Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
125.exe

Overview

General Information

Sample name:125.exe
Analysis ID:1428867
MD5:44b14057ff868e25ad444fac098d89f0
SHA1:2dceab58c101c2f5e922e5a40adcc685b557ac53
SHA256:5a54cda9e42baea3defa9f1024858f7c44f79242b8765c9e886a8f54db6e1934
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 125.exe (PID: 6812 cmdline: "C:\Users\user\Desktop\125.exe" MD5: 44B14057FF868E25AD444FAC098D89F0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 125.exeAvira: detected
Source: 125.exeReversingLabs: Detection: 25%
Source: 125.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: 125.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_004089500_2_00408950
Source: C:\Users\user\Desktop\125.exeCode function: String function: 0040B6B0 appears 40 times
Source: 125.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal56.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401F36 GetLastError,fprintf,FormatMessageA,fprintf,strcat,strcat,LocalFree,fprintf,ShellExecuteA,0_2_00401F36
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_0040206E fprintf,FindResourceExA,LoadResource,LockResource,fprintf,SetLastError,fputs,0_2_0040206E
Source: 125.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\125.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 125.exeReversingLabs: Detection: 25%
Source: 125.exeString found in binary or memory: JPHP-INF/launcher.confSV
Source: 125.exeString found in binary or memory: php/runtime/launcher/PK
Source: 125.exeString found in binary or memory: php/runtime/launcher/Launcher$1.class
Source: 125.exeString found in binary or memory: %php/runtime/launcher/Launcher$1.class
Source: 125.exeString found in binary or memory: php/runtime/launcher/Launcher.class
Source: 125.exeString found in binary or memory: 3:#php/runtime/launcher/Launcher.class
Source: 125.exeString found in binary or memory: php/runtime/loader/PK
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/PK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/PK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/PK
Source: 125.exeString found in binary or memory: php/runtime/loader/sourcemap/PK
Source: 125.exeString found in binary or memory: php/runtime/launcher/LaunchException.class
Source: 125.exeString found in binary or memory: *php/runtime/launcher/LaunchException.class
Source: 125.exeString found in binary or memory: php/runtime/launcher/StandaloneLauncher.class
Source: 125.exeString found in binary or memory: -php/runtime/launcher/StandaloneLauncher.class
Source: 125.exeString found in binary or memory: php/runtime/loader/RuntimeClassLoader.class
Source: 125.exeString found in binary or memory: +php/runtime/loader/RuntimeClassLoader.class
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$1.class
Source: 125.exeString found in binary or memory: +php/runtime/loader/StandaloneLoader$1.class
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$2.class
Source: 125.exeString found in binary or memory: +php/runtime/loader/StandaloneLoader$2.class
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$3.class
Source: 125.exeString found in binary or memory: +php/runtime/loader/StandaloneLoader$3.class
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$4.class
Source: 125.exeString found in binary or memory: +php/runtime/loader/StandaloneLoader$4.class
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader.class
Source: 125.exeString found in binary or memory: 1)php/runtime/loader/StandaloneLoader.class
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/StandaloneCompiler$1.class
Source: 125.exeString found in binary or memory: 5php/runtime/loader/compile/StandaloneCompiler$1.class
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/StandaloneCompiler$2.class
Source: 125.exeString found in binary or memory: 5php/runtime/loader/compile/StandaloneCompiler$2.class
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/StandaloneCompiler.class
Source: 125.exeString found in binary or memory: 83php/runtime/loader/compile/StandaloneCompiler.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ClassDumper.class
Source: 125.exeString found in binary or memory: /)php/runtime/loader/dump/ClassDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ClosureDumper.class
Source: 125.exeString found in binary or memory: +php/runtime/loader/dump/ClosureDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ConstantDumper.class
Source: 125.exeString found in binary or memory: ,php/runtime/loader/dump/ConstantDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/Dumper.class
Source: 125.exeString found in binary or memory: $php/runtime/loader/dump/Dumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/FunctionDumper.class
Source: 125.exeString found in binary or memory: ,php/runtime/loader/dump/FunctionDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/GeneratorDumper.class
Source: 125.exeString found in binary or memory: -php/runtime/loader/dump/GeneratorDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/MethodDumper.class
Source: 125.exeString found in binary or memory: *php/runtime/loader/dump/MethodDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ModuleDumper.class
Source: 125.exeString found in binary or memory: *php/runtime/loader/dump/ModuleDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ParameterDumper.class
Source: 125.exeString found in binary or memory: -php/runtime/loader/dump/ParameterDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/PropertyDumper.class
Source: 125.exeString found in binary or memory: ,php/runtime/loader/dump/PropertyDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/StandaloneLibrary$Module.class
Source: 125.exeString found in binary or memory: 6php/runtime/loader/dump/StandaloneLibrary$Module.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/StandaloneLibrary.class
Source: 125.exeString found in binary or memory: /php/runtime/loader/dump/StandaloneLibrary.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/StandaloneLibraryDumper.class
Source: 125.exeString found in binary or memory: 5php/runtime/loader/dump/StandaloneLibraryDumper.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/Types.classM
Source: 125.exeString found in binary or memory: #php/runtime/loader/dump/Types.classM
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpException.class
Source: 125.exeString found in binary or memory: .php/runtime/loader/dump/io/DumpException.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpInputStream$1.class
Source: 125.exeString found in binary or memory: 2php/runtime/loader/dump/io/DumpInputStream$1.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpInputStream.class
Source: 125.exeString found in binary or memory: 0php/runtime/loader/dump/io/DumpInputStream.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpOutputStream$1.class
Source: 125.exeString found in binary or memory: 3php/runtime/loader/dump/io/DumpOutputStream$1.class
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpOutputStream.class
Source: 125.exeString found in binary or memory: 1php/runtime/loader/dump/io/DumpOutputStream.class
Source: 125.exeString found in binary or memory: php/runtime/loader/sourcemap/SourceMap$Item.class
Source: 125.exeString found in binary or memory: 1php/runtime/loader/sourcemap/SourceMap$Item.class
Source: 125.exeString found in binary or memory: php/runtime/loader/sourcemap/SourceMap.class
Source: 125.exeString found in binary or memory: ,php/runtime/loader/sourcemap/SourceMap.class
Source: 125.exeString found in binary or memory: javax/mail/Address.classeP
Source: 125.exeString found in binary or memory: javax/mail/internet/AddressException.class
Source: 125.exeString found in binary or memory: *javax/mail/internet/AddressException.class
Source: 125.exeString found in binary or memory: javax/mail/search/AddressStringTerm.class
Source: 125.exeString found in binary or memory: )javax/mail/search/AddressStringTerm.class
Source: 125.exeString found in binary or memory: javax/mail/search/AddressTerm.class}
Source: 125.exeString found in binary or memory: #javax/mail/search/AddressTerm.class}
Source: 125.exeString found in binary or memory: javassist/Loader.class
Source: 125.exeString found in binary or memory: javassist/LoaderClassPath.class
Source: 125.exeString found in binary or memory: javassist/tools/reflect/Loader.class
Source: 125.exeString found in binary or memory: $javassist/tools/reflect/Loader.class
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalanceExceptionChecker.class}
Source: 125.exeString found in binary or memory: 0com/mysql/jdbc/LoadBalanceExceptionChecker.class}
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedAutoCommitInterceptor.class
Source: 125.exeString found in binary or memory: 6com/mysql/jdbc/LoadBalancedAutoCommitInterceptor.class
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedConnection.class}P
Source: 125.exeString found in binary or memory: +com/mysql/jdbc/LoadBalancedConnection.class}P
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedConnectionProxy$NullLoadBalancedConnectionProxy.class
Source: 125.exeString found in binary or memory: Pcom/mysql/jdbc/LoadBalancedConnectionProxy$NullLoadBalancedConnectionProxy.class
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedConnectionProxy.class
Source: 125.exeString found in binary or memory: O0com/mysql/jdbc/LoadBalancedConnectionProxy.class
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedMySQLConnection.class
Source: 125.exeString found in binary or memory: 0com/mysql/jdbc/LoadBalancedMySQLConnection.class
Source: 125.exeString found in binary or memory: com/mysql/jdbc/jmx/LoadBalanceConnectionGroupManager.class
Source: 125.exeString found in binary or memory: :com/mysql/jdbc/jmx/LoadBalanceConnectionGroupManager.class
Source: 125.exeString found in binary or memory: com/mysql/jdbc/jmx/LoadBalanceConnectionGroupManagerMBean.class
Source: 125.exeString found in binary or memory: ?com/mysql/jdbc/jmx/LoadBalanceConnectionGroupManagerMBean.class
Source: 125.exeString found in binary or memory: JPHP-INF/launcher.confPK
Source: 125.exeString found in binary or memory: php/runtime/launcher/Launcher$1.classPK
Source: 125.exeString found in binary or memory: php/runtime/launcher/Launcher.classPK
Source: 125.exeString found in binary or memory: php/runtime/launcher/LaunchException.classPK
Source: 125.exeString found in binary or memory: !php/runtime/launcher/LaunchException.classPK
Source: 125.exeString found in binary or memory: php/runtime/launcher/StandaloneLauncher.classPK
Source: 125.exeString found in binary or memory: !php/runtime/launcher/StandaloneLauncher.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/RuntimeClassLoader.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/RuntimeClassLoader.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$1.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/StandaloneLoader$1.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$2.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/StandaloneLoader$2.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$3.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/StandaloneLoader$3.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader$4.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/StandaloneLoader$4.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/StandaloneLoader.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/StandaloneLoader.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/StandaloneCompiler$1.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/compile/StandaloneCompiler$1.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/StandaloneCompiler$2.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/compile/StandaloneCompiler$2.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/compile/StandaloneCompiler.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/compile/StandaloneCompiler.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ClassDumper.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/dump/ClassDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ClosureDumper.classPK
Source: 125.exeString found in binary or memory: !php/runtime/loader/dump/ClosureDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ConstantDumper.classPK
Source: 125.exeString found in binary or memory: "php/runtime/loader/dump/ConstantDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/Dumper.classPK
Source: 125.exeString found in binary or memory: "php/runtime/loader/dump/Dumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/FunctionDumper.classPK
Source: 125.exeString found in binary or memory: "php/runtime/loader/dump/FunctionDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/GeneratorDumper.classPK
Source: 125.exeString found in binary or memory: "php/runtime/loader/dump/GeneratorDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/MethodDumper.classPK
Source: 125.exeString found in binary or memory: 9 "php/runtime/loader/dump/MethodDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ModuleDumper.classPK
Source: 125.exeString found in binary or memory: R*"php/runtime/loader/dump/ModuleDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/ParameterDumper.classPK
Source: 125.exeString found in binary or memory: D7"php/runtime/loader/dump/ParameterDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/PropertyDumper.classPK
Source: 125.exeString found in binary or memory: >"php/runtime/loader/dump/PropertyDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/StandaloneLibrary$Module.classPK
Source: 125.exeString found in binary or memory: C"php/runtime/loader/dump/StandaloneLibrary$Module.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/StandaloneLibrary.classPK
Source: 125.exeString found in binary or memory: H"php/runtime/loader/dump/StandaloneLibrary.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/StandaloneLibraryDumper.classPK
Source: 125.exeString found in binary or memory: M"php/runtime/loader/dump/StandaloneLibraryDumper.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/Types.classPK
Source: 125.exeString found in binary or memory: V"php/runtime/loader/dump/Types.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpException.classPK
Source: 125.exeString found in binary or memory: W"php/runtime/loader/dump/io/DumpException.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpInputStream$1.classPK
Source: 125.exeString found in binary or memory: TY"php/runtime/loader/dump/io/DumpInputStream$1.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpInputStream.classPK
Source: 125.exeString found in binary or memory: ["php/runtime/loader/dump/io/DumpInputStream.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpOutputStream$1.classPK
Source: 125.exeString found in binary or memory: e"php/runtime/loader/dump/io/DumpOutputStream$1.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/dump/io/DumpOutputStream.classPK
Source: 125.exeString found in binary or memory: Nh"php/runtime/loader/dump/io/DumpOutputStream.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/sourcemap/SourceMap$Item.classPK
Source: 125.exeString found in binary or memory: p"php/runtime/loader/sourcemap/SourceMap$Item.classPK
Source: 125.exeString found in binary or memory: php/runtime/loader/sourcemap/SourceMap.classPK
Source: 125.exeString found in binary or memory: Sr"php/runtime/loader/sourcemap/SourceMap.classPK
Source: 125.exeString found in binary or memory: javax/mail/Address.classPK
Source: 125.exeString found in binary or memory: }javax/mail/Address.classPK
Source: 125.exeString found in binary or memory: javax/mail/internet/AddressException.classPK
Source: 125.exeString found in binary or memory: ~javax/mail/internet/AddressException.classPK
Source: 125.exeString found in binary or memory: javax/mail/search/AddressStringTerm.classPK
Source: 125.exeString found in binary or memory: javax/mail/search/AddressTerm.classPK
Source: 125.exeString found in binary or memory: javassist/Loader.classPK
Source: 125.exeString found in binary or memory: javassist/LoaderClassPath.classPK
Source: 125.exeString found in binary or memory: javassist/tools/reflect/Loader.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalanceExceptionChecker.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedAutoCommitInterceptor.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedConnection.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedConnectionProxy$NullLoadBalancedConnectionProxy.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedConnectionProxy.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/LoadBalancedMySQLConnection.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/jmx/LoadBalanceConnectionGroupManager.classPK
Source: 125.exeString found in binary or memory: com/mysql/jdbc/jmx/LoadBalanceConnectionGroupManagerMBean.classPK
Source: C:\Users\user\Desktop\125.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\125.exeSection loaded: wintypes.dllJump to behavior
Source: 125.exeStatic file information: File size 19177181 > 1048576
Source: 125.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
Source: 125.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401803 push edi; mov dword ptr [esp], ebx0_2_00401842
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401803 push eax; mov dword ptr [esp], 00000000h0_2_00401A6A
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401803 push ebx; mov dword ptr [esp], eax0_2_00401AEB
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401803 push esi; mov dword ptr [esp], ebx0_2_00401BC8
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401F36 push ecx; mov dword ptr [esp], 00419168h0_2_00401FF7
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_0040E827 push esi; ret 0_2_0040E83A
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_004015D0 push eax; mov dword ptr [esp], 00000000h0_2_004016BB
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_0040DB23 push es; iretd 0_2_0040DC34
Source: C:\Users\user\Desktop\125.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\125.exeCode function: 0_2_00401180 SetUnhandledExceptionFilter,GetCommandLineA,_iob,_setmode,_setmode,_setmode,__p__fmode,__p__environ,_cexit,ExitProcess,__getmainargs,0_2_00401180
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
125.exe25%ReversingLabs
125.exe100%AviraHEUR/AGEN.1340808
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428867
Start date and time:2024-04-19 18:40:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:125.exe
Detection:MAL
Classification:mal56.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 20
  • Number of non-executed functions: 46
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Reached maximum number of file to list during submission archive extraction
  • VT rate limit hit for: 125.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Entropy (8bit):7.977616594150491
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:125.exe
File size:19'177'181 bytes
MD5:44b14057ff868e25ad444fac098d89f0
SHA1:2dceab58c101c2f5e922e5a40adcc685b557ac53
SHA256:5a54cda9e42baea3defa9f1024858f7c44f79242b8765c9e886a8f54db6e1934
SHA512:6b2476a8b884c2eff0b9495e91f18a824e2c03e8ee9e96fe9346aea438b7984c7cb79a98c8a8730a058613d5fd916fff2e0482fd8981fdcd6d5e98277dcd2e68
SSDEEP:393216:/00cmfacJqb6ZElIlTFGw0CKM8FZPG6IOyS/Uv/PhH1:/1cmBQ+8ITFGCkFOe0V
TLSH:8B171223E0DA2031FD731633A8A26463393E59DCE48B286628F45BE3F972C495F97751
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..f.....................N....................@...................................$...@... ............................
