdbf5315917de06ad574e32e95682801de
                                                                      • Instruction ID: 59e32bc90cd7eacd209643cf7fa1757bc82c8f532fc00dcf428816a3c0aa042d
                                                                      • Opcode Fuzzy Hash: 0167a2d83956dd0ffc042f6cde8ccabdbf5315917de06ad574e32e95682801de
                                                                      • Instruction Fuzzy Hash: F61100B1508308AFD710AF69C9815DEFBF8FF84344F418C6EA58897311D7B899848B66
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: free$_strdup_stricollmalloc
                                                                      • String ID:
                                                                      • API String ID: 1482192206-0
                                                                      • Opcode ID: 351a2a8870e22f0329fc654e75e7251c6513b7c51ff2b9e5253af2975e1597e5
                                                                      • Instruction ID: 7be193944dc9b16c531bbfcadc8e6aaa9cb8b400cd2f96d48889b7e5762514b2
                                                                      • Opcode Fuzzy Hash: 351a2a8870e22f0329fc654e75e7251c6513b7c51ff2b9e5253af2975e1597e5
                                                                      • Instruction Fuzzy Hash: 4541F471E05A188FDB149F69D4807AEFBF1BF54304F15846EE895AB341D738A840CBA4
                                                                      APIs
                                                                      • InterlockedExchange.KERNEL32 ref: 004BA8D3
                                                                      • InitializeCriticalSection.KERNEL32 ref: 004BA8E6
                                                                      • InitializeCriticalSection.KERNEL32 ref: 004BA8F5
                                                                      • EnterCriticalSection.KERNEL32 ref: 004BA920
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$Initialize$EnterExchangeInterlocked
                                                                      • String ID:
                                                                      • API String ID: 33273390-0
                                                                      • Opcode ID: 87c429a4fa58c21606a6e9a373325806676149b0c889859fa2281c1ce7e03e83
                                                                      • Instruction ID: 0b87010f8045512ea7597e75a56f946d813224f6589530f4291179387ffcd1da
                                                                      • Opcode Fuzzy Hash: 87c429a4fa58c21606a6e9a373325806676149b0c889859fa2281c1ce7e03e83
                                                                      • Instruction Fuzzy Hash: 270182F0901200DAEB90FF75D18A79F36B5EB40308F51442EC48146716E3BC99A9D7BB
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: atoisetlocalestrchr
                                                                      • String ID: .
                                                                      • API String ID: 1223908000-248832578
                                                                      • Opcode ID: e2363b09b94ebdf7a7908b4725bdd46078964bc533aeccb49155b5101b4f5384
                                                                      • Instruction ID: 7e8c1a282ac72163284bb004351b0f21e9f9dfc656a2c0686ada4258fdeab713
                                                                      • Opcode Fuzzy Hash: e2363b09b94ebdf7a7908b4725bdd46078964bc533aeccb49155b5101b4f5384
                                                                      • Instruction Fuzzy Hash: 294107B5A093058FD710DF69D88065BFBE8EF94754F05482EE99887300EBB8D844DBA6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: atoisetlocalestrchr
                                                                      • String ID: .
                                                                      • API String ID: 1223908000-248832578
                                                                      • Opcode ID: 4643a30243296a7df377f399390b2e2afc7f1dac62376ae5729e226b4d5e8b63
                                                                      • Instruction ID: f78b96c4a6b1abe5de2034e735e27007d6016036ca09eae140755a37ecb2d112
                                                                      • Opcode Fuzzy Hash: 4643a30243296a7df377f399390b2e2afc7f1dac62376ae5729e226b4d5e8b63
                                                                      • Instruction Fuzzy Hash: C9417176A083048FC7109FA9D8406AAF7E9EB94354F18482FF888C7350E779D845CBA6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: atoisetlocalestrchr
                                                                      • String ID: .
                                                                      • API String ID: 1223908000-248832578
                                                                      • Opcode ID: cadbe3afb2bb4883ce50dbc34ae2c9a2ac24db6bf0c987095bbe8016e1e4d812
                                                                      • Instruction ID: e9e7adb396b3ca5dc5e6f59ef9b24f6362768fdfbf448073bd8a3fc9900be176
                                                                      • Opcode Fuzzy Hash: cadbe3afb2bb4883ce50dbc34ae2c9a2ac24db6bf0c987095bbe8016e1e4d812
                                                                      • Instruction Fuzzy Hash: DA01D3B5A083018FD700AF2AD49565BBBE4FFC9754F01882EF88897351D7B9D844CB96
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: atoisetlocalestrchr
                                                                      • String ID: .
