Create Interactive Tour

Windows Analysis Report jxplorer-3.3.1.2-windows-installer.exe

Overview

General Information

Sample Name:jxplorer-3.3.1.2-windows-installer.exe
Analysis ID:512641
MD5:c23a27b06281cfa93641fdbb611c33ff
SHA1:cac02ab7f94320ff7168ac30ca4da44df649dfa9
SHA256:c1fe14a60bc6aa909ea8c1d5f09eb7426722bdd90634b451c12d1a32d10ff67b
Infos:

Most interesting Screenshot:

Detection

Score:9
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Uses 32bit PE files
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Queries time zone information
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • jxplorer-3.3.1.2-windows-installer.exe (PID: 4644 cmdline: 'C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe' MD5: C23A27B06281CFA93641FDBB611C33FF)
    • java.exe (PID: 5528 cmdline: 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -version MD5: 28733BA8C383E865338638DF5196E6FE)
      • icacls.exe (PID: 7072 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M MD5: FF0D1D4317A44C951240FAE75075D501)
        • conhost.exe (PID: 7040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • java.exe (PID: 7124 cmdline: 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -d64 -version MD5: 28733BA8C383E865338638DF5196E6FE)
    • java.exe (PID: 7148 cmdline: 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -version MD5: 28733BA8C383E865338638DF5196E6FE)
    • java.exe (PID: 7164 cmdline: 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -d64 -version MD5: 28733BA8C383E865338638DF5196E6FE)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: 0.2.jxplorer-3.3.1.2-windows-installer.exe.2990000.1.unpackAvira: Label: TR/Patched.Ren.Gen
Source: 0.2.jxplorer-3.3.1.2-windows-installer.exe.62e80000.10.unpackAvira: Label: TR/Crypt.XPACK.Gen2
Source: 0.2.jxplorer-3.3.1.2-windows-installer.exe.3900000.6.unpackAvira: Label: TR/Patched.Ren.Gen
Source: jxplorer-3.3.1.2-windows-installer.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\bitrock_installer.logJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: Binary string: C:\Documents and Settings\ashok\My Documents\src\twapi\twapi\base\twapi.pdb source: twapi-be29e7f1-71ae-4703-50cb-1d52be512f51.dll.0.dr
Source: Binary string: Y:\temp\BUILD\Mauimarkshortcut.pdb source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.570337747.0000000072E19000.00000002.00020000.sdmp, BR2EE4.tmp.0.dr
Source: Binary string: Y:\temp\BUILD\Mauimarkshortcut.pdbD source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.570337747.0000000072E19000.00000002.00020000.sdmp, BR2EE4.tmp.0.dr
Source: java.exe, 00000002.00000002.309186026.0000000005200000.00000004.00000001.sdmp, java.exe, 00000006.00000002.314145834.0000000004400000.00000004.00000001.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568740606.0000000005873000.00000004.00000001.sdmp, jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpString found in binary or memory: http://download.bitrock.com/feedback.php
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563837311.00000000040E6000.00000004.00000001.sdmpString found in binary or memory: http://download.bitrock.com/feedback.php.
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568448075.00000000056E3000.00000004.00000001.sdmpString found in binary or memory: http://download.bitrock.com/feedback.phpile
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568448075.00000000056E3000.00000004.00000001.sdmpString found in binary or memory: http://download.bitrock.com/feedback.phpqyr
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.292351957.0000000004063000.00000004.00000001.sdmp, jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.560018508.0000000003700000.00000004.00000001.sdmpString found in binary or memory: http://fedora.redhat.com/docs/selinux-faq-fc3/index.html#id2826056
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.294808644.0000000004355000.00000004.00000001.sdmpString found in binary or memory: http://forum.java.sun.com/thread.jspa?threadID=426291&messageID=1997063
Source: java.exe, 00000002.00000002.309186026.0000000005200000.00000004.00000001.sdmp, java.exe, 00000006.00000002.314145834.0000000004400000.00000004.00000001.sdmpString found in binary or memory: http://java.oracle.com/
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.295544380.0000000004861000.00000004.00000001.sdmpString found in binary or memory: http://tcl.sf.net
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564072090.0000000004280000.00000004.00000001.sdmpString found in binary or memory: http://tkcon.sourceforge.net/
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpString found in binary or memory: http://update.bitrock.com/api/1_0
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpString found in binary or memory: http://update.bitrock.com/api/1_0%
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.295544380.0000000004861000.00000004.00000001.sdmpString found in binary or memory: http://www.activestate.com/tcl/
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.294808644.0000000004355000.00000004.00000001.sdmp, jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.295544380.0000000004861000.00000004.00000001.sdmpString found in binary or memory: http://www.apple.com/DTDs/PropertyList-1.0.dtd
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.294884819.0000000004128000.00000004.00000001.sdmpString found in binary or memory: http://www.cs.wm.edu/~hallyn/des/weak
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564072090.0000000004280000.00000004.00000001.sdmpString found in binary or memory: http://www.google.com
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558457606.0000000002890000.00000004.00000001.sdmpString found in binary or memory: http://www.iana.org/assignments/character-sets
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563775781.0000000004042000.00000004.00000001.sdmpString found in binary or memory: http://www.tdom.org
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_004351EC GetClipboardOwner,OpenClipboard,EmptyClipboard,CloseClipboard,0_2_004351EC
Source: jxplorer-3.3.1.2-windows-installer.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.294804746.000000000431C000.00000004.00000001.sdmpBinary or memory string: } windowsResourceOriginalFilename { vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563912146.0000000004183000.00000004.00000001.sdmpBinary or memory string: maui::changeExecutableResources::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563912146.0000000004183000.00000004.00000001.sdmpBinary or memory string: maui::changeExecutableResources::windowsResourceOriginalFilename] vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563912146.0000000004183000.00000004.00000001.sdmpBinary or memory string: ::maui::changeExecutableResources::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563912146.0000000004183000.00000004.00000001.sdmpBinary or memory string: ::maui::changeExecutableResources::windowsResourceOriginalFilename [e vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564771907.0000000004AC8000.00000004.00000001.sdmpBinary or memory string: bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564771907.0000000004AC8000.00000004.00000001.sdmpBinary or memory string: bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilenameQb vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564771907.0000000004AC8000.00000004.00000001.sdmpBinary or memory string: maui::bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: maui::autoUpdateProject::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: ::maui::autoUpdateProject::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: changeExecutableResources::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: changeExecutableResources::windowsResourceOriginalFilenamee joi^ vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename1 vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename{ vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564672203.00000000049E1000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564656466.00000000049BF000.00000004.00000001.sdmpBinary or memory string: ::maui::javaLauncher::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564656466.00000000049BF000.00000004.00000001.sdmpBinary or memory string: ::maui::javaLauncher::windowsResourceOriginalFilename8 vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564626295.0000000004976000.00000004.00000001.sdmpBinary or memory string: javaLauncher::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: maui::javaLauncher::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: maui::javaLauncher::windowsResourceOriginalFilenamew% vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: autoUpdateProject::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: ::maui::bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilename& vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: ::maui::bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilenameinheri vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpBinary or memory string: ::maui::bTt5kRcr2ne9m5bVT6RcTkWb::windowsResourceOriginalFilename not r vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.296076395.0000000004412000.00000004.00000001.sdmpBinary or memory string: public variable windowsResourceOriginalFilename {} vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000000.289552014.0000000000688000.00000008.00020000.sdmpBinary or memory string: OriginalFilenamesetup.exe vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamewish85.exeP vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568798344.00000000058D2000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.doNotSerializeIfDefault vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568448075.00000000056E3000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.defaultValue vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568448075.00000000056E3000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.defaultValue?v vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563837311.00000000040E6000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilenameG vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563837311.00000000040E6000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename% vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563837311.00000000040E6000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilenamem vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563837311.00000000040E6000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename? vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.566193859.0000000004FAF000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename+ vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564496352.0000000004721000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametwapi.dllD vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.text vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.tip vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.tipe vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.type vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.width vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.group vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568123315.0000000005621000.00000004.00000001.sdmpBinary or memory string: windowsResourceOriginalFilename.groupm vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exeBinary or memory string: OriginalFilenamesetup.exe vs jxplorer-3.3.1.2-windows-installer.exe
Source: jxplorer-3.3.1.2-windows-installer.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_004700F40_2_004700F4
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_0041832C SendMessageA,NtdllDefWindowProc_A,NtdllDefWindowProc_A,NtdllDefWindowProc_A,0_2_0041832C
Source: jxplorer-3.3.1.2-windows-installer.exeStatic PE information: Section: UPX1 ZLIB complexity 0.998996230365
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile read: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe 'C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe'
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -version
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -d64 -version
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -version
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -d64 -version
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -versionJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -d64 -versionJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -versionJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -d64 -versionJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)MJump to behavior
Source: jxplorer-3.3.1.2-windows-installer.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7040:120:WilError_01
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR280A.tmpJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeSection loaded: C:\Program Files (x86)\Java\jre1.8.0_211\bin\client\jvm.dllJump to behavior
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$QueryBroker.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$QueryBroker.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: >com/ca/directory/jxplorer/broker/StopMonitor$QueryBroker.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: >com/ca/directory/jxplorer/broker/StopMonitor$QueryBroker.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$1.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$1.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Ccom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$1.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Ccom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$1.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$2.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$2.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Ccom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$2.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Ccom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$2.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$3.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$3.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Ccom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$3.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Ccom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI$3.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Acom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: Acom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorGUI.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorListRenderer.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor$StopMonitorListRenderer.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: &Jcom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorListRenderer.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: &Jcom/ca/directory/jxplorer/broker/StopMonitor$StopMonitorListRenderer.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: com/ca/directory/jxplorer/broker/StopMonitor.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: 2com/ca/directory/jxplorer/broker/StopMonitor.class
Source: jxplorer-3.3.1.2-windows-installer.exeString found in binary or memory: 2com/ca/directory/jxplorer/broker/StopMonitor.class
Source: classification engineClassification label: clean9.winEXE@12/18@0/0
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Javasoft\Java Development KitJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: jxplorer-3.3.1.2-windows-installer.exeStatic file information: File size 7501332 > 1048576
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: Binary string: C:\Documents and Settings\ashok\My Documents\src\twapi\twapi\base\twapi.pdb source: twapi-be29e7f1-71ae-4703-50cb-1d52be512f51.dll.0.dr
Source: Binary string: Y:\temp\BUILD\Mauimarkshortcut.pdb source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.570337747.0000000072E19000.00000002.00020000.sdmp, BR2EE4.tmp.0.dr
Source: Binary string: Y:\temp\BUILD\Mauimarkshortcut.pdbD source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.570337747.0000000072E19000.00000002.00020000.sdmp, BR2EE4.tmp.0.dr
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_3_028CB627 push A0028C21h; ret 0_3_028CB635
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_004FD268 push ecx; mov dword ptr [esp], 00000000h0_2_004FD28E
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_004FD268 push edx; mov dword ptr [esp], eax0_2_004FD29B
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_0300BB27 push 00000000h; mov dword ptr [esp], esp2_2_0300BB4D
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_0300B377 push 00000000h; mov dword ptr [esp], esp2_2_0300B39D
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_0300B907 push 00000000h; mov dword ptr [esp], esp2_2_0300B92D
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_0300A1CA push ecx; ret 2_2_0300A1DA
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_0300A1DB push ecx; ret 2_2_0300A1E5
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_03012D44 push eax; retf 2_2_03012D45
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_0300C437 push 00000000h; mov dword ptr [esp], esp2_2_0300C45D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_023FBB27 push 00000000h; mov dword ptr [esp], esp6_2_023FBB4D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_023FB377 push 00000000h; mov dword ptr [esp], esp6_2_023FB39D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_023FB907 push 00000000h; mov dword ptr [esp], esp6_2_023FB92D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_023FA1DB push ecx; ret 6_2_023FA1E5
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_023FA1CA push ecx; ret 6_2_023FA1DA
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_023FC437 push 00000000h; mov dword ptr [esp], esp6_2_023FC45D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exeCode function: 6_2_02402D44 push eax; retf 6_2_02402D45
Source: BR280A.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR2A3D.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR3434.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR352F.tmp.0.drStatic PE information: section name: .eh_fram
Source: BR2BC5.tmp.0.drStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_00418B54 SHGetFileInfo,SetLayeredWindowAttributes,LoadCursorA,LoadIconA,LoadLibraryA,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_00418B54
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR352F.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR35FB.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR2EE4.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR3434.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR3821.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR2A3D.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR2BC5.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR36B8.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\be29e7f1-71ae-4703-50cb-1d52be512f51\twapi-be29e7f1-71ae-4703-50cb-1d52be512f51.dllJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR3755.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR2C62.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\BR280A.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeFile created: C:\Users\user\AppData\Local\Temp\bitrock_installer.logJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_00417DBC IsIconic,IsZoomed,AdjustWindowRectEx,SendMessageA,SendMessageA,GetSystemMetrics,MoveWindow,GetWindowRect,GetClientRect,MoveWindow,DrawMenuBar,KiUserCallbackDispatcher,0_2_00417DBC
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BR35FB.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BR3821.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BR36B8.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\be29e7f1-71ae-4703-50cb-1d52be512f51\twapi-be29e7f1-71ae-4703-50cb-1d52be512f51.dllJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\BR3755.tmpJump to dropped file
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_004FD418 GetVersionExA,GetSystemInfo,wsprintfA,0_2_004FD418
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeAPI call chain: ExitProcess graph end nodegraph_0-8423
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.295544380.0000000004861000.00000004.00000001.sdmpBinary or memory string: lappend b4VJ9cd22EIieY1cjZ8tPU4b /Library/Java/JavaVirtualMachines/*/Home/bin/java /Library/Java/JavaVirtualMachines/*/*/Home/bin/java
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568798344.00000000058D2000.00000004.00000001.sdmpBinary or memory string: /Library/Java/JavaVirtualMachines/*/*/Home/bin/javaX
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568798344.00000000058D2000.00000004.00000001.sdmpBinary or memory string: /Library/Java/JavaVirtualMachines/*/*/Home/bin/java
Source: java.exe, 00000002.00000002.309020845.0000000002EA5000.00000004.00000001.sdmpBinary or memory string: ,java/lang/VirtualMachineError
Source: java.exe, 00000002.00000002.309020845.0000000002EA5000.00000004.00000001.sdmpBinary or memory string: |[Ljava/lang/VirtualMachineError;
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568798344.00000000058D2000.00000004.00000001.sdmpBinary or memory string: /Library/Java/JavaVirtualMachines/*/Home/bin/java
Source: java.exe, 00000002.00000002.308993388.000000000179B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~~x
Source: java.exe, 00000006.00000002.314022176.0000000002245000.00000004.00000001.sdmpBinary or memory string: 2[Ljava/lang/VirtualMachineError;
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_00418B54 SHGetFileInfo,SetLayeredWindowAttributes,LoadCursorA,LoadIconA,LoadLibraryA,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_00418B54
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_00401020 SetUnhandledExceptionFilter,__getmainargs,__p__fmode,__p__environ,_cexit,ExitProcess,_setmode,_setmode,_setmode,0_2_00401020
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -versionJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -d64 -versionJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -versionJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -d64 -versionJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)MJump to behavior
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564626295.0000000004976000.00000004.00000001.sdmpBinary or memory string: dde execute PROGMAN PROGMAN [format {[CreateGroup("%s")]} $bV6WEsSuPq1SIDWVgm4Viibb]
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.565249334.0000000004CC8000.00000004.00000001.sdmpBinary or memory string: dde execute PROGMAN PROGMAN [format {[AddItem ("%s" %s,%s,,,,,"%s")]} $bLOA0KDuBdaCSYhj41thYQQb $b6LsX3HNVf1sgf2AJflJqZHb $name $bZnN40sigZoJQ2UlUfqVP0Eb]
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564626295.0000000004976000.00000004.00000001.sdmpBinary or memory string: catch {dde execute PROGMAN PROGMAN [format {[DeleteGroup("%s")]} $bV6WEsSuPq1SIDWVgm4Viibb]}
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564626295.0000000004976000.00000004.00000001.sdmpBinary or memory string: dde execute progman progman [format {[ShowGroup("%s",6)]} $bV6WEsSuPq1SIDWVgm4Viibb]
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.565249334.0000000004CC8000.00000004.00000001.sdmpBinary or memory string: dde execute PROGMAN PROGMAN [format {[AddItem ("%s" %s,%s,"%s",,,,"%s")]} $bLOA0KDuBdaCSYhj41thYQQb $b6LsX3HNVf1sgf2AJflJqZHb $name $bQkgKU65HM9Lehnb0Ql8NfQb $bZnN40sigZoJQ2UlUfqVP0Eb]
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558405153.0000000001480000.00000002.00020000.sdmpBinary or memory string: Program Manager
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558405153.0000000001480000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558405153.0000000001480000.00000002.00020000.sdmpBinary or memory string: Progman
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.566138327.0000000004F63000.00000004.00000001.sdmpBinary or memory string: dde execute PROGMAN PROGMAN [format {[DeleteGroup("%s")]} $::maui::bnmKFU8VAU2DNQ56gbeh7FUb::b5iTZTqoOYYrgcEIWUa43OXb]
Source: jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558405153.0000000001480000.00000002.00020000.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\be29e7f1-71ae-4703-50cb-1d52be512f51 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_2_03000380 cpuid 2_2_03000380
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation BiasJump to behavior
Source: C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exeCode function: 0_2_004FD418 GetVersionExA,GetSystemInfo,wsprintfA,0_2_004FD418