Icon Hash:90cececece8e8eb0
Entrypoint:0x401590
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
Time Stamp:0x6617DF32 [Thu Apr 11 13:01:38 2024 UTC]
TLS Callbacks:0x404b30, 0x404ae0
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:1f2702872592229d2f4cb1162cfbc55b
Instruction
sub esp, 1Ch
mov dword ptr [esp], 00000002h
call dword ptr [0041A36Ch]
call 00007FAB6D8BFED0h
lea esi, dword ptr [esi+00h]
lea edi, dword ptr [edi+00000000h]
mov eax, dword ptr [0041A3B4h]
jmp eax
mov esi, esi
lea edi, dword ptr [edi+00000000h]
mov eax, dword ptr [0041A398h]
jmp eax
nop
nop
nop
nop
nop
nop
nop
nop
nop
push ebp
mov ebp, esp
sub esp, 18h
cmp dword ptr [0041000Ch], 00000000h
je 00007FAB6D8C0382h
mov eax, dword ptr [0040C000h]
test eax, eax
jne 00007FAB6D8C034Eh
mov eax, dword ptr [00410A24h]
mov dword ptr [esp+04h], 00000000h
mov dword ptr [0041000Ch], 00000000h
mov dword ptr [esp], eax
call 00007FAB6D8CA642h
cmp dword ptr [00410A20h], 00000000h
push eax
push eax
je 00007FAB6D8C034Bh
cmp dword ptr [00410A28h], 00000000h
je 00007FAB6D8C0342h
mov eax, dword ptr [ebp+08h]
mov dword ptr [esp+04h], 00000001h
mov dword ptr [esp], eax
call 00007FAB6D8CA623h
push eax
push eax
call 00007FAB6D8C0BF2h
mov dword ptr [esp], 00000000h
call 00007FAB6D8CA618h
push eax
jmp 00007FAB6D8C0319h
sub eax, 64h
cmp dword ptr [00410A20h], 00000000h
mov dword ptr [0040C000h], eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1a0000xe28.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x8e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1c0000x18.tls
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1a29c0x210.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xab200xac0033e576d4351c548351b72f32b07bda11False0.5520303415697675data6.253550416172067IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0xc0000x280x20088a2b3221ee6ae6c9e54a9a6f1b5ca29False0.0859375data0.3124291846600516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0xd0000xf180x1000618daefd50bfb717d536c65b2b2a401cFalse0.42626953125data5.55669250689837IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.eh_fram0xe0000x1d100x1e00f9747eb26dfb3c00b741544776b88f4cFalse0.33450520833333336data4.883685988354517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.bss0x100000x96780x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1a0000xe280x1000f3f34beb12ab4e6fa44d8ec2bd39e3b3False0.369873046875PGP symmetric key encrypted data - Plaintext or unencrypted data4.922852717723951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x1b0000x180x20037ec714908b8947c8236ff693ffd0138False0.046875data0.11836963125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x1c0000x200x200686c4cfe6945a031ac65029366ab5de3False0.05078125data0.20448815743984491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x1d0000x8e00xa00718231d4c0a1e48d8a5673ba7bdc09b5False0.371875data4.767686030127875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_RCDATA0x1d1f00x7ASCII text, with no line terminators2.142857142857143
RT_RCDATA0x1d1f80x2data5.0
RT_RCDATA0x1d1fc0x5ASCII text, with no line terminators2.6
RT_RCDATA0x1d2040x3ASCII text, with no line terminators3.6666666666666665
RT_RCDATA0x1d2080x32data1.16
RT_RCDATA0x1d23c0x36data1.1296296296296295
RT_RCDATA0x1d2740x35ASCII text, with no line terminators1.1320754716981132
RT_RCDATA0x1d2ac0x68data0.875
RT_MANIFEST0x1d3140x5c3XML 1.0 document, ASCII text, with CRLF line terminators0.41491525423728814
DLLImport
advapi32.dllRegCloseKey, RegEnumKeyExA, RegOpenKeyExA, RegQueryValueExA
kernel32.dllCloseHandle, CreateMutexA, CreatePipe, CreateProcessA, DeleteCriticalSection, EnterCriticalSection, ExitProcess, FindResourceExA, FormatMessageA, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetEnvironmentVariableA, GetExitCodeProcess, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GlobalMemoryStatusEx, InitializeCriticalSection, InterlockedExchange, IsDBCSLeadByteEx, LeaveCriticalSection, LoadResource, LocalFree, LockResource, MultiByteToWideChar, ReadFile, SetEnvironmentVariableA, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte
msvcrt.dll_strdup, _stricoll
msvcrt.dll__getmainargs, __mb_cur_max, __p__environ, __p__fmode, __set_app_type, _cexit, _chdir, _close, _errno, _findclose, _findfirst, _findnext, _fullpath, _iob, _itoa, _onexit, _open, _read, _setmode, _stat64, _stricmp, abort, atexit, atoi, calloc, fclose, fopen, fprintf, fputc, fputs, free, fwrite, getenv, isspace, localeconv, malloc, mbstowcs, memcpy, printf, puts, realloc, setlocale, signal, strcat, strchr, strcmp, strcoll, strcpy, strlen, strncat, strncpy, strpbrk, strrchr, strstr, strtok, tolower, vfprintf, wcslen, wcstombs
shell32.dllShellExecuteA
user32.dllCreateWindowExA, DispatchMessageA, EnumWindows, FindWindowExA, GetMessageA, GetSystemMetrics, GetWindowLongA, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, KillTimer, LoadImageA, MessageBoxA, PostQuitMessage, SendMessageA, SetForegroundWindow, SetTimer, SetWindowPos, ShowWindow, TranslateMessage, UpdateWindow
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:18:41:01
Start date:19/04/2024
Path:C:\Users\user\Desktop\125.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\125.exe"
Imagebase:0x400000
File size:19'177'181 bytes
MD5 hash:44B14057FF868E25AD444FAC098D89F0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:6.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:5.4%
    Total number of Nodes:1364
    Total number of Limit Nodes:34
    execution_graph 5747 408640 5748 408090 5747->5748 5750 40812c 5747->5750 5749 406ba0 fputc 5748->5749 5748->5750 5749->5748 5751 405c4c 5752 405c50 5751->5752 5753 405c59 5752->5753 5754 405880 59 API calls 5752->5754 5757 4059ac 5754->5757 5755 4058db 5756 405d40 strlen 5759 405d55 5756->5759 5757->5755 5757->5756 5772 4059dd 5757->5772 5758 405c1a free 5760 405c36 free 5758->5760 5758->5772 5761 406380 11 API calls 5761->5772 5762 405a3f strlen 5762->5772 5763 405d16 _errno 5763->5772 5764 4065d0 7 API calls 5764->5772 5765 406730 3 API calls 5765->5772 5766 405530 2 API calls 5766->5772 5767 405840 free 5767->5758 5768 405a91 strlen 5768->5772 5769 405ac1 memcpy strlen 5769->5772 5770 405c82 memcpy 5770->5772 5771 405b28 _strdup 5771->5772 5772->5758 5772->5759 5772->5761 5772->5762 5772->5763 5772->5764 5772->5765 5772->5766 5772->5767 5772->5768 5772->5769 5772->5770 5772->5771 5773 405b70 strcoll 5772->5773 5774 405b91 _stricoll 5772->5774 5773->5772 5775 405ba2 malloc 5773->5775 5774->5772 5774->5775 5775->5772 6127 4016cc GetWindowThreadProcessId 6128 4016f2 6127->6128 6129 4016f9 GetWindowLongA 6127->6129 6129->6128 6130 401712 ShowWindow 6129->6130 6130->6128 6329 40654c 6330 406550 _errno 6329->6330 6331 406572 free 6330->6331 6332 406593 _errno 6330->6332 6333 4064cf 6331->6333 6332->6331 6334 40754c 6335 407550 6334->6335 6336 407564 localeconv 6335->6336 6346 40741b 6335->6346 6349 407434 6335->6349 6337 40a1d0 7 API calls 6336->6337 6337->6346 6338 407440 6339 407466 6338->6339 6343 406ba0 fputc 6338->6343 6340 407428 6342 406ba0 fputc 6340->6342 6341 406ba0 fputc 6341->6349 6342->6349 6343->6338 6344 409e80 5 API calls 6344->6346 6345 4074e3 6348 406ba0 fputc 6345->6348 6345->6349 6346->6340 6346->6344 6346->6345 6347 406ba0 fputc 6346->6347 6347->6346 6348->6345 6349->6338 6349->6341 6350 408150 6351 408162 6350->6351 6352 4086a8 wcslen 6350->6352 6353 4086cf 6351->6353 6354 40816f strlen 6351->6354 6360 406c00 6352->6360 6356 406cf0 fputc 6354->6356 6358 408090 6356->6358 6357 406ba0 fputc 6357->6358 6358->6357 6359 40812c 6358->6359 6361 409e80 5 API calls 6360->6361 6362 406c2b 6361->6362 6365 406ba0 fputc 6362->6365 6368 406c51 6362->6368 6363 406ca1 6364 406cba 6363->6364 6367 406ba0 fputc 6363->6367 6364->6353 6365->6362 6366 409e80 5 API calls 6366->6368 6367->6363 6368->6363 6368->6366 6369 406ba0 fputc 6368->6369 6369->6368 6463 4015d0 6464 4015e3 6463->6464 6465 40166f GetExitCodeProcess 6463->6465 6468 401648 6464->6468 6469 4015ec ShowWindow 6464->6469 6466 401692 6465->6466 6467 4016a4 KillTimer PostQuitMessage 6465->6467 6466->6467 6471 4016c8 6466->6471 6467->6471 6468->6465 6470 401659 EnumWindows 6468->6470 6469->6465 6472 401616 6469->6472 6470->6465 6472->6465 6473 40161f KillTimer 6472->6473 6474 401f36 13 API calls 6473->6474 6475 401639 PostQuitMessage 6474->6475 6475->6465 6131 4068d7 6132 406900 6131->6132 6133 4069f7 _errno 6131->6133 6139 406780 6132->6139 6135 406908 6136 406998 _findnext 6135->6136 6138 4069b5 6135->6138 6137 406930 strncpy 6136->6137 6136->6138 6137->6135 6137->6138 6140 406794 _findclose 6139->6140 6141 4067a6 _errno 6139->6141 6140->6141 6142 4067c0 _findfirst 6140->6142 6143 4067b1 6141->6143 6142->6143 6144 4067dd strncpy 6142->6144 6143->6135 6144->6135 6145 4082d7 6146 4082e6 6145->6146 6148 408313 6145->6148 6149 407040 6146->6149 6151 40709e 6149->6151 6150 4072ee 6151->6150 6155 406ba0 fputc 6151->6155 6156 40719f 6151->6156 6152 4071c3 6153 4071e6 6152->6153 6157 406ba0 fputc 6152->6157 6153->6148 6154 406ba0 fputc 6154->6156 6155->6151 6156->6152 6156->6154 6157->6152 5776 401059 5777 401060 5776->5777 5778 40106e 5777->5778 5780 4010ba signal 5777->5780 5779 401082 signal 5778->5779 5782 401050 5778->5782 5781 401140 signal 5779->5781 5779->5782 5780->5782 5783 40111f signal 5780->5783 5781->5782 5783->5782 5784 40ac59 5789 40ac16 5784->5789 5786 40ac7f LeaveCriticalSection 5786->5789 5787 40aa90 7 API calls 5787->5789 5788 40ac4f 5789->5786 5789->5787 5789->5788 5791 40a910 5789->5791 5797 40a720 5789->5797 5792 40a947 5791->5792 5793 40a91e 5791->5793 5792->5789 5793->5792 5794 40a720 5 API calls 5793->5794 5795 40a92b 5794->5795 5795->5792 5796 40a960 LeaveCriticalSection 5795->5796 5796->5789 5798 40a7b3 EnterCriticalSection 5797->5798 5799 40a734 5797->5799 5798->5789 5800 40a764 InterlockedExchange 5799->5800 5802 40a74f 5799->5802 5800->5802 5804 40a77f InitializeCriticalSection InitializeCriticalSection 5800->5804 5801 40a740 Sleep 5801->5802 5802->5801 5805 40a75a 5802->5805 5803 40a75f 5803->5789 5804->5805 5805->5798 5805->5803 6370 40a959 6371 40a960 LeaveCriticalSection 6370->6371 6158 405edc 6159 405ee0 _strdup 6158->6159 6161 405f1a 6159->6161 6372 407d5c 6373 407d6d 6372->6373 6374 406ba0 fputc 6373->6374 6375 407d90 6374->6375 6376 406ba0 fputc 6375->6376 6377 407da0 6376->6377 6378 406ba0 fputc 6377->6378 6379 407dcc 6377->6379 6378->6377 6380 406ba0 fputc 6379->6380 6381 407e9a 6380->6381 6382 406e20 fputc 6381->6382 6383 407eb2 6382->6383 6384 40855c 6385 406ba0 fputc 6384->6385 6386 40856b 6385->6386 6386->6386 6162 404ae0 6163 404aeb 6162->6163 6164 404af0 6163->6164 6167 405220 6163->6167 6166 404b18 6168 405273 6167->6168 6169 40522e 6167->6169 6170 405290 InitializeCriticalSection 6168->6170 6171 40527c 6168->6171 6172 405230 6169->6172 6174 405245 6169->6174 6170->6171 6171->6166 6173 40523e 6172->6173 6179 405080 EnterCriticalSection 6172->6179 6173->6166 6175 40524e 6174->6175 6176 405080 4 API calls 6174->6176 6175->6173 6177 405258 DeleteCriticalSection 6175->6177 6176->6175 6177->6173 6180 4050a1 TlsGetValue GetLastError 6179->6180 6181 4050cc LeaveCriticalSection 6179->6181 6182 4050b9 6180->6182 6181->6173 6182->6180 6182->6181 6387 405760 6388 405799 free 6387->6388 6389 40577c 6387->6389 6390 405780 free 6389->6390 6390->6388 6390->6390 6476 40a3e0 setlocale strchr 6477 40a421 atoi 6476->6477 6478 40a42e 6476->6478 6477->6478 6479 40a050 4 API calls 6478->6479 6480 40a460 6479->6480 5806 40a261 5807 40a270 setlocale strchr 5806->5807 5808 40a2d6 5807->5808 5809 40a2c7 atoi 5807->5809 5810 40a367 5808->5810 5811 40a2f7 5808->5811 5814 40a34f 5808->5814 5809->5808 5812 40a050 4 API calls 5810->5812 5810->5814 5811->5814 5815 40a050 5811->5815 5812->5810 5816 40a193 5815->5816 5818 40a066 5815->5818 5816->5811 5817 40a100 5821 40a157 MultiByteToWideChar 5817->5821 5822 40a107 5817->5822 5818->5817 5819 40a0ad 5818->5819 5820 40a097 IsDBCSLeadByteEx 5818->5820 5825 40a120 5818->5825 5823 40a0d2 MultiByteToWideChar 5819->5823 5819->5825 5820->5817 5820->5819 5824 40a1a7 _errno 5821->5824 5821->5825 5822->5811 5823->5824 5826 40a0f0 5823->5826 5824->5825 5825->5811 5826->5811 6183 4050e2 6184 4050f0 6183->6184 6185 405110 calloc 6184->6185 6186 405103 6184->6186 6185->6186 6187 40512a EnterCriticalSection LeaveCriticalSection 6185->6187 6487 40a7e5 6488 40a7f0 InterlockedExchange 6487->6488 6489 40a812 6488->6489 6490 40a814 DeleteCriticalSection DeleteCriticalSection 6488->6490 5827 407869 5828 4077d3 5827->5828 5839 406aa0 5828->5839 5831 407881 5868 406d90 5831->5868 5832 407826 5843 407310 5832->5843 5835 40785a 5836 40788e 5838 407834 5838->5835 5864 406ba0 5838->5864 5840 406ad6 5839->5840 5872 408950 5840->5872 5842 406b4c 5842->5831 5842->5832 5846 40732e 5843->5846 5844 40761a 5844->5838 5845 4073e8 5847 407406 5845->5847 5848 406ba0 fputc 5845->5848 5846->5838 5846->5844 5846->5845 5846->5847 5851 406ba0 fputc 5846->5851 5849 407564 localeconv 5847->5849 5858 407434 5847->5858 5860 40741b 5847->5860 5848->5845 5955 40a1d0 setlocale strchr 5849->5955 5850 407440 5853 407466 5850->5853 5857 406ba0 fputc 5850->5857 5851->5846 5853->5838 5854 407428 5856 406ba0 fputc 5854->5856 5855 406ba0 fputc 5855->5858 5856->5858 5857->5850 5858->5850 5858->5855 5860->5854 5861 4074e3 5860->5861 5862 406ba0 fputc 5860->5862 5950 409e80 setlocale strchr 5860->5950 5861->5858 5863 406ba0 fputc 5861->5863 5862->5860 5863->5861 5865 406bac 5864->5865 5866 406bb9 5865->5866 5867 406bd0 fputc 5865->5867 5866->5838 5867->5838 5869 406da2 5868->5869 5965 406cf0 5869->5965 5873 40897c 5872->5873 5887 409264 5872->5887 5874 408a74 5873->5874 5875 408983 5873->5875 5876 408ab4 5873->5876 5877 408a48 5873->5877 5874->5842 5880 40a4b0 7 API calls 5874->5880 5912 40a840 5875->5912 5879 40a4b0 7 API calls 5876->5879 5919 40a4b0 5877->5919 5882 408ae0 5879->5882 5883 408aac 5880->5883 5882->5842 5883->5842 5884 4089a9 5885 408a40 5884->5885 5895 408ae8 5884->5895 5901 408ca2 5884->5901 5886 40a910 6 API calls 5885->5886 5886->5877 5887->5842 5888 40a910 6 API calls 5893 4091ae 5888->5893 5889 4091c2 5891 40a910 6 API calls 5889->5891 5890 40a910 6 API calls 5892 4091d6 5890->5892 5898 408e2a 5891->5898 5892->5842 5893->5889 5894 40a910 6 API calls 5893->5894 5893->5898 5894->5889 5895->5887 5895->5901 5922 40a470 5895->5922 5897 40aa60 7 API calls 5897->5901 5898->5890 5899 40abe0 11 API calls 5899->5901 5901->5887 5901->5897 5901->5898 5901->5899 5902 40a910 6 API calls 5901->5902 5903 4090db 5901->5903 5904 40ad70 8 API calls 5901->5904 5906 40a840 7 API calls 5901->5906 5907 4090ff 5901->5907 5911 40a980 9 API calls 5901->5911 5926 40aa90 5901->5926 5937 40aed0 5901->5937 5902->5901 5903->5887 5930 40a980 5903->5930 5904->5901 5908 409b51 memcpy 5906->5908 5907->5887 5907->5888 5944 40ad70 5908->5944 5911->5901 5913 40a720 5 API calls 5912->5913 5914 40a853 5913->5914 5915 40a863 5914->5915 5916 40a899 malloc 5914->5916 5917 40a875 LeaveCriticalSection 5915->5917 5918 40a8b9 5915->5918 5916->5915 5916->5918 5917->5918 5918->5884 5920 40a470 7 API calls 5919->5920 5921 40a4c9 5920->5921 5921->5874 5924 40a47f 5922->5924 5923 40a840 7 API calls 5925 40a498 5923->5925 5924->5923 5924->5924 5925->5901 5927 40aaa9 5926->5927 5928 40a840 7 API calls 5927->5928 5929 40aad0 5928->5929 5929->5901 5931 40a9b3 5930->5931 5932 40a9ea 5931->5932 5933 40a840 7 API calls 5931->5933 5932->5907 5934 40aa18 5933->5934 5934->5932 5935 40aa1e memcpy 5934->5935 5936 40a910 6 API calls 5935->5936 5936->5932 5938 40aeeb 5937->5938 5939 40b012 5938->5939 5940 40aef3 5938->5940 5941 40a840 7 API calls 5939->5941 5942 40a840 7 API calls 5940->5942 5943 40af06 5940->5943 5941->5943 5942->5943 5943->5901 5943->5943 5945 40ad9c 5944->5945 5946 40a840 7 API calls 5945->5946 5947 40adb1 5946->5947 5947->5947 5948 40a910 6 API calls 5947->5948 5949 40ae5c 5947->5949 5948->5949 5949->5901 5951 409ed5 5950->5951 5952 409ec8 atoi 5950->5952 5960 409df0 5951->5960 5952->5951 5954 409eec 5954->5860 5956 40a22c 5955->5956 5957 40a21f atoi 5955->5957 5958 40a050 4 API calls 5956->5958 5957->5956 5959 40a25a 5958->5959 5959->5860 5961 409e04 5960->5961 5962 409e16 WideCharToMultiByte 5960->5962 5963 409e67 _errno 5961->5963 5964 409e0a 5961->5964 5962->5961 5962->5963 5963->5954 5964->5954 5966 406d00 5965->5966 5967 406d3a 5966->5967 5970 406ba0 fputc 5966->5970 5971 406ba0 fputc 5967->5971 5972 406d53 5967->5972 5968 406d79 5968->5836 5969 406ba0 fputc 5969->5972 5970->5966 5971->5967 5972->5968 5972->5969 6188 40bae9 6189 40ba90 GetModuleHandleA 6188->6189 6191 401803 262 API calls 6189->6191 6192 40badb 6191->6192 6391 404f69 6392 404e75 6391->6392 6393 404f0f 6392->6393 6394 404d10 13 API calls 6392->6394 6395 404eb4 