                                                                      • API String ID: 1223908000-248832578
                                                                      • Opcode ID: 5c1496784958f62aeae2005e36e06f63657c0c21bc893aef5dad9c03036db77c
                                                                      • Instruction ID: fb95135e748911dd5d65afa66f1ddd2242373247369b34b3abfd87703368949d
                                                                      • Opcode Fuzzy Hash: 5c1496784958f62aeae2005e36e06f63657c0c21bc893aef5dad9c03036db77c
                                                                      • Instruction Fuzzy Hash: 3501C4B8A093048FD700AF29D48565BBBE4BF89304F01892EF889C7351E779D844CB56
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: atoisetlocalestrchr
                                                                      • String ID: .
                                                                      • API String ID: 1223908000-248832578
                                                                      • Opcode ID: e595a86afbcc8180cf548ed73960309150e5a647cf45b36436f53c9d63f38b9d
                                                                      • Instruction ID: 0a6b81fee6bd0f44d9af59f6da8479abfd757709ecd79af3f3c0db72dfa94ab4
                                                                      • Opcode Fuzzy Hash: e595a86afbcc8180cf548ed73960309150e5a647cf45b36436f53c9d63f38b9d
                                                                      • Instruction Fuzzy Hash: 3BF087B2A083009FD300AF6AD48565FBBE8FF84304F00882EF48487250D7B8D840CBA2
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: fopenstrcatstrncpy
                                                                      • String ID: \launch4j.log
                                                                      • API String ID: 1410583167-1044402884
                                                                      • Opcode ID: 521cd6b367cb3005b84788c62bf0198fc54468ee03743d5d6b9719cb7c5b2cb2
                                                                      • Instruction ID: 77fffd91c2bc9a777aab610db73cf56966b9167e88279013e78ab5ddfdb95002
                                                                      • Opcode Fuzzy Hash: 521cd6b367cb3005b84788c62bf0198fc54468ee03743d5d6b9719cb7c5b2cb2
                                                                      • Instruction Fuzzy Hash: 40F0F8B59043089FCB20AF69D4411DDFBE4EF94308F01886EA58C97211D7B899958BA6
                                                                      APIs
                                                                      • IsDBCSLeadByteEx.KERNEL32 ref: 004B89A1
                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004B8B5A), ref: 004B89E0
                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004B8B5A), ref: 004B8A80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Byte$CharMultiWide$Lead
                                                                      • String ID:
                                                                      • API String ID: 2933009993-0
                                                                      • Opcode ID: c01dad700cd316040131830a86ddead0c57abd91402bd1c3d1d49247e91733aa
                                                                      • Instruction ID: c7d9ef7cffbc910ea83334d7beee09fa3eb6adea2ae5175ebd71b619480df3cf
                                                                      • Opcode Fuzzy Hash: c01dad700cd316040131830a86ddead0c57abd91402bd1c3d1d49247e91733aa
                                                                      • Instruction Fuzzy Hash: 5E414870A083059FDB10DF69D4402DABBE4EF48368F00855FE8988B340D779E954CBA2
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: _errno_findclose_findfirststrncpy
                                                                      • String ID:
                                                                      • API String ID: 1756046557-0
                                                                      • Opcode ID: 233afb7bb0cc25fe4f15c6f6278a5643bd76a5286e5f1e42dbedadc7c72b6943
                                                                      • Instruction ID: 2b03a5a901edd866f5a026581d2c50f3daad4929d31d82861380ab70b13da038
                                                                      • Opcode Fuzzy Hash: 233afb7bb0cc25fe4f15c6f6278a5643bd76a5286e5f1e42dbedadc7c72b6943
                                                                      • Instruction Fuzzy Hash: 5D312BB19153018BDB10EF28C4816D6BBE1BF88314F154A6FEC888F346E778D545CBA6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: strlenwcslen
                                                                      • String ID: (null)$(null)
                                                                      • API String ID: 803329031-1601437019
                                                                      • Opcode ID: 021178ab9d32d1292da18b92e15b1a9e21e870d7be259367a92c689d39a55b05