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter2Services File Permissions Weakness1Process Injection12Disable or Modify Tools1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsServices File Permissions Weakness1Process Injection12LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information11Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Services File Permissions Weakness1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing21LSA SecretsSystem Information Discovery34SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 512641 Sample: jxplorer-3.3.1.2-windows-in... Startdate: 01/11/2021 Architecture: WINDOWS Score: 9 7 jxplorer-3.3.1.2-windows-installer.exe 1 18 2->7         started        file3 22 twapi-be29e7f1-71a...cb-1d52be512f51.dll, PE32 7->22 dropped 24 C:\Users\user\AppData\Local\Temp\BR3821.tmp, PE32 7->24 dropped 26 C:\Users\user\AppData\Local\Temp\BR3755.tmp, PE32 7->26 dropped 28 9 other files (none is malicious) 7->28 dropped 10 java.exe 4 7->10         started        12 java.exe 2 7->12         started        14 java.exe 7->14         started        16 java.exe 7->16         started        process4 process5 18 icacls.exe 1 10->18         started        process6 20 conhost.exe 18->20         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
jxplorer-3.3.1.2-windows-installer.exe1%VirustotalBrowse
jxplorer-3.3.1.2-windows-installer.exe5%MetadefenderBrowse
jxplorer-3.3.1.2-windows-installer.exe2%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\BR280A.tmp0%MetadefenderBrowse
C:\Users\user\AppData\Local\Temp\BR280A.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BR2A3D.tmp0%MetadefenderBrowse
C:\Users\user\AppData\Local\Temp\BR2A3D.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\BR2BC5.tmp0%MetadefenderBrowse
C:\Users\user\AppData\Local\Temp\BR2BC5.tmp0%ReversingLabs
SourceDetectionScannerLabelLinkDownload
0.2.jxplorer-3.3.1.2-windows-installer.exe.2990000.1.unpack100%AviraTR/Patched.Ren.GenDownload File
0.0.jxplorer-3.3.1.2-windows-installer.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.2.jxplorer-3.3.1.2-windows-installer.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.2.jxplorer-3.3.1.2-windows-installer.exe.62e80000.10.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
0.2.jxplorer-3.3.1.2-windows-installer.exe.3900000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
No Antivirus matches
SourceDetectionScannerLabelLink
http://forum.java.sun.com/thread.jspa?threadID=426291&messageID=19970630%Avira URL Cloudsafe
http://update.bitrock.com/api/1_00%Avira URL Cloudsafe
http://update.bitrock.com/api/1_0%0%Avira URL Cloudsafe
http://bugreport.sun.com/bugreport/0%URL Reputationsafe
http://www.tdom.org0%VirustotalBrowse
http://www.tdom.org0%Avira URL Cloudsafe
http://download.bitrock.com/feedback.phpqyr0%Avira URL Cloudsafe
http://download.bitrock.com/feedback.phpile0%Avira URL Cloudsafe
http://download.bitrock.com/feedback.php.0%Avira URL Cloudsafe
http://download.bitrock.com/feedback.php0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://tcl.sf.netjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.295544380.0000000004861000.00000004.00000001.sdmpfalse
    high
    http://forum.java.sun.com/thread.jspa?threadID=426291&messageID=1997063jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.294808644.0000000004355000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.iana.org/assignments/character-setsjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.558457606.0000000002890000.00000004.00000001.sdmpfalse
      high
      http://update.bitrock.com/api/1_0jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://update.bitrock.com/api/1_0%jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.309186026.0000000005200000.00000004.00000001.sdmp, java.exe, 00000006.00000002.314145834.0000000004400000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      unknown
      http://fedora.redhat.com/docs/selinux-faq-fc3/index.html#id2826056jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.292351957.0000000004063000.00000004.00000001.sdmp, jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.560018508.0000000003700000.00000004.00000001.sdmpfalse
        high
        http://www.tdom.orgjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563775781.0000000004042000.00000004.00000001.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://java.oracle.com/java.exe, 00000002.00000002.309186026.0000000005200000.00000004.00000001.sdmp, java.exe, 00000006.00000002.314145834.0000000004400000.00000004.00000001.sdmpfalse
          high
          http://download.bitrock.com/feedback.phpqyrjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568448075.00000000056E3000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.google.comjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564072090.0000000004280000.00000004.00000001.sdmpfalse
            high
            http://tkcon.sourceforge.net/jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564072090.0000000004280000.00000004.00000001.sdmpfalse
              high
              http://www.activestate.com/tcl/jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.295544380.0000000004861000.00000004.00000001.sdmpfalse
                high
                http://www.cs.wm.edu/~hallyn/des/weakjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000003.294884819.0000000004128000.00000004.00000001.sdmpfalse
                  high
                  http://download.bitrock.com/feedback.phpilejxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568448075.00000000056E3000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://download.bitrock.com/feedback.php.jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.563837311.00000000040E6000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://download.bitrock.com/feedback.phpjxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.568740606.0000000005873000.00000004.00000001.sdmp, jxplorer-3.3.1.2-windows-installer.exe, 00000000.00000002.564527356.0000000004872000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  No contacted IP infos

                  General Information

                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:512641
                  Start date:01.11.2021
                  Start time:09:34:42
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 30s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:jxplorer-3.3.1.2-windows-installer.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:22
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:CLEAN
                  Classification:clean9.winEXE@12/18@0/0
                  EGA Information:
                  • Successful, ratio: 33.3%
                  HDC Information:Failed
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Changed system and user locale, location and keyboard layout to English - Great Britain
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 20.50.102.62, 93.184.221.240, 40.112.88.60, 20.54.110.249, 80.67.82.211, 80.67.82.235, 20.49.157.6, 20.82.210.154
                  • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Execution Graph export aborted for target java.exe, PID 5528 because it is empty
                  • Execution Graph export aborted for target java.exe, PID 7148 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  C:\Users\user\AppData\Local\Temp\BR2C62.tmpAutodesk_Desktop_App_Bootstrap.exeGet hashmaliciousBrowse
                    Zscaler-windows-1.4.0.188-installer.exeGet hashmaliciousBrowse
                      iSee-1.18.2.0-windows-installer (1).exeGet hashmaliciousBrowse
                        iSee-1.18.2.0-windows-installer.exeGet hashmaliciousBrowse
                          UPSVendorInfo-1.0-windows-installer.exeGet hashmaliciousBrowse
                            http://mts-cdn.globalmeet.com/GuestDesktop/GlobalMeet_Guest_Desktop_Setup.exeGet hashmaliciousBrowse
                              http://support.steinberg.de/elc/win/elc-installation-helper.exeGet hashmaliciousBrowse
                                League of Legends installer EUW.exeGet hashmaliciousBrowse
                                  C:\Users\user\AppData\Local\Temp\BR2A3D.tmpAutodesk_Desktop_App_Bootstrap.exeGet hashmaliciousBrowse
                                    Zscaler-windows-1.4.0.188-installer.exeGet hashmaliciousBrowse
                                      iSee-1.18.2.0-windows-installer (1).exeGet hashmaliciousBrowse
                                        iSee-1.18.2.0-windows-installer.exeGet hashmaliciousBrowse
                                          UPSVendorInfo-1.0-windows-installer.exeGet hashmaliciousBrowse
                                            http://mts-cdn.globalmeet.com/GuestDesktop/GlobalMeet_Guest_Desktop_Setup.exeGet hashmaliciousBrowse
                                              http://support.steinberg.de/elc/win/elc-installation-helper.exeGet hashmaliciousBrowse
                                                League of Legends installer EUW.exeGet hashmaliciousBrowse
                                                  C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d83e2.timestamp
                                                  Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):57
                                                  Entropy (8bit):4.841147470077358
                                                  Encrypted:false
                                                  SSDEEP:3:oFj4I5vpN6yUaHTQBlv:oJ5X6yVQBlv
                                                  MD5:491BFC1D50E8452C2A6DF24E4D76EB5A
                                                  SHA1:4070BDE3F5F41C1DC56C277F469DE6213CD3F16F
                                                  SHA-256:3C1896F2B4E72601C78D11CE91D4AEDDF8A4E6288F9FBC4B6AFFEBB754F5CBF5
                                                  SHA-512:71DE50A17FC4C0B09CDA6A378E090D3C9DD4192D295FD6CA7D1247858F12D127534830853444394473CA59D1E3A65B14949CBFF9BBF5726D3D4C2E2671531290
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: C:\Program Files (x86)\Java\jre1.8.0_211..1635784551184..
                                                  C:\Users\user\AppData\Local\Temp\BR280A.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):42370
                                                  Entropy (8bit):5.0466136277802285
                                                  Encrypted:false
                                                  SSDEEP:768:bYhR8FateHZi03f9DsC429HqL9kChZYWz2CsPkr1wVXggpBOxSe2zt:bYice5iOf9DsC4WHqKRkr1wppBMSe0t
                                                  MD5:98E531FFD84600DD27E8BC4A83DCDD5E
                                                  SHA1:6B7403D6E903CFBD0B5F2C1BDAE16DE1EAB638C7
                                                  SHA-256:09DD23B63F9FE79D039E43F274B5AEB9DF01A816DEFC8C503531E1B3643921A3
                                                  SHA-512:E8523077549E79045C02882307654D21CADF334098B878C976C960BA86E323CFFDD678713E3084CCB31AC21158CF542187733767F28CC130665962AFD13D4A7A
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...;.IP.V..v......#.....4...R...............P.....b.................................+........ .........................g............................................................................................................................text....2.......4..................`.P`.data........P.......8..............@.`..rdata.......`.......:..............@.0@.eh_fram.....p.......B..............@.0..bss..................................@..edata..g............D..............@.0@.idata...............F..............@.0..CRT.................N..............@.0..tls.... ............P..............@.0..reloc...............R..............@.0B................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR2A3D.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):36633
                                                  Entropy (8bit):5.172153856265245
                                                  Encrypted:false
                                                  SSDEEP:384:i760QouLg/TgeoyZQ82FXRivC4yPTyNeOnEOqjLtKjIUZuVnrufvS0QOwOP2H:pxR1u9CpKVZuFBNOeH
                                                  MD5:08AD4CD2A940379F1DCDBDB9884A1375
                                                  SHA1:C302B7589BA4F05C6429E7F89AD0CB84DD9DFBAC
                                                  SHA-256:78827E2B1EF0AAD4F8B1B42D0964064819AA22BFCD537EBAACB30D817EDC06D8
                                                  SHA-512:F37BD071994C31B361090A149999E8B2D4A7839F19EA63E1D4563AADA1371BE37F2BFCC474E24DE95FF77CA4124A39580C9F711E2FBE54265713AB76F631835A
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: Autodesk_Desktop_App_Bootstrap.exe, Detection: malicious, Browse
                                                  • Filename: Zscaler-windows-1.4.0.188-installer.exe, Detection: malicious, Browse
                                                  • Filename: iSee-1.18.2.0-windows-installer (1).exe, Detection: malicious, Browse
                                                  • Filename: iSee-1.18.2.0-windows-installer.exe, Detection: malicious, Browse
                                                  • Filename: UPSVendorInfo-1.0-windows-installer.exe, Detection: malicious, Browse
                                                  • Filename: , Detection: malicious, Browse
                                                  • Filename: , Detection: malicious, Browse
                                                  • Filename: League of Legends installer EUW.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..../UM.R.........#.....2...N...............P....hf.......................................... ........................./.......x...............................<....................................................................................text....0.......2..................`.P`.data........P.......6..............@.`..rdata.......`.......8..............@.`@.eh_fram.....p.......B..............@.0..bss....T.............................@..edata../............D..............@.0@.idata..x............F..............@.0..CRT.................J..............@.0..tls.... ............L..............@.0..reloc..<............N..............@.0B................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR2BC5.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):112558
                                                  Entropy (8bit):5.941177762717291
                                                  Encrypted:false
                                                  SSDEEP:1536:vbn96+fgEQxtYuuDFYe4gg2ReJAkz2omuU4LCPkYLsdFEclGqKONtlD+:D9NgEQnYuscgjeJAkBCvLsEQ/HlD+
                                                  MD5:D33EE6D856350F321189138134745388
                                                  SHA1:E20A69863AE3A63A5C812D80BC7766C54CBB0689
                                                  SHA-256:9EB5405449BE0D43FEE145B5B6D5FE01799C6F635389A44F58A0AF2793A1B737
                                                  SHA-512:133A382CE27408CB993E8DCDCBD65737C99C093DD632580B47CA08A3C0198699FA27BBD0A20CFBA572B1B2F8FA3840F1309DC6B8CEBE0B1A15885E0030201FEF
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....IP.^.........#.........Z............... .....q.......................................... ......................p...............................................................................................................................text...x...........................`.P`.data........ ......................@.`..rdata.......0......................@.`@.eh_fram.....P.......2..............@.0..bss....,....`........................@..edata.......p.......4..............@.0@.idata...............D..............@.0..CRT.................H..............@.0..tls.... ............J..............@.0..reloc...............L..............@.0B................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR2C62.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):409600
                                                  Entropy (8bit):6.4807474467356245
                                                  Encrypted:false
                                                  SSDEEP:6144:qZW3ZkG4zErXGmWkaHf77ym+fs7EWdRx35FFFyFFFFFFc7N+8:qCZFmESn/v9dz35FFFyFFFFFFc48
                                                  MD5:027491B39A7B16B116E780F55ABC288E
                                                  SHA1:62C0AB7C3E374D5FC9920983EE62BAA4421076B4
                                                  SHA-256:EEF69D005BF1C0B715C8D6205400D4755C261DD38DDFBBFE918E6EE91F21F1F0
                                                  SHA-512:FE0BA835D9AF2A2C297A545BB7E30D315B580273BB1F558F16D9CBA59755200A4735F75B1672E5E5FBED449EB7A5ABB6D905696674C181B742BF637028953194
                                                  Malicious:false
                                                  Joe Sandbox View:
                                                  • Filename: Autodesk_Desktop_App_Bootstrap.exe, Detection: malicious, Browse
                                                  • Filename: Zscaler-windows-1.4.0.188-installer.exe, Detection: malicious, Browse
                                                  • Filename: iSee-1.18.2.0-windows-installer (1).exe, Detection: malicious, Browse
                                                  • Filename: iSee-1.18.2.0-windows-installer.exe, Detection: malicious, Browse
                                                  • Filename: UPSVendorInfo-1.0-windows-installer.exe, Detection: malicious, Browse
                                                  • Filename: , Detection: malicious, Browse
                                                  • Filename: , Detection: malicious, Browse
                                                  • Filename: League of Legends installer EUW.exe, Detection: malicious, Browse
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......X.......................~.......g...................?...................Rich....................PE..L...j'.?...........!.........................................................P......................................,..N....)..<...............................<F...................................................................................text............................... ..`.rdata..N...........................@..@.data...8....@.......@..............@....reloc...G.......P..................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR2EE4.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):51712
                                                  Entropy (8bit):6.11232673678852
                                                  Encrypted:false
                                                  SSDEEP:768:KUqfg94qXKdv7VzR5CnsW9+oR5gKkizhr2ORzQeOD:PqCev7ZCZ7htRzt
                                                  MD5:72FAB2C90296330ECA3787DC4093E208
                                                  SHA1:6091F6637EF24E2C4F5AEA348CD9DAE2607B17E8
                                                  SHA-256:6251F51D616CDCB4256D73A67819A3419E5B59158BE358CF387B90E39C05C260
                                                  SHA-512:347A54C6D0F4FEFC966B3EE3BCD4387FAA54D4C9D7FB050AC33E26514848CD4F4F5465D5A27F76B14F05F1D8380DA88B798B1EDE2EAB6722972EEF37118EAC0D
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............c._.c._.c._.1._.c._.1?_.c._.1)_.c._..._.c._..._.c._.c._.c._.E._.c._.. _.c._..8_.c._..;_.c._Rich.c._........PE..L....|@L...........!.....|...V......F.....................................................@.............................]...X...<...................................0................................................................................text....z.......|.................. ..`.rdata..m&.......(..................@..@.data...............................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR3434.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):31232
                                                  Entropy (8bit):5.970542297862573
                                                  Encrypted:false
                                                  SSDEEP:384:828IV0h6y6b65DRS/47tAF61letKEnQ7UcTNuZLngGDUVizkcZFNZNgB/p9DCn:8txi624hS61EtMUcnCUVoFN/AB
                                                  MD5:B226B75915B944BF20F96ADDFD6E4F87
                                                  SHA1:D1E745996FFD68C6AE91C2AC2C65B2D77BFD0EAB
                                                  SHA-256:91910BF7A630D272D5389AA6DAFC4E71F32298731B4F44D39B6A0B0D34BD1A3B
                                                  SHA-512:4913D11666057269249880668C92EC7D28788E3041BC18B6A9F72F94E2CA375464ADA6242DE694159E4EA99CCE934B01A981F60171E7A739607BB9DF6D07421B
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....^Q...........#.....L...v......`........`....8g......................................... .........................................................................................................................h............................text...$K.......L..................`.P`.data........`.......P..............@.0..rdata..|....p.......R..............@.0@.eh_fram.............V..............@.0@.bss..................................0..edata...............j..............@.0@.idata...............p..............@.0..CRT.................t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR352F.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):61685
                                                  Entropy (8bit):5.767404399067206
                                                  Encrypted:false
                                                  SSDEEP:768:3wsnWORQW1x0waiE/h3QBG14+raAQD2ZW1YRC9gfMFfdKnoOWO:37DRrxcF2S4+WH1WhMFfgoK
                                                  MD5:FA89B48BF972FEF2F26C24A5C1BD1689
                                                  SHA1:2777FB16B37609C6EFC27ACCD1DD855A11FF4F5E
                                                  SHA-256:6E5348CBCE980777D8E9827B57A90BE829F94884C9F96395807BABDB9B445756
                                                  SHA-512:1C88F8F0EC311756C1AC3A6F72725F656A74630C97AE6A2DB02728B236EC0E8A8A3E524BF76E99E6F15AD52855C05CE0F238DE0C4350DA0F5EF00FA561A2D6C0
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......O...........#.....t.........................n......................... ................ .........................u.......X....................................................................................................................text...ls.......t..................`.P`.data................x..............@.`..rdata..T............~..............@.0@.eh_fram............................@.0..bss....$.............................@..edata..u...........................@.0@.idata..X...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR35FB.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):24576
                                                  Entropy (8bit):2.1110182606763486
                                                  Encrypted:false
                                                  SSDEEP:96:3OeQrkZUMQl0sLw1pljKegUlelUEYP2OaSOdOfDUj5y2RUI32IyyymvNTB:bQAlQl/UzjBPleOE5VoUjVRUKJyo
                                                  MD5:4CF27E0747E5719A5478AA2624F6B996
                                                  SHA1:13DF901E34F77E5EA11F36C0AFEDDA7F86A2C003
                                                  SHA-256:E69A9D06F2C17CC021EBF9B62CA110548FACDC147B67DEA4846E09865043D2D9
                                                  SHA-512:4B0DDCBD7321128F977E1DBBE18CC76C7E489D4EE84B7775989E99778B5A60DAA683C6063C5B700794B7F2070AE381FEF20B19B3CB35C1BABEF9BE79FF264941
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.../.y./.y./.y.M.j.-.y...w...y./.x.%.y..s.%.y..}.+.y.Rich/.y.........PE..L....l.?...........!..... ...0......Q!.......0...............................`.......................................1..k...(0..<............................P.......................................................0..(............................text............ .................. ..`.rdata..{....0.......0..............@..@.data...P....@.......@..............@....reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR36B8.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):24576
                                                  Entropy (8bit):2.233559660511395
                                                  Encrypted:false
                                                  SSDEEP:192:w6Aw4G01nltNu1qqSyjjc1Pcrhve+fAzsI:w6Awe1ltUv3c1AveKAzs
                                                  MD5:124E89D0FCC409EDE3595A253B788708
                                                  SHA1:BC88E037C3EDEA02DD20AEFF10818105BE9F4033
                                                  SHA-256:27EA1B57A3024AEC4A03188E80FDB2AA301FA5179C19BE9C8B0DFC2AAC73A114
                                                  SHA-512:7CD0CA268A5DBD2AA22DBCE1F253A2D067CA30C5195E059C3F431D546A20D1811592F8BD8FE88B6AD9CB5C6FDD6A4666FF451B84A5E790A9D5058865D48790B1
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n..*...*...*...H...(...*..."......'..........Rich*...........................PE..L....l.?...........!..... ...@....... .......0...............................p......]................................0......$0..<............................`.......................................................0.. ............................text...R........ .................. ..`.rdata.......0.......0..............@..@.data........@.......@..............@....reloc.......`.......P..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR3755.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):102400
                                                  Entropy (8bit):6.032443659163402
                                                  Encrypted:false
                                                  SSDEEP:1536:RgeYsGOAkT1xZXRyrjGA9KOsZDmwd1/MAjVkZJEJ6PZ2:WBVw1xHef9amwDMAjUJ0
                                                  MD5:606F13D4D580B1F322B3F3D3DF423BBA
                                                  SHA1:02CB375E13B415EDC8B5360DFFDBA531E47827ED
                                                  SHA-256:C71A16B1056E522CD0365449448116D06F37A3273D77694D170340064511DD25
                                                  SHA-512:867A45DC15E99148F24FC528FBC9255582E5534BB4696700292B70163FDDB15F35DDF2ACD0536A9CD78B4D8F9D827BF7530D2303BFD7E428F11573B381A0986C
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2...v..Xv..Xv..X...Xt..X...Xw..Xv..Xe..X...Xo..X...Xr..XRichv..X................PE..L....l.?...........!.....0...P.......1.......@.......................................,.............................. C..e....A..<...............................H....................................................@..L............................text....".......0.................. ..`.rdata.......@.......@..............@..@.data...X#...P...0...P..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR3821.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):57344
                                                  Entropy (8bit):4.947032837109441
                                                  Encrypted:false
                                                  SSDEEP:384:AfMFAoyIdlBM2y3yKy8i0s7xxgx9lRD4Pich2vzLfp6kVtWVG80TTqV5axSwHAuz:Af7KBM2vcLlRDYncLfp43HTaxOPxP0
                                                  MD5:145D5C49FE34A44662BEAFFE641D58C7
                                                  SHA1:95D5E92523990B614125D66FA3FA395170A73BFE
                                                  SHA-256:59182F092B59A3005ADA6B2F2855C7E860E53E8ADF6E41CD8CD515578AE7815A
                                                  SHA-512:48CB0048F4FCF460E791A5B0BECA40DBF2399B70F1784236B6D1F17835201D70DFA64C498814B872F57E527793C58A5959230FE40DDF5EBDCB0B1DE57E9C53EF
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........../^..|^..|^..|<..|\..|...|_..|^..|K..|...|I..|...|Z..|Rich^..|........PE..L....l.?...........!.........P......z................................................!..................................h.......<.......................................................................................P............................text...>r.......................... ..`.rdata..h........ ..................@..@.data............ ..................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\BR4BDA.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):95
                                                  Entropy (8bit):4.413288531422079
                                                  Encrypted:false
                                                  SSDEEP:3:SXKPFaT5WRiGgBWKFiFCnRVLvDAEMVLU//Vy:SuFmWRiGghYFCnHEEMVQVy
                                                  MD5:EF54325FD6089991019D42D4D2584AB8
                                                  SHA1:8FAE15DB21C5C2C06E87EE9CF9EA18C6964D3D24
                                                  SHA-256:3058165ABF1FF11090812BE06B155DE1CA8BFF3F077F246F18B6D0ECB6FA7905
                                                  SHA-512:D5A257DC2DFED0E434EB2F3581E2AA03CF62736FB5E4EB4EE0E56C2C7EF1B25A1680A3709E051FBE74A2012E1C72663E73F7E5A99B114B0967F5542D95DA2E09
                                                  Malicious:false
                                                  Preview: Error: This Java instance does not support a 64-bit JVM...Please install the desired version...
                                                  C:\Users\user\AppData\Local\Temp\BR4F94.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):149
                                                  Entropy (8bit):5.0506245895145785
                                                  Encrypted:false
                                                  SSDEEP:3:CEuXWN0Ld4muEHNekOCe3Z8465TEFHgtzasVUaIfKnQvn:CEuX8J/IcCQ16tt+sVfIfKn6n
                                                  MD5:22CA8A72C29F11FF5158A385957E54D2
                                                  SHA1:3CAA40588EE350F2C8CF89E4B474BAA29A97FAAE
                                                  SHA-256:8E66EAFE2D5A1FFCB41C18C8AAC8DFAFD2DCA5C3349C6E35A6F0D7D0AB411D73
                                                  SHA-512:FE2C6863929762AA77E5F8F13258BDE0038894947E6BB70B6E42E8B7D75850C1F00732D9DF7DB77835BC4563EB03C3ACAC903EEA7071D70130E2D94DFFDBF3EF
                                                  Malicious:false
                                                  Preview: java version "1.8.0_211"..Java(TM) SE Runtime Environment (build 1.8.0_211-b12)..Java HotSpot(TM) Client VM (build 25.211-b12, mixed mode, sharing)..
                                                  C:\Users\user\AppData\Local\Temp\BR54A6.tmp
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):95
                                                  Entropy (8bit):4.413288531422079
                                                  Encrypted:false
                                                  SSDEEP:3:SXKPFaT5WRiGgBWKFiFCnRVLvDAEMVLU//Vy:SuFmWRiGghYFCnHEEMVQVy
                                                  MD5:EF54325FD6089991019D42D4D2584AB8
                                                  SHA1:8FAE15DB21C5C2C06E87EE9CF9EA18C6964D3D24
                                                  SHA-256:3058165ABF1FF11090812BE06B155DE1CA8BFF3F077F246F18B6D0ECB6FA7905
                                                  SHA-512:D5A257DC2DFED0E434EB2F3581E2AA03CF62736FB5E4EB4EE0E56C2C7EF1B25A1680A3709E051FBE74A2012E1C72663E73F7E5A99B114B0967F5542D95DA2E09
                                                  Malicious:false
                                                  Preview: Error: This Java instance does not support a 64-bit JVM...Please install the desired version...
                                                  C:\Users\user\AppData\Local\Temp\be29e7f1-71ae-4703-50cb-1d52be512f51\twapi-be29e7f1-71ae-4703-50cb-1d52be512f51.dll
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):413276
                                                  Entropy (8bit):6.543624302377151
                                                  Encrypted:false
                                                  SSDEEP:6144:qy3L0mgDcJ78LbJkOyVWWRT4KyQN5earARhMwZ1iooZfDZJHR9PWll7bt4:zg1BOI6uQNtqioo9D3TKft4
                                                  MD5:A210F1AC135E5331C314CE5F394FB5A5
                                                  SHA1:355AFC1C61E1F65834472B16A4CA718E61537DC2
                                                  SHA-256:65B32EA2982078FB9A18E88FEEC238CB76ED2AE6C2BB4DDB0F6A9C4F57B1D62B
                                                  SHA-512:E4E70EF75E2F7897837F6772B9A0DCAAF4515D8BE4210B28509F12CDDE9D85BD7BED604AD5A9EE587356971F75E6F79874DBDB974CEC4996262295E255501CF4
                                                  Malicious:false
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................Q.........................................................................................-.......Rich....................PE..L...-..J...........!.................................................................|...............................9..[...............X.................... ..x_...................................................................................text............................... ..`.rdata...Z.......\..................@..@.data........@.......&..............@....rsrc...X...........................@..@.reloc...a... ...b..................@..B................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\bitrock_installer.log
                                                  Process:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):150
                                                  Entropy (8bit):4.625871843481267
                                                  Encrypted:false
                                                  SSDEEP:3:tBkuxX9UuF6U2XJKRLOLJxZGKs1VOXFMOa1yox/0sQGGAK82sBov:42JSJKRLmLGK4VOXFboRTGAK8xov
                                                  MD5:D6DCC8B52D774A93E7CDD4B675522704
                                                  SHA1:0F3D6292875FED6CE2A56E29EB73F430C26F6F84
                                                  SHA-256:0840BCF92F33446B7E6D2E1FF1C8FF10E740B530E30E9007A9ADC8379C097373
                                                  SHA-512:B99EA924EDFFDCDF73C68356FA82DD9A9B69921834E87C667549C7110F1708D0122238CE6D5C3D30D27120BFFA080852683FE6C3CD87C434DCD5FEF546FDB81D
                                                  Malicious:false
                                                  Preview: Log started 11/01/2021 at 09:35:43..Preferred installation mode : win32..Trying to init installer in mode win32..Mode win32 successfully initialized..