6392->6395 6394->6392 6396 404cc0 13 API calls 6395->6396 6397 404ecc 6396->6397 6397->6393 6398 404d10 13 API calls 6397->6398 6398->6397 5973 405c6c 5978 405900 5973->5978 5974 405c7d 5976 40593c strlen 5974->5976 5975 405c50 5977 405c59 5975->5977 5979 405880 59 API calls 5975->5979 5980 405954 5976->5980 5978->5974 5978->5975 5978->5976 5984 4059ac 5979->5984 5982 405989 _strdup 5980->5982 5981 4058db 5982->5981 5985 4059a2 5982->5985 5983 405d40 strlen 5987 405d55 5983->5987 5984->5981 5984->5983 6001 4059dd 5984->6001 5986 4057b0 realloc 5985->5986 5986->5984 5988 405c1a free 5989 405c36 free 5988->5989 5988->6001 5990 406380 11 API calls 5990->6001 5991 405a3f strlen 5991->6001 5992 405d16 _errno 5992->6001 5993 4065d0 7 API calls 5993->6001 5994 406730 3 API calls 5994->6001 5995 405530 2 API calls 5995->6001 5996 405840 free 5996->5988 5997 405a91 strlen 5997->6001 5998 405ac1 memcpy strlen 5998->6001 5999 405c82 memcpy 5999->6001 6000 405b28 _strdup 6000->6001 6001->5987 6001->5988 6001->5990 6001->5991 6001->5992 6001->5993 6001->5994 6001->5995 6001->5996 6001->5997 6001->5998 6001->5999 6001->6000 6002 405b70 strcoll 6001->6002 6003 405b91 _stricoll 6001->6003 6002->6001 6004 405ba2 malloc 6002->6004 6003->6001 6003->6004 6004->6001 6399 40156c __set_app_type 6400 401180 349 API calls 6399->6400 6401 401585 6400->6401 6491 4079ec 6492 4079f0 6491->6492 6493 406d90 fputc 6492->6493 6494 4079a4 6493->6494 6495 409fec 6496 409ff0 6495->6496 6497 409fa3 6496->6497 6498 409df0 2 API calls 6496->6498 6498->6496 6193 4050f0 6194 405110 calloc 6193->6194 6195 405103 6193->6195 6194->6195 6196 40512a EnterCriticalSection LeaveCriticalSection 6194->6196 6499 40a7f0 InterlockedExchange 6500 40a812 6499->6500 6501 40a814 DeleteCriticalSection DeleteCriticalSection 6499->6501 6005 408274 6006 408287 6005->6006 6007 40829b 6005->6007 6011 4078a0 6006->6011 6009 4078a0 28 API calls 6007->6009 6010 4084b0 6009->6010 6010->6010 6012 4078b3 6011->6012 6027 40793b 6011->6027 6013 407994 6012->6013 6014 406aa0 12 API calls 6012->6014 6029 407640 6013->6029 6015 4078fe 6014->6015 6016 4079f0 6015->6016 6017 407910 6015->6017 6022 406d90 fputc 6016->6022 6020 407980 6017->6020 6023 40791c 6017->6023 6018 407310 14 API calls 6021 40794b 6018->6021 6020->6013 6024 407986 strlen 6020->6024 6026 406ba0 fputc 6021->6026 6028 407971 6021->6028 6022->6028 6025 407926 strlen 6023->6025 6023->6027 6024->6013 6025->6027 6026->6021 6027->6018 6028->6007 6030 40767b 6029->6030 6031 407310 14 API calls 6030->6031 6032 4076c2 6031->6032 6033 406ba0 fputc 6032->6033 6034 4076e3 6033->6034 6037 406e20 6034->6037 6038 406e55 6037->6038 6039 406f5f 6038->6039 6044 406ba0 fputc 6038->6044 6040 406f85 6039->6040 6041 406ba0 fputc 6039->6041 6042 406fab 6040->6042 6043 406ba0 fputc 6040->6043 6041->6039 6042->6028 6043->6040 6044->6038 6216 409ef9 setlocale strchr 6217 409f42 6216->6217 6218 409f35 atoi 6216->6218 6219 40a027 6217->6219 6220 409f61 6217->6220 6221 409fd7 6217->6221 6218->6217 6222 409fa3 6220->6222 6223 409df0 2 API calls 6220->6223 6221->6222 6224 409df0 2 API calls 6221->6224 6223->6220 6224->6221 6045 40107c 6046 401080 signal 6045->6046 6048 401140 signal 6046->6048 6049 401050 6046->6049 6048->6049 6050 408a7c 6051 408a80 6050->6051 6052 40a4b0 7 API calls 6051->6052 6053 408aac 6052->6053 6225 4080fc 6226 408090 6225->6226 6227 40812c 6226->6227 6228 406ba0 fputc 6226->6228 6228->6226 6229 40a0fc 6230 40a100 6229->6230 6231 40a157 MultiByteToWideChar 6230->6231 6232 40a107 6230->6232 6233 40a1a7 _errno 6231->6233 6234 40a12a 6231->6234 6233->6234 6235 405afc 6236 405a18 6235->6236 6237 405b28 _strdup 6236->6237 6238 405b70 strcoll 6236->6238 6239 405b91 _stricoll 6236->6239 6241 405c1a free 6236->6241 6242 405d16 _errno 6236->6242 6244 405d99 6236->6244 6245 406380 11 API calls 6236->6245 6246 405530 2 API calls 6236->6246 6247 406730 3 API calls 6236->6247 6248 4065d0 7 API calls 6236->6248 6249 405a91 strlen 6236->6249 6250 405a3f strlen 6236->6250 6251 405840 free 6236->6251 6252 405ac1 memcpy strlen 6236->6252 6253 405c82 memcpy 6236->6253 6237->6236 6238->6236 6240 405ba2 malloc 6238->6240 6239->6236 6239->6240 6240->6236 6241->6236 6243 405c36 free 6241->6243 6242->6236 6245->6236 6246->6236 6247->6236 6248->6236 6249->6236 6250->6236 6251->6241 6252->6236 6253->6236 6254 404afc 6255 404b00 6254->6255 6256 405220 6 API calls 6255->6256 6257 404b18 6256->6257 6402 40837c 6403 408393 6402->6403 6406 4083a7 6402->6406 6408 407710 6403->6408 6405 407710 26 API calls 6407 4085b0 6405->6407 6406->6405 6407->6407 6409 40771e 6408->6409 6410 406aa0 12 API calls 6409->6410 6411 407766 6410->6411 6412 4077a0 6411->6412 6413 407774 6411->6413 6415 406d90 fputc 6412->6415 6414 407640 14 API calls 6413->6414 6416 407782 6414->6416 6417 4077ad 6415->6417 6416->6406 6417->6406 6054 401000 6055 401013 6054->6055 6057 401060 6054->6057 6056 40101a 6055->6056 6062 40106e 6055->6062 6059 4010b3 6056->6059 6060 401025 signal 6056->6060 6061 4010ba signal 6057->6061 6057->6062 6058 401082 signal 6063 401140 signal 6058->6063 6066 401042 6058->6066 6059->6061 6059->6066 6065 401103 signal 6060->6065 6060->6066 6064 40111f signal 6061->6064 6061->6066 6062->6058 6062->6066 6063->6066 6064->6066 6065->6066 6502 405180 6503 4051a0 EnterCriticalSection 6502->6503 6504 405193 6502->6504 6505 4051d0 LeaveCriticalSection 6503->6505 6507 4051b9 6503->6507 6506 4051df 6505->6506 6507->6505 6508 4051bf free LeaveCriticalSection 6507->6508 6508->6506 6088 40ae09 6089 40ae10 6088->6089 6090 40a910 6 API calls 6089->6090 6091 40ae5c 6090->6091 6418 407309 6423 407310 6418->6423 6419 40761a 6420 4073e8 6422 406ba0 fputc 6420->6422 6425 407406 6420->6425 6421 406ba0 fputc 6421->6423 6422->6420 6423->6419 6423->6420 6423->6421 6423->6425 6424 407564 localeconv 6426 40a1d0 7 API calls 6424->6426 6425->6424 6431 40741b 6425->6431 6434 407434 6425->6434 6426->6431 6427 407440 6428 407466 6427->6428 6433 406ba0 fputc 6427->6433 6429 407428 6432 406ba0 fputc 6429->6432 6430 406ba0 fputc 6430->6434 6431->6429 6435 409e80 5 API calls 6431->6435 6436 4074e3 6431->6436 6437 406ba0 fputc 6431->6437 6432->6434 6433->6427 6434->6427 6434->6430 6435->6431 6436->6434 6438 406ba0 fputc 6436->6438 6437->6431 6438->6436 6510 408189 6511 4081aa 6510->6511 6512 4081c5 6510->6512 6513 406cf0 fputc 6511->6513 6514 406c00 6 API calls 6512->6514 6513->6512 6515 4085dc 6514->6515 6515->6515 6092 40720c 6094 407210 6092->6094 6093 406ba0 fputc 6093->6094 6094->6093 6096 40719f 6094->6096 6095 4071c3 6097 4071e6 6095->6097 6099 406ba0 fputc 6095->6099 6096->6095 6098 406ba0 fputc 6096->6098 6098->6096 6099->6095 6439 40510c 6440 405110 calloc 6439->6440 6441 40512a EnterCriticalSection LeaveCriticalSection 6440->6441 6442 405103 6440->6442 4974 401590 __set_app_type 4977 401180 4974->4977 4978 401192 4977->4978 4979 4011ae SetUnhandledExceptionFilter 4977->4979 4978->4979 4980 4011c2 4979->4980 4981 401511 __getmainargs 4980->4981 4982 4011d4 GetCommandLineA 4980->4982 4984 4011f5 4981->4984 4982->4984 4983 401422 4984->4983 4985 40137a 4984->4985 4994 405e70 4984->4994 4987 401396 _setmode _setmode _setmode 4985->4987 4988 4013d8 __p__fmode 4985->4988 4987->4988 5006 404e00 4988->5006 4990 4013ea 4991 4013f2 __p__environ 4990->4991 5021 40ba30 4991->5021 4995 405e94 4994->4995 4996 405e87 4994->4996 5028 405880 strlen 4995->5028 5069 4054d0 4996->5069 5000 405ea4 5001 405eab 5000->5001 5002 405ebb strlen 5000->5002 5001->4985 5003 405ed1 5002->5003 5004 405f08 _strdup 5003->5004 5005 405f1a 5004->5005 5005->4985 5007 404e09 5006->5007 5009 404e10 5006->5009 5007->4990 5008 404ed0 5010 404f0f 5008->5010 5015 404ecc 5008->5015 5009->5007 5009->5008 5011 404e75 5009->5011 5012 404fc7 5009->5012 5010->4990 5011->5010 5017 404e84 5011->5017 5014 404cc0 13 API calls 5012->5014 5020 404fd7 5014->5020 5015->5008 5015->5010 5149 404d10 VirtualQuery 5015->5149 5016 404d10 13 API calls 5016->5017 5017->5011 5017->5016 5018 404eb4 5017->5018 5127 404cc0 fwrite vfprintf abort 5018->5127 5020->4990 5170 405060 5021->5170 5023 40ba48 GetCommandLineA GetStartupInfoA 5027 40ba61 GetModuleHandleA 5023->5027 5172 401803 5027->5172 5072 40b3d0 5028->5072 5032 4058c5 5033 4054d0 malloc 5032->5033 5034 4058d7 5033->5034 5035 4058db 5034->5035 5036 40593c strlen 5034->5036 5037 4058ea 5034->5037 5035->5000 5039 405954 5036->5039 5037->5036 5038 405c50 5037->5038 5041 405c7d 5037->5041 5040 405c59 5038->5040 5043 405880 42 API calls 5038->5043 5042 405989 _strdup 5039->5042 5040->5000 5041->5036 5042->5035 5044 4059a2 5042->5044 5046 405df9 5043->5046 5118 4057b0 realloc 5044->5118 5048 4059ac 5046->5048 5047 405d40 strlen 5050 405d55 5047->5050 5048->5035 5048->5047 5049 4059dd 5048->5049 5049->5050 5051 405c1a free 5049->5051 5054 405a3f strlen 5049->5054 5065 405a70 5049->5065 5088 406380 5049->5088 5103 4065d0 5049->5103 5113 406730 5049->5113 5050->5000 5051->5049 5052 405c36 free 5051->5052 5052->5000 5054->5049 5055 405d16 _errno 5055->5065 5060 405a91 strlen 5060->5065 5061 405ac1 memcpy strlen 5061->5065 5062 405c82 memcpy 5062->5065 5063 405b28 _strdup 5063->5065 5064 4065d0 7 API calls 5064->5065 5065->5049 5065->5050 5065->5051 5065->5055 5065->5060 5065->5061 5065->5062 5065->5063 5065->5064 5066 405b70 strcoll 5065->5066 5067 405b91 _stricoll 5065->5067 5120 405530 5065->5120 5124 405840 5065->5124 5066->5065 5068 405ba2 malloc 5066->5068 5067->5065 5067->5068 5068->5065 5070 405500 5069->5070 5071 4054dd malloc 5069->5071 5070->4995 5071->5070 5073 4058a7 memcpy 5072->5073 5074 405f80 setlocale 5073->5074 5075 405fb0 setlocale 5074->5075 5076 405fa6 _strdup 5074->5076 5077 405fcd wcstombs realloc wcstombs setlocale free 5075->5077 5080 405fc8 5075->5080 5076->5075 5077->5032 5078 406040 mbstowcs 5077->5078 5078->5080 5079 406069 mbstowcs 5079->5080 5080->5077 5080->5078 5080->5079 5082 4060dd 5080->5082 5086 406283 5080->5086 5081 406287 setlocale free 5081->5032 5083 406133 wcstombs realloc wcstombs 5082->5083 5087 4061a9 5082->5087 5083->5081 5085 406263 wcstombs 5085->5081 5085->5086 5086->5081 5087->5085 5087->5087 5089 4065b2 _errno 5088->5089 5090 406399 5088->5090 5093 4064cf 5089->5093 5091 406581 _errno 5090->5091 5092 4063a2 _fullpath 5090->5092 5091->5093 5094 4063c7 5092->5094 5093->5049 5095 4063f7 malloc 5094->5095 5098 406525 5094->5098 5096 4065a0 _errno 5095->5096 5097 406418 memcpy _findfirst 5095->5097 5096->5093 5099 406550 _errno 5097->5099 5100 40644f strncpy 5097->5100 5098->5098 5098->5099 5101 406572 free 5099->5101 5102 406593 _errno 5099->5102 5100->5093 5101->5093 5102->5101 5104 4065e9 5103->5104 5105 40671d _errno 5103->5105 5106 40667b strlen 5104->5106 5107 4065ff _errno _findnext 5104->5107 5109 40668f 5105->5109 5106->5109 5108 406627 strncpy 5107->5108 5112 4066b8 5107->5112 5108->5106 5110 4066ef GetLastError 5108->5110 5109->5049 5110->5109 5111 4066fb _errno 5110->5111 5111->5109 5112->5110 5114 406761 _errno 5113->5114 5115 40673d _findclose 5113->5115 5117 406759 5114->5117 5115->5114 5116 406751 free 5115->5116 5116->5117 5117->5065 5119 4057dc 5118->5119 5119->5048 5121 405546 5120->5121 5122 4055b2 tolower tolower 5121->5122 5123 4055d6 5121->5123 5122->5121 5123->5065 5125 40584f 5124->5125 5126 40586c free 5125->5126 5126->5051 5128 404d10 VirtualQuery 5127->5128 5129 404d41 5128->5129 5130 404ddb 5128->5130 5131 404d49 memcpy 5129->5131 5134 404d66 VirtualProtect memcpy 5129->5134 5132 404cc0 5 API calls 5130->5132 5133 404d59 5131->5133 5138 404df3 5132->5138 5133->5015 5134->5133 5135 404dab 5134->5135 5135->5133 5136 404db0 VirtualProtect 5135->5136 5136->5015 5137 404e09 5137->5015 5138->5137 5140 404ecc 5138->5140 5141 404fc7 5138->5141 5146 404e75 5138->5146 5139 404f0f 5139->5015 5140->5139 5142 404d10 5 API calls 5140->5142 5143 404cc0 5 API calls 5141->5143 5142->5140 5145 404fd7 5143->5145 5144 404d10 VirtualQuery memcpy VirtualProtect memcpy VirtualProtect 5144->5146 5145->5015 5146->5139 5146->5144 5147 404eb4 5146->5147 5148 404cc0 5 API calls 5147->5148 5148->5140 5150 404d41 5149->5150 5151 404ddb 5149->5151 5152 404d49 memcpy 5150->5152 5155 404d66 VirtualProtect memcpy 5150->5155 5153 404cc0 8 API calls 5151->5153 5154 404d59 5152->5154 5159 404df3 5153->5159 5154->5015 5155->5154 5156 404dab 5155->5156 5156->5154 5157 404db0 VirtualProtect 5156->5157 5157->5015 5158 404e09 5158->5015 5159->5158 5161 404ecc 5159->5161 5162 404fc7 5159->5162 5165 404e75 5159->5165 5160 404f0f 5160->5015 5161->5160 5163 404d10 8 API calls 5161->5163 5164 404cc0 8 API calls 5162->5164 5163->5161 5166 404fd7 5164->5166 5165->5160 5167 404eb4 5165->5167 5168 404d10 8 API calls 5165->5168 5166->5015 5169 404cc0 8 API calls 5167->5169 5168->5165 5169->5161 5171 405010 5170->5171 5171->5023 5225 404890 5172->5225 5175 401829 5296 40173c 5175->5296 5176 40185a 5178 401b35 5176->5178 5278 402168 5176->5278 5281 401f36 GetLastError 5178->5281 5183 401413 _cexit ExitProcess 5184 40186d 5185 401873 strstr 5184->5185 5186 40188a 5184->5186 5185->5186 5187 402168 8 API calls 5186->5187 5188 40189c 5187->5188 5189 4018d3 5188->5189 5191 402168 8 API calls 5188->5191 5190 4018ea CreateWindowExA 5189->5190 5192 401af4 5189->5192 5190->5192 5193 40195f 5190->5193 5194 4018b6 5191->5194 5197 401b09 SetTimer 5192->5197 5219 401b44 5192->5219 5307 40206e 5193->5307 5194->5189 5195 4018bc strstr 5194->5195 5195->5189 5197->5178 5197->5219 5199 4019a1 5202 402168 8 API calls 5199->5202 5200 401982 atoi 5200->5199 5203 4019bc 5202->5203 5204 4019c2 strstr 5203->5204 5205 4019d9 5203->5205 5204->5205 5207 402168 8 API calls 5205->5207 5206 401b98 GetMessageA 5208 401bbf TranslateMessage DispatchMessageA 5206->5208 5206->5219 5210 4019eb LoadImageA 5207->5210 5208->5206 5209 401b6e 5211 401b87 5209->5211 5212 401b77 fputs 5209->5212 5210->5178 5213 401a2b 7 API calls 5210->5213 5326 4039ed CloseHandle CloseHandle 5211->5326 5212->5211 5213->5192 5216 401b8c 5218 401d21 fclose 5216->5218 5217 401bef fprintf 5217->5219 5221 401850 5218->5221 5219->5178 5219->5192 5219->5206 5219->5209 5219->5217 5220 401c1e 5219->5220 5319 403a11 5219->5319 5327 4039ed CloseHandle CloseHandle 5219->5327 5222 401c41 5220->5222 5223 401c27 fprintf 5220->5223 5221->5183 5224 401d21 fclose 5222->5224 5223->5222 5224->5221 5226 4048a0 5225->5226 5328 401c58 GetModuleHandleA 5226->5328 5229 401822 5229->5175 5229->5176 5234 404925 5350 401e4d GetModuleHandleA GetProcAddress 5234->5350 5235 4048fd fprintf 5235->5234 5238 40206e 7 API calls 5239 40493e 5238->5239 5240 40206e 7 API calls 5239->5240 5241 404952 5240->5241 5242 40206e 7 API calls 5241->5242 5243 404966 5242->5243 5244 404996 5243->5244 5245 40496c 5243->5245 5355 403001 5244->5355 5245->5229 5246 404979 fprintf 5245->5246 5246->5229 5253 4049c8 5403 403352 strcpy strcat 5253->5403 5259 4049f3 5421 402629 5259->5421 5279 40206e 7 API calls 5278->5279 5280 40218d strcmp 5279->5280 5280->5184 5282 401f65 5281->5282 5283 401f4d fprintf 5281->5283 5284 401ff7 5282->5284 5285 401f6d FormatMessageA 5282->5285 5283->5282 5739 401ed3 5284->5739 5286 401fb0 fprintf 5285->5286 5287 401fc7 strcat strcat LocalFree 5285->5287 5286->5287 5287->5284 5290 402064 5294 401d21 fclose 5290->5294 5291 40200c 5292 402015 fprintf 5291->5292 5293 40202d ShellExecuteA 5291->5293 5292->5293 5293->5290 5295 402069 5294->5295 5295->5183 5297 40206e 7 API calls 5296->5297 5298 40176d 5297->5298 5299 401771 ShowWindow SetForegroundWindow 5298->5299 5300 401778 FindWindowExA 5298->5300 5304 401d21 5299->5304 5301 4017a7 5300->5301 5301->5299 5302 4017ab GetWindowTextA strstr 5301->5302 5302->5299 5303 4017d2 FindWindowExA 5302->5303 5303->5301 5305 401d39 5304->5305 5306 401d2a fclose 5304->5306 5305->5221 5306->5305 5308 4020a2 FindResourceExA 5307->5308 5309 402085 5307->5309 5311 40212b SetLastError 5308->5311 5312 4020cd LoadResource 5308->5312 5309->5308 5310 40208e fprintf 5309->5310 5310->5308 5314 40213b 5311->5314 5313 4020e4 LockResource 5312->5313 5312->5314 5313->5314 5317 4020f1 5313->5317 5315 40197e 5314->5315 5316 40214f fputs 5314->5316 5315->5199 5315->5200 5316->5315 5317->5315 5318 402115 fprintf 5317->5318 5318->5315 5320 40b3d0 5319->5320 5321 403a21 strcpy strcat strcat strcat CreateProcessA 5320->5321 5322 403af2 5321->5322 5325 403b27 5321->5325 5323 403af8 WaitForSingleObject GetExitCodeProcess 5322->5323 5322->5325 5746 4039ed CloseHandle CloseHandle 5323->5746 5325->5219 5326->5216 5327->5219 5329 401c7c strcpy 5328->5329 5330 401cbf 5328->5330 5329->5330 5330->5229 5331 4025a0 GetModuleFileNameA 5330->5331 5332 4025ca strrchr 5331->5332 5333 4025de 5331->5333 5332->5333 5333->5229 5334 401d3a 5333->5334 5335 40b3d0 5334->5335 5336 401d4a