                                                                      • Instruction ID: bafe2f8f9894f9f1c761c1dba6af3a37a039db58ed8da41c1f6d4f3a3d6524bd
                                                                      • Opcode Fuzzy Hash: 021178ab9d32d1292da18b92e15b1a9e21e870d7be259367a92c689d39a55b05
                                                                      • Instruction Fuzzy Hash: AC113D746093458FC710DF28C8D06ABBBE5AF88304F504A2EE99147342DB39D90ACB66
                                                                      APIs
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B209D
                                                                        • Part of subcall function 004B206E: FindResourceExA.KERNEL32 ref: 004B20C1
                                                                        • Part of subcall function 004B206E: LoadResource.KERNEL32 ref: 004B20D9
                                                                        • Part of subcall function 004B206E: LockResource.KERNEL32 ref: 004B20E7
                                                                        • Part of subcall function 004B206E: fprintf.MSVCRT ref: 004B2124
                                                                      • FindWindowExA.USER32 ref: 004B179D
                                                                      • GetWindowTextA.USER32 ref: 004B17BA
                                                                      • strstr.MSVCRT ref: 004B17C9
                                                                      • FindWindowExA.USER32 ref: 004B17ED
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: FindResourceWindow$fprintf$LoadLockTextstrstr
                                                                      • String ID:
                                                                      • API String ID: 2277964966-0
                                                                      • Opcode ID: 95a9f5b95524026365e8c7ac09c65ee1ba0843219f0e1703a3545d923de10726
                                                                      • Instruction ID: 0ea27837128f8f9ec3f7b79de60d72d9c262b23a83dc331c9b9771fd6e5887d7
                                                                      • Opcode Fuzzy Hash: 95a9f5b95524026365e8c7ac09c65ee1ba0843219f0e1703a3545d923de10726
                                                                      • Instruction Fuzzy Hash: A2119EB15083049AE310AF69C8553DFFBE4EF84344F008C2EE98897211DBB889488BA7
                                                                      APIs
                                                                      Strings
                                                                      • VirtualQuery failed for %d bytes at address %p, xrefs: 004B4CB7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Protectmemcpy$Query
                                                                      • String ID: VirtualQuery failed for %d bytes at address %p
                                                                      • API String ID: 228986436-2206166143
                                                                      • Opcode ID: d12829d6756bfbeb375c3b18967b61272b544ec257198fe8fbcdfab312ee3f91
                                                                      • Instruction ID: 559a74de9584614124ef08ea600e83cdcfade44ba6a6710621629b3b7dd1fa7c
                                                                      • Opcode Fuzzy Hash: d12829d6756bfbeb375c3b18967b61272b544ec257198fe8fbcdfab312ee3f91
                                                                      • Instruction Fuzzy Hash: 6A014F719053049BDB00AF65D4817DAFBF8FB84744F41882EE54893241D7B4E8058BA5
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: Messageprintf
                                                                      • String ID: %s: %s
                                                                      • API String ID: 351756659-482213395
                                                                      • Opcode ID: 5d0b2663d545db3698a5e5d38bafee39333eabd1ff5b5476d689677e89d0ca91
                                                                      • Instruction ID: d1a3ae324eeb4d0173fc9cec49270b0f63d42809c61b05e31aac1c5da35b88f1
                                                                      • Opcode Fuzzy Hash: 5d0b2663d545db3698a5e5d38bafee39333eabd1ff5b5476d689677e89d0ca91
                                                                      • Instruction Fuzzy Hash: 74F01270808305EED740AF2AD4597AA7FE0FB45348F90C4AFE4C946251D7BC8498CBAB
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModulestrcpy
                                                                      • String ID: Launch4j
                                                                      • API String ID: 122033455-841392896
                                                                      • Opcode ID: 010d052e8a9c6b61c109f7bdebc0126c229c480c7da75aa64b17159803ae64ff