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                                                  Entropy (8bit):7.9936248674269565
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.39%
                                                  • UPX compressed Win32 Executable (30571/9) 0.30%
                                                  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  File name:jxplorer-3.3.1.2-windows-installer.exe
                                                  File size:7501332
                                                  MD5:c23a27b06281cfa93641fdbb611c33ff
                                                  SHA1:cac02ab7f94320ff7168ac30ca4da44df649dfa9
                                                  SHA256:c1fe14a60bc6aa909ea8c1d5f09eb7426722bdd90634b451c12d1a32d10ff67b
                                                  SHA512:f7902af4909083ce11ad7f0135a89f60096a4b44079326ec14458f90f8de908e18615e8686c526bbb04be4fdcc70b92e79ac27ba657741f2eeaee3ddffb3b437
                                                  SSDEEP:196608:p5DOE1MFFH51Cetx3WxgzPp52ce3pYt3XqZ9sYg:p5v1MFFH51CWx3WOzPp5n1Xc4
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....IP..'..............0...0...@..Pq(..P....(...@...........................)............... .....................p.).p..

                                                  File Icon

                                                  Icon Hash:f6d3d2f1d7c878b0

                                                  General

                                                  Entrypoint:0x687150
                                                  Entrypoint Section:UPX1
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED
                                                  DLL Characteristics:
                                                  Time Stamp:0x5049C0C3 [Fri Sep 7 09:39:15 2012 UTC]
                                                  TLS Callbacks:0x687d56
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f703294ca5098ae27457e58f179b2127
                                                  Instruction
                                                  pushad
                                                  mov esi, 005B5015h
                                                  lea edi, dword ptr [esi-001B4015h]
                                                  mov dword ptr [edi+0023F4A0h], E8E07FC9h
                                                  push edi
                                                  mov ebp, esp
                                                  lea ebx, dword ptr [esp-00030E80h]
                                                  xor eax, eax
                                                  push eax
                                                  cmp esp, ebx
                                                  jne 00007FB4ECAB5DCDh
                                                  inc esi
                                                  inc esi
                                                  push ebx
                                                  push 002856EFh
                                                  push edi
                                                  add ebx, 04h
                                                  push ebx
                                                  push 000D2139h
                                                  push esi
                                                  add ebx, 04h
                                                  push ebx
                                                  push eax
                                                  mov dword ptr [ebx], 00040007h
                                                  nop
                                                  nop
                                                  nop
                                                  push ebp
                                                  push edi
                                                  push esi
                                                  push ebx
                                                  sub esp, 7Ch
                                                  mov edx, dword ptr [esp+00000090h]
                                                  mov dword ptr [esp+74h], 00000000h
                                                  mov byte ptr [esp+73h], 00000000h
                                                  mov ebp, dword ptr [esp+0000009Ch]
                                                  lea eax, dword ptr [edx+04h]
                                                  mov dword ptr [esp+78h], eax
                                                  mov eax, 00000001h
                                                  movzx ecx, byte ptr [edx+02h]
                                                  mov ebx, eax
                                                  shl ebx, cl
                                                  mov ecx, ebx
                                                  dec ecx
                                                  mov dword ptr [esp+6Ch], ecx
                                                  movzx ecx, byte ptr [edx+01h]
                                                  shl eax, cl
                                                  dec eax
                                                  mov dword ptr [esp+68h], eax
                                                  mov eax, dword ptr [esp+000000A8h]
                                                  movzx esi, byte ptr [edx]
                                                  mov dword ptr [ebp+00h], 00000000h
                                                  mov dword ptr [esp+60h], 00000000h
                                                  mov dword ptr [eax], 00000000h
                                                  mov eax, 00000300h
                                                  mov dword ptr [esp+64h], esi
                                                  mov dword ptr [esp+5Ch], 00000001h
                                                  mov dword ptr [esp+58h], 00000001h
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x29a7700x70.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x29a4880x2e8.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2880000x12488.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x29a7e00x18.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x287d780x18UPX1
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  UPX00x10000x1b40000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  UPX10x1b50000xd30000xd2e00False0.998996230365data7.99969875033IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x2880000x130000x12800False0.330355257601data4.1613860609IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountry
                                                  RT_CURSOR0x28a6040x134dataEnglishUnited States
                                                  RT_CURSOR0x28a73c0x134AmigaOS bitmap fontEnglishUnited States
                                                  RT_CURSOR0x28a8740x134dataEnglishUnited States
                                                  RT_CURSOR0x28a9ac0x134dataEnglishUnited States
                                                  RT_CURSOR0x28aae40x134dataEnglishUnited States
                                                  RT_CURSOR0x28ac1c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28ad540x134dataEnglishUnited States
                                                  RT_CURSOR0x28ae8c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28afc40x134dataEnglishUnited States
                                                  RT_CURSOR0x28b0fc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28b2340x134dataEnglishUnited States
                                                  RT_CURSOR0x28b36c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28b4a40x134dataEnglishUnited States
                                                  RT_CURSOR0x28b5dc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28b7140x134dataEnglishUnited States
                                                  RT_CURSOR0x28b84c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28b9840x134dataEnglishUnited States
                                                  RT_CURSOR0x28babc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28bbf40x134dataEnglishUnited States
                                                  RT_CURSOR0x28bd2c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28be640x134dataEnglishUnited States
                                                  RT_CURSOR0x28bf9c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28c0d40x134dataEnglishUnited States
                                                  RT_CURSOR0x28c20c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28c3440x134dataEnglishUnited States
                                                  RT_CURSOR0x28c47c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28c5b40x134dataEnglishUnited States
                                                  RT_CURSOR0x28c6ec0x134dataEnglishUnited States
                                                  RT_CURSOR0x28c8240x134dataEnglishUnited States
                                                  RT_CURSOR0x28c95c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28ca940x134dataEnglishUnited States
                                                  RT_CURSOR0x28cbcc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28cd040x134dataEnglishUnited States
                                                  RT_CURSOR0x28ce3c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28cf740x134dataEnglishUnited States
                                                  RT_CURSOR0x28d0ac0x134dataEnglishUnited States
                                                  RT_CURSOR0x28d1e40x134dataEnglishUnited States
                                                  RT_CURSOR0x28d31c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28d4540x134dataEnglishUnited States
                                                  RT_CURSOR0x28d58c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28d6c40x134dataEnglishUnited States
                                                  RT_CURSOR0x28d7fc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28d9340x134dataEnglishUnited States
                                                  RT_CURSOR0x28da6c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28dba40x134dataEnglishUnited States
                                                  RT_CURSOR0x28dcdc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28de140x134dataEnglishUnited States
                                                  RT_CURSOR0x28df4c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28e0840x134dataEnglishUnited States
                                                  RT_CURSOR0x28e1bc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28e2f40x134dataEnglishUnited States
                                                  RT_CURSOR0x28e42c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28e5640x134dataEnglishUnited States
                                                  RT_CURSOR0x28e69c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28e7d40x134dataEnglishUnited States
                                                  RT_CURSOR0x28e90c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28ea440x134dataEnglishUnited States
                                                  RT_CURSOR0x28eb7c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28ecb40x134dataEnglishUnited States
                                                  RT_CURSOR0x28edec0x134dataEnglishUnited States
                                                  RT_CURSOR0x28ef240x134dataEnglishUnited States
                                                  RT_CURSOR0x28f05c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28f1940x134dataEnglishUnited States
                                                  RT_CURSOR0x28f2cc0x134dataEnglishUnited States
                                                  RT_CURSOR0x28f4040x134dataEnglishUnited States
                                                  RT_CURSOR0x28f53c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28f6740x134dataEnglishUnited States
                                                  RT_CURSOR0x28f7ac0x134dataEnglishUnited States
                                                  RT_CURSOR0x28f8e40x134dataEnglishUnited States
                                                  RT_CURSOR0x28fa1c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28fb540x134dataEnglishUnited States
                                                  RT_CURSOR0x28fc8c0x134dataEnglishUnited States
                                                  RT_CURSOR0x28fdc40x134dataEnglishUnited States
                                                  RT_CURSOR0x28fefc0x134dataEnglishUnited States
                                                  RT_CURSOR0x2900340x134dataEnglishUnited States
                                                  RT_CURSOR0x29016c0x134dataEnglishUnited States
                                                  RT_CURSOR0x2902a40x134dataEnglishUnited States
                                                  RT_CURSOR0x2903dc0x134dataEnglishUnited States
                                                  RT_BITMAP0x2905140x340dataEnglishUnited States
                                                  RT_ICON0x2908580x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                  RT_ICON0x290dc40x4228dBase III DBT, version number 0, next free block index 40EnglishUnited States
                                                  RT_ICON0x294ff00x25a8dBase III DBT, version number 0, next free block index 40EnglishUnited States
                                                  RT_ICON0x29759c0x10a8dataEnglishUnited States
                                                  RT_ICON0x2986480x988dBase III DBT, version number 0, next free block index 40EnglishUnited States
                                                  RT_DIALOG0x298fd40x23adataEnglishUnited States
                                                  RT_GROUP_CURSOR0x2992140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29922c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2992440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29925c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2992740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29928c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2992a40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2992bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2992d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2992ec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29931c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29934c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993640x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29937c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993c40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993dc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2993f40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29940c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29943c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994540x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29946c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29949c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994b40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994cc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994e40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2994fc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29952c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29955c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29958c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995a40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2995ec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29961c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29964c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996640x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29967c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996c40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996dc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2996f40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29970c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29973c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997540x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29976c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29979c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997b40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997cc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997e40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2997fc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29982c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29985c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29988c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998a40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2998ec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2999040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29991c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x2999340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_CURSOR0x29994c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                  RT_GROUP_ICON0x2999640x4cdataEnglishUnited States
                                                  RT_VERSION0x2999b40x51cdataEnglishUnited States
                                                  RT_MANIFEST0x299ed40x5b1XML 1.0 document, ASCII textEnglishUnited States
                                                  DLLImport
                                                  KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                                  ADVAPI32.DLLRegCloseKey
                                                  COMCTL32.DLLInitCommonControlsEx
                                                  COMDLG32.DLLChooseColorA
                                                  GDI32.dllArc
                                                  IMM32.DLLImmGetContext
                                                  msvcrt.dllcos
                                                  OLE32.dllCreateBindCtx
                                                  OLEAUT32.DLLVariantInit
                                                  SHELL32.DLLSHGetMalloc
                                                  USER32.dllGetDC
                                                  WS2_32.DLLbind
                                                  NameOrdinalAddress
                                                  TclKit_AppInit10x402344
                                                  TclKit_SetKitPath20x402720
                                                  DescriptionData
                                                  LegalCopyrightCopyright JXplorer Open Source Project
                                                  InternalName
                                                  FileVersion1.0.0.0
                                                  CompanyNameJXplorer Open Source Project
                                                  LegalTrademarks
                                                  Comments
                                                  ProductNameJXplorer
                                                  ProductVersion3.3.1.2
                                                  FileDescription
                                                  OriginalFilenamesetup.exe
                                                  Translation0x0409 0x04b0
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States