GetEnvironmentVariableA strstr 5335->5336 5337 401d96 strstr 5336->5337 5338 401daa 5336->5338 5337->5338 5340 401df8 5337->5340 5499 401cc3 strncpy strcat fopen 5338->5499 5342 401e01 fprintf 5340->5342 5343 401e19 5340->5343 5341 401db9 5344 401dc2 strstr 5341->5344 5345 401e3c 5341->5345 5342->5343 5346 401e40 5343->5346 5347 401e22 fprintf 5343->5347 5348 401df2 5344->5348 5349 401ddb strstr 5344->5349 5345->5346 5346->5229 5346->5234 5346->5235 5347->5346 5348->5340 5349->5348 5351 401e79 GetCurrentProcess 5350->5351 5352 401e8b 5350->5352 5351->5352 5353 401e97 fprintf 5352->5353 5354 401ebf 5352->5354 5353->5354 5354->5238 5356 40206e 7 API calls 5355->5356 5357 403030 5356->5357 5358 403042 5357->5358 5359 4030ce 5357->5359 5360 40304b fprintf 5358->5360 5361 40305f CreateMutexA GetLastError 5358->5361 5359->5229 5365 4030d5 GetCurrentDirectoryA 5359->5365 5360->5361 5361->5359 5362 4030ab 5361->5362 5363 4030b4 fprintf 5362->5363 5364 4030cc 5362->5364 5363->5364 5364->5359 5366 40206e 7 API calls 5365->5366 5367 40312b 5366->5367 5368 403176 5367->5368 5369 40312f strncpy 5367->5369 5373 404726 5368->5373 5500 4025e6 5369->5500 5371 403151 _chdir 5371->5368 5372 403162 fprintf 5371->5372 5372->5368 5374 404736 5373->5374 5375 40474f 5373->5375 5374->5375 5376 40473f fputs 5374->5376 5377 402168 8 API calls 5375->5377 5376->5375 5378 40475b 5377->5378 5379 40476a fprintf 5378->5379 5380 40478d 5378->5380 5379->5380 5381 402168 8 API calls 5380->5381 5382 404799 5381->5382 5383 4047a8 fprintf 5382->5383 5384 4047cb 5382->5384 5383->5384 5385 40206e 7 API calls 5384->5385 5386 4047df 5385->5386 5503 4023b8 strcpy 5386->5503 5389 404814 5391 40206e 7 API calls 5389->5391 5390 4047fc fprintf 5390->5389 5392 404828 5391->5392 5393 4023b8 15 API calls 5392->5393 5394 40483c 5393->5394 5395 404845 fprintf 5394->5395 5396 40485d 5394->5396 5395->5396 5518 40449f 5396->5518 5399 404888 5399->5229 5399->5253 5709 4032b9 5403->5709 5406 4033c3 5406->5229 5408 4033d0 5406->5408 5407 4033ab fprintf 5407->5406 5409 4033e0 5408->5409 5410 40206e 7 API calls 5409->5410 5411 403413 strtok 5410->5411 5412 40342b 5411->5412 5413 4034ab 5412->5413 5414 40342f strchr 5412->5414 5416 403485 SetEnvironmentVariableA strtok 5412->5416 5417 40346d fprintf 5412->5417 5418 4021ab 5413->5418 5415 402a7b 27 API calls 5414->5415 5415->5412 5416->5412 5417->5416 5419 40206e 7 API calls 5418->5419 5420 4021d0 atoi 5419->5420 5420->5259 5422 40263b 5421->5422 5423 4025e6 strcat 5422->5423 5424 402655 5423->5424 5425 402e1f GlobalMemoryStatusEx 5424->5425 5714 402cce 5425->5714 5428 402cce 12 API calls 5429 402e98 5428->5429 5430 402e9d 5429->5430 5431 40206e 7 API calls 5430->5431 5432 402ebf 5431->5432 5433 402ec3 strcat 5432->5433 5434 402ed6 strncpy strcat _open 5432->5434 5433->5434 5435 402f34 5434->5435 5436 402ff6 5434->5436 5437 402f51 _read 5435->5437 5438 402f3d fprintf 5435->5438 5442 402a7b 5436->5442 5441 402f89 5437->5441 5438->5437 5439 402fe8 _close 5439->5436 5440 402fd5 strcat 5440->5439 5441->5439 5441->5440 5459 402a8b 5442->5459 5443 402cbd 5460 4034b3 5443->5460 5444 402abd strchr 5445 402cb1 strcat 5444->5445 5446 402ae3 strchr 5444->5446 5445->5443 5446->5443 5447 402b10 strncat strncat strcmp 5446->5447 5448 402b73 strncat 5447->5448 5449 402b8e strcmp 5447->5449 5448->5459 5450 402baa strcmp 5449->5450 5449->5459 5452 402bd5 strcmp 5450->5452 5453 402bbe GetCurrentDirectoryA 5450->5453 5451 402c8d fprintf 5451->5459 5455 402bf6 strcmp 5452->5455 5452->5459 5453->5459 5454 402c7c strcat 5454->5459 5456 402c14 strstr 5455->5456 5455->5459 5456->5459 5458 402c51 GetEnvironmentVariableA 5458->5459 5459->5443 5459->5444 5459->5451 5459->5454 5459->5458 5724 4021de strstr 5459->5724 5461 4034c3 5460->5461 5462 402168 8 API calls 5461->5462 5463 403518 5462->5463 5464 40206e 7 API calls 5463->5464 5465 40352e 5464->5465 5466 40206e 7 API calls 5465->5466 5467 403542 5466->5467 5468 403888 5467->5468 5469 40354a 5467->5469 5472 4038a0 strcat strcat 5468->5472 5473 4038b7 strcat strncat 5468->5473 5470 403553 fprintf 5469->5470 5471 40356b 5469->5471 5470->5471 5474 40206e 7 API calls 5471->5474 5475 4038e6 5472->5475 5476 4025e6 strcat 5473->5476 5477 40357b 5474->5477 5476->5475 5478 403598 5477->5478 5479 403588 fputs 5477->5479 5480 402a7b 27 API calls 5478->5480 5479->5478 5481 4035b8 strcat 5480->5481 5482 4035d5 5481->5482 5495 4035fa 5482->5495 5736 402a4e strcat 5482->5736 5484 40360b strtok 5485 403856 strcat 5484->5485 5484->5495 5485->5475 5486 403623 fprintf 5487 403637 strpbrk 5486->5487 5488 40364f strrchr 5487->5488 5487->5495 5488->5495 5490 40366c strncpy _findfirst 5491 4036c3 strncpy 5490->5491 5490->5495 5492 40373a strcpy 5491->5492 5737 402a4e strcat 5492->5737 5493 4037a1 _findclose 5493->5495 5495->5484 5495->5486 5495->5487 5495->5490 5495->5493 5496 403765 fprintf 5495->5496 5497 403779 _findnext 5495->5497 5738 402a4e strcat 5495->5738 5496->5497 5497->5495 5498 4037ae strncpy 5497->5498 5498->5492 5498->5495 5499->5341 5501 402617 5500->5501 5502 402607 strcat 5500->5502 5502->5501 5504 402598 5503->5504 5508 4023de 5503->5508 5504->5389 5504->5390 5506 402553 strcat strcat strcat strcat 5514 40254a 5506->5514 5507 40241d strncpy 5507->5508 5508->5504 5508->5507 5509 402457 strcpy 5508->5509 5510 402476 strcat 5508->5510 5511 4024f4 strcat 5508->5511 5512 402531 5508->5512 5513 4024b8 strcat 5508->5513 5508->5514 5516 402499 strcat 5508->5516 5517 4024db strcat 5508->5517 5566 402356 5508->5566 5509->5510 5510->5508 5511->5508 5511->5514 5512->5514 5515 40253a fputs 5512->5515 5513->5508 5514->5504 5514->5506 5515->5514 5516->5508 5517->5508 5519 4044af 5518->5519 5520 4044d3 5519->5520 5521 4044c3 fputs 5519->5521 5522 40451c 5520->5522 5523 4044fa 5520->5523 5521->5520 5524 40206e 7 API calls 5522->5524 5525 404507 fputs 5523->5525 5526 404719 5523->5526 5527 40452c 5524->5527 5525->5526 5526->5399 5546 404214 5526->5546 5527->5526 5528 402a7b 27 API calls 5527->5528 5529 404563 5528->5529 5530 404580 strtok 5529->5530 5531 40456c fprintf 5529->5531 5541 404598 5530->5541 5531->5530 5532 4045a0 strrchr strrchr 5533 4045d7 _stricmp 5532->5533 5532->5541 5533->5541 5534 40462b strcpy 5534->5541 5535 4045fd _stricmp 5535->5534 5535->5541 5536 40461d strncpy 5536->5541 5537 40465e strcpy 5537->5541 5538 404670 strncpy 5539 4025e6 strcat 5538->5539 5539->5541 5541->5526 5541->5532 5541->5534 5541->5535 5541->5536 5541->5537 5541->5538 5542 4046b4 5541->5542 5543 4046fe strtok 5541->5543 5570 402657 5541->5570 5542->5543 5545 4046ce strcpy 5542->5545 5585 40425d 5542->5585 5543->5541 5545->5526 5547 404223 5546->5547 5548 40423c 5546->5548 5547->5548 5549 40422c fputs 5547->5549 5550 404253 5548->5550 5656 4040f7 5548->5656 5549->5548 5550->5399 5552 40319c 5550->5552 5553 4031bb 5552->5553 5562 403293 5552->5562 5554 40206e 7 API calls 5553->5554 5556 4031c7 strcat strcat 5554->5556 5555 40206e 7 API calls 5557 4032b0 5555->5557 5558 403220 5556->5558 5559 4031f8 strcat strcat 5556->5559 5557->5399 5560 403229 strcat 5558->5560 5561 40323d 5558->5561 5559->5558 5560->5561 5561->5562 5563 40206e 7 API calls 5561->5563 5562->5555 5564 40326b 5563->5564 5564->5562 5565 40326f strcat strcat 5564->5565 5565->5562 5567 402367 5566->5567 5569 402392 5566->5569 5568 40236c strchr strchr 5567->5568 5567->5569 5568->5569 5569->5508 5571 402694 strcpy 5570->5571 5580 4027e6 5570->5580 5572 402629 strcat 5571->5572 5573 4026ab _stat64 5572->5573 5574 4026c2 5573->5574 5575 4027c5 5574->5575 5576 40279e fprintf 5574->5576 5577 4027c9 SetLastError 5575->5577 5578 4027dd 5575->5578 5576->5575 5577->5580 5579 4027f0 strcpy 5578->5579 5578->5580 5581 4025e6 strcat 5579->5581 5580->5541 5582 40280f _stat64 5581->5582 5583 402826 5582->5583 5583->5580 5584 402902 fprintf 5583->5584 5584->5580 5586 40426d 5585->5586 5587 4042bf CreatePipe 5586->5587 5588 40429b fprintf 5586->5588 5589 40432e SetHandleInformation 5587->5589 5590 40430e 5587->5590 5588->5587 5593 404353 5589->5593 5594 404386 strcpy 5589->5594 5591 404327 5590->5591 5592 404317 fputs 5590->5592 5591->5542 5592->5591 5595 40436c CloseHandle 5593->5595 5596 40435c fputs 5593->5596 5597 402629 strcat 5594->5597 5598 404410 CloseHandle 5595->5598 5596->5595 5599 4043b9 5597->5599 5598->5591 5614 405f50 5599->5614 5603 4043ed 5604 4043f1 5603->5604 5605 40441e 5603->5605 5607 40440a 5604->5607 5608 4043fa fputs 5604->5608 5625 403b64 5605->5625 5607->5598 5608->5607 5610 40447d 5611 4023b8 15 API calls 5610->5611 5612 404489 5611->5612 5638 403dc7 5612->5638 5645 406a30 5614->5645 5616 4043db 5617 403cc0 5616->5617 5618 403d06 5617->5618 5619 403d29 CreateProcessA 5617->5619 5618->5619 5620 403d0f fprintf 5618->5620 5621 403d99 CloseHandle CloseHandle 5619->5621 5622 403d7a 5619->5622 5620->5619 5623 403db1 CloseHandle 5621->5623 5622->5623 5624 403d83 fprintf 5622->5624 5623->5603 5624->5623 5626 403b90 ReadFile 5625->5626 5627 403bc6 5626->5627 5628 403bb6 5626->5628 5629 403bf2 strchr 5627->5629 5630 403bde fprintf 5627->5630 5628->5626 5628->5627 5631 403c26 strchr 5629->5631 5635 403c0c 5629->5635 5630->5629 5633 403c53 5631->5633 5631->5635 5632 403cb3 CloseHandle 5632->5591 5632->5610 5633->5635 5636 403c75 strstr 5633->5636 5634 403c6e fputs 5634->5632 5635->5632 5635->5634 5636->5632 5637 403c9c strstr 5636->5637 5637->5632 5639 403df3 5638->5639 5640 403ddf strcmp 5638->5640 5641 403dfc strcmp 5639->5641 5642 403e12 5639->5642 5640->5639 5640->5642 5641->5642 5643 403e44 fprintf 5642->5643 5644 403e7e 5642->5644 5643->5644 5644->5591 5646 406a77 5645->5646 5647 406a49 5645->5647 5649 408000 2 API calls 5646->5649 5652 408000 getenv 5647->5652 5651 406a97 5649->5651 5651->5616 5654 40806d 5652->5654 5653 406ba0 fputc 5653->5654 5654->5653 5655 406a68 5654->5655 5655->5616 5657 404106 5656->5657 5658 40411f 5656->5658 5657->5658 5659 40410f fputs 5657->5659 5660 404134 5658->5660 5679 404098 5658->5679 5659->5658 5662 404098 39 API calls 5660->5662 5663 404140 5662->5663 5664 404155 5663->5664 5665 404098 39 API calls 5663->5665 5666 404098 39 API calls 5664->5666 5665->5664 5667 404161 5666->5667 5668 40417f 5667->5668 5670 404098 39 API calls 5667->5670 5673 40418b 5667->5673 5671 404098 39 API calls 5668->5671 5669 4041b5 5674 4041c0 strcpy 5669->5674 5675 40420d 5669->5675 5670->5668 5671->5673 5672 4041a9 5677 404098 39 API calls 5672->5677 5673->5669 5673->5672 5676 404098 39 API calls 5673->5676 5674->5675 5678 4041dd fprintf 5674->5678 5675->5550 5676->5672 5677->5669 5678->5675 5680 4040cd 5679->5680 5681 4040ab 5679->5681 5680->5660 5682 4040b4 5681->5682 5684 403e88 39 API calls 5681->5684 5682->5680 5685 403e88 5682->5685 5684->5682 5686 403ed1 RegOpenKeyExA 5685->5686 5687 403ea7 fprintf 5685->5687 5688 404090 5686->5688 5695 403f0c 5686->5695 5687->5686 5688->5680 5689 403f37 RegEnumKeyExA 5690 404081 RegCloseKey 5689->5690 5691 403f93 strcpy 5689->5691 5690->5688 5692 4025e6 strcat 5691->5692 5692->5695 5693 403fbd fprintf 5693->5695 5694 4023b8 15 API calls 5694->5695 5695->5689 5695->5693 5695->5694 5696 403dc7 3 API calls 5695->5696 5697 404052 fprintf 5695->5697 5699 404012 strcpy 5695->5699 5701 40293e RegOpenKeyExA 5695->5701 5696->5695 5697->5695 5699->5690 5700 404033 fprintf 5699->5700 5700->5690 5702 4029a2 RegQueryValueExA 5701->5702 5704 402a38 5701->5704 5703 402a13 RegCloseKey 5702->5703 5705 4029fe 5702->5705 5703->5704 5706 402a26 strcpy 5703->5706 5704->5695 5707 402657 8 API calls 5705->5707 5706->5704 5708 402a11 5707->5708 5708->5703 5710 40b3d0 5709->5710 5711 4032c9 GetEnvironmentVariableA 5710->5711 5712 403319 strcat strcat SetEnvironmentVariableA 5711->5712 5713 40334a 5711->5713 5712->5713 5713->5406 5713->5407 5715 4021ab 8 API calls 5714->5715 5716 402cfd 5715->5716 5717 4021ab 8 API calls 5716->5717 5718 402d08 5717->5718 5719 402e17 5718->5719 5720 402d86 5718->5720 5723 402d6a fprintf 5718->5723 5719->5428 5721 402d94 fprintf 5720->5721 5722 402dc8 strcat _itoa 5720->5722 5721->5722 5722->5719 5723->5720 5725 4021fe strstr 5724->5725 5735 402254 strchr strrchr 5724->5735 5727 402212 strstr 5725->5727 5725->5735 5728 402226 strstr 5727->5728 5727->5735 5731 40223a strstr 5728->5731 5728->5735 5729 4022d4 RegOpenKeyExA 5730 4022a9 RegOpenKeyExA 5729->5730 5734 402301 RegQueryValueExA RegCloseKey 5729->5734 5732 4022d2 5730->5732 5733 402349 5730->5733 5731->5733 5731->5735 5732->5734 5733->5459 5734->5733 5735->5729 5735->5730 5740 401f11 MessageBoxA 5739->5740 5741 401ee5 5739->5741 5742 401f34 5740->5742 5743 401f08 puts 5741->5743 5744 401eee printf 5741->5744 5742->5290 5742->5291 5744->5742 5746->5325 6258 408490 6259 408287 6258->6259 6260 40829b 6258->6260 6261 4078a0 28 API calls 6259->6261 6262 4078a0 28 API calls 6260->6262 6261->6260 6263 4084b0 6262->6263 6263->6263 6516 408590 6517 408393 6516->6517 6518 4083a7 6516->6518 6519 407710 26 API calls 6517->6519 6520 407710 26 API calls 6518->6520 6519->6518 6521 4085b0 6520->6521 6521->6521 6443 408318 6444 408325 6443->6444 6448 408408 6443->6448 6445 408377 6444->6445 6446 407040 fputc 6444->6446 6444->6448 6447 406e20 fputc 6445->6447 6446->6445 6447->6448 6264 405699 6265 405549 6264->6265 6267 4055b2 tolower tolower 6265->6267 6268 4055e8 6265->6268 6269 4055d6 6265->6269 6266 405530 2 API calls 6266->6268 6267->6265 6268->6266 6268->6269 6270 4082a0 6271 4082b3 6270->6271 6272 4082c7 6270->6272 6276 4077c0 6271->6276 6273 4077c0 26 API calls 6272->6273 6275 408601 6273->6275 6275->6275 6277 4077d3 6276->6277 6278 406aa0 12 API calls 6277->6278 6279 407818 6278->6279 6280 407881 6279->6280 6281 407826 6279->6281 6283 406d90 fputc 6280->6283 6282 407310 14 API calls 6281->6282 6284 407834 6282->6284 6285 40788e 6283->6285 6286 40785a 6284->6286 6287 406ba0 fputc 6284->6287 6285->6272 6286->6272 6287->6284 6100 401424 6101 40142d 6100->6101 6105 401481 6100->6105 6102 401442 isspace 6101->6102 6101->6105 6103 40144e 6102->6103 6102->6105 6104 405e70 61 API calls 6103->6104 6103->6105 6104->6105 6449 404b29 6450 404b42 6449->6450 6451 405220 6 API calls 6450->6451 6452 404b56 6450->6452 6451->6452 6522 4099a9 6526 408d38 6522->6526 6523 40a910 6 API calls 6524 4091d6 6523->6524 6525 4090db 6527 40a980 9 API calls 6525->6527 6528 40928b 6525->6528 6526->6525 6526->6528 6529 40ad70 8 API calls 6526->6529 6530 4090ff 6526->6530 6531 40a840 7 API calls 6526->6531 6534 40aed0 7 API calls 6526->6534 6540 40a980 9 API calls 6526->6540 6541 408e2a 6526->6541 6542 40aa60 7 API calls 6526->6542 6543 40abe0 11 API calls 6526->6543 6544 40aa90 7 API calls 6526->6544 6545 40a910 6 API calls 6526->6545 6527->6530 6529->6526 6530->6528 6535 40a910 6 API calls 6530->6535 6532 409b51 memcpy 6531->6532 6533 40ad70 8 API calls 6532->6533 6533->6526 6534->6526 6538 4091ae 6535->6538 6536 4091c2 6537 40a910 6 API calls 6536->6537 6537->6541 6538->6536 6539 40a910 6 API calls 6538->6539 6538->6541 6539->6536 6540->6526 6541->6523 6542->6526 6543->6526 6544->6526 6545->6526 6300 4062ac 6301 40623d 6300->6301 6301->6301 6302 406263 wcstombs 6301->6302 6303 406283 6302->6303 6304 406287 setlocale free 6302->6304 6303->6304 6546 4083ac 6547 40870e 6546->6547 6548 4083c3 6546->6548 6548->6547 6549 406e20 fputc 6548->6549 6550 408408 6549->6550 6305 4068b0 6306 4068c5 _errno 6305->6306 6307 4068bb 6305->6307 6306->6307 6551 4085b5 6552 4085bd 6551->6552 6553 406c00 6 API calls 6552->6553 6554 4085dc 6553->6554 6554->6554 6106 407039 6108 407040 6106->6108 6107 4072ee 6108->6107 6112 406ba0 fputc 6108->6112 6113 40719f 6108->6113 6109 4071c3 6110 4071e6 6109->6110 6114 406ba0 fputc 6109->6114 6111 406ba0 fputc 6111->6113 6112->6108 6113->6109 6113->6111 6114->6109 6308 4012b9 6316 401235 6308->6316 6309 401422 6310 40137a 6312 401396 _setmode _setmode _setmode 6310->6312 6313 4013d8 __p__fmode 6310->6313 6311 405e70 61 API calls 6311->6310 6312->6313 6314 404e00 13 API calls 6313->6314 6315 4013ea 6314->6315 6317 4013f2 __p__environ 6315->6317 6316->6309 6316->6310 6316->6311 6318 40ba30 265 API calls 6317->6318 6319 401413 _cexit ExitProcess 6318->6319 6453 40b139 6454 40a840 7 API calls 6453->6454 6455 40b15b 6454->6455 6115 40603c 6116 406040 mbstowcs 6115->6116 6118 4060ac 6116->6118 6117 406069 mbstowcs 6117->6118 6118->6117 6119 406283 6118->6119 6120 405fcd wcstombs realloc wcstombs setlocale free 6118->6120 6122 4060dd 6118->6122 6121 406287 setlocale free 6119->6121 6120->6116 6123 406133 wcstombs realloc wcstombs 6122->6123 6125 4061a9 wcstombs 6122->6125 6123->6121 6125->6119 6125->6121 6456 40113c 6457 401140 signal 6456->6457 6458 401052 6457->6458 6576 4067bc 6577 4067c0 _findfirst 6576->6577 6578 4067dd strncpy 6577->6578 6579 4067b1 6577->6579