                                                                      • Instruction ID: c655463530c9f890b01bab339aac4232b1d96ea3ed751310603223b935e8db61
                                                                      • Opcode Fuzzy Hash: 010d052e8a9c6b61c109f7bdebc0126c229c480c7da75aa64b17159803ae64ff
                                                                      • Instruction Fuzzy Hash: 99F0C0B05053449AD780AF26D955B967BF4E740308F40442ED8818B361DBBD8848ABEA
                                                                      APIs
                                                                      • GetModuleFileNameA.KERNEL32(?,?,?,00000000,?,004B1822), ref: 004B25BE
                                                                      • strrchr.MSVCRT ref: 004B25D5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleNamestrrchr
                                                                      • String ID: \
                                                                      • API String ID: 3219412323-2967466578
                                                                      • Opcode ID: ac60b51a5823fb84ab9bc24574dafc4f5aea39072ce74ce3e00434ebfd785a57
                                                                      • Instruction ID: 3bb33f32404b30b3476fd1da840c4ab07c6d2897e6eb1397c783b72f0f51df71
                                                                      • Opcode Fuzzy Hash: ac60b51a5823fb84ab9bc24574dafc4f5aea39072ce74ce3e00434ebfd785a57
                                                                      • Instruction Fuzzy Hash: 9BE048B0504305ABC710FF39DAC554A7FE4EB04358F00892EE9D547385D7B4D944DBA6
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeavefree
                                                                      • String ID:
                                                                      • API String ID: 4020351045-0
                                                                      • Opcode ID: ce4b0ac946d8369dd9aa66889a11d2decd3399aab64aa1fbb2b085514116d620
                                                                      • Instruction ID: 38c1820eabd6a24cac80addfbf793d9c74b7fdca31f64028c2c0bf6960454d37
                                                                      • Opcode Fuzzy Hash: ce4b0ac946d8369dd9aa66889a11d2decd3399aab64aa1fbb2b085514116d620
                                                                      • Instruction Fuzzy Hash: FF016170B00206CF8B44FF7AE481B9AB7E5AB44308B15456ED54987301E778DC44DBAE
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1305621331.00000000004B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004B0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1305600093.00000000004B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305643571.00000000004BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305666950.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305757359.00000000004CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1305790244.00000000004CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4b0000_SAMPLE_5.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                      • String ID:
                                                                      • API String ID: 682475483-0
                                                                      • Opcode ID: 969c9038525879ab3b1bbc1db0c7bc7708dc8f90a92c91325c5aa00c925e6a67
                                                                      • Instruction ID: b4df8ebae6572c01db15d57113b6f29ae62caa3fa1fd95c60cf8556447f24467
                                                                      • Opcode Fuzzy Hash: 969c9038525879ab3b1bbc1db0c7bc7708dc8f90a92c91325c5aa00c925e6a67
                                                                      • Instruction Fuzzy Hash: 9BF062755007058B9B10BFBAA5C16DBBBA8DE01344F01042ADE8447206D778D80886EA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: `p*m
                                                                      • API String ID: 0-318476674
                                                                      • Opcode ID: 684813d2de6f2ba522811c9a09364f9e61836db1abc64411e2f3b8e417ff07c3
                                                                      • Instruction ID: 7df5e0bba635ea6d1e225188838f9570707982ab41bec1e6215dfa1dfa0c92dd
                                                                      • Opcode Fuzzy Hash: 684813d2de6f2ba522811c9a09364f9e61836db1abc64411e2f3b8e417ff07c3
                                                                      • Instruction Fuzzy Hash: 43A1BD71A04645DFDB1ADF24C594BAAFBB1FF89318F08899DD91A4B381CB34A940CF91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: `p*m
                                                                      • API String ID: 0-318476674
                                                                      • Opcode ID: 75e01f92f2173f11fcb0c0674ccee14e03b8cadda0f4c1ac71af8e1bd6cbe1f4
                                                                      • Instruction ID: c9671d7480604bc3f9a127efb5254f72183f044c117ac5a09f352bf257004900