                                                  Network Behavior

                                                  No network behavior found

                                                  Code Manipulations

                                                  Statistics

                                                  CPU Usage

                                                  Click to jump to process

                                                  Memory Usage

                                                  Click to jump to process

                                                  High Level Behavior Distribution

                                                  • File
                                                  • Registry

                                                  Click to dive into process behavior distribution

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  Start time:09:35:39
                                                  Start date:01/11/2021
                                                  Path:C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\jxplorer-3.3.1.2-windows-installer.exe'
                                                  Imagebase:0x400000
                                                  File size:7501332 bytes
                                                  MD5 hash:C23A27B06281CFA93641FDBB611C33FF
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Start time:09:35:47
                                                  Start date:01/11/2021
                                                  Path:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -version
                                                  Imagebase:0x1160000
                                                  File size:192376 bytes
                                                  MD5 hash:28733BA8C383E865338638DF5196E6FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:Java
                                                  Reputation:high
                                                  Start time:09:35:48
                                                  Start date:01/11/2021
                                                  Path:C:\Windows\SysWOW64\icacls.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
                                                  Imagebase:0x11a0000
                                                  File size:29696 bytes
                                                  MD5 hash:FF0D1D4317A44C951240FAE75075D501
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Start time:09:35:48
                                                  Start date:01/11/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7f20f0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Start time:09:35:49
                                                  Start date:01/11/2021
                                                  Path:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -d64 -version
                                                  Imagebase:0x1160000
                                                  File size:192376 bytes
                                                  MD5 hash:28733BA8C383E865338638DF5196E6FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Start time:09:35:50
                                                  Start date:01/11/2021
                                                  Path:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -version
                                                  Imagebase:0xaa0000
                                                  File size:192376 bytes
                                                  MD5 hash:28733BA8C383E865338638DF5196E6FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Start time:09:35:52
                                                  Start date:01/11/2021
                                                  Path:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe' -d64 -version
                                                  Imagebase:0xaa0000
                                                  File size:192376 bytes
                                                  MD5 hash:28733BA8C383E865338638DF5196E6FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Disassembly

                                                  Code Analysis

                                                  Execution Graph

                                                  Execution Coverage

                                                  Dynamic/Packed Code Coverage

                                                  Signature Coverage

                                                  Execution Coverage:10.9%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:15%
                                                  Total number of Nodes:608
                                                  Total number of Limit Nodes:41

                                                  Graph

                                                  Show Legend
                                                  Hide Nodes/Edges
                                                  execution_graph 8127 409544 8129 409557 8127->8129 8128 409581 ??3@YAXPAX 8128->8129 8129->8128 8130 41e1c5 8133 418808 8130->8133 8132 41e1df 8134 4189e4 8133->8134 8135 41882a 8133->8135 8134->8132 8136 41890c SendMessageA 8135->8136 8137 418837 8135->8137 8136->8137 8141 4188ed 8136->8141 8138 418886 _mbscpy 8137->8138 8137->8141 8139 4188fc 8138->8139 8140 41889e 8138->8140 8139->8132 8140->8139 8142 4188c6 SetWindowTextW 8140->8142 8141->8132 8142->8141 8143 59abdc 8144 59abf4 8143->8144 8146 59abe8 8143->8146 8145 59ac09 ??3@YAXPAX 8144->8145 8144->8146 8145->8146 8477 48a240 SelectObject GetTextMetricsA 8478 48a498 SelectObject 8477->8478 8481 48a2a3 8477->8481 8479 48a404 8479->8478 8480 48a2ac SelectObject GetTextMetricsA 8480->8481 8481->8479 8481->8480 8147 557a58 8148 557a75 8147->8148 8149 557d00 8148->8149 8151 5010f0 _isctype 8148->8151 8152 5570dc 8148->8152 8151->8148 8153 5570f7 8152->8153 8154 557110 8152->8154 8157 5570ff 8153->8157 8159 557040 8153->8159 8154->8153 8155 5572b8 8154->8155 8154->8157 8158 557040 _isctype 8155->8158 8157->8148 8158->8157 8160 557095 8159->8160 8161 557055 8159->8161 8160->8157 8161->8160 8162 5570ac _isctype 8161->8162 8162->8161 8163 41c94f 8164 41c95a 8163->8164 8178 41ca53 8163->8178 8165 41cab9 8164->8165 8167 41ce40 8164->8167 8175 41c960 8164->8175 8166 41cacd 8165->8166 8165->8175 8170 41cae6 IsWindowVisible 8166->8170 8195 41cbdc 8166->8195 8168 41d160 733AAC50 8167->8168 8167->8195 8169 5ce7e8 8168->8169 8172 41d192 MulDiv 8169->8172 8171 41d26c GetWindowPlacement 8170->8171 8180 41cb00 8170->8180 8174 41d2a0 8171->8174 8171->8195 8176 5ce7e8 8172->8176 8173 41cb2b 8183 41cb3d GetClientRect 8173->8183 8173->8195 8182 41d32c SetFocus 8174->8182 8175->8178 8184 41ca08 8175->8184 8187 41cd31 8175->8187 8179 41d1c7 MulDiv 8176->8179 8177 41d33c 8196 4165d8 ShowWindow 8177->8196 8185 41d1fc 8179->8185 8180->8173 8180->8177 8181 41cb22 8180->8181 8181->8173 8198 4166e8 ShowWindow 8181->8198 8182->8195 8188 4163b8 8183->8188 8192 41ca18 SendMessageA 8184->8192 8185->8171 8187->8178 8187->8182 8191 41cd5f 8187->8191 8189 41cba2 MoveWindow 8188->8189 8189->8195 8200 436024 8191->8200 8192->8178 8193 41ca48 8192->8193 8193->8178 8193->8187 8197 416620 8196->8197 8197->8173 8199 41672f 8198->8199 8199->8173 8201 43604c 8200->8201 8203 436057 8200->8203 8202 4360ef SendMessageA 8201->8202 8201->8203 8202->8178 8203->8178 8204 483358 8205 483376 8204->8205 8206 48337d CreateWindowExA 8205->8206 8207 4833eb 8206->8207 8208 4833f0 CreateWindowExA 8207->8208 8209 48345a 8208->8209 8596 4340d0 8597 434128 8596->8597 8598 4340f4 8596->8598 8597->8598 8599 434158 IsWindow 8597->8599 8599->8598 8600 4341b0 SendMessageA 8599->8600 8601 4341e2 8600->8601 8602 43429e SendMessageA 8600->8602 8601->8598 8603 4341ea sprintf MessageBoxA 8601->8603 8602->8598 8603->8598 8224 4892dc 8225 4892ec 8224->8225 8226 489312 8224->8226 8225->8226 8227 4892f0 DeleteObject 8225->8227 8227->8225 8228 418b54 8229 418b7a 8228->8229 8230 418c9c 8229->8230 8231 418ce4 LoadLibraryA 8229->8231 8232 418bbe 8229->8232 8231->8232 8234 418cfb GetProcAddress FreeLibrary 8231->8234 8233 418d30 LoadLibraryA 8232->8233 8236 418bcb 8232->8236 8235 418d47 GetProcAddress FreeLibrary 8233->8235 8233->8236 8234->8232 8235->8236 8237 418cc5 LoadIconA 8236->8237 8239 418c31 8236->8239 8238 418c4f LoadCursorA 8237->8238 8240 418c78 8238->8240 8239->8238 8239->8240 8482 43f054 8483 43f082 8482->8483 8484 43f0ac strrchr 8483->8484 8485 43f0c8 8483->8485 8484->8485 8604 4421d8 8606 4421fd 8604->8606 8607 442370 8604->8607 8605 442680 8608 403060 ShowWindow 8605->8608 8606->8605 8606->8607 8611 403060 8606->8611 8609 442698 8608->8609 8609->8609 8612 403079 8611->8612 8613 403080 8611->8613 8612->8606 8614 4030e8 8613->8614 8615 4166e8 ShowWindow 8613->8615 8614->8606 8615->8612 8259 5428f4 8260 54290c 8259->8260 8261 54291e GetSystemInfo VirtualQuery 8260->8261 8262 54294a 8260->8262 8261->8262 8486 50e070 8487 50e08c 8486->8487 8488 50e0e8 8487->8488 8489 510f57 SetTimer 8487->8489 8490 510fbc KillTimer 8487->8490 8489->8488 8490->8488 8263 419a62 GetForegroundWindow 8264 419a6b 8263->8264 8265 419a91 IsWindow 8264->8265 8266 41a2e0 8264->8266 8265->8266 8267 419aa2 SetWindowLongA 8265->8267 8269 419ad6 SetParent 8267->8269 8270 419af4 SendMessageA SendMessageA 8269->8270 8271 419b4b GetDesktopWindow 8270->8271 8287 419f08 8270->8287 8272 419b58 SetWindowLongA 8271->8272 8271->8287 8275 419b81 8272->8275 8276 41a0bc 8272->8276 8273 41a0f4 SendMessageA 8274 419f24 8273->8274 8279 41a122 SendMessageA 8273->8279 8277 419f74 8274->8277 8278 419f36 SetWindowPos 8274->8278 8280 41a0c4 SetMenu 8275->8280 8291 419bc4 SetParent 8275->8291 8276->8280 8281 419980 ShowWindow 8277->8281 8278->8277 8282 4831dc 8279->8282 8280->8287 8283 419f80 8281->8283 8284 41a154 SendMessageA 8282->8284 8285 419fb1 8283->8285 8286 419f8b SendMessageA 8283->8286 8284->8274 8288 419fb9 SendMessageA 8285->8288 8289 419fdf 8285->8289 8286->8285 8287->8273 8287->8274 8288->8289 8290 419ff6 SetMenu 8289->8290 8295 41a016 8289->8295 8290->8295 8291->8275 8292 41a07b 8293 41a0a2 SetFocus 8292->8293 8294 41a0af 8292->8294 8293->8294 8295->8292 8296 419980 ShowWindow 8295->8296 8296->8295 8616 41b0e4 8617 41b1c8 8616->8617 8619 41b10d 8616->8619 8618 41b140 8619->8618 8620 419980 ShowWindow 8619->8620 8620->8618 8621 4211e4 8622 42121c SendMessageA SendMessageA SendMessageA 8621->8622 8623 4211ff 8621->8623 8622->8623 8310 4fd268 SetErrorMode SetErrorMode GetModuleHandleA 8311 4fd2a3 8310->8311 8624 41e1e6 8625 41e26b 8624->8625 8626 41e1fe 8624->8626 8626->8625 8627 41e24f _mbscpy 8626->8627 8627->8625 8492 42b068 8494 42b095 8492->8494 8493 42b169 8494->8493 8496 42a160 8494->8496 8500 42a19c 8496->8500 8497 42a24b strncpy 8497->8500 8498 42a384 _isctype 8498->8500 8499 42a399 8499->8493 8500->8497 8500->8498 8500->8499 8501 427168 8502 4272f3 8501->8502 8505 427183 8501->8505 8503 4273b3 _isctype 8503->8502 8503->8505 8504 427290 sprintf 8504->8505 8505->8502 8505->8503 8505->8504 8506 42216c 8507 422187 8506->8507 8508 4221b8 8506->8508 8509 4222ce _mbscpy 8508->8509 8510 42222f 8508->8510 8509->8508 8628 4351ec 8629 435203 8628->8629 8634 435219 8628->8634 8630 43520e GetClipboardOwner 8629->8630 8631 435290 OpenClipboard EmptyClipboard 8630->8631 8630->8634 8632 4846d0 8631->8632 8633 4352ae CloseClipboard 8632->8633 8633->8634 8635 4700f4 8636 4708d8 8635->8636 8637 470133 8635->8637 8638 47060b 8637->8638 8639 4702d0 sprintf 8637->8639 8645 470acd 8637->8645 8642 47066e sprintf 8638->8642 8647 470719 8638->8647 8641 470313 8639->8641 8644 4706c9 sprintf 8642->8644 8643 470b35 sprintf 8643->8647 8644->8647 8646 4709e5 sprintf 8646->8647 8647->8643 8647->8645 8647->8646 8648 470ced sprintf 8647->8648 8649 470bc9 floor sprintf 8647->8649 8650 47086e sprintf 8647->8650 8651 470f78 sprintf 8647->8651 8652 470a66 sprintf 8647->8652 8653 470e84 sprintf 8647->8653 8648->8647 8649->8647 8650->8647 8651->8647 8652->8647 8653->8647 8389 416474 8390 41648a 8389->8390 8391 416497 CreateWindowExA SetWindowPos 8390->8391 8391->8390 8392 41dd74 8393 41dd98 8392->8393 8394 41dd88 SetForegroundWindow 8392->8394 8395 41dda3 SetForegroundWindow 8393->8395 8511 47c07c 8512 47c087 