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 324 401f36-401f4b GetLastError 325 401f65-401f67 324->325 326 401f4d-401f60 fprintf 324->326 327 401ff7-401ffe call 401ed3 325->327 328 401f6d-401fae FormatMessageA 325->328 326->325 332 402003-40200a 327->332 329 401fb0-401fc2 fprintf 328->329 330 401fc7-401ff6 strcat * 2 LocalFree 328->330 329->330 330->327 333 402064-40206d call 401d21 332->333 334 40200c-402013 332->334 335 402015-402028 fprintf 334->335 336 40202d-402061 ShellExecuteA 334->336 335->336 336->333
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$strcat$ErrorExecuteFormatFreeLastLocalMessageShell
    • String ID: Error msg:%s$Error:%s$Open URL:%s$open
    • API String ID: 623906192-1000128352
    • Opcode ID: 5f4cdfb2db64f69c1b8899a40e8c2b2d66c7cc82bdab6081b02c6d9a4eebe329
    • Instruction ID: 4e77a20fe357836db4f87170e554fce1a7aefb146fdc10bea6d1eb2dceec5710
    • Opcode Fuzzy Hash: 5f4cdfb2db64f69c1b8899a40e8c2b2d66c7cc82bdab6081b02c6d9a4eebe329
    • Instruction Fuzzy Hash: CA31C7B0908305AAD700EF65C58975FBBE4EF44748F00C82EE5846B291D7BD9888CB9B
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 339 401180-401190 340 401192-4011ab 339->340 341 4011ae-4011ce SetUnhandledExceptionFilter call 404be0 call 404bd0 339->341 340->341 347 401511-40153c __getmainargs 341->347 348 4011d4-40122e GetCommandLineA call 40b3d0 341->348 351 401556 347->351 352 401235-401241 348->352 353 40155d-40155f 351->353 354 401336-401338 352->354 355 401247-40124a 352->355 361 401565-401567 353->361 354->353 358 40133e 354->358 356 401500-401504 355->356 357 401250 355->357 363 4012f2 356->363 364 40150a-40150c 356->364 359 4012c0-4012c3 357->359 360 401252-401255 357->360 362 401340-401349 358->362 370 4014b0-4014b3 359->370 371 4012c9-4012cc 359->371 366 4014b8-4014bf 360->366 367 40125b-401260 360->367 368 4014dc-4014de 361->368 362->362 369 40134b-40134f 362->369 365 4012f4-4012fd 363->365 372 4012ff-401304 364->372 365->365 365->372 376 401422 366->376 377 4014c5-4014c9 366->377 367->356 375 401266-401269 367->375 378 4014e0-4014e4 368->378 379 4014ea-4014f9 368->379 380 401351-401354 369->380 381 401356-401375 call 405e70 369->381 370->352 371->356 382 4012d2-4012d5 371->382 373 4014a1-4014a4 372->373 374 40130a-40130e 372->374 373->370 374->373 383 401314-401317 374->383 375->376 384 40126f-401273 375->384 377->361 385 4014cf 377->385 378->379 386 401295-4012a3 378->386 379->352 380->381 387 40137a-401394 380->387 381->387 382->376 389 4012db-4012ec 382->389 383->373 390 40131d-401330 383->390 384->351 391 401279-40127c 384->391 392 4014d1-4014da 385->392 386->352 393 401396-4013d3 _setmode * 3 387->393 394 4013d8-40141d __p__fmode call 404e00 call 405060 __p__environ call 40ba30 _cexit ExitProcess 387->394 389->363 389->364 390->354 390->355 395 401280-401289 391->395 392->368 392->392 393->394 395->395 398 40128b-40128d 395->398 400 4012a5-4012b4 398->400 401 40128f-401293 398->401 400->352 400->359 401->386 401->400
    APIs
    • SetUnhandledExceptionFilter.KERNEL32 ref: 004011B5
    • GetCommandLineA.KERNEL32 ref: 004011D4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CommandExceptionFilterLineUnhandled
    • String ID: "$0K@
    • API String ID: 3189701131-323584478
    • Opcode ID: a5a68305bb49f081b96f97709e2557b44da817316e5f71f7a6d4df3e54b6700e
    • Instruction ID: 61333d1ad20d280aa045cae7d5b4021662dfe7b6fff250ac9cbde6683caa0fff
    • Opcode Fuzzy Hash: a5a68305bb49f081b96f97709e2557b44da817316e5f71f7a6d4df3e54b6700e
    • Instruction Fuzzy Hash: EF91AF71A04304CFDB20DFB9D88479E7BE1AB58344F19857EE844EB3A1E37C98458B4A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 401803-401827 call 404890 3 401829-401855 call 40173c ShowWindow SetForegroundWindow call 401d21 0->3 4 40185a-40185b 0->4 15 401c4b-401c52 3->15 6 401861-401871 call 402168 4->6 7 401b35 call 401f36 4->7 16 401873-401887 strstr 6->16 17 40188a-4018a8 call 402168 6->17 12 401b3a-401b3f 7->12 12->15 16->17 20 4018d3-4018e0 17->20 21 4018aa-4018ba call 402168 17->21 22 4018e2-4018e4 20->22 23 4018ea-401959 CreateWindowExA 20->23 21->20 28 4018bc-4018d0 strstr 21->28 22->23 25 401af4 22->25 23->25 26 40195f-401980 call 40206e 23->26 29 401af7-401afe 25->29 35 4019a1-4019c0 call 402168 26->35 36 401982-40199b atoi 26->36 28->20 31 401b00-401b07 29->31 32 401b09-401b33 SetTimer 29->32 31->32 34 401b44-401b5a call 403a11 31->34 32->7 32->34 34->7 41 401b5c-401b63 34->41 42 4019c2-4019d6 strstr 35->42 43 4019d9-401a25 call 402168 LoadImageA 35->43 36->35 44 401b65-401b6c 41->44 45 401b98-401bbd GetMessageA 41->45 42->43 43->7 55 401a2b-401af3 SendMessageA GetWindowRect GetSystemMetrics * 2 SetWindowPos ShowWindow UpdateWindow 43->55 44->45 49 401b6e-401b75 44->49 47 401bd3-401bda 45->47 48 401bbf-401bd1 TranslateMessage DispatchMessageA 45->48 51 401c03-401c0f call 4039ed 47->51 52 401bdc-401be4 47->52 48->45 53 401b87-401b93 call 4039ed call 401d21 49->53 54 401b77-401b82 fputs 49->54 63 401c11-401c18 51->63 64 401c1e-401c25 51->64 52->51 56 401be6-401bed 52->56 53->15 54->53 55->25 56->51 60 401bef-401bfe fprintf 56->60 60->51 63->29 63->64 66 401c41-401c46 call 401d21 64->66 67 401c27-401c3c fprintf 64->67 66->15 67->66
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Windowstrstr$CreateForegroundImageLoadShowatoifclose
    • String ID: --l4j-dont-wait$--l4j-no-splash$--l4j-no-splash-err$@$Exit code:%d$Exit code:%d, restarting the application!$Exit code:0$STATIC$d
    • API String ID: 326098631-3010709316
    • Opcode ID: 71006dd15c9589b11793186ed7002b1537a19481e705ea02c5fe79c148959134
    • Instruction ID: 72a7c9eecd2e3a16443941ac5411f74ee8e4eaa653dba962b344c2f5b50a4983
    • Opcode Fuzzy Hash: 71006dd15c9589b11793186ed7002b1537a19481e705ea02c5fe79c148959134
    • Instruction Fuzzy Hash: B8B10AB05093059AE710AF66D58575BBBF4EF84348F00C83EE484A72A1D7BDD984CB9A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 70 40449f-4044b8 call 40b3d0 73 4044d3-4044ef 70->73 74 4044ba-4044c1 70->74 76 4044f1-4044f8 73->76 77 40451c-40452e call 40206e 73->77 74->73 75 4044c3-4044ce fputs 74->75 75->73 76->77 78 4044fa-404501 76->78 81 404719 77->81 84 404534-40456a call 402a7b 77->84 80 404507-404517 fputs 78->80 78->81 80->81 83 40471b-404725 81->83 87 404580-404596 strtok 84->87 88 40456c-40457b fprintf 84->88 89 404598-40459a 87->89 88->87 89->81 90 4045a0-4045d5 strrchr * 2 89->90 91 4045f3-4045fb 90->91 92 4045d7-4045e9 _stricmp 90->92 94 40462b-404632 strcpy 91->94 95 4045fd-40460f _stricmp 91->95 92->91 93 4045eb-4045f1 92->93 96 40461d-404629 strncpy 93->96 98 404637-40464f call 40317d 94->98 95->94 97 404611-404619 95->97 96->98 97->96 101 404651-404653 98->101 102 40465e-40466e strcpy 98->102 103 404670-40469f strncpy call 4025e6 101->103 104 404655-40465c 101->104 105 4046a4-4046ab call 402657 102->105 103->105 104->102 104->103 108 4046b0-4046b2 105->108 109 4046b4-4046cc call 40425d 108->109 110 4046fe-404714 strtok 108->110 109->110 113 4046ce-4046fc strcpy 109->113 110->89 113->83
    APIs
    • fputs.MSVCRT ref: 004044CE
    • fputs.MSVCRT ref: 00404512
    • fprintf.MSVCRT ref: 0040457B
    • strtok.MSVCRT ref: 00404591
    • strrchr.MSVCRT ref: 004045B6
    • strrchr.MSVCRT ref: 004045C8
    • _stricmp.MSVCRT(00000001,00000000,000000B7,?,00404874,?,?,00000000,?,00401822), ref: 004045E2
    • _stricmp.MSVCRT(00000001,00000000,000000B7,?,00404874,?,?,00000000,?,00401822), ref: 00404608
    • strncpy.MSVCRT ref: 00404624
    • strcpy.MSVCRT(00000001,00000000,000000B7,?,00404874,?,?,00000000,?,00401822), ref: 00404632
    • strcpy.MSVCRT(00000001,00000000,000000B7,?,00404874,?,?,00000000,?,00401822), ref: 00404669
    • strncpy.MSVCRT ref: 00404685
    • strcpy.MSVCRT ref: 004046F2
    • strtok.MSVCRT ref: 0040470D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcpy$_stricmpfputsstrncpystrrchrstrtok$fprintf
    • String ID: "$/bin$:$JRE paths:%s$JRE:Cannot use 64-bit runtime on 32-bit OS.$\bin$pathJreSearch()
    • API String ID: 851780383-2650538546
    • Opcode ID: 3de3fb3bba5b853eafdd9d637f89fe3f8979661adada45f13b6b3113cbb4ed2f
    • Instruction ID: 6f46c27e20929ee5c7d3c1125aed8da9d786691eb957c796904ee7d45a0181c0
    • Opcode Fuzzy Hash: 3de3fb3bba5b853eafdd9d637f89fe3f8979661adada45f13b6b3113cbb4ed2f
    • Instruction Fuzzy Hash: EE615BB05097049ACB10AF65D54469ABBE0AF84748F00C87FE6C8A7390DBBD9985CF5A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 114 405880-4058cf strlen call 40b3d0 memcpy call 405f80 119 4058d2 call 4054d0 114->119 120 4058d7-4058d9 119->120 121 4058e3-4058e8 120->121 122 4058db-4058e2 120->122 123 4058ea-4058fa 121->123 124 40593c-40595f strlen call 40b3d0 121->124 123->124 126 4058fc 123->126 129 40596e-405973 124->129 128 405900-405902 126->128 130 405904-405907 128->130 131 40590d-405910 128->131 134 405961-40596c 129->134 135 405975-405987 129->135 130->131 136 405c70-405c77 130->136 132 405c50-405c53 131->132 133 405916-405919 131->133 137 405dd9-405ddc 132->137 138 405c59-405c66 132->138 139 405de2-405df9 call 405880 133->139 140 40591f-405922 133->140 134->129 142 405989-40599c _strdup 134->142 135->129 135->142 136->131 141 405c7d 136->141 137->138 137->139 148 4059ac-4059ae 139->148 140->139 144 405928-40593a 140->144 141->124 142->122 145 4059a2-4059a7 call 4057b0 142->145 144->124 144->128 145->148 148->122 149 4059b4-4059ba 148->149 150 405d40-405d4f strlen 149->150 151 4059c0-4059c2 149->151 152 405d55-405d5b 150->152 153 405e4c-405e55 150->153 151->150 154 4059c8-4059d7 151->154 155 405d61-405d64 152->155 156 405e5a-405e60 152->156 158 405d99-405d9d 153->158 154->150 157 4059dd-4059f5 154->157 159 405d66 155->159 160 405d88-405d8d 155->160 156->158 161 405e2a-405e2d 157->161 162 4059fb-405a15 157->162 163 405da3-405db3 158->163 164 405e39-405e3d 158->164 159->156 166 405d70-405d76 160->166 167 405d8f-405d96 160->167 161->164 165 405a18-405a1c 162->165 168 405dc2-405dc5 163->168 169 405db5-405dc0 163->169 164->163 170 405e43 164->170 173 405a22-405a2e call 406380 165->173 174 405c1a-405c30 free 165->174 171 405d7c-405d80 166->171 172 405e1f-405e25 166->172 167->158 168->169 175 405dc7-405dcd 168->175 169->168 169->169 170->153 171->172 177 405d86 171->177 172->158 180 405d00-405d05 173->180 181 405a34-405a39 173->181 174->165 176 405c36-405c4b free 174->176 177->160 182 405e0a-405e11 180->182 183 405d0b-405d10 180->183 184 405dfe 181->184 185 405a3f-405a5f strlen 181->185 182->174 183->174 186 405d16-405d39 _errno 183->186 184->182 187 405a60-405a6a call 4065d0 185->187 186->174 191 405c00-405c03 call 406730 187->191 192 405a70-405a75 187->192 197 405c08-405c0d 191->197 193 405a77-405a7b 192->193 194 405a7d-405a8f call 405530 192->194 193->187 193->194 194->187 201 405a91-405abb strlen call 40b3d0 194->201 197->174 199 405c0f-405c15 call 405840 197->199 199->174 204 405ac1-405af9 memcpy strlen call 40b3d0 201->204 205 405c82-405cb0 memcpy 201->205 211 405b0d-405b12 204->211 206 405cf1 205->206 207 405cb2-405cb4 205->207 206->180 207->206 209 405cb6-405cce 207->209 212 405cd6-405ce0 call 405820 209->212 213 405b00-405b0b 211->213 214 405b14-405b26 211->214 220 405be7-405bf4 call 4065d0 212->220 213->211 215 405b28-405b36 _strdup 213->215 214->211 214->215 218 405ce5 215->218 219 405b3c-405b52 215->219 218->206 219->212 221 405b58-405b5d 219->221 220->192 229 405bfa 220->229 222 405b63-405b6d 221->222 223 405e16-405e18 221->223 225 405b83-405b8f 222->225 223->172 227 405b70-405b7f strcoll 225->227 228 405b91-405ba0 _stricoll 225->228 230 405b81 227->230 231 405ba2-405bb8 malloc 227->231 228->230 228->231 229->191 230->225 232 405bba-405bcc 231->232 233 405bdc-405be4 231->233 232->233 234 405bce-405bd3 232->234 233->220 235 405dd2-405dd4 234->235 236 405bd9 234->236 235->233 236->233
    APIs
    • strlen.MSVCRT ref: 00405894
    • memcpy.MSVCRT ref: 004058B8
      • Part of subcall function 00405F80: setlocale.MSVCRT ref: 00405F9B
      • Part of subcall function 00405F80: _strdup.MSVCRT ref: 00405FA9
      • Part of subcall function 00405F80: setlocale.MSVCRT ref: 00405FBF
      • Part of subcall function 00405F80: wcstombs.MSVCRT ref: 00405FE4
      • Part of subcall function 00405F80: realloc.MSVCRT ref: 00405FF8
      • Part of subcall function 00405F80: wcstombs.MSVCRT ref: 00406011
      • Part of subcall function 00405F80: setlocale.MSVCRT ref: 00406021
      • Part of subcall function 00405F80: free.MSVCRT ref: 00406029
      • Part of subcall function 004054D0: malloc.MSVCRT ref: 004054ED
    • strlen.MSVCRT ref: 00405944
    • _strdup.MSVCRT ref: 0040598C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: setlocale$_strdupstrlenwcstombs$freemallocmemcpyrealloc
    • String ID: \
    • API String ID: 1024038994-2967466578
    • Opcode ID: 39444ab6decfba6020a935124d071cd8fefbe59c871d0c9cd141de2c4125da59
    • Instruction ID: 4287339195e3f7e94b6462b235a1bab2e6cc6bb2b88dd4a0ec02ebb05ac0f211
    • Opcode Fuzzy Hash: 39444ab6decfba6020a935124d071cd8fefbe59c871d0c9cd141de2c4125da59
    • Instruction Fuzzy Hash: 8E025971A04A588FDB14DFA9D4846AFBBF1EF45304F58853ED885BB381E73898418F89
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 237 405f80-405fa4 setlocale 238 405fb0-405fc6 setlocale 237->238 239 405fa6-405fae _strdup 237->239 240 405fc8-405fcb 238->240 241 405fcd-40603a wcstombs realloc wcstombs setlocale free 238->241 239->238 240->241 242 406040-4060a6 mbstowcs call 40b3d0 mbstowcs 240->242 241->242 245 4060ac-4060b0 242->245 246 40619e-4061a4 242->246 248 4060b2-4060b6 245->248 249 4060bc-4060ca 245->249 247 4060d0-4060d7 246->247 252 4062d7-4062da 247->252 253 4060dd-4060e2 247->253 248->249 250 4061c6-4061d5 248->250 249->247 251 40631f-406325 249->251 250->247 255 4061db-4061f0 250->255 251->247 254 40632b-406330 251->254 252->241 256 4060f8-4060fc 253->256 259 406287-4062ab setlocale free 254->259 255->247 257 4060e4-4060e8 256->257 258 4060fe-406105 256->258 262 40610a-406111 257->262 263 4060ea-4060f4 257->263 260 406113-406117 258->260 261 406107 258->261 260->261 264 406119-40611c 260->264 261->262 262->260 262->261 265 4060f6 263->265 266 40612c-406131 263->266 264->266 267 40611e-40612a 264->267 265->256 268 4061b1-4061b6 266->268 269 406133-406138 266->269 267->265 267->266 272 4061f5-4061f8 268->272 273 4061b8-4061c0 268->273 270 406145-406148 269->270 271 40613a-40613f 269->271 275 40614b-406199 wcstombs realloc wcstombs 270->275 271->270 274 4062ff-40630f 271->274 278 406335-40633a 272->278 279 4061fe-406212 272->279 276 4061c2-4061c4 273->276 277 4061a9-4061ad 273->277 274->275 275->259 276->268 277->272 280 4061af 277->280 281 40634a-406355 278->281 282 40633c-406344 278->282 283 406218-406222 279->283 284 4062df-4062e3 279->284 280->268 281->279 286 40635b-406363 281->286 282->279 282->281 283->283 285 406224-406228 283->285 284->283 287 4062e9-4062f1 284->287 285->283 290 40622a-406232 285->290 286->279 291 406369-406370 286->291 288 4062f7-4062fa 287->288 289 406238 287->289 292 40623b 288->292 289->292 290->287 290->289 291->279 293 40623d-406240 292->293 294 406242-40624d 293->294 295 406263-406281 wcstombs 293->295 297 4062b2-4062b9 294->297 298 40624f-406256 294->298 295->259 296 406283 295->296 296->259 299 406314-406318 297->299 300 4062bb-4062bc 297->300 301 4062b0 298->301 302 406258-406261 298->302 303 4062c0-4062ca 299->303 304 40631a 299->304 300->303 301->297 302->294 302->295 303->303 305 4062cc-4062d0 303->305 304->293 305->303 306 4062d2 305->306 306->293
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: setlocale$wcstombs$_strdupfreerealloc
    • String ID: /
    • API String ID: 2293806352-2043925204
    • Opcode ID: 29e91a94cf8195a66427f98936d0d7a7a54ffaebb185864eb6c49eaef6982715
    • Instruction ID: ef4eae34b22c620e36e37fd6ba4cd3e3be8c918c437f2af2aaa4e50c12e44e23
    • Opcode Fuzzy Hash: 29e91a94cf8195a66427f98936d0d7a7a54ffaebb185864eb6c49eaef6982715
    • Instruction Fuzzy Hash: D9B16E70904215CACB20EFA9C4456AEB7F1FF54344F46847FE486BB391E3789891CB9A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 307 401d3a-401d94 call 40b3d0 GetEnvironmentVariableA strstr 310 401d96-401da8 strstr 307->310 311 401daa-401dc0 call 401cc3 307->311 310->311 313 401df8-401dff 310->313 317 401dc2-401dd9 strstr 311->317 318 401e3c-401e3e 311->318 315 401e01-401e14 fprintf 313->315 316 401e19-401e20 313->316 315->316 319 401e40 316->319 320 401e22-401e3a fprintf 316->320 321 401df2 317->321 322 401ddb-401def strstr 317->322 323 401e45-401e4c 318->323 319->323 320->319 321->313 322->321
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strstr$fprintf$EnvironmentVariable
    • String ID: Version:%s$--l4j-debug$--l4j-debug-all$3.50$CmdLine:%s %s$Launch4j$debug$debug-all
    • API String ID: 1078084263-4240183270
    • Opcode ID: 1a11980bc902c4222af1090661621f2c8b4f1336e07e54acdfb659ed28657474