                                                                      • Opcode Fuzzy Hash: 75e01f92f2173f11fcb0c0674ccee14e03b8cadda0f4c1ac71af8e1bd6cbe1f4
                                                                      • Instruction Fuzzy Hash: 8161BB71604601EFDB1ACF20C594BAAFBB1FF89718F08899CD91A4B381C774A981CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c30000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f874d57c0373d2874d5474f303d01eed66bc59206309001e830f9a17a6d2ca8
                                                                      • Instruction ID: 929ecec2d5bf36a887af5826feeee180863744ca9624c7b00d2d6522ce196a03
                                                                      • Opcode Fuzzy Hash: 1f874d57c0373d2874d5474f303d01eed66bc59206309001e830f9a17a6d2ca8
                                                                      • Instruction Fuzzy Hash: B9115BB6C0022ADFCF29DF48C9815ADB7B0FB99314B164925DC65A3346D734AE20CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c30000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 043702c30cb96ee7cd83d3c777d9805a73e252d3be2a4911be2f121a28bb503c
                                                                      • Instruction ID: 247fd42951aadd256e5593083cf1ca03fc786cb4a0f068e2dc9091be2198b105
                                                                      • Opcode Fuzzy Hash: 043702c30cb96ee7cd83d3c777d9805a73e252d3be2a4911be2f121a28bb503c
                                                                      • Instruction Fuzzy Hash: 68118F76D0022A9FCF29DF88C5825EDB7B0FB89314B064959DC64A3342D734AE61CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c30000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 518f6ffaa4a51255068d4b88d2d388c7d59e9cfad18ce2867c7dcabaee69d95b
                                                                      • Instruction ID: cefc7f0f1315fbcacd70b9b2c6546c86c020de57f5585a383e72a95394b4ecbe
                                                                      • Opcode Fuzzy Hash: 518f6ffaa4a51255068d4b88d2d388c7d59e9cfad18ce2867c7dcabaee69d95b
                                                                      • Instruction Fuzzy Hash: 11F0A576C00229DB8B15DF48C4451EDB7B1EB46218B1A8896DC6977241D332AE62CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c8415bedc393646a3057f852792e48a1a8bf3ef1970c867b9ee34e9553533a46
                                                                      • Instruction ID: 07c311ad4129fde44d01ff5551d11cbe4231325945fc51d5bdc3b00d3edadd9b
                                                                      • Opcode Fuzzy Hash: c8415bedc393646a3057f852792e48a1a8bf3ef1970c867b9ee34e9553533a46
                                                                      • Instruction Fuzzy Hash: 6EF0BCB6900A06EBEB158F60C0047EAF7B8BB88704F04460AD82C53210C3787465CBD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f05d7d63c53cfbc32d6bf75cf68646d8fdf0d6b1f206d1502b76e5730b19f1a1
                                                                      • Instruction ID: a0c06ae594c423e721cef451f4fcd5b66cf077b057f4c9725f16713faf586641
                                                                      • Opcode Fuzzy Hash: f05d7d63c53cfbc32d6bf75cf68646d8fdf0d6b1f206d1502b76e5730b19f1a1
                                                                      • Instruction Fuzzy Hash: ABF07FB6904A06EBDB158F61C0047DAFBB4BB88714F15421AD92C57350D77874658BC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 73a1acd7818cfb234ac17cb506b77db41d4d9cb1708171dd1b59a064cab3b311
                                                                      • Instruction ID: 255142deb122bf28a68d1d7cf4b91972cd346341bbcb07c8ef76697b02e8616a
                                                                      • Opcode Fuzzy Hash: 73a1acd7818cfb234ac17cb506b77db41d4d9cb1708171dd1b59a064cab3b311
                                                                      • Instruction Fuzzy Hash: E5F09BB6A04A06EBDB25CF61C1047DAFBB4BB88714F15421AC92D67350C7B8B465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c1bc21cf19514447e6e8d7ea70f938fec1472fd14f075dc3f280b9e7e15e5024
                                                                      • Instruction ID: ca189424c8c06b6364c83c82d212d9ad8f0e8e8f91b6ff6b595b341c3ac53463
                                                                      • Opcode Fuzzy Hash: c1bc21cf19514447e6e8d7ea70f938fec1472fd14f075dc3f280b9e7e15e5024
                                                                      • Instruction Fuzzy Hash: A3F092BA904A06EBDB15CF65C0047CAFBB4BB88714F15421AD52C67350D7787465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: df4c0861d7c0bce43d9652d3583c6e255fcb556d5b56d56184b69d3514a8083e
                                                                      • Instruction ID: f653ff793bc38d3aa92b6f2cb19af9cabda590a9014f97745bb17508cb0ea6ff
                                                                      • Opcode Fuzzy Hash: df4c0861d7c0bce43d9652d3583c6e255fcb556d5b56d56184b69d3514a8083e