8511->8512 8513 47c09c LoadCursorA 8511->8513 8512->8513 8514 47c08e SetCursor 8512->8514 8513->8514 8515 47c0b7 8513->8515 8516 47f17c 8519 47f154 GetCursorPos 8516->8519 8518 47f1a2 8519->8518 8654 4331f8 8655 433240 8654->8655 8656 433209 8654->8656 8656->8655 8657 433217 strncpy 8656->8657 8437 5131ec 8441 5131fa 8437->8441 8438 51321c GetStdHandle 8439 513274 8438->8439 8442 51322d 8438->8442 8443 51302c 8439->8443 8441->8438 8444 513048 8443->8444 8449 51303e 8443->8449 8453 512eb4 GetFileType 8444->8453 8446 513054 8447 51305d GetCurrentProcess GetCurrentProcess DuplicateHandle 8446->8447 8446->8449 8451 513140 8446->8451 8448 5130a7 CloseHandle 8447->8448 8447->8449 8450 5130f5 8448->8450 8449->8442 8450->8449 8460 519494 8451->8460 8454 512ee1 GetConsoleMode 8453->8454 8455 512ecb 8453->8455 8458 512f08 GetCommState 8454->8458 8459 512ef8 8454->8459 8456 512ed8 GetLastError 8455->8456 8457 512ecf 8455->8457 8456->8454 8456->8457 8457->8446 8458->8457 8459->8446 8461 5194ae 8460->8461 8462 519518 CreateEventA CreateEventA CreateEventA CreateThread SetThreadPriority 8461->8462 8463 51973c 8461->8463 8464 5196b9 sprintf 8462->8464 8465 5195eb CreateEventA CreateEventA CreateEventA CreateThread SetThreadPriority 8462->8465 8467 518980 8462->8467 8466 5196ec 8464->8466 8465->8464 8466->8449 8468 5189ac WaitForMultipleObjects 8467->8468 8469 518a69 8468->8469 8470 5189da ReadFile 8468->8470 8471 518a09 PeekNamedPipe 8470->8471 8472 518aac GetLastError 8470->8472 8471->8472 8476 518a3c 8471->8476 8472->8476 8473 518a46 SetEvent 8473->8476 8474 518a78 ReadFile 8474->8472 8475 518aa3 8474->8475 8475->8473 8476->8468 8476->8469 8476->8473 8476->8474 8658 42c1fc 8660 42c20a 8658->8660 8661 42c26b 8660->8661 8662 42c008 8660->8662 8663 42c0ac 8662->8663 8665 42c035 8662->8665 8664 42c0b1 sprintf 8663->8664 8667 42c055 8663->8667 8664->8667 8666 42c085 _mbscpy 8665->8666 8665->8667 8666->8667 8667->8661 8520 476178 GetStockObject 8521 4761ba 8520->8521 8059 598e18 8060 598e3c 8059->8060 8062 598e31 8059->8062 8061 598e77 malloc 8060->8061 8060->8062 8061->8062 8522 454104 8523 45412c 8522->8523 8539 45416a 8522->8539 8524 4543ec 8523->8524 8525 4542a8 8523->8525 8526 4543f5 8523->8526 8527 454320 8523->8527 8528 4542d8 8523->8528 8538 454290 8523->8538 8523->8539 8524->8526 8524->8527 8525->8526 8529 454636 8525->8529 8525->8539 8530 455134 _strncoll 8526->8530 8526->8539 8531 454bf9 sprintf 8527->8531 8527->8539 8533 4552e6 8528->8533 8534 4547bc strcmp 8528->8534 8528->8539 8532 454654 _strncoll 8529->8532 8529->8539 8530->8539 8531->8539 8532->8539 8535 45530a sscanf 8533->8535 8533->8539 8534->8539 8540 45521c 8534->8540 8535->8538 8536 455359 sprintf 8536->8539 8538->8536 8538->8539 8540->8539 8541 4552b2 memcmp 8540->8541 8541->8539 8541->8540 8063 419c02 8073 419c11 8063->8073 8065 419e83 GetWindowPlacement 8066 419ece 8065->8066 8067 419aa2 8066->8067 8069 419eec GetWindow 8066->8069 8068 419aaa SetWindowLongA 8067->8068 8070 419ad6 SetParent 8068->8070 8069->8068 8071 419af4 SendMessageA SendMessageA 8070->8071 8072 419b4b GetDesktopWindow 8071->8072 8087 419f08 8071->8087 8074 419b58 SetWindowLongA 8072->8074 8072->8087 8073->8065 8077 419d55 CreateWindowExW 8073->8077 8090 419de4 SetWindowLongA 8073->8090 8094 419e24 8073->8094 8102 417dbc 8073->8102 8078 41a0bc 8074->8078 8093 419b81 8074->8093 8075 41a0f4 SendMessageA 8076 419f24 8075->8076 8081 41a122 SendMessageA 8075->8081 8079 419f74 8076->8079 8080 419f36 SetWindowPos 8076->8080 8077->8073 8082 41a0c4 SetMenu 8078->8082 8120 419980 8079->8120 8080->8079 8125 4831dc 8081->8125 8082->8087 8085 419f80 8088 419fb1 8085->8088 8089 419f8b SendMessageA 8085->8089 8086 41a154 SendMessageA 8086->8076 8087->8075 8087->8076 8091 419fb9 SendMessageA 8088->8091 8092 419fdf 8088->8092 8089->8088 8090->8073 8091->8092 8095 419ff6 SetMenu 8092->8095 8100 41a016 8092->8100 8093->8082 8096 419bc4 SetParent 8093->8096 8094->8065 8095->8100 8096->8093 8097 41a07b 8098 41a0a2 SetFocus 8097->8098 8099 41a0af 8097->8099 8098->8099 8100->8097 8101 419980 ShowWindow 8100->8101 8101->8100 8103 417e09 AdjustWindowRectEx 8102->8103 8104 417ddb IsIconic 8102->8104 8109 417e87 8103->8109 8105 417df0 IsZoomed 8104->8105 8106 417de8 8104->8106 8105->8106 8107 417e00 8105->8107 8106->8073 8107->8103 8107->8106 8108 4180dc 8108->8073 8109->8108 8110 418120 GetSystemMetrics 8109->8110 8111 418060 SendMessageA SendMessageA 8109->8111 8113 418148 MoveWindow GetWindowRect 8110->8113 8112 4180aa 8111->8112 8112->8073 8114 418217 8113->8114 8115 418198 GetClientRect 8113->8115 8114->8112 8116 418225 DrawMenuBar 8114->8116 8115->8114 8117 4181b6 8115->8117 8116->8112 8117->8113 8118 4181d4 MoveWindow 8117->8118 8118->8114 8121 4199c4 8120->8121 8123 41999d 8120->8123 8121->8085 8122 4199d6 ShowWindow 8122->8085 8123->8122 8124 4199b9 8123->8124 8124->8085 8126 4831fa 8125->8126 8126->8086 8668 47508c SetBkColor SetBkMode ExtTextOutA SetBkColor 8210 50f900 8211 50f91f 8210->8211 8216 50facc 8210->8216 8212 50f929 _ftime 8211->8212 8214 50f969 RtlEnterCriticalSection QueryPerformanceCounter 8211->8214 8213 50f94f 8212->8213 8219 50f9f0 8214->8219 8215 50fae8 QueryPerformanceFrequency 8215->8216 8216->8215 8218 50fbd8 7 API calls 8216->8218 8220 50fb11 GetSystemInfo 8216->8220 8221 50fcdb 8216->8221 8217 50fb62 RtlLeaveCriticalSection 8217->8212 8218->8216 8219->8217 8222 50fa00 8219->8222 8220->8216 8221->8221 8223 50fab5 RtlLeaveCriticalSection 8222->8223 8223->8213 8241 4ac51c 8242 43499c 8241->8242 8243 4ac532 LoadIconA LoadIconA LoadCursorA RegisterClassExA 8242->8243 8244 4ac650 CreateWindowExA SetWindowLongA ShowWindow UpdateWindow 8243->8244 8245 4ac615 8243->8245 8244->8245 8248 4d6214 8245->8248 8247 4ac637 8250 4d622e 8248->8250 8249 4d6430 8249->8247 8250->8249 8251 4d6369 CreatePatternBrush 8250->8251 8252 4d638e 8251->8252 8252->8247 8253 4fd418 8254 4fd43f 8253->8254 8255 4fd463 GetVersionExA GetSystemInfo 8254->8255 8256 4fd4b6 8255->8256 8257 4fd4c6 wsprintfA 8256->8257 8258 4fd517 8256->8258 8257->8258 8669 44619c 8670 44620c sprintf 8669->8670 8671 4461bf sprintf 8669->8671 8672 4461e1 8670->8672 8671->8672 8542 43f118 8543 5d3f74 8542->8543 8544 43f126 MultiByteToWideChar MultiByteToWideChar MessageBoxW 8543->8544 8545 43c01c 8547 43c034 8545->8547 8546 43c100 _strncoll 8546->8547 8547->8546 8548 43c292 8547->8548 8549 43c186 sprintf 8547->8549 8550 43c2ce strtol 8547->8550 8551 43c1bf 8549->8551 8550->8547 8673 43119c 8674 431274 8673->8674 8675 4311af 8673->8675 8676 48af14 5 API calls 8675->8676 8677 43120a 8675->8677 8676->8677 8297 47f824 8298 47f847 GetMenuItemCount 8297->8298 8299 47fc2a 8297->8299 8300 47f86d 8298->8300 8304 47f898 8298->8304 8301 47f87c RemoveMenu 8300->8301 8301->8301 8301->8304 8302 47fc20 8302->8299 8303 47fe22 DrawMenuBar 8302->8303 8303->8299 8304->8302 8305 47fad1 8304->8305 8306 47fe61 DestroyMenu GetSystemMenu 8304->8306 8309 47fb51 _mbscpy 8304->8309 8307 47feb8 8306->8307 8306->8309 8309->8302 8312 41d126 8313 41d132 8312->8313 8316 48a910 8313->8316 8317 48ab58 8316->8317 8318 48a932 SystemParametersInfoA 8316->8318 8319 48aaa4 8318->8319 8320 48a974 SystemParametersInfoA 8318->8320 8322 48a854 2 API calls 8319->8322 8321 48a9b1 733AAC50 8320->8321 8343 48ab38 8320->8343 8324 5ce7e8 8321->8324 8323 48aabc 8322->8323 8326 48a854 2 API calls 8323->8326 8327 48a9fb MulDiv MulDiv 8324->8327 8325 48a854 2 API calls 8325->8317 8328 48aacd 8326->8328 8329 48aa51 8327->8329 8330 48a854 2 API calls 8328->8330 8344 48a854 CreateFontIndirectA 8329->8344 8331 48aade 8330->8331 8333 48a854 2 API calls 8331->8333 8335 48aaf6 8333->8335 8334 48aa6c 8336 48aa74 GetStockObject 8334->8336 8340 41d13d 8334->8340 8337 48a854 2 API calls 8335->8337 8336->8334 8338 48ab0e 8337->8338 8339 48a854 2 API calls 8338->8339 8341 48ab23 8339->8341 8342 48a854 2 API calls 8341->8342 8342->8343 8343->8325 8345 48a7e8 8344->8345 8346 48a884 DeleteObject 8345->8346 8346->8334 8552 431024 8553 431188 8552->8553 8554 431045 8552->8554 8554->8553 8556 48af14 8554->8556 8557 48af29 8556->8557 8558 48af44 733AAC50 SelectObject 8556->8558 8557->8554 8562 48af9e 8558->8562 8565 48b18e 8558->8565 8559 48b0ef GetTextExtentPoint32W 8561 48b167 8559->8561 8563 48b2e3 SelectObject 8561->8563 8561->8565 8562->8559 8562->8561 8564 48b06e SelectObject 8562->8564 8562->8565 8563->8565 8564->8559 8564->8562 8565->8554 8347 48ad20 8348 48ad35 733AAC50 8347->8348 8350 48ad48 8348->8350 8351 48ad88 EnumFontFamiliesW 8350->8351 8352 48ad4d EnumFontFamiliesA 8350->8352 8353 48ad6c 8351->8353 8352->8353 8566 55313c 8567 55317d 8566->8567 8568 55319d __p__environ 8567->8568 8571 553231 8568->8571 8573 5531ae 8568->8573 8569 553223 __p__environ 8570 5531b8 __p__environ 8569->8570 8569->8571 8570->8573 8572 5531de strchr 8572->8573 8573->8569 8573->8572 8354 47382c 8355 4738b0 733AAC50 8354->8355 8356 473846 8354->8356 8357 47386f 8355->8357 8356->8357 8358 473857 SelectObject 8356->8358 8359 47387b GetBkMode 8357->8359 8358->8357 8574 47302c 8575 47304f 8574->8575 8579 4730b0 733AAC50 GetDIBits 8574->8579 8577 47307b GetClientRect 8575->8577 8580 473054 8575->8580 8578 473117 8579->8578 8360 5d6cb0 8361 5d6d3b RtlEnterCriticalSection 8360->8361 8362 5d6cc0 8360->8362 8363 5d6cec InterlockedExchange 8362->8363 8365 5d6cd8 8362->8365 8363->8365 8367 5d6d07 RtlInitializeCriticalSection RtlInitializeCriticalSection 8363->8367 8364 5d6cc6 Sleep 8364->8365 8365->8364 8368 5d6ce2 8365->8368 8366 5d6ce7 8367->8368 8368->8361 8368->8366 8369 41832c 8370 418364 8369->8370 8371 418349 8369->8371 8379 4183a8 SendMessageA 8370->8379 8380 41838b 8370->8380 8372 4361f6 8371->8372 8373 436244 8371->8373 8374 43637c 8371->8374 8376 436202 8372->8376 8378 4362c4 8372->8378 8375 436344 8373->8375 8377 436204 8373->8377 8382 436355 NtdllDefWindowProc_A 8375->8382 8376->8377 8381 436304 8376->8381 8383 43620f 8377->8383 8385 436024 SendMessageA 8377->8385 8378->8383 8384 4362dd NtdllDefWindowProc_A 8378->8384 8379->8380 8381->8383 8387 436024 SendMessageA 8381->8387 8382->8374 8384->8383 8386 43628c 8385->8386 8386->8383 8388 436290 NtdllDefWindowProc_A 8386->8388 8387->8383 8388->8383 8581 55a020 8582 55a03e 8581->8582 8584 55a05c 8581->8584 8582->8584 8585 576160 8582->8585 8587 57617e 8585->8587 8586 57626e 8586->8584 8587->8586 8588 576444 _isctype 8587->8588 8588->8587 8678 4250b4 8679 42510b 8678->8679 8682 4250c9 8678->8682 8680 42511c 8683 425225 printf 8680->8683 8685 425100 8680->8685 8681 42520d printf 8681->8679 8682->8680 8684 4250ea 8682->8684 8682->8685 8683->8685 8684->8679 8684->8685 8686 425242 printf 8684->8686 8685->8679 8685->8681 8686->8685 8687 4601b0 8688 4601cf 8687->8688 8689 4604ec 8687->8689 8690 460227 8688->8690 8691 46020c 8688->8691 8692 46032c 8688->8692 8691->8690 8696 460c84 sprintf 8691->8696 8692->8690 8693 460564 8692->8693 8694 460dda 8692->8694 8693->8690 8698 4721f8 8693->8698 8695 4721f8 _strncoll 8694->8695 8695->8690 8696->8690 8699 47222f 8698->8699 8701 47226c 8699->8701 8702 4711e4 8699->8702 8701->8690 8704 471217 8702->8704 8705 471290 8702->8705 8703 471240 _strncoll 8703->8704 8704->8703 8704->8705 8705->8701 8396 401137 __set_app_type 8413 401020 8396->8413 8414 401030 8413->8414 8415 40104c SetUnhandledExceptionFilter 8413->8415 8414->8415 8416 401060 8415->8416 8417 401065 __getmainargs 8416->8417 8418 4010f0 _setmode _setmode _setmode 8417->8418 8419 4010a0 __p__fmode 8417->8419 8418->8419 8420 4010b2 8419->8420 8421 4010ba __p__environ 8420->8421 8424 5cf130 8421->8424 8423 4010db _cexit ExitProcess 8423->8418 8431 5cf110 8424->8431 8426 5cf148 GetCommandLineA GetStartupInfoA 8430 5cf161 8426->8430 8427 5cf1df GetModuleHandleA 8429 5cf206 8427->8429 8428 5cf192 8428->8427 8428->8430 8429->8423 8430->8427 8430->8428 8432 5cf0b0 8431->8432 8432->8426 8589 57f120 8592 50c070 8589->8592 8591 57f137 8593 50c08f 8592->8593 8594 50c0a5 8593->8594 8595 50c22a strcmp 8593->8595 8594->8591 8595->8594 8433 40d0b8 8436 40d0e7 8433->8436 8434 40cd38 malloc 8434->8436 8435 40d21f 8436->8434 8436->8435 8706 4330b8 8707 4330ca 8706->8707 8708 4330de _strcmpi 8707->8708 8709 4330ee 8707->8709 8708->8707 8708->8709 8710 4500b8 8711 46f690 8710->8711 8712 46f6c0 sprintf 8711->8712 8715 46f6b2 8711->8715 8714 46f70c 8712->8714 8713 46f71c sprintf 8713->8714 8714->8713 8714->8715 8716 47f1b8 8717 4163b8 8716->8717 8718 47f1c7 GetWindowRect SetCursorPos 8717->8718