    • Instruction ID: 240118571c359228ea942c7fd67ea7bcf76378698847c1fa79b3b71b01140d31
    • Opcode Fuzzy Hash: 1a11980bc902c4222af1090661621f2c8b4f1336e07e54acdfb659ed28657474
    • Instruction Fuzzy Hash: 12214BB09093059BD710AF76C54455EBBE4EF84348F00C83FE888A7391D7BDD8499B9A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 405 402657-40268e 406 402694-4026c0 strcpy call 402629 _stat64 405->406 407 402936-40293d 405->407 410 4026c2-4026d6 406->410 411 4026db-402784 406->411 412 40278a-40279c 410->412 411->412 413 4027c5-4027c7 412->413 414 40279e-4027c0 fprintf 412->414 415 4027c9-4027d8 SetLastError 413->415 416 4027dd-4027e4 413->416 414->413 415->407 417 4027f0-402824 strcpy call 4025e6 _stat64 416->417 418 4027e6-4027eb 416->418 421 402826-40283a 417->421 422 40283f-4028e8 417->422 418->407 423 4028ee-402900 421->423 422->423 424 402902-402924 fprintf 423->424 425 402929-40292b 423->425 424->425 425->418 426 402931 425->426 426->407
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _stat64fprintfstrcpy$ErrorLast
    • String ID: (OK)$(not found)$Check javac:%s %s$Check launcher:%s %s$bin\javac.exe
    • API String ID: 2531230949-2473518738
    • Opcode ID: 6b6e4e039725007883f195c48bb8c95687a85f23a6bde72dc0c748ae1f542035
    • Instruction ID: 24c5410039ecfdee54c700dd89ae99862b86a9d0cd2a4f3f9ec375766abd04bf
    • Opcode Fuzzy Hash: 6b6e4e039725007883f195c48bb8c95687a85f23a6bde72dc0c748ae1f542035
    • Instruction Fuzzy Hash: A9811774D056288BCB60DF25C98869AB7F1BF98310F1086EAD84CA3390D7749EC5CF49
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 427 404890-4048af call 40b3d0 call 401c58 432 4048b1-4048b3 427->432 433 4048b8-4048da call 4025a0 427->433 434 404ace-404ada 432->434 433->432 437 4048dc-4048f1 call 401d3a 433->437 437->432 440 4048f3-4048fb 437->440 441 404925-40496a call 401e4d call 40206e * 3 440->441 442 4048fd-404920 fprintf 440->442 451 404996-4049a2 call 403001 441->451 452 40496c-404973 441->452 442->441 451->434 456 4049a8-4049bb call 4030d5 call 404726 451->456 452->432 453 404979-404991 fprintf 452->453 453->434 460 4049c0-4049c2 456->460 460->432 461 4049c8-4049cf call 403352 460->461 461->432 464 4049d5-404a61 call 4033d0 call 4021ab call 402629 call 402e1f call 402e9d call 402a7b call 4034b3 call 403903 461->464 481 404a63-404a76 fprintf 464->481 482 404a7b-404a82 464->482 481->482 483 404a84-404a97 fprintf 482->483 484 404a9c-404aa4 482->484 483->484 485 404aa6-404ac4 fprintf 484->485 486 404ac9 484->486 485->486 486->434
    APIs
      • Part of subcall function 00401C58: GetModuleHandleA.KERNEL32 ref: 00401C6D
      • Part of subcall function 00401C58: strcpy.MSVCRT ref: 00401C8B
    • fprintf.MSVCRT ref: 00404920
    • fprintf.MSVCRT ref: 0040498C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$HandleModulestrcpy
    • String ID: Args length:%d/32768 chars$Error:%s$JNI:%s$Launcher args:%s$Launcher:%s$Startup error message not defined.$Yes
    • API String ID: 3713479259-1718269414
    • Opcode ID: 8ac4680c3350026231faa1d904766670af036b00e5e1b23834d43dad823cb963
    • Instruction ID: f520fc6a28f52f7e025b69a1e60a886e88e346874c2c6fec5a8b2c45fb7fc856
    • Opcode Fuzzy Hash: 8ac4680c3350026231faa1d904766670af036b00e5e1b23834d43dad823cb963
    • Instruction Fuzzy Hash: 32513FB1A087049AD710BF76C54515EBAE4AF80744F11CC3EA588AB3C1DBBCC985CB9E
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 487 404726-404734 488 404736-40473d 487->488 489 40474f-404768 call 402168 487->489 488->489 490 40473f-40474a fputs 488->490 493 40476a-404788 fprintf 489->493 494 40478d-4047a6 call 402168 489->494 490->489 493->494 497 4047a8-4047c6 fprintf 494->497 498 4047cb-4047fa call 40206e call 4023b8 494->498 497->498 503 404814-404843 call 40206e call 4023b8 498->503 504 4047fc-40480f fprintf 498->504 509 404845-404858 fprintf 503->509 510 40485d-40486f call 40449f 503->510 504->503 509->510 512 404874-404876 510->512 513 404888-40488f 512->513 514 404878-404881 call 404214 512->514 514->513 517 404883 call 40319c 514->517 517->513
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$fputs
    • String ID: Java max ver:%s$Java min ver:%s$Requires 64-Bit: %s$Requires JDK:%s$Yes$jreSearch()
    • API String ID: 1801251168-2968954267
    • Opcode ID: cf3487a34a4ca02be2a690f590e53343f7e3c1de17e3423f8611410f7b1d396e
    • Instruction ID: 0c6fb1b8f60470863c9a64685e8f5e014fedd77521014e1acee72daa591faa3e
    • Opcode Fuzzy Hash: cf3487a34a4ca02be2a690f590e53343f7e3c1de17e3423f8611410f7b1d396e
    • Instruction Fuzzy Hash: 0131EDB06053049AD704BF75D54565EBAE4AF84748F01C83EE588AB3D1DBBCC8849B9E
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 519 406380-406393 520 4065b2-4065bf _errno 519->520 521 406399-40639c 519->521 524 4064cf-4064d9 520->524 522 406581-40658e _errno 521->522 523 4063a2-4063c1 _fullpath 521->523 522->524 525 4064e0-4064f4 523->525 526 4063c7-4063db 523->526 525->525 528 4064f6-406517 525->528 526->526 527 4063dd-4063f5 526->527 529 4063f7-406412 malloc 527->529 528->529 530 40651d-40651f 528->530 532 4065a0-4065ad _errno 529->532 533 406418-406449 memcpy _findfirst 529->533 530->529 531 406525-40652e 530->531 534 406530-406544 531->534 532->524 535 406550-406570 _errno 533->535 536 40644f-4064c9 strncpy 533->536 534->534 537 406546 534->537 538 406572-40657c free 535->538 539 406593-40659e _errno 535->539 536->524 537->535 538->524 539->538
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _errno$_findfirst_fullpathmallocmemcpystrncpy
    • String ID:
    • API String ID: 114964343-0
    • Opcode ID: ac5dd1818a9ecdf6e06c42feb85a9514df4bdb9c2b0a224e921110a678da1f4c
    • Instruction ID: d87042495fe416e8182163f5e03ef9be9330b6b8c10a74b619a4bde9b2285889
    • Opcode Fuzzy Hash: ac5dd1818a9ecdf6e06c42feb85a9514df4bdb9c2b0a224e921110a678da1f4c
    • Instruction Fuzzy Hash: 83517D701147008BD360DF29C88539AB7E1EF89304F458A3ED89AD7295D77CA459CB5A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 540 4065d0-4065e3 541 4065e9-4065fd 540->541 542 40671d-406728 _errno 540->542 543 40667b-40668d strlen 541->543 544 4065ff-406621 _errno _findnext 541->544 545 40669b-4066a7 542->545 548 4066a8-4066b7 543->548 549 40668f-406692 543->549 546 406627-406679 strncpy 544->546 547 4066b8-4066c6 544->547 546->543 550 4066ef-4066f9 GetLastError 546->550 552 406712-40671b 547->552 553 4066c8-4066ce 547->553 549->548 551 406694 549->551 550->545 554 4066fb-406702 _errno 550->554 551->545 552->553 555 4066d0-4066dc 553->555 556 406704-406710 553->556 554->545 557 4066e7-4066ea 555->557 558 4066de-4066e3 555->558 556->555 557->550 559 4066ec 557->559 558->557 559->550
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _errno$ErrorLast_findnextstrlenstrncpy
    • String ID:
    • API String ID: 2306919634-0
    • Opcode ID: 52ebd991032f233f5bd36e8415cb99fdac9675b4ae3ad357f5c6709db5c6e44e
    • Instruction ID: c191b308396b233c4953d4c892610c2755b5371d9e2fa7c251b53b0bd6301074
    • Opcode Fuzzy Hash: 52ebd991032f233f5bd36e8415cb99fdac9675b4ae3ad357f5c6709db5c6e44e
    • Instruction Fuzzy Hash: 3F416E715042018FCB10DF68C4C129AB7E5EF85314F168A7EEC49AF386D339D955CBAA
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 560 4012b9 561 4012c0-4012c3 560->561 562 4014b0-4014b3 561->562 563 4012c9-4012cc 561->563 564 401235-401241 562->564 565 401500-401504 563->565 566 4012d2-4012d5 563->566 571 401336-401338 564->571 572 401247-40124a 564->572 567 4012f2 565->567 568 40150a-40150c 565->568 569 401422 566->569 570 4012db-4012ec 566->570 573 4012f4-4012fd 567->573 577 4012ff-401304 568->577 570->567 570->568 575 40155d-40155f 571->575 576 40133e 571->576 572->565 574 401250 572->574 573->573 573->577 574->561 578 401252-401255 574->578 584 401565-401567 575->584 581 401340-401349 576->581 579 4014a1-4014a4 577->579 580 40130a-40130e 577->580 582 4014b8-4014bf 578->582 583 40125b-401260 578->583 579->562 580->579 585 401314-401317 580->585 581->581 586 40134b-40134f 581->586 582->569 590 4014c5-4014c9 582->590 583->565 587 401266-401269 583->587 588 4014dc-4014de 584->588 585->579 589 40131d-401330 585->589 591 401351-401354 586->591 592 401356-401375 call 405e70 586->592 587->569 593 40126f-401273 587->593 595 4014e0-4014e4 588->595 596 4014ea-4014f9 588->596 589->571 589->572 590->584 594 4014cf 590->594 591->592 597 40137a-401394 591->597 592->597 599 401556 593->599 600 401279-40127c 593->600 601 4014d1-4014da 594->601 595->596 602 401295-4012a3 595->602 596->564 603 401396-4013d3 _setmode * 3 597->603 604 4013d8-40141d __p__fmode call 404e00 call 405060 __p__environ call 40ba30 _cexit ExitProcess 597->604 599->575 605 401280-401289 600->605 601->588 601->601 602->564 603->604 605->605 608 40128b-40128d 605->608 610 4012a5-4012b4 608->610 611 40128f-401293 608->611 610->561 610->564 611->602 611->610
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _setmode$ExitProcess__getmainargs__p__environ__p__fmode_cexit
    • String ID:
    • API String ID: 2438820944-0
    • Opcode ID: f6ba04b6fc30baa5b6245b36c1b88902cb96308c7c9d07e3cdfd209005c5df17
    • Instruction ID: 058210b3582aba625fc543f68b2c5d40d01c40b01c4658391f06578e9241cf30
    • Opcode Fuzzy Hash: f6ba04b6fc30baa5b6245b36c1b88902cb96308c7c9d07e3cdfd209005c5df17
    • Instruction Fuzzy Hash: B6412970A05304CFDB10DF79D980B5E7BE1AB58354F49897EE848E73A1E7399880CB5A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 615 4030d5-40312d GetCurrentDirectoryA call 40206e 618 403176-40317c 615->618 619 40312f-403160 strncpy call 4025e6 _chdir 615->619 619->618 622 403162-403171 fprintf 619->622 622->618
    APIs
    • GetCurrentDirectoryA.KERNEL32 ref: 0040310E
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • strncpy.MSVCRT ref: 00403140
      • Part of subcall function 004025E6: strcat.MSVCRT(?,?,?,?,00403151,?,?), ref: 00402612
    • _chdir.MSVCRT ref: 00403154
    • fprintf.MSVCRT ref: 00403171
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Resourcefprintf$CurrentDirectoryFindLoadLock_chdirstrcatstrncpy
    • String ID: Working dir:%s
    • API String ID: 3319590416-1807235602
    • Opcode ID: e1ebbde09c7e8ab75b28734c72d5f03353e95ae769957cef5839753ce583c119
    • Instruction ID: 026808b7f3a3021f0a290c55733d0e83f8868061d30f2bb03267eebfdc7edaac
    • Opcode Fuzzy Hash: e1ebbde09c7e8ab75b28734c72d5f03353e95ae769957cef5839753ce583c119
    • Instruction Fuzzy Hash: D41130B1508308ABD710AF69C98459EFBF8FF84344F41CC7EE488A7350D7B899848B56
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 623 405e70-405e85 624 405e94-405e9f call 405880 623->624 625 405e87-405e8e call 4054d0 623->625 628 405ea4-405ea9 624->628 625->624 630 405eb5-405eb9 628->630 631 405eab-405eb4 628->631 630->631 632 405ebb-405ed9 strlen call 40b3d0 630->632 635 405eed-405ef2 632->635 636 405ee0-405eeb 635->636 637 405ef4-405f06 635->637 636->635 638 405f08-405f23 _strdup call 405820 636->638 637->635 637->638
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _strdupmallocstrlen
    • String ID: glob-1.0-mingw32
    • API String ID: 3776109042-3253302226
    • Opcode ID: c7ef10c8fc13bf167dd354e22faae44c63f79e58ca2daf120f64f145e82a65e3
    • Instruction ID: d86937e87039ef58bea2ee39f29534f121709ac59445a58f53545eef5f8ad5e5
    • Opcode Fuzzy Hash: c7ef10c8fc13bf167dd354e22faae44c63f79e58ca2daf120f64f145e82a65e3
    • Instruction Fuzzy Hash: 68112CB2A046044BCB10AF65D8412AFBB65EE50314F54857FECD0673C2E3399A05CFE9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Messageprintf
    • String ID: %s: %s
    • API String ID: 351756659-482213395
    • Opcode ID: 086f5f872b72dbeab95df6729747531053729a0a7f1dba4ad9aba4c4c80d5050
    • Instruction ID: b0629b8bc2cc43963ad4c0c639e18c244297bc65686ed069ee9f23447f2e332f
    • Opcode Fuzzy Hash: 086f5f872b72dbeab95df6729747531053729a0a7f1dba4ad9aba4c4c80d5050
    • Instruction Fuzzy Hash: F6F0FE70409306EAD700AF24C45539E7FE0AB45348F50C93FE49966291D7B98588CB9F
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CommandHandleInfoLineModuleStartup
    • String ID:
    • API String ID: 1628297973-0
    • Opcode ID: 782236e8eab9c404dd8503ebedad9de7f052c1e6ef67b9c544d33eb725333c1b
    • Instruction ID: 683c93da681822c8bdd4e68fe4fc45ae700913e2caeef5859a1f0bbddea9d15c
    • Opcode Fuzzy Hash: 782236e8eab9c404dd8503ebedad9de7f052c1e6ef67b9c544d33eb725333c1b
    • Instruction Fuzzy Hash: 8921D8B2A4431849DF3066A984853BA7BA1DB16304F84007BDCD0662D5E37D59469EDF
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _errno_findclosefree
    • String ID:
    • API String ID: 531968878-0
    • Opcode ID: 59e2543e3a3937255b6a4c2bb656510cb1fb118bf1359fa9f59c552fbdc37ce2
    • Instruction ID: 6de2fcfc115aca7985e5ca6cb23da726c403cdd58cecdb5da52348a5a23120c8
    • Opcode Fuzzy Hash: 59e2543e3a3937255b6a4c2bb656510cb1fb118bf1359fa9f59c552fbdc37ce2
    • Instruction Fuzzy Hash: E7E0DFB16043404BCB007E3998C021636D4AF00368F0206BEEC81AB3C2E7388800839A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: HandleModule
    • String ID:
    • API String ID: 4139908857-0
    • Opcode ID: 9a6efc2665252e5eb1cd645efb8eab484d636dad40cbae3b16522a6a17c96558
    • Instruction ID: a41649d6ece103326572959801aa9f277788500120c795674a13f6bd8a530fc3
    • Opcode Fuzzy Hash: 9a6efc2665252e5eb1cd645efb8eab484d636dad40cbae3b16522a6a17c96558
    • Instruction Fuzzy Hash: A301F2B390436849DF205BA994853EABBE0EB05304F48446BDCD1622C5D37D19859B9E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __set_app_type.MSVCRT ref: 0040159A
      • Part of subcall function 00401180: SetUnhandledExceptionFilter.KERNEL32 ref: 004011B5
      • Part of subcall function 00401180: GetCommandLineA.KERNEL32 ref: 004011D4
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CommandExceptionFilterLineUnhandled__set_app_type
    • String ID:
    • API String ID: 3309298700-0
    • Opcode ID: d269e840212fe75b084e826f1cc98449c70ccffee4adaabc4c65867a7fe14721
    • Instruction ID: b22718cabd537c8ca27e3a27ecb8edd54fc76a2934aa30c17b0dddcd1df9cfe8
    • Opcode Fuzzy Hash: d269e840212fe75b084e826f1cc98449c70ccffee4adaabc4c65867a7fe14721
    • Instruction Fuzzy Hash: 29C09B314005159BC7047F24D405394F7B4FF04344F45852CD9A937051C77435198BE6
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Resource$fprintf$ErrorFindLastLoadLockfputs
    • String ID: %s$<NULL>$Resource %d:
    • API String ID: 2361679423-125972688
    • Opcode ID: 6e32c59fbe76ed510b56d79a5f7784b44f2d46ab26867308757d5ae487f133e5
    • Instruction ID: b2b282bdc40890864b5b2746fa73940b38df57dd9ecf847a3767f3fc8689b533
    • Opcode Fuzzy Hash: 6e32c59fbe76ed510b56d79a5f7784b44f2d46ab26867308757d5ae487f133e5
    • Instruction Fuzzy Hash: 91217171A083119BD700BF66CA487577BE4EB04744F04C87EEA84AB3D1D7B88841CB9A
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID:
    • String ID: $9$Infinity$NaN
    • API String ID: 0-197352145
    • Opcode ID: 2956a404b131339b250372750b6c8a1ac7e7600f652435563cff51a4aeb64e12
    • Instruction ID: dbb76cab8b1b16f7cf5d09354f639944b109cbe710cde7c6d68a2bfea417b997
    • Opcode Fuzzy Hash: 2956a404b131339b250372750b6c8a1ac7e7600f652435563cff51a4aeb64e12
    • Instruction Fuzzy Hash: D4C237B1A083419FD714DF29C58421BBBE0BB84354F148D2EE8D9A7392E779D8458F8B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00402168: strcmp.MSVCRT ref: 00402198
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
      • Part of subcall function 0040206E: SetLastError.KERNEL32 ref: 00402132
      • Part of subcall function 0040206E: fputs.MSVCRT ref: 0040215A
    • fprintf.MSVCRT ref: 00403566
    • fputs.MSVCRT ref: 00403593
    • strcat.MSVCRT(?,00000000,?,?,00404A4F,?,?,00000000,?,00401822), ref: 004035C7
    • strtok.MSVCRT ref: 0040360B
    • fprintf.MSVCRT ref: 00403632
    • strpbrk.MSVCRT ref: 00403642
    • strrchr.MSVCRT ref: 0040365A
    • strncpy.MSVCRT ref: 00403684
    • _findfirst.MSVCRT ref: 004036A7
    • strncpy.MSVCRT ref: 00403735
    • strcpy.MSVCRT(?,00000000,?,?,00404A4F,?,?,00000000,?,00401822), ref: 00403747
    • fprintf.MSVCRT ref: 00403774
    • _findnext.MSVCRT ref: 00403786
    • _findclose.MSVCRT ref: 004037A4
    • strncpy.MSVCRT ref: 0040381A
    • strcat.MSVCRT(?,00000000,?,?,00404A4F,?,?,00000000,?,00401822), ref: 0040387A
    • strcat.MSVCRT(?,00000000,?,?,00404A4F,?,?,00000000,?,00401822), ref: 004038A0
    • strcat.MSVCRT(?,00000000,?,?,00404A4F,?,?,00000000,?,00401822), ref: 004038B0
    • strcat.MSVCRT(?,00000000,?,?,00404A4F,?,?,00000000,?,00401822), ref: 004038B7
    • strncat.MSVCRT ref: 004038D1
      • Part of subcall function 004025E6: strcat.MSVCRT(?,?,?,?,00403151,?,?), ref: 00402612
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcat$fprintf$Resourcestrncpy$fputs$ErrorFindLastLoadLock_findclose_findfirst_findnextstrcmpstrcpystrncatstrpbrkstrrchrstrtok