                                                                      • Instruction Fuzzy Hash: 92F0C2B6D00A0AABDB258F61C1047DAFBB4BB84714F19461AC52C63310D3787465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f0590c0ff0478afa7ad65f5f1fbf2985aaa3a3c1507f9cf6c8d85494227724a
                                                                      • Instruction ID: 4aa6eab398752bf6f92f8b234548f8f4b70e69aa58443ca5e6e697c4c6b9a27e
                                                                      • Opcode Fuzzy Hash: 1f0590c0ff0478afa7ad65f5f1fbf2985aaa3a3c1507f9cf6c8d85494227724a
                                                                      • Instruction Fuzzy Hash: 0FF0C2B6D00A06ABDB25CF61C0047CAFBB4BB88714F15461AC52C67310D3787465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d1406d4fff8894865a1cf73f73786185b19d653840b2bcae36ed2130099c3e17
                                                                      • Instruction ID: 0257cab4e52c9e465a3635714d8abcb00d1ec68babe8e4f55a173f12d0339b18
                                                                      • Opcode Fuzzy Hash: d1406d4fff8894865a1cf73f73786185b19d653840b2bcae36ed2130099c3e17
                                                                      • Instruction Fuzzy Hash: A7F0C2B6D00A06ABDB258F61C0047CAFBB4BB84714F15421AC52C63310C7787565CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c5fe288e039036f78f18ae64851ac20690cbfe7d92416a9b3f0254a7287c3099
                                                                      • Instruction ID: 436bed6c742feebb0dbf143dca2a462397cdf026bc00e6c81143f93db0e45cff
                                                                      • Opcode Fuzzy Hash: c5fe288e039036f78f18ae64851ac20690cbfe7d92416a9b3f0254a7287c3099
                                                                      • Instruction Fuzzy Hash: D8F0C2B6D00A0AABDB258F61C1047CAFBB4BB84714F15461AC52C67320D3787465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c93c892d1714ec7131220346ff55216c3f36a06e868cf1c06102891230ae5699
                                                                      • Instruction ID: 8e8b96fbcfecbb470d9470fc5a4974ae75d72a9bce698f73c3a7a3929f3836b2
                                                                      • Opcode Fuzzy Hash: c93c892d1714ec7131220346ff55216c3f36a06e868cf1c06102891230ae5699
                                                                      • Instruction Fuzzy Hash: 24F0C2B6D00A06ABDB258F61C0047CAFBB4BB84714F15461AC52C63350D3787465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f752d386f78022fa1ca22014394cee4d07edfd7e8ee9aca087f3f5f752b747f0
                                                                      • Instruction ID: dec6ea57df6190743d9c389f4743478a2bedf08221e0990db548d9ed3551a492
                                                                      • Opcode Fuzzy Hash: f752d386f78022fa1ca22014394cee4d07edfd7e8ee9aca087f3f5f752b747f0
                                                                      • Instruction Fuzzy Hash: 80F0C2B6D00A0AABDB258F65C1047CAFBB4BB84714F19461AC52C63310D3B87465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C32000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C32000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c32000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e2389c21714578c38d4afa4b074654f735e738324dba7e06ccab979c59883b53
                                                                      • Instruction ID: f2d79fc898ccd5f12968fc87aed71bdfd75ec280573540990a2990181e6eb79c
                                                                      • Opcode Fuzzy Hash: e2389c21714578c38d4afa4b074654f735e738324dba7e06ccab979c59883b53
                                                                      • Instruction Fuzzy Hash: 87F0C2B6D00A0AABDB24CF61C10439AF7B0BB84B14F15421AC52C63350C3B8B465CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002CD4000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD4000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2cd4000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2849d91b70f12643592cd8148f4cc774a008c668dc032f8306b3330de4ea16ac
                                                                      • Instruction ID: fb529632f750e7bf4f7150fc3e45b77c295b833d5b66e2aabbec2c26bb7fab12
                                                                      • Opcode Fuzzy Hash: 2849d91b70f12643592cd8148f4cc774a008c668dc032f8306b3330de4ea16ac
                                                                      • Instruction Fuzzy Hash: 76518171A043119FC310DF28D48062AF7F2BF89318F698A6EED99A7755D331E942CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.1336773161.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_2c30000_javaw.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                      • Instruction ID: c2dff64f1870814ea72defaa0baeb9938e28260648a59b8416da2276eb4ec2b9
                                                                      • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                      • Instruction Fuzzy Hash: 3721C2BB5082568FDB368F1988403D9B7A5FB58314F214C2EDECDA7710D2306B898B91