                                                  Executed Functions

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 142 417dbc-417dd9 143 417e09-417e81 AdjustWindowRectEx 142->143 144 417ddb-417de6 IsIconic 142->144 147 417e87-417e8c 143->147 148 4180bc-4180c2 143->148 145 417df0-417dfe IsZoomed 144->145 146 417de8-417def 144->146 145->146 149 417e00-417e07 145->149 150 417e9e-417ea0 147->150 151 417e8e-417e98 147->151 152 4180cc-4180d6 148->152 149->143 149->146 153 417ea6-417ea8 150->153 154 418248 150->154 151->150 155 418014-418019 152->155 156 418290-418297 153->156 157 417eae-417ee2 153->157 158 418254 154->158 161 418027-418044 155->161 162 41801b-418021 155->162 163 4182a0-4182a6 156->163 159 418260 157->159 160 417ee8-417ef9 157->160 158->159 173 418268 159->173 164 4180f8 160->164 165 417eff-417f01 160->165 166 418104-41811f 161->166 167 41804a-41805a 161->167 162->161 162->163 163->161 170 4182ac 163->170 164->166 171 417f03-417f05 165->171 172 417f0c-417f15 165->172 168 418120-418147 GetSystemMetrics 167->168 169 418060-4180a4 SendMessageA * 2 167->169 177 418148-418196 MoveWindow GetWindowRect 168->177 174 4180aa-4180ba 169->174 170->170 178 418278-41827a 171->178 179 417f0b 171->179 175 417f1b-417f1d 172->175 176 41823c 172->176 180 418270-418272 173->180 181 417f2f-417f31 175->181 182 417f1f-417f29 175->182 176->154 183 418217-41821f 177->183 184 418198-4181b4 GetClientRect 177->184 178->172 179->172 185 417f9c-417fa9 180->185 181->158 186 417f37-417f39 181->186 182->181 183->174 187 418225-418237 DrawMenuBar 183->187 184->183 188 4181b6-4181b8 184->188 193 4180dc-4180e2 185->193 194 417faf-417fea 185->194 191 418280-418287 186->191 192 417f3f-417f73 186->192 187->174 189 4181d4-4181df 188->189 190 4181ba-4181c5 188->190 196 4181e1 189->196 197 4181e5-418214 MoveWindow 189->197 190->177 195 4181c7-4181cf 190->195 191->156 192->173 198 417f79-417f8a 192->198 201 4180ec 193->201 194->152 199 417ff0-418010 194->199 195->177 196->197 197->183 200 417f90-417f92 198->200 198->201 199->155 200->185 202 417f94-417f96 200->202 201->164 202->180 202->185
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$AdjustIconicRectWindowZoomed
                                                  • String ID: @
                                                  • API String ID: 3468695746-2766056989
                                                  • Opcode ID: 1dfc70bc8f74020222e4fa21b729a1296705e618534ff47a6460fa8efc646f2a
                                                  • Instruction ID: b3f47970eecb9420cda856a2368fa749880b8b57822db4e005dd73235364fa22
                                                  • Opcode Fuzzy Hash: 1dfc70bc8f74020222e4fa21b729a1296705e618534ff47a6460fa8efc646f2a
                                                  • Instruction Fuzzy Hash: 12E12B71508305CFCB14DF28C18469ABBF1BF88318F158A6EEC986B345DB34E985CB5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: _setmode$ExceptionExitFilterProcessUnhandled__getmainargs__p__environ__p__fmode_cexit
                                                  • String ID: @\
                                                  • API String ID: 3695137517-3984165437
                                                  • Opcode ID: 87beb7fabfa9707f6b45a3ec9534653eff2953bd471800a764ac23823eee4b94
                                                  • Instruction ID: dfed728f0063e300c51f57784679bc62287248947ced7a3eeb6717f653d6abfe
                                                  • Opcode Fuzzy Hash: 87beb7fabfa9707f6b45a3ec9534653eff2953bd471800a764ac23823eee4b94
                                                  • Instruction Fuzzy Hash: D131B7B49093469FC710EF78D59A62ABBF5BF84300F00882EE9C497362D774D9449B52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 582 418b54-418b81 584 418b83-418b91 582->584 585 418b98-418ba0 582->585 584->585 586 418ba6-418bb8 585->586 587 418c9c-418ca8 585->587 588 418ce4-418cf5 LoadLibraryA 586->588 589 418bbe-418bc5 586->589 588->589 592 418cfb-418d1c GetProcAddress FreeLibrary 588->592 590 418d30-418d41 LoadLibraryA 589->590 591 418bcb-418c2b call 43499c 589->591 590->591 593 418d47-418d68 GetProcAddress FreeLibrary 590->593 597 418c31-418c46 call 417b10 591->597 598 418cc0-418cdf call 43499c LoadIconA 591->598 592->589 593->591 604 418d24-418d29 597->604 605 418c4c 597->605 603 418c4f-418c7c LoadCursorA 598->603 608 418cac-418cbb 603->608 609 418c7e-418c8c 603->609 606 418c8e-418c98 604->606 605->603 608->609 609->606
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CursorLoad
                                                  • String ID: Z_
                                                  • API String ID: 3238433803-1605463335
                                                  • Opcode ID: 03668ea9d278256fc5a6e19b055f2bff59c2aaf889a54834eb54fa34a154b0af
                                                  • Instruction ID: 4529915f5265db785fee36eee1967e0453c3551146f5c9e9d1dcc4fc07457575
                                                  • Opcode Fuzzy Hash: 03668ea9d278256fc5a6e19b055f2bff59c2aaf889a54834eb54fa34a154b0af
                                                  • Instruction Fuzzy Hash: 694189B15087058BD320AF28D5487AA7FF5FF80304F05496EE5898B351EB78D845CFA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: InfoSystemVersionwsprintf
                                                  • String ID: hpa
                                                  • API String ID: 3808322963-2886691762
                                                  • Opcode ID: 1e3bd9ca012b50a78634628fe4d42bd72467ed3ee07ea7a95e8262f7efba8401
                                                  • Instruction ID: a6d285c7c9c722aa2fc2a02095e453056b6a40f4546951374d00b6775df73744
                                                  • Opcode Fuzzy Hash: 1e3bd9ca012b50a78634628fe4d42bd72467ed3ee07ea7a95e8262f7efba8401
                                                  • Instruction Fuzzy Hash: 0F81D2B0408745AFC320AF25C4982AEBFE6BF88349F048D1EE5D88B241C7B99585CF57
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • NtdllDefWindowProc_A.NTDLL ref: 0043629F
                                                  • NtdllDefWindowProc_A.NTDLL ref: 004362F0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: NtdllProc_Window
                                                  • String ID:
                                                  • API String ID: 4255912815-0
                                                  • Opcode ID: 3def92e04e55f4bfc274b5ef146cb00f7e2534ba68811a57a05619c9b0901be2
                                                  • Instruction ID: 3913e1c84d1a17e8f5318016c0647030583df3b4a57b645ee8e4a81c2f96c842
                                                  • Opcode Fuzzy Hash: 3def92e04e55f4bfc274b5ef146cb00f7e2534ba68811a57a05619c9b0901be2
                                                  • Instruction Fuzzy Hash: 15615BB09083029FC710AF29C48556FBBE4BB88314F06DA6FE8A997341D338D9458F4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Window$LongMessageParentSend$DesktopForeground
                                                  • String ID:
                                                  • API String ID: 2299332115-3916222277
                                                  • Opcode ID: 21ac153df164bac7657e66e35e01e705aedf371d401fb55333957b2cdbd37b6a
                                                  • Instruction ID: ab16b314d7edb7fb2e842306ce609dc906fb71e19f0691c1b0c6c3642d68181a
                                                  • Opcode Fuzzy Hash: 21ac153df164bac7657e66e35e01e705aedf371d401fb55333957b2cdbd37b6a
                                                  • Instruction Fuzzy Hash: D0C107B0509701DFD710EF28C18976ABBF1BF84704F14896EE8998B392D779D884CB96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • SystemParametersInfoA.USER32 ref: 0048A964
                                                  • SystemParametersInfoA.USER32 ref: 0048A9A1
                                                  • 733AAC50.USER32 ref: 0048A9E3
                                                  • MulDiv.KERNEL32 ref: 0048AA16
                                                  • GetStockObject.GDI32 ref: 0048AA79
                                                  • MulDiv.KERNEL32 ref: 0048AA30
                                                    • Part of subcall function 0048A854: CreateFontIndirectA.GDI32 ref: 0048A86A
                                                    • Part of subcall function 0048A854: DeleteObject.GDI32 ref: 0048A889
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: InfoObjectParametersSystem$CreateDeleteFontIndirectStock
                                                  • String ID: 1$H$H$L$TkCaptionFont$TkDefaultFont$TkFixedFont$TkHeadingFont$TkIconFont$TkMenuFont$TkSmallCaptionFont$TkTextFont$TkTooltipFont
                                                  • API String ID: 2412933844-581550370
                                                  • Opcode ID: f8ad6996d3b9d81194897c48c2124e1b69edbe3d6cb877e07245aed2bd4192aa
                                                  • Instruction ID: df09e8b0604826b9a847722ce989e57484fc40e49ac1658ffdb3daab5d28662b
                                                  • Opcode Fuzzy Hash: f8ad6996d3b9d81194897c48c2124e1b69edbe3d6cb877e07245aed2bd4192aa
                                                  • Instruction Fuzzy Hash: 4D511C706083448FE350FF28C58579EBBE6AB88304F018C2EE989C7345DBB898598B57
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 92 50f900-50f919 93 50facc-50fad9 call 5143cc 92->93 94 50f91f-50f927 92->94 101 50fae8-50fafc QueryPerformanceFrequency 93->101 102 50fadb-50fae0 call 51441c 93->102 95 50f929-50f94c _ftime 94->95 96 50f95c-50f967 94->96 98 50f94f-50f959 95->98 96->95 100 50f969-50f9f4 RtlEnterCriticalSection QueryPerformanceCounter call 5d3fa8 96->100 109 50fb62-50fb6f RtlLeaveCriticalSection 100->109 110 50f9fa 100->110 106 50fb4c-50fb56 101->106 107 50fafe-50fb05 101->107 102->101 106->102 111 50fbd8-50fcc1 RtlInitializeCriticalSection CreateEventA * 2 CreateThread SetThreadPriority WaitForSingleObject CloseHandle call 50f244 107->111 112 50fb0b 107->112 109->95 113 50fa00-50fac5 call 5d3fa8 * 3 call 5d4118 RtlLeaveCriticalSection 110->113 114 50fb58-50fb5c 110->114 118 50fcc6 111->118 115 50fb11-50fb34 GetSystemInfo call 542f40 112->115 116 50fccb-50fcd5 112->116 113->98 114->109 114->113 125 50fb40-50fb4a 115->125 126 50fb36-50fb3e 115->126 116->111 119 50fcdb 116->119 118->106 119->119 125->106 126->125 127 50fb74-50fb7c 126->127 127->125 129 50fb7e-50fb86 127->129 129->125 131 50fb88-50fb9a call 542f40 129->131 131->125 137 50fb9c-50fbae 131->137 138 50fbb0-50fbb5 137->138 139 50fbbe-50fbc7 137->139 138->125 140 50fbb7-50fbbc 138->140 139->125 141 50fbcd-50fbd7 139->141 140->125 140->139 141->111
                                                  APIs
                                                  • _ftime.MSVCRT ref: 0050F930
                                                  • RtlEnterCriticalSection.NTDLL ref: 0050F984
                                                  • QueryPerformanceCounter.KERNEL32 ref: 0050F991
                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 0050FABF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection$CounterEnterLeavePerformanceQuery_ftime
                                                  • String ID: Genu$ineI$ntel
                                                  • API String ID: 809612594-3389352399
                                                  • Opcode ID: 3bb0167c3934eca56ddb2f427e30a0814f8fe06bbf3774d3e5695a431e0490f8
                                                  • Instruction ID: 56be6974c6fe67d0062e3a682dc3cfd4d5d209c7406cf5f45a825cc7359be0c5
                                                  • Opcode Fuzzy Hash: 3bb0167c3934eca56ddb2f427e30a0814f8fe06bbf3774d3e5695a431e0490f8
                                                  • Instruction Fuzzy Hash: CBA1E4B08083429FD720EF68D56971EFFE5BB84744F00992EE899877A1D7789448CF82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 203 419c02-419c0b 204 419c11-419c16 203->204 205 41a248-41a25a 203->205 206 41a388-41a39f 204->206 207 419c1c-419c4f call 4163b8 204->207 208 41a262-41a280 205->208 206->208 215 419c55-419c7e 207->215 216 41a3bb-41a3d3 207->216 210 419c80-419dc4 call 417dbc call 43499c CreateWindowExW 208->210 211 41a286-41a28b 208->211 247 419dcf-419e10 SetWindowLongA 210->247 214 41a2fc-41a318 211->214 218 419e83-419ed0 GetWindowPlacement 214->218 219 41a31e-41a325 214->219 215->210 216->211 225 419aa2 218->225 226 419ed6-419ed9 218->226 221 41a3d8-41a3e6 219->221 222 41a32b 219->222 221->222 222->206 230 419aaa-419b45 SetWindowLongA SetParent SendMessageA * 2 225->230 226->225 228 419edf-419ee6 226->228 228->225 231 419eec-419f03 GetWindow 228->231 235 419f08-419f1e 230->235 236 419b4b-419b52 GetDesktopWindow 230->236 231->230 239 41a0f4-41a11c SendMessageA 235->239 240 419f24-419f34 235->240 236->235 238 419b58-419b7b SetWindowLongA 236->238 242 419b81-419b9e 238->242 243 41a0bc 238->243 239->240 246 41a122-41a178 SendMessageA call 4831dc SendMessageA 239->246 244 419f74-419f89 call 419980 240->244 245 419f36-419f71 SetWindowPos 240->245 248 41a0c4-41a0da SetMenu call 5d8c98 242->248 258 419ba4-419ba6 242->258 243->248 255 419fb1-419fb7 244->255 256 419f8b-419fae SendMessageA 244->256 245->244 246->240 247->214 262 419e16-419e1e 247->262 259 41a0df-41a0ee 248->259 260 419fb9-419fdc SendMessageA 255->260 261 419fdf-419ff4 255->261 256->255 263 419bb6-419bb9 258->263 259->239 259->240 260->261 268 41a016-41a01c 261->268 269 419ff6-41a00f SetMenu 261->269 262->214 265 419e24-419e80 262->265 266 419ba8-419bb0 263->266 267 419bbb-419bc2 263->267 265->218 266->248 266->263 267->266 270 419bc4-419bf2 SetParent 267->270 272 41a08b-41a0a0 268->272 273 41a01e-41a026 268->273 269->268 270->266 277 41a0a2-41a0ae SetFocus 272->277 278 41a0af-41a0b9 272->278 275 41a028-41a033 273->275 276 41a07c-41a083 273->276 275->276 279 41a035-41a037 275->279 276->272 277->278 280 41a046-41a079 call 419a10 call 419980 279->280 287 41a07b 280->287 287->276
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$MessageParentSend$CreateDesktopIconicPlacement
                                                  • String ID: ,
                                                  • API String ID: 1921295904-3772416878
                                                  • Opcode ID: 8459e2ca7db4151b67cf8311fc708252881fa70ef2f0da39e5df0658d44600bd
                                                  • Instruction ID: 6055e93715125bd72b99c945665e696d42438dbdf7e1f1f5fbc6dfe2b8109d76
                                                  • Opcode Fuzzy Hash: 8459e2ca7db4151b67cf8311fc708252881fa70ef2f0da39e5df0658d44600bd
                                                  • Instruction Fuzzy Hash: 96E1D1B4509301CFD750EF28C584B9ABBF1BF84304F18896EEC998B396D7799884CB56
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 288 41c94f-41c954 289 41c95a 288->289 290 41ce9c-41cebd call 47f124 288->290 292 41cab0-41cab3 289->292 293 41c960-41c965 289->293 300 41d08c-41d0b0 call 418538 290->300 294 41ce40-41ce50 call 4183f8 292->294 295 41cab9-41cabe 292->295 297 41d0b8-41d0d5 call 418538 293->297 298 41c96b-41c970 293->298 315 41cce0-41cceb 294->315 316 41ce56-41ce71 294->316 303 41cac4-41cac7 295->303 304 41ce08-41ce16 call 4183f8 295->304 318 41ca90-41caac 297->318 299 41c976-41c97b 298->299 298->300 306 41c97d-41c985 299->306 307 41c9cc-41c9ec call 4183f8 299->307 300->318 303->307 311 41cacd-41cae0 call 4183f8 303->311 304->307 325 41ce1c-41ce27 call 42e2e0 304->325 306->307 313 41c987-41c9a4 306->313 337 41cd10-41cd15 307->337 338 41c9f2-41c9f5 307->338 311->315 331 41cae6-41cafa IsWindowVisible 311->331 313->307 321 41d160-41d1fc 733AAC50 call 5ce7e8 MulDiv call 5ce7e8 MulDiv call 5d8cc8 316->321 322 41ce77-41ce89 call 434ce0 316->322 334 41d26c-41d29a GetWindowPlacement 321->334 322->315 345 41ce8f-41ce96 call 417c24 322->345 325->307 342 41ce2d-41ce38 325->342 333 41cb00-41cb05 331->333 331->334 340 41cb07-41cb0d 333->340 341 41cb2c-41cb2e 333->341 343 41d2a0-41d2ab 334->343 344 41d3cf 334->344 346 41cd34-41cd36 337->346 349 41cd17-41cd1c 337->349 338->346 347 41c9fb-41c9fe 338->347 352 41cb13 340->352 353 41d33c-41d343 340->353 341->315 356 41cb34-41cb37 341->356 342->318 367 41d32c-41d335 SetFocus 343->367 363 41d3d9-41d3dc 344->363 345->315 354 41ca5a-41ca6c 346->354 355 41cd3c-41cd41 346->355 351 41ca04-41ca06 347->351 358 41d150-41d155 347->358 350 41cd22-41cd2b 349->350 349->351 350->351 360 41cd31 350->360 351->354 373 41ca08-41ca46 call 434794 SendMessageA 351->373 361 41cb19-41cb1c 352->361 362 41d37e-41d380 352->362 368 41d345-41d362 353->368 369 41d364-41d370 call 4165d8 353->369 364 41ca70-41ca7e 354->364 365 41ca53 355->365 366 41cd47-41cd59 call 4163b8 355->366 356->315 370 41cb3d-41cbdd GetClientRect call 4163b8 MoveWindow call 4182b4 356->370 358->346 371 41d15b 358->371 360->346 361->369 378 41cb22-41cb25 361->378 362->356 377 41d386-41d392 call 4166e8 362->377 384 41d3e7-41d40f 363->384 382 41ca86-41ca89 364->382 365->354 366->367 392 41cd5f-41cd8e call 436024 366->392 367->315 368->369 388 41d375-41d379 369->388 370->315 399 41cbe3-41cbee 370->399 371->351 373->318 395 41ca48-41ca4d 373->395 391 41d397 377->391 378->377 383 41cb2b 378->383 382->318 383->341 384->315 388->341 391->341 392->318 400 41cd94-41cdb1 392->400 395->365 395->366 401 41cbf4-41cbfd 399->401 402 41cc9a-41cc9d 399->402 400->364 404 41cc03-41cc0a 401->404 405 41cc8f-41cc92 401->405 402->363 403 41cca3-41ccce 402->403 403->384 410 41ccd4-41ccdd 403->410 406 41cc10 404->406 407 41d43c-41d445 404->407 408 41d414-41d41f 405->408 409 41cc98 405->409 411 41cc13-41cc18 406->411 407->411 412 41d44b 407->412 408->402 409->402 410->315 413 41d46e 411->413 414 41cc1e-41cc38 411->414 415 41cc3e-41cc45 412->415 419 41d479-41d47d 413->419 414->415 416 41d450 414->416 417 41d424-41d431 415->417 418 41cc4b-41cc4e 415->418 424 41d45f 416->424 420 41cc52-41cc57 417->420 421 41d437 417->421 418->420 420->419 422 41cc5d-41cc79 420->422 423 41cc7f-41cc89 421->423 422->423 422->424 423->405 424->413
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientMessageMoveRectSendVisible
                                                  • String ID: ,$Z
                                                  • API String ID: 3303122596-3024109530
                                                  • Opcode ID: e0beef523fe094c72795692bf717737d03d0cbd67c3e3cacb766a83010b708a3
                                                  • Instruction ID: 2e8d3ecffb26bc1ce40e336ff9a2c8adfccb203d54eabbf5d237a56337cc25ab
                                                  • Opcode Fuzzy Hash: e0beef523fe094c72795692bf717737d03d0cbd67c3e3cacb766a83010b708a3
                                                  • Instruction Fuzzy Hash: 35024BB0548701CFD724DF28C5C57AABBE1BF84344F14892ED8998B355D738E885CB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Window$Load$Icon$ClassCreateCursorLongRegisterShowUpdate
                                                  • String ID: 0$TtkMonitorClass$TtkMonitorWindow
                                                  • API String ID: 1906826020-4109889077
                                                  • Opcode ID: 5a6d5aa1303209dcc19ebcae4ad7267da52fba77c0fa46cc1c28f09fd69c17bd
                                                  • Instruction ID: ef8428fd6395ead5cb2f4dbe3cc88fe1601c8907ef333af622a7926318b55ea4
                                                  • Opcode Fuzzy Hash: 5a6d5aa1303209dcc19ebcae4ad7267da52fba77c0fa46cc1c28f09fd69c17bd
                                                  • Instruction Fuzzy Hash: 6A4100B08183418FD320AF68C44935FBFE4BB84744F40892EE8C89B391D7B99548CB93
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Create$Event$Thread$Priority$sprintf
                                                  • String ID:
                                                  • API String ID: 2067779509-0
                                                  • Opcode ID: 6998950a34e982990c13e70034224f4513f6f94996bb2ff08443efe48eef13ae
                                                  • Instruction ID: 69af821411dfb6cd930ad2ddcbd2e77d70ed776cb084ce52a7c8766b00a650e3
                                                  • Opcode Fuzzy Hash: 6998950a34e982990c13e70034224f4513f6f94996bb2ff08443efe48eef13ae
                                                  • Instruction Fuzzy Hash: 126162B1409301AFE750EF69C19935ABFE0BF84708F54C95EE8984B346D7B98588CF92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 470 47f824-47f841 471 47f847-47f86b GetMenuItemCount 470->471 472 47fc34-47fc3e 470->472 473 47f86d-47f879 471->473 474 47f89c-47f8a5 471->474 475 47f87c-47f896 RemoveMenu 473->475 476 47fc20-47fc24 474->476 477 47f8ab-47f8bb 474->477 475->475 478 47f898 475->478 479 47fe04-47fe0c 476->479 480 47fc2a 476->480 481 47fa0c-47fa2f 477->481 478->474 479->480 482 47fe12-47fe1c call 41dd3c 479->482 480->472 486 47fa35-47fa38 481->486 487 47f8c0-47f8c3 481->487 482->480 490 47fe22-47fe2b DrawMenuBar 482->490 488 47fa3e-47fa61 486->488 489 47f8c9-47f8ce 486->489 487->489 491 47f9fa-47fa06 487->491 498 47fa67 488->498 499 47f8fc-47f903 488->499 492 47f8d4-47f8f6 489->492 493 47fadc-47fae1 489->493 490->480 491->476 491->481 492->499 502 47fa68-47faa4 492->502 495 47fae3-47fb00 493->495 496 47fb20-47fb25 493->496 509 47fb08-47fb0f 495->509 500 47fb2b-47fb30 496->500 501 47fde8-47fdf9 496->501 498->502 499->502 503 47f909-47f918 499->503 500->501 504 47fb36-47fb4b 500->504 501->479 506 47f91e-47f923 502->506 507 47faaa-47fab2 502->507 503->506 503->507 517 47fb51-47fb78 504->517 518 47fe30 504->518 511 47f929-47f92c 506->511 512 47fab8-47fabf 506->512 507->511 507->512 514 47fb15-47fb19 509->514 515 47fc40-47fcd6 call 4384bc 509->515 511->512 516 47f932-47f935 511->516 512->516 519 47fac5-47facb 512->519 520 47f9ce-47f9ed 514->520 538 47fcf4-47fcfa 515->538 571 47fcd8-47fcdc 515->571 521 47fad1-47fad7 516->521 522 47f93b-47f940 516->522 540 47fb7e-47fb88 517->540 541 47fd0a-47fd0f 517->541 523 47fe3d-47fe5b call 41dd3c 518->523 519->521 519->522 520->491 535 47f9ef-47f9f2 520->535 525 47f945-47f951 522->525 526 47f942 522->526 523->538 539 47fe61-47feb2 DestroyMenu GetSystemMenu 523->539 530 47f953-47f95b 525->530 531 47f990-47f996 525->531 526->525 530->531 537 47f95d-47f961 530->537 531->520 534 47f998-47f9ca 531->534 534->520 535->491 537->531 542 47f963-47f96b 537->542 555 47fd04-47fd06 538->555 539->538 545 47feb8-47fee9 539->545 548 47fbc9-47fbcc 540->548 543 47fd15-47fd3f 541->543 544 47fda4-47fddc _mbscpy 541->544 549 47f96d-47f970 542->549 550 47f979-47f97d 542->550 543->544 563 47fd41-47fd45 543->563 544->501 552 47fbce-47fbf3 548->552 553 47fb8c-47fb8f 548->553 549->550 556 47f972-47f975 549->556 550->509 551 47f983-47f98a 550->551 551->514 551->531 561 47fb91-47fbc0 552->561 568 47fbf5 552->568 553->561 562 47fbf8-47fc1a 553->562 555->541 556->550 561->555 576 47fbc6-47fbc7 561->576 562->561 567 47fd7c-47fd7e 563->567 572 47fd80-47fda2 567->572 573 47fd48-47fd78 567->573 568->562 571->538 575 47fcde-47fce6 571->575 572->573 573->544 581 47fd7a 573->581 575->538 578 47fce8-47fcee 575->578 576->548 578->523 578->538 581->567