    • String ID: " :%s$-classpath "$-jar "$0A$0A$0A$Add classpath:%s$Info:Classpath not defined.$Main class:%s$\
    • API String ID: 613304418-2540393707
    • Opcode ID: 6564128a6cc528ec5cb1b9d027dc0a7a37f9b8b73ccbb25743e7080770cadeb0
    • Instruction ID: bf63dada7832985e1febaaf2b1d8cbe36adb275f95a9fc3bdd2783700abf1d5b
    • Opcode Fuzzy Hash: 6564128a6cc528ec5cb1b9d027dc0a7a37f9b8b73ccbb25743e7080770cadeb0
    • Instruction Fuzzy Hash: 84B1EEB09153189BCB209F65C9849DEBBF4BF44704F0089AEE5C8A7391D7B896C4CF4A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcmp$strncat$strcatstrchr$CurrentDirectoryfprintf
    • String ID: %$EXEDIR$EXEFILE$HKEY$JREHOMEDIR$OLDPWD$PWD$Substitute:%s = %s
    • API String ID: 54753763-2002562290
    • Opcode ID: 94fd70767d738fff143135af240ead0c608938e38743d25e844e5498d7beb604
    • Instruction ID: a8c3753f6e64bff7cb0e6b833eb0b3127f56a9d06cf8f1ab9b577b30a68fd9b8
    • Opcode Fuzzy Hash: 94fd70767d738fff143135af240ead0c608938e38743d25e844e5498d7beb604
    • Instruction Fuzzy Hash: 39511DB09087059BD754AF25C94815EBBE4FF84344F00C87FE488A73C1DBB8D9899B9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • strstr.MSVCRT ref: 004021F5
    • strstr.MSVCRT ref: 00402209
    • strstr.MSVCRT ref: 0040221D
    • strstr.MSVCRT ref: 00402231
    • strstr.MSVCRT ref: 00402247
    • strchr.MSVCRT ref: 00402280
    • strrchr.MSVCRT ref: 00402293
    • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004022C6
    • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,00000000,?,?,00404563,00000001,00000000,000000B7,?), ref: 004022F2
    • RegQueryValueExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00404563), ref: 0040232B
    • RegCloseKey.ADVAPI32 ref: 00402343
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strstr$Open$CloseQueryValuestrchrstrrchr
    • String ID: HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$\
    • API String ID: 356245303-3439841907
    • Opcode ID: b68e94b4651e59875c23cbe767a162237a3e38a7b6a04e1972fb8d4ce0db7f60
    • Instruction ID: 099114257f5834d4dfd9dfbf971b1345a1aa800c6043e63931d92b8a70d085bf
    • Opcode Fuzzy Hash: b68e94b4651e59875c23cbe767a162237a3e38a7b6a04e1972fb8d4ce0db7f60
    • Instruction Fuzzy Hash: 68414F71909705DFC700AFA5C58475EBBE4AB44344F01897FE885AB381D7BD88448F9B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • fprintf.MSVCRT ref: 004042BA
    • CreatePipe.KERNEL32 ref: 00404302
    • fputs.MSVCRT ref: 00404322
    • SetHandleInformation.KERNEL32(?,?,?,?,00404874,?,?,00000000,?,00401822), ref: 00404347
    • fputs.MSVCRT ref: 00404367
    • CloseHandle.KERNEL32 ref: 00404375
    • strcpy.MSVCRT ref: 004043AC
    • fputs.MSVCRT ref: 00404405
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00404874,?,?,00000000,?,00401822), ref: 00404413
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00404874,?,?,00000000,?,00401822), ref: 00404464
    Strings
    • Cannot set handle information, xrefs: 00404360
    • Check Java Version: %s min=%s max=%s, xrefs: 004042AF
    • Cannot run java(w) -version, xrefs: 004043FE
    • Cannot create pipe, xrefs: 0040431B
    • "%s" -version, xrefs: 004043C3
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Handle$Closefputs$CreateInformationPipefprintfstrcpy
    • String ID: "%s" -version$Cannot create pipe$Cannot run java(w) -version$Cannot set handle information$Check Java Version: %s min=%s max=%s
    • API String ID: 571126077-3734277957
    • Opcode ID: 6ff35bc699c4434bbcb055b598f65245645bea7e341e1a5a77471e3fc549a602
    • Instruction ID: 01e741dbff6da5ac0ed7ecf63647694fc58ce104bdfefedce5b9c8226379a9fd
    • Opcode Fuzzy Hash: 6ff35bc699c4434bbcb055b598f65245645bea7e341e1a5a77471e3fc549a602
    • Instruction Fuzzy Hash: EF512EB1915B149BCB10AF65C44469EBBF4FF84344F00C87EE988A7380D7789A84CF9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • strcpy.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 004023CF
      • Part of subcall function 00402356: strchr.MSVCRT ref: 00402377
      • Part of subcall function 00402356: strchr.MSVCRT ref: 00402389
    • strncpy.MSVCRT ref: 0040243B
    • strcpy.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 00402462
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 00402481
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 004024A7
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 004024C3
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 004024E9
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 004024FE
    • fputs.MSVCRT ref: 00402545
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 0040255E
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 0040256E
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 0040257E
    • strcat.MSVCRT(?,?,?,?,?,?,?,00000000,000000B7,?,004047F3,?,?,00000000,?,00401822), ref: 0040258E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcat$strchrstrcpy$fputsstrncpy
    • String ID: 1.0_
    • API String ID: 2030749601-2140295588
    • Opcode ID: 34745bde1229345fe57035e0c9f1bdb61a38b0e33f141d83ce7dc8e3bef02a45
    • Instruction ID: c8cc6dbe12c22dde379ee278e671de4d24285e3bd24e64302c9b55a0a8e8a779
    • Opcode Fuzzy Hash: 34745bde1229345fe57035e0c9f1bdb61a38b0e33f141d83ce7dc8e3bef02a45
    • Instruction Fuzzy Hash: 6D5167708042089ECB10EFA5C9845AEBBF1FF44318F10C93EE895BB2C1D77898468F4A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    • ", xrefs: 00403C29
    • Cannot get version string: cannot find quote, xrefs: 00403C1D
    • 64-bit, xrefs: 00403C9C
    • Java version output: %s, xrefs: 00403BE2
    • Cannot get version string: missing end quote, xrefs: 00403C4A
    • 64-Bit, xrefs: 00403C83
    • Cannot get version string: data too large, xrefs: 00403C67
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strchrstrstr$FileReadfprintffputs
    • String ID: "$64-Bit$64-bit$Cannot get version string: cannot find quote$Cannot get version string: data too large$Cannot get version string: missing end quote$Java version output: %s
    • API String ID: 654744459-1675060857
    • Opcode ID: 156e2843adf327391821868efd350f7fbfbdc8521a23d9965e68f5c8307a01cc
    • Instruction ID: e8aa2acd962ab2fd5c8c0fc22ee4c0e01d98c506ce6ea6c951ee3204a80167ad
    • Opcode Fuzzy Hash: 156e2843adf327391821868efd350f7fbfbdc8521a23d9965e68f5c8307a01cc
    • Instruction Fuzzy Hash: C1413071A083059BD710AF39C94479ABBE8EF44745F01C87EE884F7381D778D9849B9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$strcpy$CloseEnumOpen
    • String ID: %s-bit search:%s...$Check:%s$Ignore:%s$Match:%s
    • API String ID: 3338988320-103288940
    • Opcode ID: 2de5386d3749ffbcccdce159ddb5600dcbeeb1ab2c6bc441cb082d33776583ec
    • Instruction ID: b939c929f63a7de0fdb388904b3839f18005a212951f29d3dd11f867c2209be8
    • Opcode Fuzzy Hash: 2de5386d3749ffbcccdce159ddb5600dcbeeb1ab2c6bc441cb082d33776583ec
    • Instruction Fuzzy Hash: FB51EAB09043199BCB10DF65C98469ABBF8FF84744F40C87EE988A7351D7789A85CF86
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strlen$_strdup
    • String ID: \
    • API String ID: 2848476203-2967466578
    • Opcode ID: 40266cb6b7e606f28f1ce6d171f8b793c7301e699fe6d1beae70279d47884b78
    • Instruction ID: 338fe63d1142efbbd1dd2a8cbea8508b5e0bced79ebd2ed05883e858327e80fd
    • Opcode Fuzzy Hash: 40266cb6b7e606f28f1ce6d171f8b793c7301e699fe6d1beae70279d47884b78
    • Instruction Fuzzy Hash: 8E9149B1A046088FDB14EF65D4847AEB7F1EF44314F55852EE845BB381E738A841CF89
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • fputs.MSVCRT ref: 0040411A
    • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,0040487D,?,?,00000000,?), ref: 004041CE
    • fprintf.MSVCRT ref: 00404208
    Strings
    • SOFTWARE\IBM\Java Development Kit, xrefs: 0040417F, 004041A9
    • SOFTWARE\IBM\Java Runtime Environment, xrefs: 00404173
    • SOFTWARE\JavaSoft\JDK, xrefs: 00404155
    • Runtime used:%s (%s-bit), xrefs: 004041FD
    • SOFTWARE\JavaSoft\JRE, xrefs: 00404149
    • SOFTWARE\IBM\Java2 Runtime Environment, xrefs: 0040419D
    • SOFTWARE\JavaSoft\Java Development Kit, xrefs: 00404134
    • findRegistryJavaHome(), xrefs: 00404113
    • SOFTWARE\JavaSoft\Java Runtime Environment, xrefs: 00404128
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintffputsstrcpy
    • String ID: Runtime used:%s (%s-bit)$SOFTWARE\IBM\Java Development Kit$SOFTWARE\IBM\Java Runtime Environment$SOFTWARE\IBM\Java2 Runtime Environment$SOFTWARE\JavaSoft\JDK$SOFTWARE\JavaSoft\JRE$SOFTWARE\JavaSoft\Java Development Kit$SOFTWARE\JavaSoft\Java Runtime Environment$findRegistryJavaHome()
    • API String ID: 1909795467-63838366
    • Opcode ID: 1c50ead3fb921290a0689db3b6edd9f7bed6fd35e6df379523e7a12ee7c8669d
    • Instruction ID: d12f84050712283ef0caac45d72fbda2f43e63f73d6c3a0a72d72ebe76e6f0a8
    • Opcode Fuzzy Hash: 1c50ead3fb921290a0689db3b6edd9f7bed6fd35e6df379523e7a12ee7c8669d
    • Instruction Fuzzy Hash: 4F2187B09153049ADB107FA5D80535A7BE0AB91308F41C93FA6847A3D5DBBD48C8CF9E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • strcat.MSVCRT ref: 00402ED1
    • strncpy.MSVCRT ref: 00402F02
    • strcat.MSVCRT ref: 00402F12
    • _open.MSVCRT ref: 00402F22
    • fprintf.MSVCRT ref: 00402F4C
    • _read.MSVCRT ref: 00402F82
    • strcat.MSVCRT ref: 00402FE3
    • _close.MSVCRT ref: 00402FF1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Resourcefprintfstrcat$FindLoadLock_close_open_readstrncpy
    • String ID: Loading:%s$l4j.ini
    • API String ID: 1951458220-28774081
    • Opcode ID: 6500996f953e90d402b07531e7880fd30e7e77e9bb9eaf60c5882c14693f788e
    • Instruction ID: e6a59ccfb4348ae7fdfb3dc021d56774ebb656fd3bd48e1e1ba4922efda9210c
    • Opcode Fuzzy Hash: 6500996f953e90d402b07531e7880fd30e7e77e9bb9eaf60c5882c14693f788e
    • Instruction Fuzzy Hash: 144194709043059BD7109F75C6483AEBBE0EF45394F54897EE988A73C1D7BCD8809B9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Virtual$Protectmemcpy$Queryabortfwritevfprintf
    • String ID: @$Mingw runtime failure:
    • API String ID: 978211760-2549925133
    • Opcode ID: 202b3489fbe21ffe6074641cc2764324021f8920e8ce36e99d4c120ec63bf990
    • Instruction ID: 9884236dd0ff3e00766b16e33be4efd070c970773d2926e11ecf1e6f517b4ba2
    • Opcode Fuzzy Hash: 202b3489fbe21ffe6074641cc2764324021f8920e8ce36e99d4c120ec63bf990
    • Instruction Fuzzy Hash: D231F4B5905308EFDB00EF6AD48459EFBF4EF88354F00882EE998A3351D77898448F86
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CloseHandle$fprintf$CreateProcess
    • String ID: Cannot create process %s$Create process: %s$D
    • API String ID: 991247836-3672066502
    • Opcode ID: 44a9ebc4f29dd275e19e668eb4d94abdf4c185c4c056473b7187bfc6ca55a02d
    • Instruction ID: 3006a752ac1b2f0d7f8f9d526bed630b8ad66a9ddf4ed0f0844996f609aba220
    • Opcode Fuzzy Hash: 44a9ebc4f29dd275e19e668eb4d94abdf4c185c4c056473b7187bfc6ca55a02d
    • Instruction Fuzzy Hash: 0431CBB1904304DBDB00EF69D45479EBBF8FF88348F00882EE958A7391D77995488F9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: wcstombs$mbstowcs$freereallocsetlocale
    • String ID: /
    • API String ID: 2027400679-2043925204
    • Opcode ID: 06c86813c71c67ec2b1ef2b73ab138173f94e706e0f547e821152b96c49dd03f
    • Instruction ID: dbdb09d2e49c637d055f1a091daabc9124cb30004860345a232a416a3289bb7a
    • Opcode Fuzzy Hash: 06c86813c71c67ec2b1ef2b73ab138173f94e706e0f547e821152b96c49dd03f
    • Instruction Fuzzy Hash: C84129759042198BCB10EF69C0416AEF7F1FF88340F45856FE885B7391E77898518B9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • strcpy.MSVCRT ref: 00403A69
    • strcat.MSVCRT ref: 00403A79
    • strcat.MSVCRT ref: 00403A89
    • strcat.MSVCRT ref: 00403A99
    • CreateProcessA.KERNEL32 ref: 00403AE6
    • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,00000000,?,00401B58), ref: 00403B08
    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00403B1B
      • Part of subcall function 004039ED: CloseHandle.KERNEL32 ref: 004039FB
      • Part of subcall function 004039ED: CloseHandle.KERNEL32(00000000), ref: 00403A09
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcat$CloseHandleProcess$CodeCreateExitObjectSingleWaitstrcpy
    • String ID: D
    • API String ID: 3105771607-2746444292
    • Opcode ID: 8a3474058418f01a79e41f1e2f626a7043a5e5ccd7006143ff001d79813bd500
    • Instruction ID: 3df40940e8432ce9284b6fea613a2f7888b8acc634e22e3942a9b99661cca235
    • Opcode Fuzzy Hash: 8a3474058418f01a79e41f1e2f626a7043a5e5ccd7006143ff001d79813bd500
    • Instruction Fuzzy Hash: B6312DB14093049FD710AF15C54436FBBF4EB84318F40C92EE488AB391DB799989CF9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: AddressCurrentHandleModuleProcProcessfprintf
    • String ID: IsWow64Process$WOW64:%s$Yes$kernel32
    • API String ID: 24026888-2598006572
    • Opcode ID: 4d68c35bc7673b327c6e9748294b050cf96d391d96f91c4c823ca62e5cf1f564
    • Instruction ID: 0dbb2e1e3f4b8ff3b0d60c87df776afcaeee342ada2e56ea3d16539466c2c780
    • Opcode Fuzzy Hash: 4d68c35bc7673b327c6e9748294b050cf96d391d96f91c4c823ca62e5cf1f564
    • Instruction Fuzzy Hash: E8F01DB05043489ED7047FB5D84551B7AE8EB84708F10C83EE548A7291D779D884575E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • strcat.MSVCRT(?,00000000,?,?,00404A5A,?,?,00000000,?,00401822), ref: 00403950
    • strcat.MSVCRT(?,00000000,?,?,00404A5A,?,?,00000000,?,00401822), ref: 00403960
    • strcpy.MSVCRT(?,00000000,?,?,00404A5A,?,?,00000000,?,00401822), ref: 00403971
    • strstr.MSVCRT ref: 00403981
    • strchr.MSVCRT ref: 00403997
    • strcat.MSVCRT ref: 004039CD
    • strcat.MSVCRT ref: 004039DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcat$Resource$fprintf$FindLoadLockstrchrstrcpystrstr
    • String ID: $--l4j-
    • API String ID: 3962799999-2912585538
    • Opcode ID: 324bd260140970f8cb80dcf07fa8b1b48f5031bab3856de975eef6cf38d9d5e5
    • Instruction ID: d86d6bac42e11a723af3e38eb1e774dd3d214982ac7ad35cb17906f1e13af449
    • Opcode Fuzzy Hash: 324bd260140970f8cb80dcf07fa8b1b48f5031bab3856de975eef6cf38d9d5e5
    • Instruction Fuzzy Hash: 1A214FB04093049AD7206F66854436EBEE8AF81714F05C87FA4C8A72C1D7BD8988DB9B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • strcat.MSVCRT ref: 004031D6
    • strcat.MSVCRT ref: 004031EA
    • strcat.MSVCRT ref: 00403207
    • strcat.MSVCRT ref: 0040321B
    • strcat.MSVCRT ref: 00403238
    • strcat.MSVCRT ref: 0040327E
    • strcat.MSVCRT ref: 0040328E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcat$Resource$fprintf$FindLoadLock
    • String ID: (64-bit)$ -
    • API String ID: 2267084178-2895498852
    • Opcode ID: 73a27253a1d9cce557c46d00cb91e28e8f48ed9c1a34b081921d08c64a598965
    • Instruction ID: 09907799204a2b68986263d62de9c25d620fdfe5dfd06028c6549d32c673b362
    • Opcode Fuzzy Hash: 73a27253a1d9cce557c46d00cb91e28e8f48ed9c1a34b081921d08c64a598965
    • Instruction Fuzzy Hash: 4621B6B0819341AAE7116F5595192AEBAE4AF80708F01C86FD5C4272D1CBFD49C8DBAF
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • strtok.MSVCRT ref: 00403424
    • strchr.MSVCRT ref: 0040343A
      • Part of subcall function 00402A7B: strchr.MSVCRT ref: 00402ACE
      • Part of subcall function 00402A7B: strchr.MSVCRT ref: 00402AFD
      • Part of subcall function 00402A7B: strncat.MSVCRT ref: 00402B25
      • Part of subcall function 00402A7B: strncat.MSVCRT ref: 00402B4D
      • Part of subcall function 00402A7B: strcmp.MSVCRT ref: 00402B6A
      • Part of subcall function 00402A7B: strncat.MSVCRT ref: 00402B84
      • Part of subcall function 00402A7B: strcmp.MSVCRT ref: 00402B99
      • Part of subcall function 00402A7B: strcat.MSVCRT ref: 00402C7F
      • Part of subcall function 00402A7B: fprintf.MSVCRT ref: 00402CA0
      • Part of subcall function 00402A7B: strcat.MSVCRT(?,00000000,?,?,00404563,00000001,00000000,000000B7,?,00404874,?,?,00000000,?,00401822), ref: 00402CB8
    • fprintf.MSVCRT ref: 00403480
    • SetEnvironmentVariableA.KERNEL32(?,?), ref: 0040348C
    • strtok.MSVCRT ref: 004034A2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$Resourcestrchrstrncat$strcatstrcmpstrtok$EnvironmentFindLoadLockVariable
    • String ID: =$Set var:%s = %s
    • API String ID: 3861738652-24686798
    • Opcode ID: ef20f33879f290eaae31b3fd09d33172aef78c4e4380af2f2bfc46b0946ee58f
    • Instruction ID: 3ec13cc95b499d9f319ec9d1fe1beb8d0880a979b0ad09246d7046286d1adb68
    • Opcode Fuzzy Hash: ef20f33879f290eaae31b3fd09d33172aef78c4e4380af2f2bfc46b0946ee58f
    • Instruction Fuzzy Hash: 07212F718087189FC711AF25C48468EBBF4FF84754F01C87EE489A7381D7B88A459BDA
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • fprintf.MSVCRT ref: 0040305A
    • CreateMutexA.KERNEL32 ref: 00403092
    • GetLastError.KERNEL32 ref: 0040309A
    • fprintf.MSVCRT ref: 004030C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$Resource$CreateErrorFindLastLoadLockMutex
    • String ID: Create mutex:%s$Error:%s$Instance already exists.
    • API String ID: 891584312-2614424452
    • Opcode ID: 8038696ccd142a534505979f791e031c8a291c32fdb7ed26f7ee5de89c305d0e
    • Instruction ID: 1f4c1eaa82f4060830f2c0f32ca48a780e5aa8165ae46bea8d59ee0f5803b43f
    • Opcode Fuzzy Hash: 8038696ccd142a534505979f791e031c8a291c32fdb7ed26f7ee5de89c305d0e
    • Instruction Fuzzy Hash: 62114F719053088AE720AF75C84574EBBF5EF80704F00C87ED48CB7395D7B99A888B4A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 004021AB: atoi.MSVCRT ref: 004021D3
    • fprintf.MSVCRT ref: 00402D81
    • fprintf.MSVCRT ref: 00402DC3
    • strcat.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,00402E6A), ref: 00402DD5
    • _itoa.MSVCRT ref: 00402DFC
    Strings
    • Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB, xrefs: 00402DB4
    • Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB, xrefs: 00402D76
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$_itoaatoistrcat
    • String ID: Heap %s:Requested %d MB / %d%%, Available: %d MB, Heap size: %d MB$Heap limit:Reduced %d MB heap size to 32-bit maximum %d MB
    • API String ID: 2922754228-3040617333
    • Opcode ID: 918653d39c195f357f14f90cc5a83aee57f61a1c160bdbb060af1e2d2a3e4856
    • Instruction ID: b96a5499c86e2501b1b4687ab3327843e8a336129cde26e5737633cb2b7b499e
    • Opcode Fuzzy Hash: 918653d39c195f357f14f90cc5a83aee57f61a1c160bdbb060af1e2d2a3e4856
    • Instruction Fuzzy Hash: 5041F9B5A047099BCB04DF69C58469EBBF4EF88354F10C83EE944A7390D778D8458FA5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ShowWindow.USER32 ref: 00401606
    • KillTimer.USER32(00000000,00000000), ref: 0040162D
      • Part of subcall function 00401F36: GetLastError.KERNEL32 ref: 00401F3D
      • Part of subcall function 00401F36: fprintf.MSVCRT ref: 00401F60
      • Part of subcall function 00401F36: FormatMessageA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401F9F
      • Part of subcall function 00401F36: fprintf.MSVCRT ref: 00401FC2
      • Part of subcall function 00401F36: strcat.MSVCRT ref: 00401FD6
      • Part of subcall function 00401F36: strcat.MSVCRT ref: 00401FE9
      • Part of subcall function 00401F36: LocalFree.KERNEL32 ref: 00401FF1
      • Part of subcall function 00401F36: fprintf.MSVCRT ref: 00402028
      • Part of subcall function 00401F36: ShellExecuteA.SHELL32 ref: 0040205C
    • PostQuitMessage.USER32(00000000), ref: 00401640
    • EnumWindows.USER32 ref: 00401668
    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0040167F
    • KillTimer.USER32 ref: 004016B4
    • PostQuitMessage.USER32(00000000), ref: 004016C2
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Messagefprintf$KillPostQuitTimerstrcat$CodeEnumErrorExecuteExitFormatFreeLastLocalProcessShellShowWindowWindows
    • String ID:
    • API String ID: 3625041480-0
    • Opcode ID: 58dfb5ebc8f86ec5701fb2e5a533e7cf4fe2df1a8f8ff1d809d73ff33d617007
    • Instruction ID: 50cd0177247bc64fdd0427adbd308ef8a0a0659d826e296ea7324a0b65c46f2b
    • Opcode Fuzzy Hash: 58dfb5ebc8f86ec5701fb2e5a533e7cf4fe2df1a8f8ff1d809d73ff33d617007
    • Instruction Fuzzy Hash: 0B21E8B0105305DBD710AF25ED49B6A7BE8EB14348F04893EE480A72E1D7BD9884CB6E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • strcpy.MSVCRT ref: 0040337C
    • strcat.MSVCRT ref: 0040338C
      • Part of subcall function 004032B9: GetEnvironmentVariableA.KERNEL32(?,00000000,?,?,00403399), ref: 004032F5
      • Part of subcall function 004032B9: strcat.MSVCRT(?,?,00403399), ref: 00403324
      • Part of subcall function 004032B9: strcat.MSVCRT(?,?,00403399), ref: 00403333
      • Part of subcall function 004032B9: SetEnvironmentVariableA.KERNEL32(?,?,00403399), ref: 00403343
    • fprintf.MSVCRT ref: 004033BE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcat$EnvironmentVariable$fprintfstrcpy
    • String ID: Error:%s$\bin$appendToPathVar failed.
    • API String ID: 4002749114-3685084685
    • Opcode ID: 32c48cab8f2bb47bb4a523018c08e237e67254d927d0fffb13c59598ce9b388a
    • Instruction ID: a6e49bf5e468cc694fd20e402aa1819437a355fb40fcd76aae32b06a45a3a6aa
    • Opcode Fuzzy Hash: 32c48cab8f2bb47bb4a523018c08e237e67254d927d0fffb13c59598ce9b388a
    • Instruction Fuzzy Hash: E9F044715183044BD710AF65D5412AE7BE59FC1704F01C83ED9886B380DBBD95998B8B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: signal
    • String ID:
    • API String ID: 1946981877-0
    • Opcode ID: d1ee1be7c3420bf09eeede14ca8e6c34e224ea776cae3f46f88c592e957151fa
    • Instruction ID: 4cadb046b36af996b1d1f2cf527b2353056622184eb83a27ca2ebd8e6865ad1e
    • Opcode Fuzzy Hash: d1ee1be7c3420bf09eeede14ca8e6c34e224ea776cae3f46f88c592e957151fa
    • Instruction Fuzzy Hash: 3F21EC701082448AD7106F79858472B76D0AF46328F114A3BE5E9E77E1C7BEC8C59B5B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CloseOpenQueryValuestrcpy
    • String ID: JavaHome
    • API String ID: 1410419071-2033683150
    • Opcode ID: a81f4f9dc3a1d61cc8afe0be9ae05c1be234e21f248e322f42947556999d8126
    • Instruction ID: bd454ce830a56a602a8766d1f7cd4e947d2f03486a263cfd597384e2f0d6c919
    • Opcode Fuzzy Hash: a81f4f9dc3a1d61cc8afe0be9ae05c1be234e21f248e322f42947556999d8126
    • Instruction Fuzzy Hash: A02175705053199FDB20DF69D98479AFBF4EB48304F00887EE988A3340D7B899898F96
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strcmp$fprintf
    • String ID: Ignore$Version string: %s / %s-Bit (%s)
    • API String ID: 512415533-1929821993
    • Opcode ID: a083bb2088dd92846d9d0cc6c5db1bfa6cb82e22ea4d85e67aa72f732297f2c9
    • Instruction ID: a308aaa70cdc7c99e6cc35e3197b585a9af99593057eae588ba8e59894b27b33
    • Opcode Fuzzy Hash: a083bb2088dd92846d9d0cc6c5db1bfa6cb82e22ea4d85e67aa72f732297f2c9
    • Instruction Fuzzy Hash: 36115171605745ABD7105FAAD884357BEE8AB84309F04C53FE988573D0D7B8C9888BCE
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetEnvironmentVariableA.KERNEL32(?,00000000,?,?,00403399), ref: 004032F5
    • strcat.MSVCRT(?,?,00403399), ref: 00403324
    • strcat.MSVCRT(?,?,00403399), ref: 00403333
    • SetEnvironmentVariableA.KERNEL32(?,?,00403399), ref: 00403343
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: EnvironmentVariablestrcat
    • String ID: Path
    • API String ID: 194762557-2875597873
    • Opcode ID: 4e501c9781179ad70e6ec4900027c91821c103ba319cf1e7f9fd3aefabda63be
    • Instruction ID: 9ee655bba7f4b95a13a94f6b6184e2646f9d4ed479972dc6f58929c70fabdcf9
    • Opcode Fuzzy Hash: 4e501c9781179ad70e6ec4900027c91821c103ba319cf1e7f9fd3aefabda63be
    • Instruction Fuzzy Hash: 5A018472D052149BC710BF69D84545EBBE8EF80750F00C93EF888B7281CB7999448BD6
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: free$_strdup_stricollmalloc
    • String ID:
    • API String ID: 1482192206-0
    • Opcode ID: fa1a3a1c7293af21a5bdabd5d85a8924aee9ec680419855745ef2d36f71ba0b9
    • Instruction ID: 0c6198cb73fcb15dcbff579bc24d052ca6a8ea50e1a1f1f35e22a27e58772e65
    • Opcode Fuzzy Hash: fa1a3a1c7293af21a5bdabd5d85a8924aee9ec680419855745ef2d36f71ba0b9
    • Instruction Fuzzy Hash: F241F571E056188FDB14AF65D8807AEBBF1FF54704F15842EE895AB381E738A840CF99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • InterlockedExchange.KERNEL32 ref: 0040A773
    • InitializeCriticalSection.KERNEL32 ref: 0040A786
    • InitializeCriticalSection.KERNEL32 ref: 0040A795
    • EnterCriticalSection.KERNEL32 ref: 0040A7C0
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CriticalSection$Initialize$EnterExchangeInterlocked
    • String ID:
    • API String ID: 33273390-0
    • Opcode ID: 9094809fcfd36ec149a913ec7d06249b0405fa4375e1a0609fcf41aa07456243
    • Instruction ID: 8978e4663f07e4eabd78e94cf7698e3e81c016ad33f91651ac53295973909b3b
    • Opcode Fuzzy Hash: 9094809fcfd36ec149a913ec7d06249b0405fa4375e1a0609fcf41aa07456243
    • Instruction Fuzzy Hash: D10170F09113008ADB10BB65968665F7AB1AB40308F10C03ED5816B796E3BCD9D8CB9F
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: atoisetlocalestrchr
    • String ID: .
    • API String ID: 1223908000-248832578
    • Opcode ID: 3270f91f7922ab3b5d7aa57701077556a37b0b53f039c661556303982f2fd5de
    • Instruction ID: 59b94eea45fc45cca61a0dd7a439114e1de0c739a0487efca54ac24f97a75736
    • Opcode Fuzzy Hash: 3270f91f7922ab3b5d7aa57701077556a37b0b53f039c661556303982f2fd5de
    • Instruction Fuzzy Hash: 1C41E4B5A083058FC710DFA9D88461BFBE0EB84754F04883EE89997340E7B9D9549B8B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: atoisetlocalestrchr
    • String ID: .
    • API String ID: 1223908000-248832578
    • Opcode ID: a8b9106fde2d983b4bf634a459b582d0d7432c50519f31b79c7f225c892b1153
    • Instruction ID: 3ec6e69c29ba00536f2ce63c0d32a49914501dcd30d8e5bff3086fc1ab73a18b
    • Opcode Fuzzy Hash: a8b9106fde2d983b4bf634a459b582d0d7432c50519f31b79c7f225c892b1153
    • Instruction Fuzzy Hash: CC414EB66083058BC3109FA9D48066BF7E4EB88354F19483FF988D7391E2B9DC459B96
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: atoisetlocalestrchr
    • String ID: .
    • API String ID: 1223908000-248832578
    • Opcode ID: d3af92e3cc376c7eea1e32a94e1db5e082592ef3f1495720b547aee6e6023a19
    • Instruction ID: 3ca11e63642a12c279f462a5a6fb6f23286a3cfc4b697b85424e89a509c2f3a4
    • Opcode Fuzzy Hash: d3af92e3cc376c7eea1e32a94e1db5e082592ef3f1495720b547aee6e6023a19
    • Instruction Fuzzy Hash: 3B0113B5A083048FC700AF2AD48561BFBE4FFC9754F01882EE88897350D779D8408B86
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: atoisetlocalestrchr
    • String ID: .
    • API String ID: 1223908000-248832578
    • Opcode ID: 3fd6088e8158c89e5a3430864840c513b01eb40df900bbc371d7f266f049c3b6
    • Instruction ID: a7ef87725b9dcf44717deb7ffc122926462050dec49db7d39ec114503dfababd
    • Opcode Fuzzy Hash: 3fd6088e8158c89e5a3430864840c513b01eb40df900bbc371d7f266f049c3b6
    • Instruction Fuzzy Hash: FC01C4B8A093048FC700AF29D48521BBBE4BF89304F01892EF889D7350E779D9448B87
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: atoisetlocalestrchr
    • String ID: .
    • API String ID: 1223908000-248832578
    • Opcode ID: ba61b7d8ee88fea6a6b806d43f20f11430b8b353efbf4e71f162ba6863726cdf
    • Instruction ID: 5ba0300438d0ac068fe45ac81f85b4fbc570726fa1613f38a85816e8b9f6d1c2
    • Opcode Fuzzy Hash: ba61b7d8ee88fea6a6b806d43f20f11430b8b353efbf4e71f162ba6863726cdf
    • Instruction Fuzzy Hash: 43F0A9B2A093049FD700AF6AD48521BBBE4FFC4314F04882EF48897381D778D840DB96
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GlobalMemoryStatusEx.KERNEL32 ref: 00402E36
      • Part of subcall function 00402CCE: fprintf.MSVCRT ref: 00402D81
      • Part of subcall function 00402CCE: fprintf.MSVCRT ref: 00402DC3
      • Part of subcall function 00402CCE: strcat.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,00402E6A), ref: 00402DD5
      • Part of subcall function 00402CCE: _itoa.MSVCRT ref: 00402DFC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fprintf$GlobalMemoryStatus_itoastrcat
    • String ID: -Xms$-Xmx$@
    • API String ID: 1064291243-2676391021
    • Opcode ID: 071b1f9e0216fa77da666e2e75bcce91bc5b84a573770bc5839819a6b47cd2c1
    • Instruction ID: bc242c044632792b171e6d0f9fa9c1d09a4762a676b1e6f1e2c00bedfff1742a
    • Opcode Fuzzy Hash: 071b1f9e0216fa77da666e2e75bcce91bc5b84a573770bc5839819a6b47cd2c1
    • Instruction Fuzzy Hash: D40184B0909309AFDB00EF95D18564EBBF4AF88308F10882DE588A7380D3B899499B56
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: fopenstrcatstrncpy
    • String ID: \launch4j.log
    • API String ID: 1410583167-1044402884
    • Opcode ID: eb22b3b9a31237926c538f78d3858c95965968eae31f3f570c49f1244c93e501
    • Instruction ID: 6ef1316ed9d2cad65e71f5130712ffe27c73cf4c172c8ebb0c53ab12c04cd51b
    • Opcode Fuzzy Hash: eb22b3b9a31237926c538f78d3858c95965968eae31f3f570c49f1244c93e501
    • Instruction Fuzzy Hash: 9FF01CB59043089FC720AF69D4411ADFBE4EF94308F01CC2EA58CA7351D7B999998B8B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsDBCSLeadByteEx.KERNEL32 ref: 0040A0A1
    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A25A), ref: 0040A0E0
    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A25A), ref: 0040A180
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Byte$CharMultiWide$Lead
    • String ID:
    • API String ID: 2933009993-0
    • Opcode ID: 4cc1ac304da61fa0f05acc38741b36de605b1d562b0ba7cbf89b49dbb5342f41
    • Instruction ID: f878ae1d2f86e9673b3fc4fe241f4898e596f67a39ad2dcb2de0cfc4edaf13fb
    • Opcode Fuzzy Hash: 4cc1ac304da61fa0f05acc38741b36de605b1d562b0ba7cbf89b49dbb5342f41
    • Instruction Fuzzy Hash: F9416C759083059FDB10DF69C44039EBBE0EF45368F00856EE8989B380D379D964CB87
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: _errno_findclose_findfirststrncpy
    • String ID:
    • API String ID: 1756046557-0
    • Opcode ID: 47e5dec0858019fab288049e4bde0f5d8ec638908c8f914f36d308cd68aa0a68
    • Instruction ID: f1a5818ff41c5277f722d0bf63fffd872353918378df782a456789fb1828a578
    • Opcode Fuzzy Hash: 47e5dec0858019fab288049e4bde0f5d8ec638908c8f914f36d308cd68aa0a68
    • Instruction Fuzzy Hash: 5F318DB69153008BCB10EF24C481296BBE1AF88314F158A7EEC899F386E778D554CB96
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: strlenwcslen
    • String ID: (null)$(null)
    • API String ID: 803329031-1601437019
    • Opcode ID: 755b17e9435e443b416313464ba19ab178ffaaa3ad23898636c58324f7eff690
    • Instruction ID: e1d2258b7b43fd080b19de6069f7093c7622ad11fda81158090099896dc83125
    • Opcode Fuzzy Hash: 755b17e9435e443b416313464ba19ab178ffaaa3ad23898636c58324f7eff690
    • Instruction Fuzzy Hash: DE116D706087458BC710DF24C5C062BB7E1AF88300F504A3EE9D1AB3C2DB39D90A8B56
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 0040209D
      • Part of subcall function 0040206E: FindResourceExA.KERNEL32 ref: 004020C1
      • Part of subcall function 0040206E: LoadResource.KERNEL32 ref: 004020D9
      • Part of subcall function 0040206E: LockResource.KERNEL32 ref: 004020E7
      • Part of subcall function 0040206E: fprintf.MSVCRT ref: 00402124
    • FindWindowExA.USER32 ref: 0040179D
    • GetWindowTextA.USER32 ref: 004017BA
    • strstr.MSVCRT ref: 004017C9
    • FindWindowExA.USER32 ref: 004017ED
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: FindResourceWindow$fprintf$LoadLockTextstrstr
    • String ID:
    • API String ID: 2277964966-0
    • Opcode ID: 85f9ae7a374bb356a8490ad1413b21033b20bafa4b6f5419c7aa4fcb7108217d
    • Instruction ID: 0206b14cbbe15eff5e0745b06f001f13997dc788e4fb818a840818c5a2b78433
    • Opcode Fuzzy Hash: 85f9ae7a374bb356a8490ad1413b21033b20bafa4b6f5419c7aa4fcb7108217d
    • Instruction Fuzzy Hash: 5C115EB19083059AE710AF69C54539FFBE4EF84348F00883EE988A7291D7BD95489F97
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    • VirtualQuery failed for %d bytes at address %p, xrefs: 00404DE7
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: Virtual$Protectmemcpy$Query
    • String ID: VirtualQuery failed for %d bytes at address %p
    • API String ID: 228986436-2206166143
    • Opcode ID: 599342b8fcc1dac55810bcf0207243e2523d629254a73455696a29d7d9e59f67
    • Instruction ID: f07a9ee0f6d5a40c0601b72032257670a0e4f463a0d257c6d32f085c030ec0f2
    • Opcode Fuzzy Hash: 599342b8fcc1dac55810bcf0207243e2523d629254a73455696a29d7d9e59f67
    • Instruction Fuzzy Hash: 77014FB19043059BD710AF65D48179EFBE8FFC4744F45883FE988A3251D778E8448B96
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: HandleModulestrcpy
    • String ID: Launch4j
    • API String ID: 122033455-841392896
    • Opcode ID: b498556efc7d9145b01c0ca6f2fcb3ae92a60ca972750d71c2624420ce5232a1
    • Instruction ID: f1b9d722f4717ffcde7627e04545aae764529b60bc994cd72755b13e78f56b46
    • Opcode Fuzzy Hash: b498556efc7d9145b01c0ca6f2fcb3ae92a60ca972750d71c2624420ce5232a1
    • Instruction Fuzzy Hash: 1AF0C0B06053448AE700AF25D9557967FE4E704308F40C43ED8849B3A1EBBDC9889BDE
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(?,?,?,00000000,?,00401822), ref: 004025BE
    • strrchr.MSVCRT ref: 004025D5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: FileModuleNamestrrchr
    • String ID: \
    • API String ID: 3219412323-2967466578
    • Opcode ID: f9a69eec61a8ea6980a1876ce36b37117878024588dbd4712645da03dfd326de
    • Instruction ID: bf9ae0b5b0848c05b8397682a605a95d708ec562a16bdae5073891b22b41f200
    • Opcode Fuzzy Hash: f9a69eec61a8ea6980a1876ce36b37117878024588dbd4712645da03dfd326de
    • Instruction Fuzzy Hash: 28E092B050470AABCB00FF39CEC550A7FE4AB04358F00853EE989572C1C374D844CB9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeavefree
    • String ID:
    • API String ID: 4020351045-0
    • Opcode ID: 06dbfda76d716d931dadb8ba255f964557a56025f829b788966d99287c466e03
    • Instruction ID: 2133d77c9e8ea4f0574ce106fd9849bc4c6ee41edb9da7885afa25666f5e1d1f
    • Opcode Fuzzy Hash: 06dbfda76d716d931dadb8ba255f964557a56025f829b788966d99287c466e03
    • Instruction Fuzzy Hash: 460152707002058FC700EF64D48165ABBE0EB49308B15857ED545DB342EB78DD84DF9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1709224570.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1709206276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709244602.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709259872.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1709274791.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_125.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeaveValue
    • String ID:
    • API String ID: 682475483-0
    • Opcode ID: f840290e0bba7e48b91d022f11001495e6362a08620a308d21ff9fde98c485d2
    • Instruction ID: 31649562a132b46b638d4c03626ff8e6658f0501274e78c704d307552a7e6c75
    • Opcode Fuzzy Hash: f840290e0bba7e48b91d022f11001495e6362a08620a308d21ff9fde98c485d2
    • Instruction Fuzzy Hash: B0F0C2B15007048BDB007FB594C159FBFA4DE05304F00083ADE449B346D738A8888ADE
    Uniqueness

    Uniqueness Score: -1.00%