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Menu$CountItemRemove
                                                  • String ID: (Pixmap)$(Tear-off)$ge)
                                                  • API String ID: 1046485675-1017915560
                                                  • Opcode ID: 77bb54f53515e45e56296cab9b15366362feefc859836a48e2825a04ef1270a5
                                                  • Instruction ID: 165960d8b491ec4e01c2997aac214d862667a42d005618d56dfa826d81c1241c
                                                  • Opcode Fuzzy Hash: 77bb54f53515e45e56296cab9b15366362feefc859836a48e2825a04ef1270a5
                                                  • Instruction Fuzzy Hash: D712E7B49083419FC714DF28C584AAABBE1BF89310F15897EE8899B361D774E845CF86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 612 401137-401153 __set_app_type call 401020 614 401158-401193 __set_app_type call 401020 612->614 617 4011d0-4011d5 614->617 618 401195-40119a 614->618 619 401230-401232 617->619 620 4011d7-4011dc 617->620 621 4011e7-4011f0 618->621 622 40119c 618->622 627 4011a1-4011b8 signal 619->627 623 4011f9-401210 signal 620->623 624 4011de-4011e3 620->624 625 4011f2-4011f7 621->625 626 401237-40124e signal 621->626 622->627 630 401212-401214 623->630 631 401285-40129c signal 623->631 628 4011e5 624->628 629 4011c6 624->629 625->623 625->629 632 401250-401252 626->632 633 4012a1-4012b8 signal 626->633 634 4012bd-4012d3 signal 627->634 635 4011be-4011c0 627->635 628->622 636 4011c8-4011cd 629->636 630->629 639 401216-401227 630->639 631->636 632->629 640 401258-401267 632->640 633->636 637 4012d5 634->637 638 4012df-4012e5 call 5cf240 634->638 635->629 641 401270-401280 635->641 637->638 638->637 639->636 640->636 641->636
                                                  APIs
                                                  • __set_app_type.MSVCRT ref: 0040114D
                                                    • Part of subcall function 00401020: SetUnhandledExceptionFilter.KERNEL32 ref: 00401053
                                                    • Part of subcall function 00401020: __getmainargs.MSVCRT ref: 00401092
                                                    • Part of subcall function 00401020: __p__fmode.MSVCRT ref: 004010A0
                                                    • Part of subcall function 00401020: __p__environ.MSVCRT ref: 004010BA
                                                    • Part of subcall function 00401020: _cexit.MSVCRT ref: 004010DD
                                                    • Part of subcall function 00401020: ExitProcess.KERNEL32 ref: 004010E5
                                                    • Part of subcall function 00401020: _setmode.MSVCRT ref: 00401105
                                                    • Part of subcall function 00401020: _setmode.MSVCRT ref: 00401119
                                                    • Part of subcall function 00401020: _setmode.MSVCRT ref: 0040112D
                                                  • __set_app_type.MSVCRT ref: 0040116D
                                                  • signal.MSVCRT ref: 004011B0
                                                  • signal.MSVCRT ref: 00401208
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: _setmode$__set_app_typesignal$ExceptionExitFilterProcessUnhandled__getmainargs__p__environ__p__fmode_cexit
                                                  • String ID:
                                                  • API String ID: 312243418-0
                                                  • Opcode ID: 862aa577647d4664eda0bce5bbbf62d24ee43af8cf31228daf786c227d63a13d
                                                  • Instruction ID: a6ab4f04e15091c89f6135d63b23023ea29ae5da0b75456b6f4cac2c2492200a
                                                  • Opcode Fuzzy Hash: 862aa577647d4664eda0bce5bbbf62d24ee43af8cf31228daf786c227d63a13d
                                                  • Instruction Fuzzy Hash: 323183700142018BD7246B68C94437ABAE4BB46328F150A2FE6D5FB3E1CBBD9885875B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 647 48af14-48af27 648 48af29-48af42 647->648 649 48af44-48af98 733AAC50 SelectObject 647->649 650 48b4ad-48b4cd 649->650 651 48af9e-48afcd 649->651 653 48b4d6-48b4da 650->653 652 48b09b-48b0db call 489f20 651->652 659 48b0e1-48b0ed 652->659 660 48afd4-48b050 652->660 655 48b47f-48b491 653->655 661 48b496-48b49e 655->661 659->652 662 48b0ef-48b15c GetTextExtentPoint32W 659->662 673 48b2c8-48b2cc 660->673 674 48b056-48b068 660->674 663 48b3a0-48b3a2 661->663 664 48b4a4-48b4a8 661->664 669 48b167-48b170 662->669 666 48b3a9-48b3bc 663->666 664->666 671 48b2d8-48b2dc 669->671 672 48b176-48b188 669->672 675 48b2e3-48b323 SelectObject call 5d8cc8 671->675 672->675 676 48b18e-48b1ae 672->676 673->671 674->676 677 48b06e-48b099 SelectObject 674->677 675->663 682 48b325-48b329 675->682 676->653 681 48b1b4-48b1c7 676->681 677->652 677->662 683 48b1ce-48b2aa 681->683 682->663 684 48b32b-48b33c 682->684 700 48b420-48b438 683->700 701 48b2b0-48b2b4 683->701 684->661 685 48b342-48b358 684->685 687 48b377-48b395 685->687 690 48b35c-48b367 687->690 691 48b397-48b39e 687->691 692 48b369-48b373 690->692 693 48b3c0-48b3c4 690->693 691->692 695 48b3c8-48b3ce 692->695 696 48b375 692->696 693->692 695->661 697 48b3d4-48b413 call 48af14 695->697 696->687 702 48b418 697->702 706 48b43a-48b442 700->706 707 48b46c-48b470 700->707 703 48b479-48b47d 701->703 704 48b2ba-48b2c0 701->704 702->700 703->655 704->683 708 48b463-48b46a 706->708 709 48b444-48b44f 706->709 707->703 708->707 711 48b4dc-48b4e4 708->711 709->708 710 48b451-48b45c 709->710 710->708 712 48b4f1-48b4f9 711->712 713 48b4e6-48b4eb 711->713 713->710 713->712
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ExtentObjectPoint32SelectText
                                                  • String ID:
                                                  • API String ID: 1470722260-3916222277
                                                  • Opcode ID: dd1756c1c319f331719094d3a7a569f2244b2bfff88336452d6b3dc283b1f416
                                                  • Instruction ID: 3f0afc2c8483562b699363120c6255ae64b8f7f32d57e15670fd6a08abe91075
                                                  • Opcode Fuzzy Hash: dd1756c1c319f331719094d3a7a569f2244b2bfff88336452d6b3dc283b1f416
                                                  • Instruction Fuzzy Hash: 17028C74908740DFC360EF29C588A9EBBF0EF89705F14896EE99887321D775A944CF86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 714 518980-5189aa 715 5189ac-5189d4 WaitForMultipleObjects 714->715 716 518a69-518a72 715->716 717 5189da-518a03 ReadFile 715->717 718 518a09-518a3a PeekNamedPipe 717->718 719 518aac-518ab4 GetLastError 717->719 718->719 722 518a3c-518a42 718->722 720 518ab6-518ab9 719->720 721 518ac8-518ad1 719->721 723 518a44 720->723 724 518abb-518ac4 720->724 725 518a46-518a57 SetEvent 721->725 722->723 726 518a78-518aa1 ReadFile 722->726 723->725 728 518a61-518a63 725->728 729 518a59-518a5c call 50e3a8 725->729 726->719 727 518aa3-518aa9 726->727 727->725 728->715 728->716 729->728
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: FileRead$ErrorEventLastMultipleNamedObjectsPeekPipeWait
                                                  • String ID:
                                                  • API String ID: 409193913-0
                                                  • Opcode ID: 71b31091d4b973b014f70bf2aff975ef16c57729169b2ede5d4a928a20c8003c
                                                  • Instruction ID: 1cafbb4331aa6f58bfcfcb3b5d179f52cdcb5d758ad0ff3e378a6d5bd04eea5b
                                                  • Opcode Fuzzy Hash: 71b31091d4b973b014f70bf2aff975ef16c57729169b2ede5d4a928a20c8003c
                                                  • Instruction Fuzzy Hash: C73159B55083019FE760EF29C58876BBFE4BF84364F04892EE8888B341D775D984CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: BrushCreatePattern
                                                  • String ID: 3Fa$7Fa$>Ga$MFa
                                                  • API String ID: 1995003023-1512465142
                                                  • Opcode ID: de73a9de05c86bc1c8b258370482ebe6fb33c437b3c72707a64b2c63325bc320
                                                  • Instruction ID: 75fadcf07c1b38f56ef71d4641bd968666acd6b250126cfc45388c5b175f053d
                                                  • Opcode Fuzzy Hash: de73a9de05c86bc1c8b258370482ebe6fb33c437b3c72707a64b2c63325bc320
                                                  • Instruction Fuzzy Hash: B151BDB0409741AFD701AF16D19825EBFE1BF81758F55C82EE4D88B351DBB88489CF86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileType.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000004,line,00513054), ref: 00512EBE
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000004,line,00513054), ref: 00512ED8
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000004,line,00513054), ref: 00512EEC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorFileLastModeType
                                                  • String ID: line
                                                  • API String ID: 2867079444-3507795190
                                                  • Opcode ID: e96547521f8fc94660850a6b3213d786de110d7878bbced6ffa8d8f7b6506712
                                                  • Instruction ID: 00406211933036d7f5ac0434d913f5a7a29ad1fc6e5ce0ad58e121e6085cdfec
                                                  • Opcode Fuzzy Hash: e96547521f8fc94660850a6b3213d786de110d7878bbced6ffa8d8f7b6506712
                                                  • Instruction Fuzzy Hash: 58F036B16093114BEB10FA38B9892DB7ED8BB44354F05493FFC58C6344E735D999C692
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • InterlockedExchange.KERNEL32 ref: 005D6CFB
                                                  • RtlInitializeCriticalSection.NTDLL ref: 005D6D0E
                                                  • RtlInitializeCriticalSection.NTDLL ref: 005D6D1D
                                                  • RtlEnterCriticalSection.NTDLL ref: 005D6D48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection$Initialize$EnterExchangeInterlocked
                                                  • String ID:
                                                  • API String ID: 33273390-0
                                                  • Opcode ID: 0334e486cb7d73863c9a6ceb37f76073a1e92d8fa425e7668c45c0a3370bd000
                                                  • Instruction ID: 1d2e89b87524eab1fb031f087281dda5f3319854309c179298ba8cd56b8ad92a
                                                  • Opcode Fuzzy Hash: 0334e486cb7d73863c9a6ceb37f76073a1e92d8fa425e7668c45c0a3370bd000
                                                  • Instruction Fuzzy Hash: 3B016DF190411186E734BFBCA64A2193EE6FB41344F40582BE981C7721F375999ADF93
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: MessageSendTextWindow_mbscpy
                                                  • String ID:
                                                  • API String ID: 3092963323-0
                                                  • Opcode ID: ea77ef0630a1ed058133c7854fad195a9e9c5b19ec1e85726b8074bea3b32389
                                                  • Instruction ID: 92930b6000ae40238bdc8a1862c31a9cec4fa2e2c35789e401793ae7e8d0235e
                                                  • Opcode Fuzzy Hash: ea77ef0630a1ed058133c7854fad195a9e9c5b19ec1e85726b8074bea3b32389
                                                  • Instruction Fuzzy Hash: BD51E5B5A08701DFC310DF28D588A6ABBE5FF88320F15896EE89DC7761D73598848F52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ModeObjectSelect
                                                  • String ID:
                                                  • API String ID: 2050317032-0
                                                  • Opcode ID: 24c8b1628fdf94ad6d709d08b7d089b53061631f8551548a3558391dc8428457
                                                  • Instruction ID: 24872b9aa47b1765540832d1d5f6603c05c09271e3155d132f02c8f70ef90cf1
                                                  • Opcode Fuzzy Hash: 24c8b1628fdf94ad6d709d08b7d089b53061631f8551548a3558391dc8428457
                                                  • Instruction Fuzzy Hash: 951104B46047018FC360EF2AC885A5ABBF4FB89310F15882EF889C7702D634E944DB56
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: EnumFamiliesFont
                                                  • String ID:
                                                  • API String ID: 2229041460-0
                                                  • Opcode ID: 1adf2f98d9df91696021672d7f5176b1e97759a89843f7523e057bdfb29875fb
                                                  • Instruction ID: 2a5fd9178197e884cf4e7f41768ade893b097ef9b396f4f8b2f63ec6460891fa
                                                  • Opcode Fuzzy Hash: 1adf2f98d9df91696021672d7f5176b1e97759a89843f7523e057bdfb29875fb
                                                  • Instruction Fuzzy Hash: E0015AB04083009AD320BF29958961FBFE4EF80308F418D1FF49887312D6788814CB9B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetErrorMode.KERNEL32(?,?,?,?,?,?,0050F478,?,?,?,?,?,?,004E989C), ref: 004FD27C
                                                  • SetErrorMode.KERNEL32(?,?,?,?,?,?,?,0050F478,?,?,?,?,?,?,004E989C), ref: 004FD288
                                                  • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,0050F478,?,?,?,?,?,?,004E989C), ref: 004FD295
                                                    • Part of subcall function 00542870: GetVersionExA.KERNEL32 ref: 00542891
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$HandleModuleVersion
                                                  • String ID:
                                                  • API String ID: 1490064178-0
                                                  • Opcode ID: 39cc959004907f691b6efa335e57a52db79f761651f6aeb648451af686c397de
                                                  • Instruction ID: 41281cd27e4b69f252c9dc71da0ba33c608d0d6729e72d67a8c19733ab019e92
                                                  • Opcode Fuzzy Hash: 39cc959004907f691b6efa335e57a52db79f761651f6aeb648451af686c397de
                                                  • Instruction Fuzzy Hash: DCD09EF44487029AE7507FB8D80E75D7DE4BF90706F81495EF4C457352E77940448623
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: malloc
                                                  • String ID: 0%
                                                  • API String ID: 2803490479-3583766603
                                                  • Opcode ID: da459b4480afd5a85025d57be6f0bd20e075aa72a7e269af96c72eb1a8dd11ae
                                                  • Instruction ID: 43272f94abd23b14930d61e0314b4c16fb9248d634b7597935165e45de7b3eb4
                                                  • Opcode Fuzzy Hash: da459b4480afd5a85025d57be6f0bd20e075aa72a7e269af96c72eb1a8dd11ae
                                                  • Instruction Fuzzy Hash: 902139B09042108FDF108F24C99476A7EE8FB4A368F658799EC594B396D774CC85CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 7ebbba2fdebd3cf811400f33d9c41fd6163761c443cecc646bd5615bca4e7aad
                                                  • Instruction ID: 827c8f3ea988240b9bc57280d49db92f0a4df3bbcbab5bf5775b2b6225a5b109
                                                  • Opcode Fuzzy Hash: 7ebbba2fdebd3cf811400f33d9c41fd6163761c443cecc646bd5615bca4e7aad
                                                  • Instruction Fuzzy Hash: CE31AFB0509301CFE300AF25C55971FBFE0FB84708F14986EE8889B2A1D7B98949CF96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: InfoQuerySystemVirtual
                                                  • String ID:
                                                  • API String ID: 401686933-0
                                                  • Opcode ID: 3773d760258ace996b719f087a94ad69d2ab58732df6676d48eb8877336784b8
                                                  • Instruction ID: 206eab185391c417d4d7a0d948f19b6e20c3ac285e3bb1b8a8c54ccd42d9ce1f
                                                  • Opcode Fuzzy Hash: 3773d760258ace996b719f087a94ad69d2ab58732df6676d48eb8877336784b8
                                                  • Instruction Fuzzy Hash: F711F2B56083028FD750DF68C481A9AFBE0BB89748F94892DF894C7300E378D888CB52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Window$Create
                                                  • String ID:
                                                  • API String ID: 870168347-0
                                                  • Opcode ID: 3538a40de986ab059f749819989974d3536e838d0ae558ada1056b05c7c242f9
                                                  • Instruction ID: 492ce447c219f4c3f0e9dde633ec125d7ab1825407403e1e179143cada259ebb
                                                  • Opcode Fuzzy Hash: 3538a40de986ab059f749819989974d3536e838d0ae558ada1056b05c7c242f9
                                                  • Instruction Fuzzy Hash: 3911E4B08093018FD340DF29C18871BBFF4BB88354F15895EE9889B351D3B9D9488F96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CreateDeleteFontIndirectObject
                                                  • String ID:
                                                  • API String ID: 1932138579-0
                                                  • Opcode ID: ebe32e7144cec7d4fd79aa2ab3a836baec2ab8b9d2555c55423f1697812cf37c
                                                  • Instruction ID: 2698363bc748baab621001724186537644e5d339d8980361525ee8544be14d85
                                                  • Opcode Fuzzy Hash: ebe32e7144cec7d4fd79aa2ab3a836baec2ab8b9d2555c55423f1697812cf37c
                                                  • Instruction Fuzzy Hash: 5EE0E5B0A087118FC394EF2D98C5A0FBBE4AF8C250F01592DF889D3301E234D9858B92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetForegroundWindow.USER32 ref: 0041DD8B
                                                  • SetForegroundWindow.USER32 ref: 0041DDA6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ForegroundWindow
                                                  • String ID:
                                                  • API String ID: 2020703349-0
                                                  • Opcode ID: d68fff69d0362bea47adc5efd410823941d844d77263701ef5cbd24bfb1b8428
                                                  • Instruction ID: 80788abe60655e53ceceeb737f8df583d6c92566f1d4b7228b94839c9a716f1f
                                                  • Opcode Fuzzy Hash: d68fff69d0362bea47adc5efd410823941d844d77263701ef5cbd24bfb1b8428
                                                  • Instruction Fuzzy Hash: 7AE01DB49047018BD714FF38C546A6EBBE47F84300FC50A9DE88497742D63CD5808B67
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: a41cfb58879ce6500416b149af3d780e5975d22ca75f5aa838f02a6fc908c960
                                                  • Instruction ID: 27bf1ee4af788bf3a2eea4fa83627e4cebf97940e407cb9908deccf8e4ab03d3
                                                  • Opcode Fuzzy Hash: a41cfb58879ce6500416b149af3d780e5975d22ca75f5aa838f02a6fc908c960
                                                  • Instruction Fuzzy Hash: D931DBB05093008FD750DF29D584B9BBBE0BF88318F05896EE88C9B345D779D985CB56
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: d1edded23859d20f758d9a610107fe28be2dd130926a95e5435de9b50fd446bd
                                                  • Instruction ID: 49ef41fac315f9177bf7b8cc39eaf08fb4b3c1a03e796b08a5ed85a3d361f629
                                                  • Opcode Fuzzy Hash: d1edded23859d20f758d9a610107fe28be2dd130926a95e5435de9b50fd446bd
                                                  • Instruction Fuzzy Hash: AB21C570604201DFCB50EF2AC9C0A1ABBE4AF48304B5585AAE988DF397E738DC41CB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 1e42611596d295b6901cf8160005b211a10211af04ca8a792e3414a6edfc3e2b
                                                  • Instruction ID: 926fa9a6760c6ee7b5e968137f8f5a221a418706b8d806aa876ee763124dece1
                                                  • Opcode Fuzzy Hash: 1e42611596d295b6901cf8160005b211a10211af04ca8a792e3414a6edfc3e2b
                                                  • Instruction Fuzzy Hash: 10012CF191420587DB209E2C89D17A677D4AB54301F5845ABE84CCB385F22ACCD5A796
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: DeleteObject
                                                  • String ID:
                                                  • API String ID: 1531683806-0
                                                  • Opcode ID: a74492c10af2d7347b0c242ed8141cb10ced9d9c25a3778d46d1e8acf0fd9bdc
                                                  • Instruction ID: d127a8632bfb2a6a296164e8689feec42e1a190d089e5b67d13fbd86571ade5f
                                                  • Opcode Fuzzy Hash: a74492c10af2d7347b0c242ed8141cb10ced9d9c25a3778d46d1e8acf0fd9bdc
                                                  • Instruction Fuzzy Hash: 95F090316405049FCB20BFADD88592ABBE4FF44314B19097EED59C3322D224EC50C794
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 775bc4612f3fde25676219590a1745faf13eddddd76b13f6ac9ead3b7bc5f115
                                                  • Instruction ID: fe0b38728a35944cb171696bc8f630b6e9eb7fe1e1b8fa8caa88712018e394d3
                                                  • Opcode Fuzzy Hash: 775bc4612f3fde25676219590a1745faf13eddddd76b13f6ac9ead3b7bc5f115
                                                  • Instruction Fuzzy Hash: 880116B45087018FC350DF28D58478BBBE0BF88314F108A6EE89887355D738EA88CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 6226cf96f88226f9045ecd0a2c4ac9454f09fb1fd7af28ba243cf9ad3cd06b01
                                                  • Instruction ID: dbd1a0d373b8140ec61abedff1f4d5a544fc6f49b2ede229bd81b180d37b7408
                                                  • Opcode Fuzzy Hash: 6226cf96f88226f9045ecd0a2c4ac9454f09fb1fd7af28ba243cf9ad3cd06b01
                                                  • Instruction Fuzzy Hash: B2F0A4B47056008BCF54EF69C5C4A1A7BE6BF88710B65869CE8498B34AE734DC51CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CombineCreateDeleteObjectRect$Indirect
                                                  • String ID:
                                                  • API String ID: 3044651595-0
                                                  • Opcode ID: 19b0cf3a384e83862e688888efcc9bf040804df147fd5d4215a7e53d3df44462
                                                  • Instruction ID: 18b30bd831e71ec7baa31c179fd10da025ec476a828a0401f6b0d67dd0ed4f8f
                                                  • Opcode Fuzzy Hash: 19b0cf3a384e83862e688888efcc9bf040804df147fd5d4215a7e53d3df44462
                                                  • Instruction Fuzzy Hash: 33A11771508301CBCB18DF25C0C062BBBF5FF88744F05496EE989AB291E779D942DB8A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: sprintf
                                                  • String ID: /DeviceGray$/DeviceRGB$;$[0 1 0 1 0 1]$[1 0$]
                                                  • API String ID: 590974362-1630172899
                                                  • Opcode ID: 6b09a2930e947bacc0902e346b3b165e0ea6b5f6bcc171342bb453a2eaab8e7e
                                                  • Instruction ID: 8ff1b55727ffae2a1816a5e39721f6eba072dd109f06cd90322d0ce963a0f433
                                                  • Opcode Fuzzy Hash: 6b09a2930e947bacc0902e346b3b165e0ea6b5f6bcc171342bb453a2eaab8e7e
                                                  • Instruction Fuzzy Hash: DD82D2B0549381CFC325DF15C48879BBBE2BB89314F14896EE4D88B3A2D7B49845CF96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$CloseEmptyOpenOwner
                                                  • String ID:
                                                  • API String ID: 1113666267-0
                                                  • Opcode ID: 9950952572b77b57ef40fc14d515aea708fba70a19462a3adda9e8afb72a0d37
                                                  • Instruction ID: 92f3fb5f6ab1d7a5557e1100c3c36db63f0aa1070366741f634f72a31997670d
                                                  • Opcode Fuzzy Hash: 9950952572b77b57ef40fc14d515aea708fba70a19462a3adda9e8afb72a0d37
                                                  • Instruction Fuzzy Hash: 551197B4504B058FCB50EF69D88569A7BE4BF48305F0558BAEC88CB346E674D9808F65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Window
                                                  • String ID: 1
                                                  • API String ID: 2353593579-2212294583
                                                  • Opcode ID: 97957a819e94dd0f1e5836e3ff142191d6818384c02acd16d2dd1941e308cbc1
                                                  • Instruction ID: cf4d8638c93e4feb1c813016f407832571ddddb8af0c9c41ae7a262259c58701
                                                  • Opcode Fuzzy Hash: 97957a819e94dd0f1e5836e3ff142191d6818384c02acd16d2dd1941e308cbc1
                                                  • Instruction Fuzzy Hash: 045139B05083009FD310AF29D4897AABBE4FFC8354F04986EE9888B351D77998848F96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: __p__environ$strchr
                                                  • String ID: =$hpa
                                                  • API String ID: 3615923317-3817669091
                                                  • Opcode ID: 44df40ff74d6775cb6499d64df7be1f0dbbb3fbbef18a7cabe2372dc61312aca
                                                  • Instruction ID: b188c27479abf36994b430aa7b7e6a683400762e7a7729ec95a41a9ede8b8e69
                                                  • Opcode Fuzzy Hash: 44df40ff74d6775cb6499d64df7be1f0dbbb3fbbef18a7cabe2372dc61312aca
                                                  • Instruction Fuzzy Hash: 594116B45087419FD710EF59D49872ABFE0FF85389F00885EE9894B362C7B99848CF92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: _isctypesprintf
                                                  • String ID: 0$Wt_$`|_
                                                  • API String ID: 3856747102-1717563890
                                                  • Opcode ID: ba8e74db4a7b057dc5434bf78346386fc28331e414417e7247c296aeaa274feb
                                                  • Instruction ID: 11e9e6729de9f0d99dff572e517177f252e580d0602c087a507397475857dbbb
                                                  • Opcode Fuzzy Hash: ba8e74db4a7b057dc5434bf78346386fc28331e414417e7247c296aeaa274feb
                                                  • Instruction Fuzzy Hash: 2FC10474608352CFC710DF19D588A2ABBE1FF89304F548AAEE8998B361D734D945CF4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: CurrentHandleProcess$CloseDuplicate
                                                  • String ID: line
                                                  • API String ID: 1410216518-3507795190
                                                  • Opcode ID: 7f07dc42570967f1563fd61bc2e07d12144606d833a8619c603fa08787f79b70
                                                  • Instruction ID: 0e90dfbe444b505ab157694d3e7a313b060df38faac91232096c37ee8e3fac0f
                                                  • Opcode Fuzzy Hash: 7f07dc42570967f1563fd61bc2e07d12144606d833a8619c603fa08787f79b70
                                                  • Instruction Fuzzy Hash: 9141A6B45087459FD360EF64C49579AFFE4FB88740F108D2EE88987311E7799A84CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ObjectSelect$MetricsText
                                                  • String ID:
                                                  • API String ID: 3697559710-0
                                                  • Opcode ID: ab686e14286090032e6e0ffbefe99d5617bbddb11f133cb97f630b237d58e5ed
                                                  • Instruction ID: 2c52ea1d3b65e68362f0c4d0d4cfd3095759291897c222dcdc424e1050c1e55b
                                                  • Opcode Fuzzy Hash: ab686e14286090032e6e0ffbefe99d5617bbddb11f133cb97f630b237d58e5ed
                                                  • Instruction Fuzzy Hash: E97170749087459FC390EF28C585A9EBBF0BF88701F44896EE989C7315E730A955CF92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: strncpy
                                                  • String ID: H$d
                                                  • API String ID: 3301158039-989806989
                                                  • Opcode ID: b7ce41448c75a05407d9907faf95def6a1f48a5f07f599a070b69c70532e7e7d
                                                  • Instruction ID: 99795147df00731972e54b1705124a5cf865683d5295bb382dd6828d1b225689
                                                  • Opcode Fuzzy Hash: b7ce41448c75a05407d9907faf95def6a1f48a5f07f599a070b69c70532e7e7d
                                                  • Instruction Fuzzy Hash: 82717D74704351CFD720DF29E0847ABB7E1BB85304F98896ADD888B312D3799895CB9B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: BitsClientRect
                                                  • String ID: (
                                                  • API String ID: 1769629971-3887548279
                                                  • Opcode ID: 951a99067c15eabdfb2183b3f9b6ef615ac024bcf69ce1da0f7685ca2f4b76eb
                                                  • Instruction ID: 3566dd0bc71e1c63a864a448f1aa7d9e3ec0f712a5caac23623a5f9b0907eb05
                                                  • Opcode Fuzzy Hash: 951a99067c15eabdfb2183b3f9b6ef615ac024bcf69ce1da0f7685ca2f4b76eb
                                                  • Instruction Fuzzy Hash: 563102B1608300CFC714EF68D585B5ABBE4FB84305F04886EE888CB351E779D944CBA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00407086), ref: 0043F158
                                                  • MultiByteToWideChar.KERNEL32 ref: 0043F195
                                                  • MessageBoxW.USER32 ref: 0043F1D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$Message
                                                  • String ID: ...
                                                  • API String ID: 3609034761-1685331755
                                                  • Opcode ID: f7099ffdd2a7b6e463bcd01fd1f6f3162990682c2fea4f9798ece317b2bacde9
                                                  • Instruction ID: 8ecdf76cfab7d17513de80c6ff5e732f459cbeb97d2928bbdfa63c4d8acf5569
                                                  • Opcode Fuzzy Hash: f7099ffdd2a7b6e463bcd01fd1f6f3162990682c2fea4f9798ece317b2bacde9
                                                  • Instruction Fuzzy Hash: AC11F5B54093459BD320EF29D14869BBFE4FB84364F408A1EE4E887380D7B986488B93
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID: Color$ModeText
                                                  • String ID:
                                                  • API String ID: 2971265119-0
                                                  • Opcode ID: cf0c09b6b347ee7c91e9625af907751c57fc18f59f60365bb4a9758f9e643916
                                                  • Instruction ID: 6a49e02db2abc8b0efcff8356259a5e0684ab65ee08fc4943b73230f7bd46504
                                                  • Opcode Fuzzy Hash: cf0c09b6b347ee7c91e9625af907751c57fc18f59f60365bb4a9758f9e643916
                                                  • Instruction Fuzzy Hash: BB1150B18093028FD300EF65D58A70ABFF4BB89754F018A2DE8D857245D37996488F92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.557522840.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.557518151.0000000000400000.00000002.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.557977950.00000000005F3000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558039738.0000000000643000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558047296.0000000000646000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558051613.0000000000649000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558059951.000000000065B000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558078695.000000000067A000.00000040.00020000.sdmp Download File
                                                  • Associated: 00000000.00000002.558101117.0000000000688000.00000004.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_jxplorer-3.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: 61f217ba63f8902fc8c37dc4dbc318fc442b6b39fb40aed3fafc2559f68fa44a
                                                  • Instruction ID: 1b6907fba4bf0bd4e95e953748db7a22f205ed165092e53664cb59025ff7deb5
                                                  • Opcode Fuzzy Hash: 61f217ba63f8902fc8c37dc4dbc318fc442b6b39fb40aed3fafc2559f68fa44a
                                                  • Instruction Fuzzy Hash: 5B317F716042018FD714DF18D49975ABFE1FB94308F648A6DE8884F386D3B6D986CF92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fabc6b6114c1a5dbd816713225acf91c2bf2cb6bbe04259081a782eda49d51ab
                                                  • Instruction ID: 4c552414c1e656a04caa5c8bd0ef796cb463af181d170359988e6a2967ea6aee
                                                  • Opcode Fuzzy Hash: fabc6b6114c1a5dbd816713225acf91c2bf2cb6bbe04259081a782eda49d51ab
                                                  • Instruction Fuzzy Hash: 6B81BE75A06601DFEB58CFA4C494BA9FBB0FF49314F08859ED81A5B381D774A981CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309135198.0000000003000000.00000040.00000001.sdmp, Offset: 03000000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3000000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 60392962478eb443b2c3eac1ca8a1346b06c4eb38417e1efb3aaec0e1d1d181d
                                                  • Instruction ID: 8d9cb9782b988db55d4aa5e243400ff9a767eeaf9dca2b089a90b8c9e314dc02
                                                  • Opcode Fuzzy Hash: 60392962478eb443b2c3eac1ca8a1346b06c4eb38417e1efb3aaec0e1d1d181d
                                                  • Instruction Fuzzy Hash: EE117FB2D0122A8FEF54CF88C5815ADF3F2FB98310F1A452ADC64A7381D7346960CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309135198.0000000003000000.00000040.00000001.sdmp, Offset: 03000000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3000000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9e513933093163475642b4a94aa170af4ed19f1dc54cbffa2c5a5906f3dfe324
                                                  • Instruction ID: 765442c1e5f1b8b5252a6346b430bf449a26413f772dc73a4232e968caa83a8f
                                                  • Opcode Fuzzy Hash: 9e513933093163475642b4a94aa170af4ed19f1dc54cbffa2c5a5906f3dfe324
                                                  • Instruction Fuzzy Hash: D5F09276C0122A9B9B54CF48C4442ADF7B2EB45228F1A8496DC687B281D232AD62CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 22ee169920cb418ee8e005a5731482da6819bddb763a71cbef078c1b35c35d95
                                                  • Instruction ID: 4134abdad79f7233801e69ea33622fc5d3b8498cec6ac8377099ff7761313c4e
                                                  • Opcode Fuzzy Hash: 22ee169920cb418ee8e005a5731482da6819bddb763a71cbef078c1b35c35d95
                                                  • Instruction Fuzzy Hash: 07F07FB5910B06ABEB05CF64C4947EBF7B8FB88714F14460AD82857340C379B569CBD0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66008689f0cf585ad922949da2edb2daa32fbf2a0392a0bb82c05c45471c9e0c
                                                  • Instruction ID: 752450be8b69d7990f851f2dc4a81834f6198db82dc9f4fd2d6bfd6912bf7c57
                                                  • Opcode Fuzzy Hash: 66008689f0cf585ad922949da2edb2daa32fbf2a0392a0bb82c05c45471c9e0c
                                                  • Instruction Fuzzy Hash: 3AF07FB5911A06ABDB05CF60C4947DAF7B9FB88714F14421AD82867340C779B565CFD0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 90364bd81e3920fbb7ffde34cd023512d541eb50534d5a4db38c4c448c009eb6
                                                  • Instruction ID: e7d7c094d2ceae6d067c1b41731b5ed2ca55511b4ecaff03ee372535e537b4eb
                                                  • Opcode Fuzzy Hash: 90364bd81e3920fbb7ffde34cd023512d541eb50534d5a4db38c4c448c009eb6
                                                  • Instruction Fuzzy Hash: AFF092B5910B06ABDB05CF60C4947CAFBB5BF48714F14421AD82867340C379B569CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8dd27ee32c318d6739e3447d917e9e0fe7e374f9fba598de3cff28c7ebc616fb
                                                  • Instruction ID: d7427883d04fcf234aa2b91adeb6c32733c2afc0151f9e2f0cbca0aac6f203be
                                                  • Opcode Fuzzy Hash: 8dd27ee32c318d6739e3447d917e9e0fe7e374f9fba598de3cff28c7ebc616fb
                                                  • Instruction Fuzzy Hash: 3EF0C2B6D00B06ABDB05CF60C0847CAFBB8BB84724F14461AD82863340D378B665CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d8d2963f46246303f5dfc391d3bb0a42326a2d3d426dcef5bde77839f5413365
                                                  • Instruction ID: 66d230cb7eeb6cc07ce5243e79df6e230c999cb40431136c3d3ed14103856a85
                                                  • Opcode Fuzzy Hash: d8d2963f46246303f5dfc391d3bb0a42326a2d3d426dcef5bde77839f5413365
                                                  • Instruction Fuzzy Hash: 40F0C2B6D00A06ABDB44CF60C0947CAFBB8BB84724F14461AD82863340D378B669CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6ee906f858cd89d32a65b4db392e9ebc1f260d4331c3c9f01d387a8d2151826b
                                                  • Instruction ID: 3f7d640a260859b042de84f1e79bb87e87e732259aef8377193ee11862c2f236
                                                  • Opcode Fuzzy Hash: 6ee906f858cd89d32a65b4db392e9ebc1f260d4331c3c9f01d387a8d2151826b
                                                  • Instruction Fuzzy Hash: A0F0C2B6D10A06ABDB04CF60C4947CAFBB8BB84724F14461AD82867340D378B665CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309138532.0000000003002000.00000040.00000001.sdmp, Offset: 03002000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3002000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 399b5e4204aa9922db8ae099ee210b88e0818346baa11082d47865dcb003641a
                                                  • Instruction ID: 6da1650180a78d8d98b812d0f73c9871a6f16a03e5935c474d628c4c8a1c8e91
                                                  • Opcode Fuzzy Hash: 399b5e4204aa9922db8ae099ee210b88e0818346baa11082d47865dcb003641a
                                                  • Instruction Fuzzy Hash: 79F0C2B5D00A06EBDB04CF60C18439AF7B4BB84718F14421AD82863340C378B565CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.309135198.0000000003000000.00000040.00000001.sdmp, Offset: 03000000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3000000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                  • Instruction ID: d34860c5f71c07f5af0eb92ad1e5a8beccaa957abadfd6cd6ba89976764545e6
                                                  • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                  • Instruction Fuzzy Hash: 2921F6BA6042568FEB358F298C403D9B7E9FB58314F21482EDECDE7711D3306A898B55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314106089.00000000023F2000.00000040.00000001.sdmp, Offset: 023F2000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f2000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bb0502b7983dcbbf45d6ec6e45fdf13283d5cbce37256ca744bec595d6d7b411
                                                  • Instruction ID: af1af880f05bbd8ca3aabadde3d5744438c29db291d475d262d5172c475f5031
                                                  • Opcode Fuzzy Hash: bb0502b7983dcbbf45d6ec6e45fdf13283d5cbce37256ca744bec595d6d7b411
                                                  • Instruction Fuzzy Hash: 1B81CE71A04609DFDB99CF64D498BA9FBB0FF49314F0881AEDA1A4B381D734A941CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314102970.00000000023F0000.00000040.00000001.sdmp, Offset: 023F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f0000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 60392962478eb443b2c3eac1ca8a1346b06c4eb38417e1efb3aaec0e1d1d181d
                                                  • Instruction ID: 2cbb12442c847c2cb19362ac1f74408a3481c86ed7c04adc0d7eb67cf2f930fb
                                                  • Opcode Fuzzy Hash: 60392962478eb443b2c3eac1ca8a1346b06c4eb38417e1efb3aaec0e1d1d181d
                                                  • Instruction Fuzzy Hash: 301179B2C0023A8FDF68CF8CC5814ADB3B1FF98314B56412AED64A7346D3346960CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314102970.00000000023F0000.00000040.00000001.sdmp, Offset: 023F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f0000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9e513933093163475642b4a94aa170af4ed19f1dc54cbffa2c5a5906f3dfe324
                                                  • Instruction ID: aa4f1437e75b1d7cfd2e6bdc8642a58145120f4ed07926d020ffe1a742d834b7
                                                  • Opcode Fuzzy Hash: 9e513933093163475642b4a94aa170af4ed19f1dc54cbffa2c5a5906f3dfe324
                                                  • Instruction Fuzzy Hash: 1DF0A576C0022ADB8B58CF48D4441ADF7B1FB45228B1A8496DD6C7B242D332AD62CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314106089.00000000023F2000.00000040.00000001.sdmp, Offset: 023F2000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f2000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 565424907f9e94dbe12c8eae88dd0af2340cebef77b4a5a22f00aa78d2618386
                                                  • Instruction ID: 6893649b0c4194b6bfc774317117063af4c753bdc037c21b23686ab1e36219af
                                                  • Opcode Fuzzy Hash: 565424907f9e94dbe12c8eae88dd0af2340cebef77b4a5a22f00aa78d2618386
                                                  • Instruction Fuzzy Hash: 3CF092B5910A06AFDB05CF64C5947DAF7B4FB88714F14421AD82867340C779B565CFD0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314106089.00000000023F2000.00000040.00000001.sdmp, Offset: 023F2000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f2000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70a90ef9afdbfc62e0f7b25b645266d4c494af9a4385537d793c36c1cafa5d20
                                                  • Instruction ID: f9f9a55ab993500e44122f459c3515568b884f918a0d019c40600746a43853ea
                                                  • Opcode Fuzzy Hash: 70a90ef9afdbfc62e0f7b25b645266d4c494af9a4385537d793c36c1cafa5d20
                                                  • Instruction Fuzzy Hash: 8BF0C2B6D00B06ABDB058F64C5847CAFBB4BB84724F14461AD82863300D378B665CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314106089.00000000023F2000.00000040.00000001.sdmp, Offset: 023F2000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f2000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ce5ae3c218c98543fa7f5d6860c4eadc8bd3d25fddb15f57732ca4bb55e82dac
                                                  • Instruction ID: f6bdc837160f200ea08bfacb72d30e74ed6cc46d29e334ec79f2fa63ff1fbf8b
                                                  • Opcode Fuzzy Hash: ce5ae3c218c98543fa7f5d6860c4eadc8bd3d25fddb15f57732ca4bb55e82dac
                                                  • Instruction Fuzzy Hash: A9F0C2B6D00A06ABDB448F64C5947CAFBB4BB84724F14461AD82863300D378B669CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.314106089.00000000023F2000.00000040.00000001.sdmp, Offset: 023F2000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_23f2000_java.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cfcbbe8c4b49a932f21c14add593067fe4ec0cb8400c985bc46d92134180f5b
                                                  • Instruction ID: c064929421fe1ce0cba5e4a85dee295997c7bd4095c1a3aaf64d0383b99b58e4
                                                  • Opcode Fuzzy Hash: 6cfcbbe8c4b49a932f21c14add593067fe4ec0cb8400c985bc46d92134180f5b
                                                  • Instruction Fuzzy Hash: 85F0C2B6D10A06ABDB048F64C5947CAFBB4FB84724F14461AD82867300D378B665CFC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions