Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002C_101.dll

Overview

General Information

Sample name:LisectAVT_2403002C_101.dll
Analysis ID:1481559
MD5:e297538fd11e88f35c51d59361579625
SHA1:f083c244220424b40d90046003e02f4281d5a5ce
SHA256:51c5b0c6008197cd7c9a9fcd7e0be8534578f2e5ec4f0b48501b09e427825fd7
Tags:dllexe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to get notified if a device is plugged in / out
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2460 cmdline: loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1396 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6540 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3128 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5596 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaar MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6152 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4368 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkx MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4448 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaar MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 360 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5060 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdij MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4524 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewk MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6052 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnp MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1352 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbb MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 348 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyey MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3668 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrh MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2616 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6504 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3568 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1968 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6404 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrg MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7056 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdo MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1292 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTch MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1784 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfv MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2300 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStso MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3652 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSf MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6056 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4676 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfn MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7172 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulon MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7180 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQr MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7188 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQm MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7200 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPp MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7208 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxft MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7216 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7244 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOi MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7268 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbhe MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7276 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOda MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7288 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7328 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNr MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7344 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovl MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7364 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqh MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 52.90.110.169, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Windows\SysWOW64\rundll32.exe, Initiated: true, ProcessId: 7180, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49716
No Snort rule has matched
Timestamp:2024-07-25T11:03:50.937557+0200
SID:2036858
Source Port:49717
Destination Port:8080
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:05:13.891219+0200
SID:2036858
Source Port:49714
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:04:51.489726+0200
SID:2036858
Source Port:49712
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:04:12.566298+0200
SID:2022930
Source Port:443
Destination Port:49705
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T11:04:50.190026+0200
SID:2022930
Source Port:443
Destination Port:49713
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T11:05:30.970079+0200
SID:2036858
Source Port:49715
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE891E0 FileEncryptionStatusW,0_2_6CE891E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE891E0 FileEncryptionStatusW,30_2_6CE891E0
Source: LisectAVT_2403002C_101.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.5:49713 version: TLS 1.2
Source: LisectAVT_2403002C_101.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE82C90 UnregisterDeviceNotification,0_2_6CE82C90

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 52.90.110.169 8080
Source: C:\Windows\SysWOW64\rundll32.exeDomain query: ec2-52-90-110-169.compute-1.amazonaws.com
Source: global trafficTCP traffic: 192.168.2.5:49716 -> 52.90.110.169:8080
Source: Joe Sandbox ViewIP Address: 1.1.1.1 1.1.1.1
Source: Joe Sandbox ViewIP Address: 162.159.36.2 162.159.36.2
Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: global trafficHTTP traffic detected: POST /update?id=76e79776 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=53c23cb5 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=fe4a1493 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=20e113cb HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169:8080Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CEA2DE0 recv,30_2_6CEA2DE0
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=W+gb5OpOS1NuRRp&MD=31PpXX5p HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=W+gb5OpOS1NuRRp&MD=31PpXX5p HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: ec2-52-90-110-169.compute-1.amazonaws.com
Source: unknownHTTP traffic detected: POST /update?id=76e79776 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=53c23cb5
Source: rundll32.exe, 0000001E.00000002.3277333754.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998242463.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3225054203.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=53c23cb5#
Source: rundll32.exe, 0000001E.00000002.3277333754.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998242463.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3225054203.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=53c23cb5/update?id=76e79776
Source: rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=76e79776
Source: rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.3277333754.000000000310A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=fe4a1493
Source: rundll32.exe, 0000001E.00000002.3277333754.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998242463.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3225054203.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=fe4a1493U
Source: rundll32.exe, 0000001E.00000002.3277333754.0000000003189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.3277333754.000000000310A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=20e113cb
Source: rundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=20e113cb%
Source: rundll32.exe, 0000001E.00000002.3277333754.0000000003189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=20e113cbF
Source: rundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=20e113cbN
Source: rundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=20e113cbm
Source: rundll32.exe, 0000001E.00000002.3277333754.0000000003189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=20e113cbs
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.5:49713 version: TLS 1.2
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE81880 EntryPoint,ExitWindowsEx,0_2_6CE81880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE81880 EntryPoint,ExitWindowsEx,30_2_6CE81880
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE8E0400_2_6CE8E040
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE8E2F00_2_6CE8E2F0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE8E32D0_2_6CE8E32D
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE8E3080_2_6CE8E308
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE8E04030_2_6CE8E040
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE8E2F030_2_6CE8E2F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE8E32D30_2_6CE8E32D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE8E30830_2_6CE8E308
Source: LisectAVT_2403002C_101.dllBinary or memory string: OriginalFilenameSafeSvc.exe0 vs LisectAVT_2403002C_101.dll
Source: LisectAVT_2403002C_101.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal56.evad.winDLL@95/0@1/7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE96580 AdjustTokenPrivileges,30_2_6CE96580
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE86690 StartServiceCtrlDispatcherW,0_2_6CE86690
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE86690 StartServiceCtrlDispatcherW,0_2_6CE86690
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE86690 StartServiceCtrlDispatcherW,30_2_6CE86690
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7100:120:WilError_03
Source: LisectAVT_2403002C_101.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaar
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkx
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaar
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdij
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewk
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnp
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbb
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyey
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrh
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrg
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdo
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTch
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfv
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStso
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSf
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfn
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulon
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQm
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPp
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxft
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOi
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbhe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOda
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovl
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqh
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkxJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaarJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkxJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaarJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdijJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewkJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnpJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbbJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyeyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrhJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrgJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdoJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTchJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfvJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStsoJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSfJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfnJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulonJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQmJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPpJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxftJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOiJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbheJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOdaJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovlJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqhJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
Source: LisectAVT_2403002C_101.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE828E0 CreateMailslotW,LoadLibraryA,GetProcAddress,0_2_6CE828E0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE86690 StartServiceCtrlDispatcherW,0_2_6CE86690
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE810000_2_6CE81000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE8100030_2_6CE81000
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 845
Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_30-20969
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE810000_2_6CE81000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CE8100030_2_6CE81000
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4760Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6532Thread sleep count: 100 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5328Thread sleep count: 100 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6784Thread sleep count: 100 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4124Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5364Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5852Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5876Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1216Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6388Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2584Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6532Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6540Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 320Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1276Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6456Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3692Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3580Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1576Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1272Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2072Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3116Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3920Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5952Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5332Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7176Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7184Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7436Thread sleep count: 845 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7436Thread sleep time: -84500s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7192Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7204Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7212Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7220Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7248Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7272Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7280Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7292Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7332Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7348Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7368Thread sleep count: 99 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 0000001E.00000003.2998242463.00000000031BC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.3277333754.000000000310A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE828E0 CreateMailslotW,LoadLibraryA,GetProcAddress,0_2_6CE828E0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 52.90.110.169 8080
Source: C:\Windows\SysWOW64\rundll32.exeDomain query: ec2-52-90-110-169.compute-1.amazonaws.com
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE86B50 LogonUserW,0_2_6CE86B50
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CEA2B70 bind,30_2_6CEA2B70
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
2
Service Execution
1
Valid Accounts
1
Valid Accounts
1
Valid Accounts
OS Credential Dumping111
Security Software Discovery
Remote Services1
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
3
Windows Service
11
Access Token Manipulation
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
3
Windows Service
11
Access Token Manipulation
Security Account Manager1
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook111
Process Injection
111
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Rundll32
LSA Secrets1
Remote System Discovery
SSHKeylogging14
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://52.90.110.169:8080/update?id=20e113cbF0%Avira URL Cloudsafe
http://52.90.110.169/update?id=fe4a1493U0%Avira URL Cloudsafe
http://52.90.110.169/update?id=53c23cb50%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=20e113cb0%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=20e113cbs0%Avira URL Cloudsafe
http://52.90.110.169/update?id=fe4a14930%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=20e113cbm0%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=20e113cb%0%Avira URL Cloudsafe
http://52.90.110.169/update?id=76e797760%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=20e113cbN0%Avira URL Cloudsafe
http://52.90.110.169/update?id=53c23cb5#0%Avira URL Cloudsafe
http://52.90.110.169/update?id=53c23cb5/update?id=76e797760%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ec2-52-90-110-169.compute-1.amazonaws.com
52.90.110.169
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://52.90.110.169/update?id=53c23cb5true
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=76e79776true
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=fe4a1493true
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=20e113cbtrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://52.90.110.169:8080/update?id=20e113cbFrundll32.exe, 0000001E.00000002.3277333754.0000000003189000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=fe4a1493Urundll32.exe, 0000001E.00000002.3277333754.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998242463.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3225054203.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=20e113cb%rundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=20e113cbsrundll32.exe, 0000001E.00000002.3277333754.0000000003189000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=20e113cbNrundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=20e113cbmrundll32.exe, 0000001E.00000002.3277333754.00000000031BC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=53c23cb5#rundll32.exe, 0000001E.00000002.3277333754.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998242463.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3225054203.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=53c23cb5/update?id=76e79776rundll32.exe, 0000001E.00000002.3277333754.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998242463.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3225054203.00000000031A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.2998474662.00000000031A8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    13.85.23.86
    unknownUnited States
    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
    1.1.1.1
    unknownAustralia
    13335CLOUDFLARENETUSfalse
    52.90.110.169
    ec2-52-90-110-169.compute-1.amazonaws.comUnited States
    14618AMAZON-AESUStrue
    162.159.36.2
    unknownUnited States
    13335CLOUDFLARENETUSfalse
    20.12.23.50
    unknownUnited States
    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
    IP
    192.168.2.1
    192.168.2.5
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1481559
    Start date and time:2024-07-25 11:03:04 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 9s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:42
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:LisectAVT_2403002C_101.dll
    Detection:MAL
    Classification:mal56.evad.winDLL@95/0@1/7
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 41
    • Number of non-executed functions: 13
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded IPs from analysis (whitelisted): 199.232.210.172, 192.229.221.95
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: LisectAVT_2403002C_101.dll
    TimeTypeDescription
    05:04:05API Interceptor556x Sleep call for process: rundll32.exe modified
    05:05:58API Interceptor1x Sleep call for process: loaddll32.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    1.1.1.1PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
    • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
    AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
    • 1.1.1.1/
    INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
    • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
    Go.exeGet hashmaliciousUnknownBrowse
    • 1.1.1.1/
    162.159.36.2SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeGet hashmaliciousUnknownBrowse
      EGQqjPn5p3.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
        file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
          j1FDxfhkS3.exeGet hashmaliciousGlupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
            ZN5KdHxjL1.exeGet hashmaliciousWannacryBrowse
              W9vVOVhMMq.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                b6HXTGQmJN.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                  20.12.23.50EGQqjPn5p3.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
                    j1FDxfhkS3.exeGet hashmaliciousGlupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSirlsever.docGet hashmaliciousFormBookBrowse
                      • 188.114.97.3
                      LisectAVT_2403002C_110.dllGet hashmaliciousRamnitBrowse
                      • 172.64.41.3
                      LisectAVT_2403002C_11.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.13.205
                      http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion/Get hashmaliciousUnknownBrowse
                      • 104.27.206.92
                      LisectAVT_2403002C_12.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.13.205
                      LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                      • 172.64.41.3
                      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                      • 188.114.96.3
                      Scan copy.xlsGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      LisectAVT_2403002C_124.exeGet hashmaliciousBdaejec, RamnitBrowse
                      • 172.64.41.3
                      54.xlsGet hashmaliciousFormBookBrowse
                      • 188.114.96.3
                      MICROSOFT-CORP-MSN-AS-BLOCKUShttps://t.co/7624BZTZPqGet hashmaliciousUnknownBrowse
                      • 40.114.177.156
                      LisectAVT_2403002C_106.exeGet hashmaliciousDarkbotBrowse
                      • 204.95.99.243
                      http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion/Get hashmaliciousUnknownBrowse
                      • 13.74.129.1
                      LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                      • 13.107.246.40
                      Scan copy.xlsGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      Order_490104.xlsGet hashmaliciousUnknownBrowse
                      • 13.107.246.42
                      Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • 13.107.137.11
                      CWS610973I4SC2024.exeGet hashmaliciousDBatLoaderBrowse
                      • 13.107.137.11
                      LisectAVT_2403002C_142.exeGet hashmaliciousNjratBrowse
                      • 13.107.253.42
                      CWS610973I4SC2024.exeGet hashmaliciousDBatLoaderBrowse
                      • 13.107.137.11
                      AMAZON-AESUSLisectAVT_2403002C_113.exeGet hashmaliciousBdaejec, GandcrabBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_113.exeGet hashmaliciousBdaejec, GandcrabBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_114.exeGet hashmaliciousBdaejec, GandcrabBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_112.exeGet hashmaliciousGamarueBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_114.exeGet hashmaliciousBdaejec, GandcrabBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_115.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_124.exeGet hashmaliciousBdaejec, RamnitBrowse
                      • 44.221.84.105
                      LisectAVT_2403002C_125.exeGet hashmaliciousUpatreBrowse
                      • 34.205.242.146
                      CLOUDFLARENETUSirlsever.docGet hashmaliciousFormBookBrowse
                      • 188.114.97.3
                      LisectAVT_2403002C_110.dllGet hashmaliciousRamnitBrowse
                      • 172.64.41.3
                      LisectAVT_2403002C_11.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.13.205
                      http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion/Get hashmaliciousUnknownBrowse
                      • 104.27.206.92
                      LisectAVT_2403002C_12.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.13.205
                      LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                      • 172.64.41.3
                      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                      • 188.114.96.3
                      Scan copy.xlsGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      LisectAVT_2403002C_124.exeGet hashmaliciousBdaejec, RamnitBrowse
                      • 172.64.41.3
                      54.xlsGet hashmaliciousFormBookBrowse
                      • 188.114.96.3
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      28a2c9bd18a11de089ef85a160da29e4https://t.co/7624BZTZPqGet hashmaliciousUnknownBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      https://pakbutton.com.pk/mailbox/upgrade/25GB/client/?email=info.me@vistra.comGet hashmaliciousUnknownBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      LisectAVT_2403002C_142.exeGet hashmaliciousNjratBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      https://gist.github.com/CreativeRoy/7405537df8cb20f60a08246a6093453bGet hashmaliciousCoinhive, XmrigBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      https://gist.github.com/qiuxiuya/d1415f62623f8acf65dd0a4c1096b1e2Get hashmaliciousXmrigBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      LisectAVT_2403002C_181.exeGet hashmaliciousRevengeBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      https://forms.office.com/Pages/ResponsePage.aspx?id=kAi_W0yZC0qQpKIHxTYoPxauHzsZJkZMuCk5U9e1Y4RUNFlCMDNQTTdIRTdLV0dKQ1lOUjJYQjg4Si4u&origin=Invitation&channel=0Get hashmaliciousHTMLPhisherBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      LisectAVT_2403002C_66.exeGet hashmaliciousUnknownBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      Sol Distribution - SO-SBES3039324 - - PO52880.emlGet hashmaliciousUnknownBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      https://drive.google.com/file/d/18uQaHuJAdR5xS3lALDyDJ0z0B_5vCmVE/view?usp=drivesdkGet hashmaliciousUnknownBrowse
                      • 13.85.23.86
                      • 20.12.23.50
                      No context
                      No created / dropped files found
                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.529157171131098
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:LisectAVT_2403002C_101.dll
                      File size:192'512 bytes
                      MD5:e297538fd11e88f35c51d59361579625
                      SHA1:f083c244220424b40d90046003e02f4281d5a5ce
                      SHA256:51c5b0c6008197cd7c9a9fcd7e0be8534578f2e5ec4f0b48501b09e427825fd7
                      SHA512:bdf488b91477e118d126d774137715f4db744738148fb13e26e54cb827ce483044d75bf7fee377c23f1e507f318cf33615f596fc8813a681917ba6a2b9455f9a
                      SSDEEP:3072:HqPO7C6IiSX2hI/rmE8PjguXRY7ArrCEmguU1DNlFJa34kg:HSOu6i2hI/rXGg4RLmED5B
                      TLSH:04143915F501873DE8BF00FAC7F9266CA52C9A32935820C3ABC85CA71555AEBBF35193
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X..............A...............y.......I.......H.......O.....Rich............PE..L......N...........!.....d...6.............
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x10001880
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x4EE21DCE [Fri Dec 9 14:40:14 2011 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:a87240b873c1a5b2b17c559a4ce533e7
                      Instruction
                      push ebp
                      mov ebp, esp
                      push ecx
                      mov eax, dword ptr [10030628h]
                      and eax, 01h
                      jne 00007FB5FCB67B3Dh
                      mov ecx, dword ptr [10030628h]
                      or ecx, 01h
                      mov dword ptr [10030628h], ecx
                      mov edx, dword ptr [10028194h]
                      mov dword ptr [10030624h], edx
                      mov eax, dword ptr [ebp+0Ch]
                      mov dword ptr [ebp-04h], eax
                      cmp dword ptr [ebp-04h], 00000000h
                      je 00007FB5FCB67B31h
                      cmp dword ptr [ebp-04h], 01h
                      je 00007FB5FCB67B24h
                      jmp 00007FB5FCB67B2Eh
                      call 00007FB5FCB672F3h
                      jmp 00007FB5FCB67B27h
                      call 00007FB5FCB6731Ch
                      mov eax, 00000001h
                      mov esp, ebp
                      pop ebp
                      retn 000Ch
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      sub esp, 08h
                      mov eax, dword ptr [10028120h]
                      mov dword ptr [ebp-04h], eax
                      mov dword ptr [ebp-08h], 00000000h
                      call 00007FB5FCB672BBh
                      call 00007FB5FCB7D8F6h
                      mov dword ptr [ebp-08h], eax
                      mov ecx, dword ptr [ebp-08h]
                      push ecx
                      call 00007FB5FCB683CAh
                      push eax
                      call 00007FB5FCB68484h
                      test eax, eax
                      jne 00007FB5FCB67B2Bh
                      mov edx, dword ptr [ebp-08h]
                      push edx
                      call 00007FB5FCB68597h
                      call 00007FB5FCB672C2h
                      mov eax, dword ptr [ebp-08h]
                      mov esp, ebp
                      pop ebp
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      pop ebp
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      pop ebp
                      ret
                      int3
                      int3
                      Programming Language:
                      • [IMP] VS2008 SP1 build 30729
                      • [C++] VS2010 build 30319
                      • [EXP] VS2010 build 30319
                      • [RES] VS2010 build 30319
                      • [LNK] VS2010 build 30319
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2bfc00x3d4.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2b5900x64.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x3e0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x9b0000x2188.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x280000x1b4.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x262de0x26400fb8bd1b81ccfb4f534f3daef7cbb4ccaFalse0.47029462826797386data6.33246806574087IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x280000x43940x440082b918d77a044f40686ae5809c89ddbdFalse0.759765625data7.055205472510572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x2d0000x6c5510xa00c81870d3c545b9989522cccbbdbde726False0.913671875data7.449705734565964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x9a0000x3e00x4006117fb448b882a3030c2aff8efcd289bFalse0.4248046875data3.0643979755835313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x9b0000x26fc0x2800745f439c351f3878b92a5df493588d95False0.62431640625data6.137144019251764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_DIALOG0x9a3400x9cdataChineseChina0.6794871794871795
                      RT_VERSION0x9a0a00x29cdataChineseChina0.4550898203592814
                      DLLImport
                      KERNEL32.dllEnumTimeFormatsW, GlobalAddAtomW, TryEnterCriticalSection, HeapAlloc, EnumResourceNamesW, GlobalFix, HeapCompact, TlsSetValue, FindResourceExA, MoveFileA, CompareFileTime, WriteProfileSectionW, InitializeSListHead, UpdateResourceA, ClearCommBreak, GetDevicePowerState, Sleep, EnumResourceTypesW, SetConsoleTitleA, IsSystemResumeAutomatic, GetShortPathNameA, GetPrivateProfileStringW, IsBadStringPtrA, CreateMailslotW, LoadLibraryA, GetProcAddress, PeekConsoleInputA, GetSystemWindowsDirectoryW, OpenWaitableTimerA, CreateFileW, GetLastError, SetFilePointer, WriteFile, CloseHandle, SetConsoleActiveScreenBuffer, SetCurrentDirectoryW, EnumSystemCodePagesA, GetCalendarInfoA, GetTickCount, FindResourceW
                      USER32.dllDefDlgProcA, DrawAnimatedRects, ArrangeIconicWindows, SetWindowRgn, HideCaret, ScrollWindowEx, ShowWindowAsync, RegisterClipboardFormatA, AnimateWindow, FillRect, GetClassInfoExW, IsDialogMessageW, CharLowerBuffA, LoadStringW, GetKBCodePage, DlgDirSelectComboBoxExA, ClipCursor, IsWindowUnicode, SendMessageTimeoutA, PostMessageA, OemToCharA, GetClipboardFormatNameA, UnregisterDeviceNotification, ExitWindowsEx, SetPropA, SystemParametersInfoA, UnregisterClassA, GetDlgItemInt, IsWindowEnabled, LoadCursorFromFileA
                      GDI32.dllCloseFigure, SetBitmapBits, GetPixel, PlayMetaFileRecord, GetMiterLimit, GetEnhMetaFileHeader, SetICMProfileA, SetColorSpace, SetICMMode, SetTextColor, SetDeviceGammaRamp, SelectPalette, GetWindowExtEx, CreateEnhMetaFileA, DeleteDC, LPtoDP, GetBitmapBits
                      ADVAPI32.dllIsValidSid, SetSecurityDescriptorSacl, RegDisablePredefinedCache, FileEncryptionStatusW, LookupPrivilegeNameW, OpenBackupEventLogW, LogonUserW, RegEnumKeyW, StartServiceCtrlDispatcherW, InitiateSystemShutdownExW, SetKernelObjectSecurity, AreAllAccessesGranted, QueryServiceConfigA, LookupPrivilegeNameA, RegOpenUserClassesRoot, ImpersonateLoggedOnUser, ReadEventLogW, RegEnumKeyExA
                      NameOrdinalAddress
                      GnrkBltvkx10x10001a90
                      GnrkBmoaar20x10001aa0
                      GnrkCyrpw30x10001a40
                      GnrkEkp40x10001be0
                      GnrkEnjzs50x10001d80
                      GnrkFa60x10001d60
                      GnrkFsx70x10001940
                      GnrkGm80x10001c70
                      GnrkGt90x10001b30
                      GnrkHhcpo100x10001c20
                      GnrkHjtl110x10001c10
                      GnrkIiip120x10001d90
                      GnrkJird130x10001d50
                      GnrkJstv140x10001e20
                      GnrkKhlhca150x10001e10
                      GnrkKhqbbu160x10001f00
                      GnrkLmkamk170x10001dc0
                      GnrkLoc180x10001a10
                      GnrkNlqh190x10001e00
                      GnrkNofovl200x10001da0
                      GnrkNr210x10001970
                      GnrkNsdwzc220x10001a70
                      GnrkOda230x10001ca0
                      GnrkOhqbhe240x10001ee0
                      GnrkOi250x10001db0
                      GnrkOksgc260x10001cb0
                      GnrkOxft270x10001960
                      GnrkPp280x10001b00
                      GnrkQm290x10001bf0
                      GnrkQr300x10001770
                      GnrkQulon310x10001c90
                      GnrkRrdcfn320x10001c50
                      GnrkSbq330x10001990
                      GnrkSf340x10001ec0
                      GnrkStso350x10001ae0
                      GnrkTcfv360x10001eb0
                      GnrkTch370x10001c30
                      GnrkTjxdo380x10001ab0
                      GnrkTrg390x10001e60
                      GnrkUsmc400x10001930
                      GnrkVnndq410x10001b10
                      GnrkWapq420x10001de0
                      GnrkWsnq430x10001ad0
                      GnrkWtlrh440x10001c00
                      GnrkWyey450x10001c40
                      GnrkXalbb460x10001950
                      GnrkXzwnp470x10001a50
                      GnrkZewk480x10001d20
                      GnrkZtdij490x10001b70
                      Language of compilation systemCountry where language is spokenMap
                      ChineseChina
                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                      2024-07-25T11:03:50.937557+0200TCP2036858ET MALWARE PlugX CnC Beacon497178080192.168.2.552.90.110.169
                      2024-07-25T11:05:13.891219+0200TCP2036858ET MALWARE PlugX CnC Beacon4971480192.168.2.552.90.110.169
                      2024-07-25T11:04:51.489726+0200TCP2036858ET MALWARE PlugX CnC Beacon4971280192.168.2.552.90.110.169
                      2024-07-25T11:04:12.566298+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970513.85.23.86192.168.2.5
                      2024-07-25T11:04:50.190026+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971320.12.23.50192.168.2.5
                      2024-07-25T11:05:30.970079+0200TCP2036858ET MALWARE PlugX CnC Beacon4971580192.168.2.552.90.110.169
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 25, 2024 11:03:50.937556982 CEST49674443192.168.2.523.1.237.91
                      Jul 25, 2024 11:03:50.937566042 CEST49675443192.168.2.523.1.237.91
                      Jul 25, 2024 11:03:51.046802044 CEST49673443192.168.2.523.1.237.91
                      Jul 25, 2024 11:04:00.546756983 CEST49674443192.168.2.523.1.237.91
                      Jul 25, 2024 11:04:00.546767950 CEST49675443192.168.2.523.1.237.91
                      Jul 25, 2024 11:04:00.656141043 CEST49673443192.168.2.523.1.237.91
                      Jul 25, 2024 11:04:02.321460962 CEST4434970323.1.237.91192.168.2.5
                      Jul 25, 2024 11:04:02.321722984 CEST49703443192.168.2.523.1.237.91
                      Jul 25, 2024 11:04:06.532630920 CEST4970480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:06.538407087 CEST804970452.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:06.538491964 CEST4970480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:06.538738012 CEST4970480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:06.544974089 CEST804970452.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:11.028345108 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:11.028381109 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:11.028513908 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:11.029414892 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:11.029423952 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:11.790846109 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:11.790950060 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:11.793525934 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:11.793540001 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:11.793859005 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:11.843645096 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:12.316127062 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:12.356497049 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.565949917 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.565985918 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.565998077 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566015005 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566044092 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566056013 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:12.566072941 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566114902 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566126108 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:12.566135883 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566170931 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:12.566199064 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:12.566205978 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:12.566256046 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:13.155019999 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:13.155050993 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:13.155085087 CEST49705443192.168.2.513.85.23.86
                      Jul 25, 2024 11:04:13.155092001 CEST4434970513.85.23.86192.168.2.5
                      Jul 25, 2024 11:04:27.943042994 CEST804970452.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:27.943294048 CEST4970480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:27.943373919 CEST4970480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:27.949783087 CEST804970452.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:30.118796110 CEST4971280192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:30.124572992 CEST804971252.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:30.124674082 CEST4971280192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:30.128576994 CEST4971280192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:30.133611917 CEST804971252.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:49.390470982 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:49.390513897 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:49.390716076 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:49.391720057 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:49.391738892 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:49.984548092 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:49.984632969 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:49.989624023 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:49.989650011 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:49.990010977 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:49.993272066 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.040502071 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.187799931 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.187823057 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.187863111 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.188102961 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.188136101 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.188199997 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.189035892 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.189070940 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.189136028 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.189152002 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.189182997 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.189882994 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.189959049 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.212117910 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.212167978 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:50.212219000 CEST49713443192.168.2.520.12.23.50
                      Jul 25, 2024 11:04:50.212228060 CEST4434971320.12.23.50192.168.2.5
                      Jul 25, 2024 11:04:51.489590883 CEST804971252.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:51.489726067 CEST4971280192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:51.489841938 CEST4971280192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:51.494937897 CEST804971252.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:52.500777006 CEST4971480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:52.506076097 CEST804971452.90.110.169192.168.2.5
                      Jul 25, 2024 11:04:52.506310940 CEST4971480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:52.506453991 CEST4971480192.168.2.552.90.110.169
                      Jul 25, 2024 11:04:52.511240959 CEST804971452.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:13.891060114 CEST804971452.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:13.891218901 CEST4971480192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:13.891326904 CEST4971480192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:13.896120071 CEST804971452.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:14.907201052 CEST4971580192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:14.912750006 CEST804971552.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:14.912889004 CEST4971580192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:14.916404009 CEST4971580192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:14.922386885 CEST804971552.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:30.970078945 CEST4971580192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:32.048125029 CEST497168080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:32.053349972 CEST80804971652.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:32.053436041 CEST497168080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:32.053575993 CEST497168080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:32.058679104 CEST80804971652.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:53.670490980 CEST80804971652.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:53.670603991 CEST497168080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:53.670708895 CEST497168080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:53.672085047 CEST80804971652.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:53.672153950 CEST497168080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:53.676449060 CEST80804971652.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:55.706521988 CEST497178080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:55.711886883 CEST80804971752.90.110.169192.168.2.5
                      Jul 25, 2024 11:05:55.712033987 CEST497178080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:55.712255955 CEST497178080192.168.2.552.90.110.169
                      Jul 25, 2024 11:05:55.717221022 CEST80804971752.90.110.169192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 25, 2024 11:04:06.510271072 CEST6223553192.168.2.58.8.8.8
                      Jul 25, 2024 11:04:06.530945063 CEST53622358.8.8.8192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 25, 2024 11:04:06.510271072 CEST192.168.2.58.8.8.80xe9bbStandard query (0)ec2-52-90-110-169.compute-1.amazonaws.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 25, 2024 11:04:06.530945063 CEST8.8.8.8192.168.2.50xe9bbNo error (0)ec2-52-90-110-169.compute-1.amazonaws.com52.90.110.169A (IP address)IN (0x0001)false
                      • slscr.update.microsoft.com
                      • 52.90.110.169
                      • 52.90.110.169:8080
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.54970452.90.110.169807180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Jul 25, 2024 11:04:06.538738012 CEST86OUTData Raw: 77 00 35 77 c1 fb 49 3e a0 00 bb c1 40 5f cd b6 26 01 aa c4 6b 4a 04 7f 98 0b c7 c1 55 59 d5 e1 f8 fd 02 02 07 6b 6d f5 4c b0 98 d9 25 10 6a d8 55 7a c0 6c 09 cb 22 01 b7 b0 71 a1 21 a4 4a 0f 73 be ab b0 56 ba ed 94 8e f7 b8 c8 86 0c 68 c2 c2 81
                      Data Ascii: w5wI>@_&kJUYkmL%jUzl"q!JsVhQ


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.54971252.90.110.169807180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Jul 25, 2024 11:04:30.128576994 CEST258OUTPOST /update?id=76e79776 HTTP/1.1
                      Accept: */*
                      X-Session: 0
                      X-Status: 0
                      X-Size: 61456
                      X-Sn: 1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                      Host: 52.90.110.169
                      Content-Length: 0
                      Connection: Keep-Alive
                      Cache-Control: no-cache


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.54971452.90.110.169807180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Jul 25, 2024 11:04:52.506453991 CEST258OUTPOST /update?id=53c23cb5 HTTP/1.1
                      Accept: */*
                      X-Session: 0
                      X-Status: 0
                      X-Size: 61456
                      X-Sn: 1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                      Host: 52.90.110.169
                      Content-Length: 0
                      Connection: Keep-Alive
                      Cache-Control: no-cache


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.54971552.90.110.169807180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Jul 25, 2024 11:05:14.916404009 CEST258OUTPOST /update?id=fe4a1493 HTTP/1.1
                      Accept: */*
                      X-Session: 0
                      X-Status: 0
                      X-Size: 61456
                      X-Sn: 1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                      Host: 52.90.110.169
                      Content-Length: 0
                      Connection: Keep-Alive
                      Cache-Control: no-cache


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.54971752.90.110.16980807180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Jul 25, 2024 11:05:55.712255955 CEST263OUTPOST /update?id=20e113cb HTTP/1.1
                      Accept: */*
                      X-Session: 0
                      X-Status: 0
                      X-Size: 61456
                      X-Sn: 1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                      Host: 52.90.110.169:8080
                      Content-Length: 0
                      Connection: Keep-Alive
                      Cache-Control: no-cache


                      Session IDSource IPSource PortDestination IPDestination Port
                      0192.168.2.54970513.85.23.86443
                      TimestampBytes transferredDirectionData
                      2024-07-25 09:04:12 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=W+gb5OpOS1NuRRp&MD=31PpXX5p HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.54970513.85.23.864437180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-07-25 09:04:12 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                      MS-CorrelationId: a44d4898-7301-4d07-b194-4fd6fb9432c2
                      MS-RequestId: a1f3f499-517f-46e5-a864-3486d5e81b1f
                      MS-CV: 6hYmR2ZJlE2X+pvh.0
                      X-Microsoft-SLSClientCache: 2880
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Thu, 25 Jul 2024 09:04:11 GMT
                      Connection: close
                      Content-Length: 24490
                      2024-07-25 09:04:12 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                      2024-07-25 09:04:12 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                      Session IDSource IPSource PortDestination IPDestination Port
                      2192.168.2.54971320.12.23.50443
                      TimestampBytes transferredDirectionData
                      2024-07-25 09:04:49 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=W+gb5OpOS1NuRRp&MD=31PpXX5p HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.54971320.12.23.504437180C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-07-25 09:04:50 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                      MS-CorrelationId: 9daddc74-a08d-4773-9fab-ecaa10be43f8
                      MS-RequestId: 7300bca5-30f4-4a2b-9e80-001045d48f25
                      MS-CV: qNWJgSdwtEyquRzp.0
                      X-Microsoft-SLSClientCache: 1440
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Thu, 25 Jul 2024 09:04:49 GMT
                      Connection: close
                      Content-Length: 30005
                      2024-07-25 09:04:50 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                      Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                      2024-07-25 09:04:50 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                      Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                      Click to jump to process

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:05:03:52
                      Start date:25/07/2024
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll"
                      Imagebase:0xe10000
                      File size:126'464 bytes
                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:1
                      Start time:05:03:52
                      Start date:25/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:2
                      Start time:05:03:52
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
                      Imagebase:0x790000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:05:03:52
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:05:03:52
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:05:03:55
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaar
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:7
                      Start time:05:03:58
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpw
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:8
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkx
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaar
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpw
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdij
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewk
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:13
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnp
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:14
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbb
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:15
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyey
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:16
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrh
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:17
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnq
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:18
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapq
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:19
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndq
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:20
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmc
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:21
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrg
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:22
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdo
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:23
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTch
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:24
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfv
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:25
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStso
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:26
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSf
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:27
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbq
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:28
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfn
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:29
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulon
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:30
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQr
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:false

                      Target ID:31
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQm
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:32
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPp
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:33
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxft
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:34
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgc
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:35
                      Start time:05:04:03
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOi
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:36
                      Start time:05:04:04
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbhe
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:37
                      Start time:05:04:04
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOda
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:38
                      Start time:05:04:04
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzc
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:39
                      Start time:05:04:04
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNr
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:40
                      Start time:05:04:04
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovl
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:41
                      Start time:05:04:04
                      Start date:25/07/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqh
                      Imagebase:0x8f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:1.6%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:15.2%
                        Total number of Nodes:46
                        Total number of Limit Nodes:1
                        execution_graph 20395 6ce81880 20396 6ce8188e 20395->20396 20398 6ce818bb 20396->20398 20399 6ce81090 20396->20399 20406 6ce81000 20399->20406 20401 6ce81098 20410 6ce98f80 20401->20410 20403 6ce810b1 20413 6ce9e330 20403->20413 20405 6ce810bb 20405->20398 20407 6ce81016 20406->20407 20408 6ce81055 20407->20408 20409 6ce81025 GetTickCount Sleep GetTickCount 20407->20409 20408->20401 20409->20407 20431 6ce99e90 20410->20431 20412 6ce98f88 20412->20403 20414 6ce9e346 20413->20414 20416 6ce9e35a 20414->20416 20438 6ce83270 20414->20438 20417 6ce83270 VirtualAlloc 20416->20417 20418 6ce9e396 20416->20418 20417->20418 20419 6ce83270 VirtualAlloc 20418->20419 20420 6ce9e3d1 20418->20420 20419->20420 20421 6ce83270 VirtualAlloc 20420->20421 20422 6ce9e40e codecvt 20420->20422 20421->20422 20442 6ce83390 GetProcAddress 20422->20442 20424 6ce9e49e codecvt 20443 6ce83390 GetProcAddress 20424->20443 20426 6ce9e524 codecvt 20444 6ce83390 GetProcAddress 20426->20444 20428 6ce9e5a9 codecvt 20445 6ce83390 GetProcAddress 20428->20445 20430 6ce9e632 codecvt 20430->20405 20432 6ce99ea7 codecvt 20431->20432 20435 6ce823f0 20432->20435 20434 6ce99f09 codecvt 20434->20412 20436 6ce8243a lstrcmpiW 20435->20436 20437 6ce823ff codecvt 20435->20437 20436->20434 20437->20436 20439 6ce83281 20438->20439 20446 6ce836c0 20439->20446 20441 6ce832af 20441->20416 20442->20424 20443->20426 20444->20428 20445->20430 20447 6ce8370a VirtualAlloc 20446->20447 20448 6ce836cf codecvt 20446->20448 20447->20441 20448->20447 20449 6ce818e0 6 API calls 20453 6ce82680 5 API calls codecvt 20452 6ce84eb3 VirtualAlloc 20463 6ce81770 lstrcmpiW codecvt

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID: CountTick$Sleep
                        • String ID: F$d
                        • API String ID: 4250438611-811691143
                        • Opcode ID: 6da0b52e6283401d33a19c089dc6781841239daf8f0ca6d2733d92dc85a25cb9
                        • Instruction ID: 63cbe722af710afdc223de3e79295cbb5810f97743beea5a3749bf1784f60073
                        • Opcode Fuzzy Hash: 6da0b52e6283401d33a19c089dc6781841239daf8f0ca6d2733d92dc85a25cb9
                        • Instruction Fuzzy Hash: 2F010030D06288DFCB04DFE8CD4539DB771BF06319F20866AD53996741DB729A42EB41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 256 6ce81880-6ce8188c 257 6ce818a9-6ce818b3 256->257 258 6ce8188e-6ce818a3 256->258 259 6ce818c4 call 6ce810c0 257->259 260 6ce818b5-6ce818b9 257->260 258->257 264 6ce818c9-6ce818d1 259->264 261 6ce818bb 260->261 262 6ce818bd call 6ce81090 260->262 261->264 266 6ce818c2 262->266 266->264
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db03dc92f2f28fb97703f17cfd243002f3735589ec18a5222b8193eacf56a784
                        • Instruction ID: 5d4f5a0022e8c6fb198df0ab32154b60cb424c1281e28761a7a39a11a22350ba
                        • Opcode Fuzzy Hash: db03dc92f2f28fb97703f17cfd243002f3735589ec18a5222b8193eacf56a784
                        • Instruction Fuzzy Hash: 95F039B0A07144DBCB44DBC8DB026A873F8E78A318F70419AD82887B48C63AE940DB49

                        Control-flow Graph

                        APIs
                        • lstrcmpiW.KERNELBASE(00000000,?,00000000,00000000), ref: 6CE82442
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID: lstrcmpi
                        • String ID: l
                        • API String ID: 1586166983-1545559182
                        • Opcode ID: 624a38ba496221c214f5daf13d6af8e6577772bf249a1160539e697ec60724d9
                        • Instruction ID: e1c0def32172ac9c117cb66823a86fa09ecef05cf5c7ead275d0a0976652c980
                        • Opcode Fuzzy Hash: 624a38ba496221c214f5daf13d6af8e6577772bf249a1160539e697ec60724d9
                        • Instruction Fuzzy Hash: C8F0ECB1A01144ABCB10EFA0DD55FAA7738DB11245F10811AF80A7A740FB30695D8BD1

                        Control-flow Graph

                        APIs
                        • VirtualAlloc.KERNELBASE(?,?,?,?,?,6CE9E40E), ref: 6CE8371A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: c5b89cd158fdeb965facb7c246cd680c41e61fb58e39cf9209e22cf8c22e4f99
                        • Instruction ID: 3007209e0a294bdc59c0a8d8d549c73dc553df99a7d5bc1a2fb9ce24330a7bd0
                        • Opcode Fuzzy Hash: c5b89cd158fdeb965facb7c246cd680c41e61fb58e39cf9209e22cf8c22e4f99
                        • Instruction Fuzzy Hash: D2F089716062086BCB00DFE4DE91FAE3B78EF45205F10455EF94967B40EB709D1487B5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,Sl$1l
                        • API String ID: 0-2909412923
                        • Opcode ID: 846589f719d23609d324c3af1d5294aeb8f37feb5c1c8d55504aedc9c7d69f50
                        • Instruction ID: 8f3426aa405330802d01a058f55742bbd592a5266b4fbaa16fd85aeba495fe7b
                        • Opcode Fuzzy Hash: 846589f719d23609d324c3af1d5294aeb8f37feb5c1c8d55504aedc9c7d69f50
                        • Instruction Fuzzy Hash: 65D12171A0A204ABCB159FB0C96AAED3774FF15748F30451AF41E7BB90EF38554ACA84
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: ul$ul
                        • API String ID: 0-3019654151
                        • Opcode ID: 97cbd7203d191b498a102ea7784af2dd83e7596d2b3904508cb77ac6cba96286
                        • Instruction ID: 14884978e3dc2dddfc7979fc4822de9c400d0c9929b106ff6d11526a61927d0f
                        • Opcode Fuzzy Hash: 97cbd7203d191b498a102ea7784af2dd83e7596d2b3904508cb77ac6cba96286
                        • Instruction Fuzzy Hash: F4C1D6B0D05159DBCF08CF99C991AEEBBB2FF98304F14815AE814AB345D334AA61CF94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: ul$ul
                        • API String ID: 0-3019654151
                        • Opcode ID: 0c8a9737debf7333a0f958e2089c6d762d27a878e3007d4562316f9c1ed437a3
                        • Instruction ID: 2e07efb31a18f85ced93ef6be2dc0ee1c084f458cc3c1ce24ac47c0796e70a45
                        • Opcode Fuzzy Hash: 0c8a9737debf7333a0f958e2089c6d762d27a878e3007d4562316f9c1ed437a3
                        • Instruction Fuzzy Hash: 1951E7B0D01659DBCF04CF99C991AEEBBB2FF98304F14C15AE814AB345D334AA61DB94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: ul$ul
                        • API String ID: 0-3019654151
                        • Opcode ID: 446fac22fc25e5ebe9834733f62750428f8b2cf52dc42aac7255b1b48395739d
                        • Instruction ID: 45c496f75d8d9951e9132764961e8e4776b8110d55083ab09c67a181374c4eef
                        • Opcode Fuzzy Hash: 446fac22fc25e5ebe9834733f62750428f8b2cf52dc42aac7255b1b48395739d
                        • Instruction Fuzzy Hash: A751F8B0D0125ADBCF04CF99C981AEEBBB2FF98304F14C156E814AB345D334AA21DB54
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: Kl
                        • API String ID: 0-2995236844
                        • Opcode ID: 8711eb5a034fc7b91f54e85c32679345af70936d2d4dc79d77391d6a434eb62e
                        • Instruction ID: 9a39676016399cddebc4547d977367715c96f5ec5bfe19a2d5f135a437ca52f4
                        • Opcode Fuzzy Hash: 8711eb5a034fc7b91f54e85c32679345af70936d2d4dc79d77391d6a434eb62e
                        • Instruction Fuzzy Hash: C0B1B5B1D005599FCF08CF99D991ADEBBB2FF99304F18815AE814AB345C330A961CF94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: m
                        • API String ID: 0-3775001192
                        • Opcode ID: 8c3c14d672e2470add1ad34148c21413191b483bd122ba77171c48bf553c1c16
                        • Instruction ID: 630a2bc3fc0783ae27cdeeae8005169272af5ee81d8f15d48b2975ee866006e7
                        • Opcode Fuzzy Hash: 8c3c14d672e2470add1ad34148c21413191b483bd122ba77171c48bf553c1c16
                        • Instruction Fuzzy Hash: 8A21D730F0A284ABDB00DBE4DD56BAD3BB4EF22204F20446ED4597BB81EB711909C795
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e46c09389e1881bf6234c744747cd68338f6039bde5332bf22fe79aef686c9bf
                        • Instruction ID: a72c1e57b86e741de526cec24c0bd2ec733100074def90a9e72960aa5048e6c6
                        • Opcode Fuzzy Hash: e46c09389e1881bf6234c744747cd68338f6039bde5332bf22fe79aef686c9bf
                        • Instruction Fuzzy Hash: 4D112DB4900108AFCB18DF98D891ADEF7B5FF44318F10C159E9196B381DB30EA58CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e3c3ef56ac60c92904b3e7dbad513d0ab0ab0f82802cedf90070b66dcaf24c9c
                        • Instruction ID: abd78b8b07ad56fc1c1d9e8a1d3d25a53769c8967aa671b7741002810dfeb322
                        • Opcode Fuzzy Hash: e3c3ef56ac60c92904b3e7dbad513d0ab0ab0f82802cedf90070b66dcaf24c9c
                        • Instruction Fuzzy Hash: 58F0C974A05208AFDB08CF54C895B9DBBB5EB48314F20C199ED1C5F791E775EA45CB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 75bb33bf96ba129deb1dfc062fcab516471f7ac8438581115f74ae22b6c3b50e
                        • Instruction ID: 9904572d0973c9422ee2e1a193241940f1f1bc537f632e0e0cf529da0d24c29e
                        • Opcode Fuzzy Hash: 75bb33bf96ba129deb1dfc062fcab516471f7ac8438581115f74ae22b6c3b50e
                        • Instruction Fuzzy Hash: 52D09E71B292499B8B08CF4AE46383A77FDF346314710427EE829C7304D732AA108B99

                        Control-flow Graph

                        APIs
                        • CreateFileW.KERNEL32(00000000,6CEA835C,00000016,F6A49D28,6CEB1084,40000000,00000001,00000000,00000004,00000000,00000000), ref: 6CE826DB
                        • GetLastError.KERNEL32 ref: 6CE82713
                        • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 6CE82725
                        • WriteFile.KERNEL32(000000FF,?,?,?,00000000), ref: 6CE8273D
                        • CloseHandle.KERNEL32(000000FF), ref: 6CE82747
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID: File$CloseCreateErrorHandleLastPointerWrite
                        • String ID:
                        • API String ID: 170361235-0
                        • Opcode ID: 30198114ddba95179757ace6dfa3ac440d4ac0202d6def9216e970d78db4cc85
                        • Instruction ID: c99615e953a2c4e496ffd6e62a53ce618fe655a7a89c13a637f1ab3a303db829
                        • Opcode Fuzzy Hash: 30198114ddba95179757ace6dfa3ac440d4ac0202d6def9216e970d78db4cc85
                        • Instruction Fuzzy Hash: 7C217F75B40204AFDF24CFE4EE8AF9D37B5EB55704F20821AF605AB2C0DB70AA019B54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 463 6ce9e650-6ce9e689 call 6ce835b0 * 4 472 6ce9e68b-6ce9e69d 463->472 473 6ce9e6bf-6ce9e6c6 463->473 474 6ce9e69f-6ce9e6ac call 6ce9ea20 472->474 475 6ce9e6ae 472->475 476 6ce9e6c8-6ce9e6db 473->476 477 6ce9e6fd-6ce9e704 473->477 479 6ce9e6b5 474->479 475->479 480 6ce9e6dd-6ce9e6ea call 6ce9ea20 476->480 481 6ce9e6ec 476->481 482 6ce9e73b-6ce9e742 477->482 483 6ce9e706-6ce9e719 477->483 479->473 490 6ce9e6f3 480->490 481->490 487 6ce9e778-6ce9e77b 482->487 488 6ce9e744-6ce9e756 482->488 484 6ce9e71b-6ce9e728 call 6ce9ea20 483->484 485 6ce9e72a 483->485 492 6ce9e731 484->492 485->492 493 6ce9e758-6ce9e765 call 6ce9ea20 488->493 494 6ce9e767 488->494 490->477 492->482 498 6ce9e76e 493->498 494->498 498->487
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3277399574.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 00000000.00000002.3277381724.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277429505.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277450831.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277484589.000000006CF07000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3277506329.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ce80000_loaddll32.jbxd
                        Similarity
                        • API ID: codecvt
                        • String ID:
                        • API String ID: 3662085145-0
                        • Opcode ID: f45ff2e2872abc948ef01e181b3dd1947064de060e6b3adfaa9dcc5962e23236
                        • Instruction ID: 2b0d0c3dc94e33ccd47e35a21c35a08a0fbd04e72691939625e916644ed08740
                        • Opcode Fuzzy Hash: f45ff2e2872abc948ef01e181b3dd1947064de060e6b3adfaa9dcc5962e23236
                        • Instruction Fuzzy Hash: 9B31A278B0160ADBDB14EF94E594BADB7B1BB8A308F304829C52137790D7B51988CF91

                        Execution Graph

                        Execution Coverage:8.4%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:1.3%
                        Total number of Nodes:1181
                        Total number of Limit Nodes:116
                        execution_graph 21806 6ce83ee0 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 21807 6ce818e0 13 API calls 21808 6ce9b6e0 5 API calls codecvt 21810 6ce96ae2 10 API calls 21812 6ce8eaf9 5 API calls codecvt 21824 6cea4ec0 Sleep LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification 21827 6ce84eb3 31 API calls 21828 6ce8d4db LoadLibraryA LoadLibraryA LoadLibraryA RegCreateKeyExW WSASend 21840 6ce92ab0 7 API calls codecvt 20365 6ce81880 20366 6ce8188e 20365->20366 20367 6ce818c4 20366->20367 20368 6ce818b5 20366->20368 20387 6ce810c0 6 API calls 20367->20387 20371 6ce818bb 20368->20371 20372 6ce81090 20368->20372 20388 6ce81000 20372->20388 20380 6ce810a7 20446 6ce9eb60 20380->20446 20384 6ce810b1 20454 6ce9e330 20384->20454 20386 6ce810bb 20386->20371 20387->20371 20390 6ce81016 20388->20390 20389 6ce81025 GetTickCount Sleep GetTickCount 20389->20390 20390->20389 20391 6ce81055 20390->20391 20392 6ce828e0 20391->20392 20393 6ce828f4 codecvt 20392->20393 20479 6ce831d0 20393->20479 20395 6ce82950 codecvt 20396 6ce831d0 codecvt 3 API calls 20395->20396 20397 6ce82998 codecvt 20396->20397 20482 6ce82080 20397->20482 20399 6ce829c3 20400 6ce82080 3 API calls 20399->20400 20401 6ce829c8 20400->20401 20402 6ce82080 3 API calls 20401->20402 20403 6ce8109d 20402->20403 20404 6ce94120 20403->20404 20406 6ce94154 20404->20406 20496 6ce90a90 20406->20496 20407 6ce9420c 20500 6ce96130 20407->20500 20409 6ce94235 20504 6ce96190 20409->20504 20411 6ce94244 20508 6ce83db0 20411->20508 20416 6ce9426c 20548 6ce961f0 20416->20548 20419 6ce94282 20420 6ce961f0 3 API calls 20419->20420 20421 6ce94297 20420->20421 20552 6ce83fb0 20421->20552 20424 6cea0870 20617 6ce83810 20424->20617 20426 6cea088a codecvt 20621 6ce86da0 20426->20621 20428 6cea08de codecvt 20429 6cea08ff codecvt 20428->20429 20430 6cea0b61 codecvt 20428->20430 20431 6ce81f20 3 API calls 20429->20431 20445 6cea0b57 codecvt 20430->20445 20628 6cea1790 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20430->20628 20433 6cea0a0e codecvt 20431->20433 20434 6ce81f20 3 API calls 20433->20434 20435 6cea0a41 codecvt 20434->20435 20436 6ce81f20 3 API calls 20435->20436 20437 6cea0a74 codecvt 20436->20437 20438 6ce81f20 3 API calls 20437->20438 20439 6cea0aa7 codecvt 20438->20439 20625 6cea1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20439->20625 20441 6cea0af1 codecvt 20626 6cea1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20441->20626 20443 6cea0b24 codecvt 20627 6cea1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20443->20627 20445->20380 20629 6ce9ee00 20446->20629 20448 6ce9eb68 20633 6ce9ee60 20448->20633 20450 6ce810ac 20451 6ce98f80 20450->20451 20637 6ce99e90 20451->20637 20455 6ce82550 4 API calls 20454->20455 20456 6ce9e346 20455->20456 20457 6ce9e35a 20456->20457 20727 6ce83270 20456->20727 20459 6ce82550 4 API calls 20457->20459 20460 6ce9e382 20459->20460 20461 6ce9e396 20460->20461 20462 6ce83270 4 API calls 20460->20462 20463 6ce82550 4 API calls 20461->20463 20462->20461 20464 6ce9e3bd 20463->20464 20465 6ce9e3d1 20464->20465 20466 6ce83270 4 API calls 20464->20466 20467 6ce82550 4 API calls 20465->20467 20466->20465 20468 6ce9e3fa 20467->20468 20469 6ce83270 4 API calls 20468->20469 20470 6ce9e40e codecvt 20468->20470 20469->20470 20731 6ce83390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20470->20731 20472 6ce9e49e codecvt 20732 6ce83390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20472->20732 20474 6ce9e524 codecvt 20733 6ce83390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20474->20733 20476 6ce9e5a9 codecvt 20734 6ce83390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20476->20734 20478 6ce9e632 codecvt 20478->20386 20486 6ce82c90 20479->20486 20481 6ce831ee 20481->20395 20483 6ce8208f codecvt 20482->20483 20485 6ce820ba codecvt 20482->20485 20484 6ce831d0 codecvt 3 API calls 20483->20484 20484->20485 20485->20399 20487 6ce82ca3 20486->20487 20488 6ce82e57 20487->20488 20489 6ce82e1e codecvt 20487->20489 20491 6ce82cc6 codecvt 20487->20491 20488->20491 20492 6ce82f68 codecvt 20488->20492 20494 6ce82fa1 codecvt 20488->20494 20490 6ce82e3e LoadLibraryA 20489->20490 20490->20491 20491->20481 20493 6ce82f88 LoadLibraryA 20492->20493 20493->20491 20494->20491 20495 6ce8304e LoadLibraryA 20494->20495 20495->20491 20497 6ce90aca codecvt 20496->20497 20498 6ce90a9f codecvt 20496->20498 20497->20407 20499 6ce831d0 codecvt 3 API calls 20498->20499 20499->20497 20501 6ce9616a codecvt 20500->20501 20502 6ce9613f codecvt 20500->20502 20501->20409 20503 6ce831d0 codecvt 3 API calls 20502->20503 20503->20501 20505 6ce961ca codecvt 20504->20505 20506 6ce9619f codecvt 20504->20506 20505->20411 20507 6ce831d0 codecvt 3 API calls 20506->20507 20507->20505 20509 6ce83dc1 20508->20509 20560 6ce83ff0 20509->20560 20512 6ce948b0 20598 6ce88ea0 20512->20598 20514 6ce948d8 20515 6ce948dc 20514->20515 20516 6ce948e6 20514->20516 20517 6ce82080 3 API calls 20515->20517 20518 6ce94943 20516->20518 20521 6ce948f8 20516->20521 20520 6ce94257 20517->20520 20519 6ce949a0 20518->20519 20522 6ce94955 20518->20522 20524 6ce949fd 20519->20524 20527 6ce949b2 20519->20527 20520->20416 20556 6ce81f20 20520->20556 20602 6ce84150 20521->20602 20525 6ce84150 5 API calls 20522->20525 20526 6ce94a57 20524->20526 20528 6ce94a0f 20524->20528 20533 6ce94964 codecvt 20525->20533 20526->20520 20532 6ce84150 5 API calls 20526->20532 20529 6ce84150 5 API calls 20527->20529 20530 6ce84150 5 API calls 20528->20530 20534 6ce949c1 codecvt 20529->20534 20536 6ce94a1e codecvt 20530->20536 20531 6ce94907 codecvt 20608 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20531->20608 20539 6ce94a78 codecvt 20532->20539 20609 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20533->20609 20610 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20534->20610 20611 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20536->20611 20612 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20539->20612 20542 6ce94933 codecvt 20613 6ce95370 LoadLibraryA LoadLibraryA LoadLibraryA 20542->20613 20544 6ce94ac3 codecvt 20544->20520 20614 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20544->20614 20546 6ce94b0f codecvt 20615 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20546->20615 20549 6ce9622a codecvt 20548->20549 20550 6ce961ff codecvt 20548->20550 20549->20419 20551 6ce831d0 codecvt 3 API calls 20550->20551 20551->20549 20553 6ce83fc9 20552->20553 20555 6ce810a2 20552->20555 20554 6ce825e0 codecvt 4 API calls 20553->20554 20554->20555 20555->20424 20557 6ce81f2f codecvt 20556->20557 20559 6ce81f5a codecvt 20556->20559 20558 6ce831d0 codecvt 3 API calls 20557->20558 20558->20559 20559->20416 20561 6ce83e22 20560->20561 20562 6ce84011 20560->20562 20561->20512 20563 6ce8402a 20562->20563 20575 6ce825e0 20562->20575 20570 6ce82550 20563->20570 20568 6ce84070 20569 6ce84860 3 API calls 20568->20569 20569->20561 20584 6ce82760 20570->20584 20572 6ce82569 20588 6ce827c0 20572->20588 20574 6ce8256f 20580 6ce84860 20574->20580 20576 6ce82760 codecvt 3 API calls 20575->20576 20577 6ce825f7 20576->20577 20593 6ce82830 20577->20593 20579 6ce825fd 20579->20563 20581 6ce8489a codecvt 20580->20581 20582 6ce8486f codecvt 20580->20582 20581->20568 20583 6ce831d0 codecvt 3 API calls 20582->20583 20583->20581 20585 6ce8279a codecvt 20584->20585 20586 6ce8276f codecvt 20584->20586 20585->20572 20587 6ce831d0 codecvt 3 API calls 20586->20587 20587->20585 20589 6ce8280a RtlAllocateHeap 20588->20589 20590 6ce827cf codecvt 20588->20590 20589->20574 20591 6ce831d0 codecvt 3 API calls 20590->20591 20592 6ce827fa codecvt 20591->20592 20592->20589 20594 6ce8287a RtlFreeHeap 20593->20594 20595 6ce8283f codecvt 20593->20595 20594->20579 20596 6ce831d0 codecvt 3 API calls 20595->20596 20597 6ce8286a codecvt 20596->20597 20597->20594 20599 6ce88eda codecvt 20598->20599 20600 6ce88eaf codecvt 20598->20600 20599->20514 20601 6ce831d0 codecvt 3 API calls 20600->20601 20601->20599 20603 6ce84163 20602->20603 20604 6ce83ff0 5 API calls 20603->20604 20605 6ce8418c 20604->20605 20607 6ce84195 20605->20607 20616 6ce84090 LoadLibraryA LoadLibraryA LoadLibraryA 20605->20616 20607->20531 20608->20542 20609->20542 20610->20542 20611->20542 20612->20542 20613->20544 20614->20546 20615->20520 20616->20607 20618 6ce8384a codecvt 20617->20618 20619 6ce8381f codecvt 20617->20619 20618->20426 20620 6ce831d0 codecvt 3 API calls 20619->20620 20620->20618 20622 6ce86daf codecvt 20621->20622 20623 6ce86dda codecvt 20621->20623 20624 6ce831d0 codecvt 3 API calls 20622->20624 20623->20428 20624->20623 20625->20441 20626->20443 20627->20445 20628->20445 20630 6ce9ee3a codecvt 20629->20630 20631 6ce9ee0f codecvt 20629->20631 20630->20448 20632 6ce831d0 codecvt 3 API calls 20631->20632 20632->20630 20634 6ce9ee9a codecvt 20633->20634 20635 6ce9ee6f codecvt 20633->20635 20634->20450 20636 6ce831d0 codecvt 3 API calls 20635->20636 20636->20634 20688 6ce848d0 20637->20688 20639 6ce99ea7 codecvt 20692 6ce823f0 20639->20692 20641 6ce98f88 20641->20384 20642 6ce99f09 codecvt 20642->20641 20643 6ce83db0 5 API calls 20642->20643 20644 6ce99f2f 20643->20644 20697 6ce82520 20644->20697 20646 6ce99f52 codecvt 20700 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20646->20700 20648 6ce99f92 codecvt 20649 6ce83db0 5 API calls 20648->20649 20650 6ce99fb8 codecvt 20649->20650 20701 6ce842e0 20650->20701 20652 6ce99ffd codecvt 20707 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20652->20707 20654 6ce9a03e codecvt 20708 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20654->20708 20656 6ce9a062 codecvt 20709 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20656->20709 20658 6ce9a09b codecvt 20710 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20658->20710 20660 6ce9a0b2 codecvt 20711 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20660->20711 20662 6ce9a0de codecvt 20712 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20662->20712 20664 6ce9a115 codecvt 20713 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20664->20713 20666 6ce9a14c codecvt 20714 6ce84350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20666->20714 20668 6ce9a183 codecvt 20669 6ce84860 3 API calls 20668->20669 20670 6ce9a19b 20669->20670 20671 6ce84860 3 API calls 20670->20671 20672 6ce9a1ab 20671->20672 20715 6ce874f0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20672->20715 20674 6ce9a1eb 20675 6ce9a1fa 20674->20675 20716 6ce86f30 20674->20716 20677 6ce9a210 20675->20677 20678 6ce86f30 codecvt 4 API calls 20675->20678 20721 6ce821b0 20677->20721 20678->20677 20680 6ce9a21e 20725 6ce82270 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20680->20725 20682 6ce9a224 20683 6ce9a22f 20682->20683 20726 6ce82390 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20682->20726 20685 6ce83fb0 4 API calls 20683->20685 20686 6ce9a237 20685->20686 20687 6ce83fb0 4 API calls 20686->20687 20687->20641 20689 6ce8490a codecvt 20688->20689 20690 6ce848df codecvt 20688->20690 20689->20639 20691 6ce831d0 codecvt 3 API calls 20690->20691 20691->20689 20693 6ce8243a lstrcmpiW 20692->20693 20694 6ce823ff codecvt 20692->20694 20693->20642 20695 6ce831d0 codecvt 3 API calls 20694->20695 20696 6ce8242a codecvt 20695->20696 20696->20693 20698 6ce842e0 5 API calls 20697->20698 20699 6ce82531 20698->20699 20699->20646 20700->20648 20702 6ce842fd 20701->20702 20703 6ce848d0 3 API calls 20702->20703 20704 6ce8431f 20703->20704 20705 6ce84150 5 API calls 20704->20705 20706 6ce8432e 20705->20706 20706->20652 20707->20654 20708->20656 20709->20658 20710->20660 20711->20662 20712->20664 20713->20666 20714->20668 20715->20674 20717 6ce86f7a FindCloseChangeNotification 20716->20717 20718 6ce86f3f codecvt 20716->20718 20717->20675 20719 6ce831d0 codecvt 3 API calls 20718->20719 20720 6ce86f6a codecvt 20719->20720 20720->20717 20722 6ce821ea codecvt 20721->20722 20723 6ce821bf codecvt 20721->20723 20722->20680 20724 6ce831d0 codecvt 3 API calls 20723->20724 20724->20722 20725->20682 20726->20683 20728 6ce83281 20727->20728 20735 6ce836c0 20728->20735 20730 6ce832af 20730->20457 20731->20472 20732->20474 20733->20476 20734->20478 20736 6ce8370a VirtualAlloc 20735->20736 20737 6ce836cf codecvt 20735->20737 20736->20730 20738 6ce831d0 codecvt 3 API calls 20737->20738 20739 6ce836fa codecvt 20738->20739 20739->20736 21844 6ce82680 5 API calls codecvt 21853 6cea1e6b LoadLibraryA LoadLibraryA LoadLibraryA shutdown closesocket 21859 6ce90c62 LoadLibraryA LoadLibraryA LoadLibraryA WSASend WSARecv 21867 6ce9aa40 8 API calls 21869 6ce8ba44 RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21870 6ce87e45 7 API calls codecvt 21873 6ce98451 Sleep LoadLibraryA LoadLibraryA LoadLibraryA 21874 6ce9f450 7 API calls codecvt 21875 6ce91e50 LoadLibraryA LoadLibraryA LoadLibraryA VirtualFree codecvt 20362 6cea4028 7 API calls codecvt 21883 6ce82620 RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21884 6ce8f220 6 API calls codecvt 20743 6ce9903e 7 API calls codecvt 21890 6ce81430 LoadLibraryA LoadLibraryA LoadLibraryA 20363 6ce9c20c 31 API calls 21795 6ce94010 21796 6ce9401f codecvt 21795->21796 21798 6ce9404a codecvt 21795->21798 21797 6ce831d0 codecvt 3 API calls 21796->21797 21797->21798 21903 6ce897ee 8 API calls codecvt 20742 6cea5bff LoadLibraryA LoadLibraryA LoadLibraryA shutdown closesocket 21913 6ce937f0 6 API calls 20740 6ce94fc3 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 21920 6cea61dd 6 API calls 21923 6ce973af 6 API calls codecvt 21799 6ce93fb0 21800 6ce93fea codecvt 21799->21800 21801 6ce93fbf codecvt 21799->21801 21802 6ce831d0 codecvt 3 API calls 21801->21802 21802->21800 21946 6ce85d90 LoadLibraryA LoadLibraryA LoadLibraryA WSASend 20744 6ce81770 20745 6ce81787 codecvt 20744->20745 20746 6ce81f20 3 API calls 20745->20746 20747 6ce817cd codecvt 20746->20747 20774 6ce81ff0 20747->20774 20752 6ce83db0 5 API calls 20753 6ce817ef 20752->20753 20754 6ce82520 5 API calls 20753->20754 20755 6ce817f8 20754->20755 20808 6ce824b0 20755->20808 20757 6ce8180b 20813 6ce81390 20757->20813 20763 6ce8182e 20764 6ce82210 4 API calls 20763->20764 20765 6ce81838 20764->20765 20766 6ce82210 4 API calls 20765->20766 20767 6ce81842 20766->20767 20768 6ce81390 3 API calls 20767->20768 20769 6ce8184f 20768->20769 20770 6ce81ff0 3 API calls 20769->20770 20771 6ce81856 20770->20771 20772 6ce83fb0 4 API calls 20771->20772 20773 6ce81868 20772->20773 20853 6ce82020 20774->20853 20776 6ce82004 20777 6ce817df 20776->20777 20778 6ce82080 3 API calls 20776->20778 20779 6ce815b0 20777->20779 20778->20777 20780 6ce815c7 20779->20780 20857 6ce82330 20780->20857 20782 6ce815f2 20861 6ce82450 20782->20861 20784 6ce81601 20784->20752 20785 6ce815f8 codecvt 20785->20784 20786 6ce823f0 4 API calls 20785->20786 20787 6ce81638 codecvt 20786->20787 20788 6ce81652 20787->20788 20791 6ce8165c codecvt 20787->20791 20893 6ce81490 10 API calls 20788->20893 20790 6ce81657 20895 6ce822d0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20790->20895 20793 6ce823f0 4 API calls 20791->20793 20795 6ce81689 codecvt 20793->20795 20794 6ce81756 20896 6ce82390 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20794->20896 20797 6ce816a3 20795->20797 20799 6ce816ad codecvt 20795->20799 20894 6ce814e0 9 API calls 20797->20894 20800 6ce823f0 4 API calls 20799->20800 20801 6ce816da codecvt 20800->20801 20802 6ce816f4 20801->20802 20804 6ce816fb codecvt 20801->20804 20865 6ce810f0 20802->20865 20805 6ce823f0 4 API calls 20804->20805 20806 6ce81728 codecvt 20805->20806 20806->20784 20807 6ce81250 34 API calls 20806->20807 20807->20790 20809 6ce824fa RegisterServiceCtrlHandlerExW 20808->20809 20810 6ce824bf codecvt 20808->20810 20809->20757 20811 6ce831d0 codecvt 3 API calls 20810->20811 20812 6ce824ea codecvt 20811->20812 20812->20809 20814 6ce813e6 20813->20814 20998 6ce82150 20814->20998 20816 6ce81429 20817 6ce81250 20816->20817 20818 6ce98fb0 7 API calls 20817->20818 20819 6ce8126e 20818->20819 20820 6cea5b30 4 API calls 20819->20820 20821 6ce81276 codecvt 20820->20821 21002 6ce94f90 20821->21002 20823 6ce8129e codecvt 20824 6ce94f90 6 API calls 20823->20824 20825 6ce812d4 codecvt 20824->20825 21021 6ce934b0 20825->21021 20831 6ce81309 21071 6ce9f070 31 API calls 20831->21071 20833 6ce81362 21074 6ce93570 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20833->21074 20836 6ce81367 21075 6cea1ff0 6 API calls codecvt 20836->21075 20839 6ce8136c 20841 6ce81372 20839->20841 21076 6ce9f1f0 5 API calls codecvt 20839->21076 20840 6ce81302 20840->20833 21065 6ce9bbe0 20840->21065 21072 6ce820e0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20840->21072 21073 6ce9bc90 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20840->21073 21078 6cea5b70 LoadLibraryA LoadLibraryA LoadLibraryA 20841->21078 20843 6ce81379 21077 6cea04e0 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20843->21077 20847 6ce81383 20848 6ce82210 20847->20848 20849 6ce8225a Sleep 20848->20849 20850 6ce8221f codecvt 20848->20850 20849->20763 20851 6ce831d0 codecvt 3 API calls 20850->20851 20852 6ce8224a codecvt 20851->20852 20852->20849 20854 6ce8202f codecvt 20853->20854 20855 6ce8205a codecvt 20853->20855 20856 6ce831d0 codecvt 3 API calls 20854->20856 20855->20776 20856->20855 20858 6ce8236a codecvt 20857->20858 20859 6ce8233f codecvt 20857->20859 20858->20782 20860 6ce831d0 codecvt 3 API calls 20859->20860 20860->20858 20862 6ce8248a codecvt 20861->20862 20863 6ce8245f codecvt 20861->20863 20862->20785 20864 6ce831d0 codecvt 3 API calls 20863->20864 20864->20862 20866 6ce8113b codecvt 20865->20866 20867 6ce81f20 3 API calls 20866->20867 20868 6ce8114d codecvt 20867->20868 20869 6ce81ff0 3 API calls 20868->20869 20870 6ce81180 20869->20870 20897 6ce98fb0 20870->20897 20876 6ce811f0 20877 6ce811fe 20876->20877 20956 6cea71d0 LoadLibraryA LoadLibraryA LoadLibraryA 20876->20956 20936 6ce9a9d0 20877->20936 20882 6ce8120e 20950 6ce9ab80 20882->20950 20886 6ce81225 20887 6ce81230 20886->20887 20961 6cea71d0 LoadLibraryA LoadLibraryA LoadLibraryA 20886->20961 20962 6cea04e0 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20887->20962 20890 6ce81238 20963 6cea5b70 LoadLibraryA LoadLibraryA LoadLibraryA 20890->20963 20892 6ce81240 20892->20790 20893->20790 20894->20790 20895->20794 20896->20784 20898 6ce83db0 5 API calls 20897->20898 20899 6ce98fe3 20898->20899 20900 6ce821b0 3 API calls 20899->20900 20901 6ce99027 20900->20901 20964 6ce964a0 20901->20964 20903 6ce9902d 20904 6ce9904a 20903->20904 20905 6ce99031 20903->20905 20968 6ce96730 20904->20968 20906 6ce82080 3 API calls 20905->20906 20922 6ce99036 20906->20922 20908 6ce9905d 20909 6ce99078 20908->20909 20910 6ce82080 3 API calls 20908->20910 20911 6ce83ff0 5 API calls 20909->20911 20912 6ce99066 20910->20912 20913 6ce99089 20911->20913 20912->20909 20916 6ce9906b 20912->20916 20917 6ce96730 4 API calls 20913->20917 20914 6ce86f30 codecvt 4 API calls 20918 6ce99145 20914->20918 20915 6ce83fb0 4 API calls 20919 6ce811b4 20915->20919 20920 6ce82080 3 API calls 20916->20920 20921 6ce990a0 20917->20921 20918->20915 20924 6cea5b30 20919->20924 20920->20922 20921->20922 20923 6ce82080 3 API calls 20921->20923 20922->20914 20922->20918 20923->20922 20973 6cea2d80 20924->20973 20926 6cea5b3e 20927 6cea2d80 3 API calls 20926->20927 20928 6cea5b43 20927->20928 20929 6cea2d80 3 API calls 20928->20929 20930 6cea5b48 20929->20930 20977 6cea6cd0 20930->20977 20932 6cea5b59 20933 6ce811cf 20932->20933 20934 6cea2d80 3 API calls 20932->20934 20935 6cea0440 31 API calls 20933->20935 20934->20933 20935->20876 20937 6ce9aa03 codecvt 20936->20937 20982 6ce93d10 20937->20982 20939 6ce9aa12 codecvt 20940 6ce9aa54 20939->20940 20941 6ce9aa36 20939->20941 20987 6ce93e70 20940->20987 20942 6ce82080 3 API calls 20941->20942 20944 6ce81206 20942->20944 20949 6ce9ab40 LoadLibraryA LoadLibraryA LoadLibraryA 20944->20949 20945 6ce9aa6e 20946 6ce98fb0 7 API calls 20945->20946 20947 6ce9aab3 20946->20947 20947->20944 20992 6ce9b7f0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20947->20992 20949->20882 20951 6ce9ab91 20950->20951 20952 6ce9ab9c 20950->20952 20997 6ce9b8d0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20951->20997 20993 6ce93e10 20952->20993 20955 6ce81216 20957 6ce81f80 20955->20957 20956->20877 20958 6ce81fba codecvt 20957->20958 20959 6ce81f8f codecvt 20957->20959 20958->20886 20960 6ce831d0 codecvt 3 API calls 20959->20960 20960->20958 20961->20887 20962->20890 20963->20892 20965 6ce964af codecvt 20964->20965 20966 6ce964da codecvt 20964->20966 20967 6ce831d0 codecvt 3 API calls 20965->20967 20966->20903 20967->20966 20969 6ce9677a GetTokenInformation 20968->20969 20970 6ce9673f codecvt 20968->20970 20969->20908 20971 6ce831d0 codecvt 3 API calls 20970->20971 20972 6ce9676a codecvt 20971->20972 20972->20969 20974 6cea2dba codecvt 20973->20974 20975 6cea2d8f codecvt 20973->20975 20974->20926 20976 6ce831d0 codecvt 3 API calls 20975->20976 20976->20974 20978 6cea6d1a WSAStartup 20977->20978 20979 6cea6cdf codecvt 20977->20979 20978->20932 20980 6ce831d0 codecvt 3 API calls 20979->20980 20981 6cea6d0a codecvt 20980->20981 20981->20978 20983 6ce93d5a CreateWindowExW 20982->20983 20984 6ce93d1f codecvt 20982->20984 20983->20939 20985 6ce831d0 codecvt 3 API calls 20984->20985 20986 6ce93d4a codecvt 20985->20986 20986->20983 20988 6ce93eba SetTimer 20987->20988 20989 6ce93e7f codecvt 20987->20989 20988->20945 20990 6ce831d0 codecvt 3 API calls 20989->20990 20991 6ce93eaa codecvt 20990->20991 20991->20988 20992->20944 20994 6ce93e4a codecvt 20993->20994 20995 6ce93e1f codecvt 20993->20995 20994->20955 20996 6ce831d0 codecvt 3 API calls 20995->20996 20996->20994 20997->20952 20999 6ce8218a codecvt 20998->20999 21000 6ce8215f codecvt 20998->21000 20999->20816 21001 6ce831d0 codecvt 3 API calls 21000->21001 21001->20999 21003 6ce821b0 3 API calls 21002->21003 21004 6ce94faf 21003->21004 21005 6ce964a0 3 API calls 21004->21005 21006 6ce94fb5 21005->21006 21007 6ce94fb9 21006->21007 21008 6ce94fc5 21006->21008 21009 6ce82080 3 API calls 21007->21009 21079 6ce96510 21008->21079 21016 6ce94fbe 21009->21016 21011 6ce94fd4 21012 6ce94fd8 21011->21012 21013 6ce94fe4 21011->21013 21014 6ce82080 3 API calls 21012->21014 21084 6ce96580 21013->21084 21014->21016 21018 6ce86f30 codecvt 4 API calls 21016->21018 21019 6ce95028 21016->21019 21017 6ce9500d 21017->21016 21020 6ce82080 3 API calls 21017->21020 21018->21019 21019->20823 21020->21016 21089 6ce8f810 21021->21089 21023 6ce934f3 21024 6ce812ee 21023->21024 21025 6ce82080 3 API calls 21023->21025 21026 6cea1dd0 21024->21026 21025->21024 21027 6cea2b00 4 API calls 21026->21027 21028 6cea1e50 21027->21028 21029 6cea1e5e 21028->21029 21030 6cea1e70 21028->21030 21031 6cea2d80 3 API calls 21029->21031 21032 6cea2be0 4 API calls 21030->21032 21039 6cea1e63 21031->21039 21033 6cea1e8d 21032->21033 21034 6cea1ea3 21033->21034 21035 6cea1e91 21033->21035 21037 6cea2be0 4 API calls 21034->21037 21036 6cea2d80 3 API calls 21035->21036 21036->21039 21041 6cea1ec5 21037->21041 21038 6ce812f9 21038->20840 21070 6cea0440 31 API calls 21038->21070 21039->21038 21040 6cea2c50 4 API calls 21039->21040 21042 6cea1fd2 21040->21042 21043 6cea1edb 21041->21043 21044 6cea1ec9 21041->21044 21046 6cea2cb0 4 API calls 21042->21046 21045 6ce9d910 4 API calls 21043->21045 21047 6cea2d80 3 API calls 21044->21047 21048 6cea1ee2 21045->21048 21046->21038 21047->21039 21049 6cea1eeb 21048->21049 21050 6cea1efd 21048->21050 21051 6cea2d80 3 API calls 21049->21051 21785 6cea2b70 21050->21785 21051->21039 21053 6cea1f2b 21054 6cea1f3e 21053->21054 21055 6cea1f2f 21053->21055 21790 6cea2d10 21054->21790 21056 6cea2d80 3 API calls 21055->21056 21056->21039 21058 6cea1f78 21059 6cea1f88 21058->21059 21060 6cea1f7c 21058->21060 21062 6ce8f810 31 API calls 21059->21062 21061 6cea2d80 3 API calls 21060->21061 21061->21039 21063 6cea1f9e 21062->21063 21063->21038 21064 6cea2d80 3 API calls 21063->21064 21064->21039 21066 6ce8f810 31 API calls 21065->21066 21067 6ce9bc1e 21066->21067 21068 6ce9bc31 21067->21068 21069 6ce82080 3 API calls 21067->21069 21068->20840 21069->21068 21070->20831 21071->20840 21072->20840 21073->20840 21074->20836 21075->20839 21076->20843 21077->20841 21078->20847 21080 6ce9655a LookupPrivilegeValueW 21079->21080 21081 6ce9651f codecvt 21079->21081 21080->21011 21082 6ce831d0 codecvt 3 API calls 21081->21082 21083 6ce9654a codecvt 21082->21083 21083->21080 21085 6ce965ca AdjustTokenPrivileges 21084->21085 21086 6ce9658f codecvt 21084->21086 21085->21017 21087 6ce831d0 codecvt 3 API calls 21086->21087 21088 6ce965ba codecvt 21087->21088 21088->21085 21090 6ce8f85a CreateThread 21089->21090 21091 6ce8f81f codecvt 21089->21091 21090->21023 21094 6ce9c490 21090->21094 21112 6cea2080 21090->21112 21126 6cea4ed0 21090->21126 21092 6ce831d0 codecvt 3 API calls 21091->21092 21093 6ce8f84a codecvt 21092->21093 21093->21090 21095 6ce9c4b5 codecvt 21094->21095 21096 6ce81f20 3 API calls 21095->21096 21097 6ce9c4c7 codecvt 21096->21097 21098 6ce81ff0 3 API calls 21097->21098 21099 6ce9c4dc 21098->21099 21100 6ce82550 4 API calls 21099->21100 21101 6ce9c4e9 21100->21101 21107 6ce9c5d7 21101->21107 21134 6cea0be0 21101->21134 21137 6cea0dc0 21101->21137 21140 6ce9be60 21101->21140 21173 6ce9bfc0 21101->21173 21197 6ce8f880 21101->21197 21201 6cea0de0 21101->21201 21208 6cea0c10 21101->21208 21109 6ce9c62f 21107->21109 21110 6ce825e0 codecvt 4 API calls 21107->21110 21110->21109 21113 6cea209f codecvt 21112->21113 21114 6ce81f20 3 API calls 21113->21114 21115 6cea20b1 codecvt 21114->21115 21116 6ce81ff0 3 API calls 21115->21116 21117 6cea20c3 21116->21117 21118 6ce836c0 4 API calls 21117->21118 21122 6cea20d9 21118->21122 21119 6ce83730 codecvt 4 API calls 21121 6cea2137 21119->21121 21123 6cea2d80 3 API calls 21122->21123 21125 6cea2111 21122->21125 21592 6cea2de0 21122->21592 21597 6cea2140 LoadLibraryA LoadLibraryA LoadLibraryA RegCreateKeyExW codecvt 21122->21597 21123->21122 21125->21119 21127 6cea4eef codecvt 21126->21127 21128 6ce81f20 3 API calls 21127->21128 21129 6cea4f01 codecvt 21128->21129 21130 6ce81ff0 3 API calls 21129->21130 21131 6cea4f13 21130->21131 21598 6cea3d70 21131->21598 21135 6cea0c10 8 API calls 21134->21135 21136 6cea0bfb 21135->21136 21136->21101 21138 6cea0de0 5 API calls 21137->21138 21139 6cea0dd6 21138->21139 21139->21101 21225 6cea5a30 21140->21225 21145 6ce9be9f 21147 6ce9bea8 21145->21147 21148 6ce9bed2 21145->21148 21146 6ce9beb3 21233 6cea5bd0 21146->21233 21150 6ce9beb1 21147->21150 21287 6cea6480 11 API calls 21147->21287 21286 6cea6190 11 API calls 21148->21286 21153 6ce9bf01 21150->21153 21154 6ce9bf30 21150->21154 21155 6cea6bd0 3 API calls 21153->21155 21256 6cea6900 21154->21256 21157 6ce9bf09 21155->21157 21159 6cea6bf0 5 API calls 21157->21159 21162 6ce9bf11 21159->21162 21160 6ce9bf58 21163 6ce9bf64 21160->21163 21288 6ce9c330 31 API calls codecvt 21160->21288 21161 6ce9bf66 21261 6ce9c130 21161->21261 21166 6cea5b10 6 API calls 21162->21166 21274 6cea6bd0 21163->21274 21168 6ce9bf25 21166->21168 21168->21101 21447 6cea3490 21173->21447 21183 6ce84860 3 API calls 21185 6ce9c032 21183->21185 21186 6ce84860 3 API calls 21185->21186 21188 6ce9c042 21186->21188 21190 6ce9d910 4 API calls 21188->21190 21191 6ce9c04c 21190->21191 21192 6ce9c0a4 21191->21192 21193 6ce9c096 21191->21193 21194 6ce9c130 31 API calls 21192->21194 21195 6ce9bffe 21193->21195 21501 6ce9c330 31 API calls codecvt 21193->21501 21194->21195 21471 6ce8f8e0 21195->21471 21198 6ce8f8ba codecvt 21197->21198 21199 6ce8f88f codecvt 21197->21199 21198->21101 21200 6ce831d0 codecvt 3 API calls 21199->21200 21200->21198 21202 6ce84860 3 API calls 21201->21202 21203 6cea0e04 21202->21203 21204 6cea0e24 21203->21204 21539 6cea0ec0 21203->21539 21206 6cea0e63 21204->21206 21556 6cea0e90 LoadLibraryA LoadLibraryA LoadLibraryA 21204->21556 21206->21101 21211 6cea0c29 codecvt 21208->21211 21209 6cea0d71 21209->21101 21210 6ce86da0 3 API calls 21210->21211 21211->21209 21211->21210 21212 6cea0cae 21211->21212 21215 6cea0cd0 21211->21215 21582 6cea1440 7 API calls 21211->21582 21213 6ce83810 3 API calls 21212->21213 21213->21215 21573 6cea1860 21215->21573 21217 6cea0d64 21585 6cea0d90 LoadLibraryA LoadLibraryA LoadLibraryA 21217->21585 21219 6cea0d06 21219->21217 21221 6cea0d50 21219->21221 21577 6cea1710 21219->21577 21583 6cea18c0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21221->21583 21223 6cea0d59 21584 6cea1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21223->21584 21289 6cea2f10 21225->21289 21228 6cea5ba0 21311 6cea2b00 21228->21311 21230 6cea5bb2 21231 6ce9be80 21230->21231 21232 6cea2d80 3 API calls 21230->21232 21231->21145 21231->21146 21232->21231 21316 6ce9d910 21233->21316 21235 6cea5be9 21236 6cea5bf2 21235->21236 21237 6cea5c04 21235->21237 21238 6cea2d80 3 API calls 21236->21238 21321 6cea2e50 21237->21321 21242 6cea5bf7 21238->21242 21240 6cea5c24 21325 6cea6d90 21240->21325 21243 6cea5d06 21242->21243 21340 6cea2c50 21242->21340 21243->21150 21244 6cea5c3a 21245 6cea5c3e 21244->21245 21246 6cea5c50 21244->21246 21247 6cea2d80 3 API calls 21245->21247 21330 6cea2be0 21246->21330 21247->21242 21250 6cea5c70 21335 6cea6e00 21250->21335 21251 6cea5cfa 21345 6cea2cb0 21251->21345 21254 6cea5caf 21254->21242 21255 6cea2be0 4 API calls 21254->21255 21255->21242 21350 6cea6e80 21256->21350 21258 6cea6932 21259 6ce9bf40 21258->21259 21355 6cea6ef0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21258->21355 21259->21160 21259->21161 21356 6ce95f80 21261->21356 21263 6ce9c1c1 21359 6cea3360 21263->21359 21264 6ce95f80 3 API calls 21266 6ce9c157 21264->21266 21266->21263 21266->21264 21268 6ce9c1db 21268->21163 21269 6ce9c1d2 21269->21268 21366 6cea3250 21269->21366 21374 6ce9cb10 13 API calls codecvt 21269->21374 21375 6ce9d1e0 31 API calls codecvt 21269->21375 21376 6ce9d290 LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21269->21376 21377 6ce9d2f0 6 API calls codecvt 21269->21377 21420 6cea70d0 21274->21420 21276 6ce9bf98 21277 6cea6bf0 21276->21277 21278 6cea6c00 21277->21278 21282 6ce9bfa0 21277->21282 21279 6cea2c50 4 API calls 21278->21279 21280 6cea6c0e 21279->21280 21281 6cea2cb0 4 API calls 21280->21281 21281->21282 21283 6cea5b10 21282->21283 21424 6cea3060 21283->21424 21286->21150 21287->21150 21288->21163 21298 6ce9db80 21289->21298 21292 6ce90a90 3 API calls 21293 6cea2fa8 21292->21293 21294 6ce90a90 3 API calls 21293->21294 21295 6cea300b 21294->21295 21296 6ce90a90 3 API calls 21295->21296 21297 6ce9be78 21296->21297 21297->21228 21307 6ce9e140 21298->21307 21300 6ce9dbb7 21301 6ce82550 4 API calls 21300->21301 21302 6ce9dbcf 21301->21302 21303 6ce82550 4 API calls 21302->21303 21304 6ce9dbf7 21303->21304 21305 6ce836c0 4 API calls 21304->21305 21306 6ce9dc22 21305->21306 21306->21292 21308 6ce9e14f codecvt 21307->21308 21310 6ce9e17a codecvt 21307->21310 21309 6ce831d0 codecvt 3 API calls 21308->21309 21309->21310 21310->21300 21312 6cea2b4a socket 21311->21312 21313 6cea2b0f codecvt 21311->21313 21312->21230 21314 6ce831d0 codecvt 3 API calls 21313->21314 21315 6cea2b3a codecvt 21314->21315 21315->21312 21317 6ce9d95a gethostbyname 21316->21317 21318 6ce9d91f codecvt 21316->21318 21317->21235 21319 6ce831d0 codecvt 3 API calls 21318->21319 21320 6ce9d94a codecvt 21319->21320 21320->21317 21322 6cea2e5f codecvt 21321->21322 21324 6cea2e8a codecvt 21321->21324 21323 6ce831d0 codecvt 3 API calls 21322->21323 21323->21324 21324->21240 21326 6cea6dda connect 21325->21326 21327 6cea6d9f codecvt 21325->21327 21326->21244 21328 6ce831d0 codecvt 3 API calls 21327->21328 21329 6cea6dca codecvt 21328->21329 21329->21326 21331 6cea2c2a setsockopt 21330->21331 21332 6cea2bef codecvt 21330->21332 21331->21250 21333 6ce831d0 codecvt 3 API calls 21332->21333 21334 6cea2c1a codecvt 21333->21334 21334->21331 21336 6cea6e4a WSAIoctl 21335->21336 21337 6cea6e0f codecvt 21335->21337 21336->21254 21338 6ce831d0 codecvt 3 API calls 21337->21338 21339 6cea6e3a codecvt 21338->21339 21339->21336 21341 6cea2c9a shutdown 21340->21341 21342 6cea2c5f codecvt 21340->21342 21341->21251 21343 6ce831d0 codecvt 3 API calls 21342->21343 21344 6cea2c8a codecvt 21343->21344 21344->21341 21346 6cea2cfa closesocket 21345->21346 21347 6cea2cbf codecvt 21345->21347 21346->21243 21348 6ce831d0 codecvt 3 API calls 21347->21348 21349 6cea2cea codecvt 21348->21349 21349->21346 21351 6cea6eca getsockname 21350->21351 21352 6cea6e8f codecvt 21350->21352 21351->21258 21353 6ce831d0 codecvt 3 API calls 21352->21353 21354 6cea6eba codecvt 21353->21354 21354->21351 21355->21259 21378 6ce963e0 21356->21378 21358 6ce95f8f 21358->21266 21382 6ce9dcf0 21359->21382 21361 6cea3381 21362 6cea340b 21361->21362 21365 6cea338a 21361->21365 21393 6cea3190 21361->21393 21364 6ce83810 3 API calls 21362->21364 21364->21365 21365->21269 21367 6cea3270 21366->21367 21369 6cea32b2 21367->21369 21373 6cea329f 21367->21373 21407 6cea30e0 21367->21407 21370 6cea3333 21369->21370 21371 6cea30e0 4 API calls 21369->21371 21369->21373 21412 6ce9de70 LoadLibraryA LoadLibraryA LoadLibraryA 21370->21412 21371->21369 21373->21269 21374->21269 21375->21269 21376->21269 21377->21269 21379 6ce9641a codecvt 21378->21379 21380 6ce963ef codecvt 21378->21380 21379->21358 21381 6ce831d0 codecvt 3 API calls 21380->21381 21381->21379 21383 6ce9dd09 21382->21383 21384 6ce9dd13 21382->21384 21383->21361 21385 6ce95f80 3 API calls 21384->21385 21386 6ce9dd1a 21385->21386 21386->21383 21387 6ce9ddd6 21386->21387 21398 6ce9e210 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21386->21398 21387->21383 21390 6ce83810 3 API calls 21387->21390 21389 6ce9ddb9 21389->21387 21391 6ce9ddc2 21389->21391 21390->21383 21399 6ce9e1b0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21391->21399 21400 6cea3430 21393->21400 21397 6cea31bf 21397->21361 21398->21389 21399->21383 21404 6cea6c40 21400->21404 21403 6ce820e0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21403->21397 21405 6cea6970 LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21404->21405 21406 6cea31b6 21405->21406 21406->21397 21406->21403 21413 6ce895e0 21407->21413 21411 6cea3106 21411->21367 21412->21373 21417 6cea6c80 21413->21417 21416 6ce820e0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21416->21411 21418 6cea69e0 LoadLibraryA LoadLibraryA LoadLibraryA WSARecv 21417->21418 21419 6ce89613 21418->21419 21419->21411 21419->21416 21421 6cea70df codecvt 21420->21421 21423 6cea710a codecvt 21420->21423 21422 6ce831d0 codecvt 3 API calls 21421->21422 21422->21423 21423->21276 21425 6cea3082 21424->21425 21426 6cea3076 21424->21426 21428 6ce86f30 codecvt 4 API calls 21425->21428 21431 6cea30a1 21425->21431 21427 6ce86f30 codecvt 4 API calls 21426->21427 21427->21425 21428->21431 21429 6ce86f30 codecvt 4 API calls 21432 6cea30c0 21429->21432 21431->21429 21431->21432 21434 6ce9dc60 21432->21434 21435 6ce9dc7b 21434->21435 21436 6ce9dc8d 21434->21436 21437 6ce825e0 codecvt 4 API calls 21435->21437 21438 6ce9dcc3 21436->21438 21439 6ce825e0 codecvt 4 API calls 21436->21439 21437->21436 21442 6ce83730 21438->21442 21439->21438 21441 6ce9dce2 21441->21168 21443 6ce8377a VirtualFree 21442->21443 21444 6ce8373f codecvt 21442->21444 21443->21441 21445 6ce831d0 codecvt 3 API calls 21444->21445 21446 6ce8376a codecvt 21445->21446 21446->21443 21448 6cea2f10 5 API calls 21447->21448 21449 6cea349f 21448->21449 21502 6ce84c30 21449->21502 21452 6ce83db0 5 API calls 21453 6cea34b8 21452->21453 21454 6ce83db0 5 API calls 21453->21454 21455 6cea34c6 21454->21455 21456 6ce83ff0 5 API calls 21455->21456 21457 6cea35a9 21456->21457 21458 6ce83ff0 5 API calls 21457->21458 21459 6ce9bfe0 21458->21459 21460 6cea3660 21459->21460 21461 6ce83810 3 API calls 21460->21461 21462 6cea367e 21461->21462 21463 6ce8f810 31 API calls 21462->21463 21465 6cea36b3 21463->21465 21464 6ce9bfef 21464->21195 21467 6cea36e0 21464->21467 21465->21464 21466 6ce82080 3 API calls 21465->21466 21466->21464 21470 6cea36f2 21467->21470 21468 6ce9c00e 21468->21183 21468->21195 21469 6ce82210 4 API calls 21469->21470 21470->21468 21470->21469 21472 6ce81f80 3 API calls 21471->21472 21473 6ce8f8f3 21472->21473 21474 6ce8f8fc 21473->21474 21475 6ce82080 3 API calls 21473->21475 21476 6cea3730 21474->21476 21475->21474 21477 6cea3739 21476->21477 21478 6cea3751 21477->21478 21480 6ce82210 4 API calls 21477->21480 21509 6cea0070 21478->21509 21480->21477 21483 6cea37c0 21484 6cea37d5 21483->21484 21485 6ce82210 4 API calls 21483->21485 21515 6cea3a50 21484->21515 21485->21483 21488 6ce8f880 3 API calls 21489 6cea37f0 21488->21489 21490 6ce9c0ed 21489->21490 21491 6ce86f30 codecvt 4 API calls 21489->21491 21492 6cea3620 21490->21492 21491->21490 21493 6ce83fb0 4 API calls 21492->21493 21494 6cea3635 21493->21494 21495 6ce83fb0 4 API calls 21494->21495 21496 6cea3643 21495->21496 21532 6ce84c70 21496->21532 21499 6cea3060 codecvt 6 API calls 21500 6ce9c102 21499->21500 21500->21101 21501->21195 21505 6ce84cb0 21502->21505 21504 6ce84c4a 21504->21452 21506 6ce84cbf codecvt 21505->21506 21508 6ce84cea codecvt 21505->21508 21507 6ce831d0 codecvt 3 API calls 21506->21507 21507->21508 21508->21504 21524 6cea0090 21509->21524 21511 6cea0080 21512 6cea0110 21511->21512 21528 6cea0130 21512->21528 21514 6cea0120 21514->21483 21516 6cea0070 3 API calls 21515->21516 21517 6cea3a68 21516->21517 21518 6cea3ad9 21517->21518 21519 6ce81f80 3 API calls 21517->21519 21520 6cea3b40 21518->21520 21521 6ce81f80 3 API calls 21518->21521 21519->21518 21522 6cea0110 3 API calls 21520->21522 21521->21520 21523 6cea37e2 21522->21523 21523->21488 21525 6cea00ca codecvt 21524->21525 21526 6cea009f codecvt 21524->21526 21525->21511 21527 6ce831d0 codecvt 3 API calls 21526->21527 21527->21525 21529 6cea016a codecvt 21528->21529 21530 6cea013f codecvt 21528->21530 21529->21514 21531 6ce831d0 codecvt 3 API calls 21530->21531 21531->21529 21535 6ce84d10 21532->21535 21534 6ce84c94 21534->21499 21536 6ce84d4a codecvt 21535->21536 21537 6ce84d1f codecvt 21535->21537 21536->21534 21538 6ce831d0 codecvt 3 API calls 21537->21538 21538->21536 21540 6cea0f05 codecvt 21539->21540 21557 6ce8d870 21540->21557 21543 6cea0fa5 21548 6cea0f31 21543->21548 21567 6ce8d960 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21543->21567 21546 6cea0f17 codecvt 21546->21543 21547 6cea0fff 21546->21547 21546->21548 21562 6cea1990 21546->21562 21568 6cea1350 LoadLibraryA LoadLibraryA LoadLibraryA 21546->21568 21550 6cea101b 21547->21550 21569 6ce8d960 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21547->21569 21548->21204 21570 6cea1920 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21550->21570 21552 6cea1095 21571 6cea1920 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21552->21571 21554 6cea10aa 21572 6cea1920 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21554->21572 21556->21206 21558 6ce8d8ba RegCreateKeyExW 21557->21558 21559 6ce8d87f codecvt 21557->21559 21558->21546 21560 6ce831d0 codecvt 3 API calls 21559->21560 21561 6ce8d8aa codecvt 21560->21561 21561->21558 21563 6cea19da RegEnumValueA 21562->21563 21564 6cea199f codecvt 21562->21564 21563->21546 21565 6ce831d0 codecvt 3 API calls 21564->21565 21566 6cea19ca codecvt 21565->21566 21566->21563 21567->21548 21568->21546 21569->21550 21570->21552 21571->21554 21572->21548 21574 6cea189a codecvt 21573->21574 21575 6cea186f codecvt 21573->21575 21574->21219 21576 6ce831d0 codecvt 3 API calls 21575->21576 21576->21574 21586 6cea1ca0 21577->21586 21579 6cea1743 21580 6cea174c 21579->21580 21591 6cea1d10 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21579->21591 21580->21219 21582->21211 21583->21223 21584->21217 21585->21209 21587 6cea1cea DnsQuery_A 21586->21587 21588 6cea1caf codecvt 21586->21588 21587->21579 21589 6ce831d0 codecvt 3 API calls 21588->21589 21590 6cea1cda codecvt 21589->21590 21590->21587 21591->21580 21593 6cea2e2a recv 21592->21593 21594 6cea2def codecvt 21592->21594 21593->21122 21595 6ce831d0 codecvt 3 API calls 21594->21595 21596 6cea2e1a codecvt 21595->21596 21596->21593 21597->21122 21628 6ce9ef20 21598->21628 21600 6cea3d87 21632 6cea4f90 21600->21632 21602 6cea3d8d 21603 6ce98fb0 7 API calls 21602->21603 21604 6cea3db7 21603->21604 21605 6cea3dc0 21604->21605 21659 6ce9f3e0 LoadLibraryA LoadLibraryA LoadLibraryA 21604->21659 21607 6cea3dfd 21605->21607 21660 6ce8bff0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21605->21660 21609 6cea3e18 21607->21609 21610 6ce964a0 3 API calls 21607->21610 21611 6cea3e27 21609->21611 21661 6cea4ff0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21609->21661 21610->21609 21637 6ce83e50 21611->21637 21615 6cea3e34 21616 6ce82210 4 API calls 21615->21616 21617 6cea3e7c 21615->21617 21641 6cea3f30 21615->21641 21616->21615 21618 6cea3ed7 21617->21618 21662 6cea5050 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21617->21662 21620 6cea3ee6 21618->21620 21621 6ce86f30 codecvt 4 API calls 21618->21621 21622 6cea3efc 21620->21622 21623 6ce86f30 codecvt 4 API calls 21620->21623 21621->21620 21624 6cea3a50 3 API calls 21622->21624 21623->21622 21625 6cea3f10 21624->21625 21626 6ce83fb0 4 API calls 21625->21626 21627 6cea3f1e 21626->21627 21629 6ce9ef5a codecvt 21628->21629 21630 6ce9ef2f codecvt 21628->21630 21629->21600 21631 6ce831d0 codecvt 3 API calls 21630->21631 21631->21629 21633 6cea4fda SetThreadPriority 21632->21633 21634 6cea4f9f codecvt 21632->21634 21633->21602 21635 6ce831d0 codecvt 3 API calls 21634->21635 21636 6cea4fca codecvt 21635->21636 21636->21633 21638 6ce83e6d 21637->21638 21639 6ce83ff0 5 API calls 21638->21639 21640 6ce83ec2 21639->21640 21640->21615 21642 6cea3f96 codecvt 21641->21642 21663 6cea1af0 21642->21663 21644 6cea4075 codecvt 21645 6cea409e 21644->21645 21646 6cea4094 21644->21646 21668 6cea50b0 21645->21668 21647 6ce82080 3 API calls 21646->21647 21651 6cea4099 21647->21651 21649 6cea40c0 21650 6cea40c9 21649->21650 21658 6cea40d3 21649->21658 21652 6ce82080 3 API calls 21650->21652 21653 6cea4116 21651->21653 21755 6cea1c40 21651->21755 21652->21651 21654 6cea4125 21653->21654 21657 6cea1c40 4 API calls 21653->21657 21654->21615 21657->21654 21658->21651 21673 6cea4130 21658->21673 21659->21605 21660->21607 21661->21611 21662->21618 21664 6cea1b3a InternetOpenA 21663->21664 21665 6cea1aff codecvt 21663->21665 21664->21644 21666 6ce831d0 codecvt 3 API calls 21665->21666 21667 6cea1b2a codecvt 21666->21667 21667->21664 21669 6cea50fa InternetConnectA 21668->21669 21670 6cea50bf codecvt 21668->21670 21669->21649 21671 6ce831d0 codecvt 3 API calls 21670->21671 21672 6cea50ea codecvt 21671->21672 21672->21669 21674 6ce95f80 3 API calls 21673->21674 21675 6cea4162 codecvt 21674->21675 21760 6cea51a0 21675->21760 21677 6cea41e2 codecvt 21678 6cea420a 21677->21678 21679 6cea4217 21677->21679 21680 6ce82080 3 API calls 21678->21680 21764 6cea5300 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21679->21764 21706 6cea420f 21680->21706 21682 6cea422f 21765 6cea5300 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21682->21765 21684 6cea4240 21766 6cea5300 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21684->21766 21685 6cea4d86 21685->21658 21687 6cea1c40 4 API calls 21687->21685 21688 6cea4251 codecvt 21767 6ce9eac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21688->21767 21690 6cea42d5 codecvt 21768 6ce9eac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21690->21768 21692 6cea4357 codecvt 21769 6ce9eac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21692->21769 21694 6cea43ee codecvt 21770 6ce9eac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21694->21770 21696 6ce84860 3 API calls 21710 6cea447c codecvt 21696->21710 21698 6cea455a 21699 6ce82080 3 API calls 21698->21699 21699->21706 21702 6cea4592 21703 6ce82080 3 API calls 21702->21703 21703->21706 21704 6ce82080 3 API calls 21704->21710 21706->21685 21706->21687 21707 6cea4651 codecvt 21775 6cea4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21707->21775 21709 6ce84930 LoadLibraryA LoadLibraryA LoadLibraryA 21709->21710 21710->21696 21710->21698 21710->21702 21710->21704 21710->21706 21710->21707 21710->21709 21711 6cea5300 LoadLibraryA LoadLibraryA LoadLibraryA 21710->21711 21771 6cea5220 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21710->21771 21772 6cea5130 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21710->21772 21773 6cea5290 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21710->21773 21774 6cea4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21710->21774 21711->21710 21712 6cea472f codecvt 21712->21706 21776 6cea4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21712->21776 21714 6cea4790 codecvt 21714->21706 21777 6cea4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21714->21777 21716 6cea47f1 codecvt 21716->21706 21778 6cea4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21716->21778 21718 6cea4852 codecvt 21718->21706 21779 6cea4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21718->21779 21720 6cea48b3 codecvt 21720->21706 21721 6cea48de 21720->21721 21722 6cea493f 21720->21722 21725 6cea0070 3 API calls 21721->21725 21723 6cea4a4b 21722->21723 21724 6cea49a6 21722->21724 21728 6cea4b99 21723->21728 21729 6cea4a55 21723->21729 21726 6cea0070 3 API calls 21724->21726 21727 6cea48ec 21725->21727 21730 6cea49b4 21726->21730 21731 6cea0110 3 API calls 21727->21731 21734 6cea0070 3 API calls 21728->21734 21753 6cea4a30 21728->21753 21729->21706 21732 6cea0070 3 API calls 21729->21732 21739 6cea0110 3 API calls 21730->21739 21733 6cea492a 21731->21733 21736 6cea4a95 21732->21736 21738 6cea3a50 3 API calls 21733->21738 21735 6cea4bad 21734->21735 21740 6cea0110 3 API calls 21735->21740 21780 6ce84090 LoadLibraryA LoadLibraryA LoadLibraryA 21736->21780 21738->21706 21739->21753 21740->21753 21742 6cea4c24 21744 6ce82080 3 API calls 21742->21744 21743 6cea4b4e 21746 6cea0110 3 API calls 21743->21746 21744->21706 21745 6cea0070 3 API calls 21745->21753 21749 6cea4b8c 21746->21749 21748 6cea4c3a 21748->21706 21751 6ce82210 4 API calls 21748->21751 21781 6cea3b60 LoadLibraryA LoadLibraryA LoadLibraryA 21749->21781 21751->21748 21752 6cea0110 3 API calls 21752->21753 21753->21742 21753->21745 21753->21748 21753->21752 21782 6cea1bd0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21753->21782 21783 6ce84090 LoadLibraryA LoadLibraryA LoadLibraryA 21753->21783 21784 6cea3c50 LoadLibraryA LoadLibraryA LoadLibraryA 21753->21784 21756 6cea1c8a InternetCloseHandle 21755->21756 21757 6cea1c4f codecvt 21755->21757 21756->21653 21758 6ce831d0 codecvt 3 API calls 21757->21758 21759 6cea1c7a codecvt 21758->21759 21759->21756 21761 6cea51af codecvt 21760->21761 21763 6cea51da codecvt 21760->21763 21762 6ce831d0 codecvt 3 API calls 21761->21762 21762->21763 21763->21677 21764->21682 21765->21684 21766->21688 21767->21690 21768->21692 21769->21694 21770->21710 21771->21710 21772->21710 21773->21710 21774->21710 21775->21712 21776->21714 21777->21716 21778->21718 21779->21720 21780->21743 21781->21753 21782->21753 21783->21753 21784->21753 21786 6cea2bba bind 21785->21786 21787 6cea2b7f codecvt 21785->21787 21786->21053 21788 6ce831d0 codecvt 3 API calls 21787->21788 21789 6cea2baa codecvt 21788->21789 21789->21786 21791 6cea2d5a ioctlsocket 21790->21791 21792 6cea2d1f codecvt 21790->21792 21791->21058 21793 6ce831d0 codecvt 3 API calls 21792->21793 21794 6cea2d4a codecvt 21793->21794 21794->21791 21974 6cea7150 6 API calls codecvt 21975 6ce97557 Sleep RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 21978 6ce8632e 5 API calls codecvt 21986 6cea5d30 13 API calls codecvt 21987 6cea7130 RtlAllocateHeap LoadLibraryA LoadLibraryA LoadLibraryA VirtualAlloc 21989 6ce8ad09 7 API calls codecvt 20364 6cea450c 5 API calls codecvt 21991 6ce94f00 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 21803 6cea4513 LoadLibraryA LoadLibraryA LoadLibraryA InternetCloseHandle 21805 6cea36f2 Sleep LoadLibraryA LoadLibraryA LoadLibraryA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 174 6ce81000-6ce81014 175 6ce8101f-6ce81023 174->175 176 6ce81055-6ce81059 175->176 177 6ce81025-6ce81048 GetTickCount Sleep GetTickCount 175->177 180 6ce8105b-6ce81062 176->180 181 6ce81064-6ce81068 176->181 178 6ce8104a-6ce81050 177->178 179 6ce81053 177->179 178->179 179->175 188 6ce8107f-6ce81082 180->188 182 6ce8106a-6ce8106e 181->182 183 6ce81070-6ce81074 181->183 182->188 186 6ce8107d 183->186 187 6ce81076-6ce8107b 183->187 186->188 187->188
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: CountTick$Sleep
                        • String ID: F$d
                        • API String ID: 4250438611-811691143
                        • Opcode ID: 6da0b52e6283401d33a19c089dc6781841239daf8f0ca6d2733d92dc85a25cb9
                        • Instruction ID: 63cbe722af710afdc223de3e79295cbb5810f97743beea5a3749bf1784f60073
                        • Opcode Fuzzy Hash: 6da0b52e6283401d33a19c089dc6781841239daf8f0ca6d2733d92dc85a25cb9
                        • Instruction Fuzzy Hash: 2F010030D06288DFCB04DFE8CD4539DB771BF06319F20866AD53996741DB729A42EB41
                        APIs
                        • AdjustTokenPrivileges.KERNELBASE(00000028,?,?,?,?,?,00000028,00000000), ref: 6CE965E2
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: AdjustPrivilegesToken
                        • String ID:
                        • API String ID: 2874748243-0
                        • Opcode ID: 3b006031f61bafe840658ef400f328162027557eef0f47db785a7eabad3e8c07
                        • Instruction ID: fa2d4529a7e1a39419429d6691277e68f16dd157f2d2dc73155d0f6d3ee3619f
                        • Opcode Fuzzy Hash: 3b006031f61bafe840658ef400f328162027557eef0f47db785a7eabad3e8c07
                        • Instruction Fuzzy Hash: CEF09676604208ABCB50DF98EC91EDF377CEB48B45F104559F909A7B40EB30A955C7E4
                        APIs
                        • recv.WS2_32(00001000,?,?,?,00001000,00000004,6CF0A060), ref: 6CEA2E3A
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: recv
                        • String ID:
                        • API String ID: 1507349165-0
                        • Opcode ID: 3cd07923aecae30257aa99aa53d3ac945d134f63e064c19b5695ba466c359bee
                        • Instruction ID: ec1aa244c26b782d0bf7d6efc12560cfbe0d1707c4b6a0f2d28b7f291d6fa772
                        • Opcode Fuzzy Hash: 3cd07923aecae30257aa99aa53d3ac945d134f63e064c19b5695ba466c359bee
                        • Instruction Fuzzy Hash: 42F05471B0520CABCB04EF94DC65F9B3778FB15E05F10451DF94A6BB40EB3099548BA5
                        APIs
                        • bind.WS2_32(00000003,?,?,00000003,00000000), ref: 6CEA2BC6
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: bind
                        • String ID:
                        • API String ID: 1187836755-0
                        • Opcode ID: 0534720979c537406e3e8e6cdf30bbd90f8e44335c94e3c98294a1abd4ce909f
                        • Instruction ID: 0ea4798a0ef007f823dee5867636c5708adda28b5c5a29f9fe621ee8fb74e322
                        • Opcode Fuzzy Hash: 0534720979c537406e3e8e6cdf30bbd90f8e44335c94e3c98294a1abd4ce909f
                        • Instruction Fuzzy Hash: FCF08272B052086BCB00EBA4DC65FAE37B8FB11619F10465DF809A6780EB30595987A6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6ce82c90-6ce82ca1 1 6ce82cbe-6ce82cc4 0->1 2 6ce82ca3-6ce82cb8 0->2 3 6ce82ccb-6ce82cd2 1->3 4 6ce82cc6 1->4 2->1 6 6ce82d0d-6ce82d14 3->6 7 6ce82cd4-6ce82d08 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 3->7 5 6ce831c6-6ce831ce 4->5 8 6ce82d4f-6ce82d56 6->8 9 6ce82d16-6ce82d4a call 6ce84a80 call 6ce81fe0 call 6ce84bf0 6->9 7->5 13 6ce82d58-6ce82d8c call 6ce84a80 call 6ce81fe0 call 6ce84bf0 8->13 14 6ce82d91-6ce82d98 8->14 9->5 13->5 16 6ce82d9a-6ce82dce call 6ce84a80 call 6ce81fe0 call 6ce84bf0 14->16 17 6ce82dd3-6ce82dda 14->17 16->5 21 6ce82ddc-6ce82e10 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 17->21 22 6ce82e15-6ce82e1c 17->22 21->5 30 6ce82e1e-6ce82e4d call 6ce84a80 call 6ce81fe0 LoadLibraryA call 6ce84bf0 22->30 31 6ce82e57-6ce82e5e 22->31 77 6ce82e52 30->77 35 6ce82e99-6ce82ea0 31->35 36 6ce82e60-6ce82e94 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 31->36 44 6ce82edb-6ce82ee2 35->44 45 6ce82ea2-6ce82ed6 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 35->45 36->5 51 6ce82f1d-6ce82f24 44->51 52 6ce82ee4-6ce82f18 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 44->52 45->5 58 6ce82f5f-6ce82f66 51->58 59 6ce82f26-6ce82f5a call 6ce84a80 call 6ce81fe0 call 6ce84bf0 51->59 52->5 72 6ce82f68-6ce82f97 call 6ce84a80 call 6ce81fe0 LoadLibraryA call 6ce84bf0 58->72 73 6ce82fa1-6ce82fa8 58->73 59->5 122 6ce82f9c 72->122 79 6ce82faa-6ce82fde call 6ce84a80 call 6ce81fe0 call 6ce84bf0 73->79 80 6ce82fe3-6ce82fea 73->80 77->5 79->5 89 6ce82fec-6ce83020 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 80->89 90 6ce83025-6ce8302c 80->90 89->5 95 6ce8302e-6ce8305d call 6ce84a80 call 6ce81fe0 LoadLibraryA call 6ce84bf0 90->95 96 6ce83067-6ce8306e 90->96 151 6ce83062 95->151 100 6ce830a9-6ce830b0 96->100 101 6ce83070-6ce830a4 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 96->101 115 6ce830eb-6ce830f2 100->115 116 6ce830b2-6ce830e6 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 100->116 101->5 123 6ce83133-6ce8313a 115->123 124 6ce830f4-6ce8312e call 6ce84a80 call 6ce81fe0 call 6ce84bf0 115->124 116->5 122->5 134 6ce83178-6ce8317f 123->134 135 6ce8313c-6ce83176 call 6ce84a80 call 6ce81fe0 call 6ce84bf0 123->135 124->5 139 6ce831bd-6ce831c0 134->139 140 6ce83181-6ce831bb call 6ce84a80 call 6ce81fe0 call 6ce84bf0 134->140 135->5 139->5 140->5 151->5
                        Strings
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,Sl$1l
                        • API String ID: 0-2909412923
                        • Opcode ID: 846589f719d23609d324c3af1d5294aeb8f37feb5c1c8d55504aedc9c7d69f50
                        • Instruction ID: 8f3426aa405330802d01a058f55742bbd592a5266b4fbaa16fd85aeba495fe7b
                        • Opcode Fuzzy Hash: 846589f719d23609d324c3af1d5294aeb8f37feb5c1c8d55504aedc9c7d69f50
                        • Instruction Fuzzy Hash: 65D12171A0A204ABCB159FB0C96AAED3774FF15748F30451AF41E7BB90EF38554ACA84

                        Control-flow Graph

                        APIs
                        • CreateWindowExW.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CE93D8A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID: pl$tNpl
                        • API String ID: 716092398-3341923368
                        • Opcode ID: 9ad56a3939934128032ccd945e29c17487ac4f57914c7d9c716279c83814b1a5
                        • Instruction ID: 48b5c499de4f2505709461fa84b3d89192590b4ca2cf9e38cc7933ec450094ef
                        • Opcode Fuzzy Hash: 9ad56a3939934128032ccd945e29c17487ac4f57914c7d9c716279c83814b1a5
                        • Instruction Fuzzy Hash: 4E012176604108AFCB04DF98DC90EDA77BCAF9C344F144208F90997640DB30E855C7A1

                        Control-flow Graph

                        APIs
                        • RtlFreeHeap.NTDLL(*@l,?,?,6CE8402A,00100000,00000000,?), ref: 6CE82886
                        Strings
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: FreeHeap
                        • String ID: *@l$*@l
                        • API String ID: 3298025750-3543056153
                        • Opcode ID: 274eaf5fee51d54badc2ece9a340227d1a2026cddf57125de6c610b9926b922f
                        • Instruction ID: 38113e49790ad1454f071cec328763dfde59519e21e8ef731a02baa3f6981c98
                        • Opcode Fuzzy Hash: 274eaf5fee51d54badc2ece9a340227d1a2026cddf57125de6c610b9926b922f
                        • Instruction Fuzzy Hash: 1FF08276A05209ABCB04DFE0DD55EBE7778AF20205F60421AF90966640EB3095188BA4

                        Control-flow Graph

                        APIs
                        • VirtualFree.KERNELBASE(00000000,?,?,00000000,00008000,?,6CE9E762,00000001), ref: 6CE83786
                        Strings
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID: T|l
                        • API String ID: 1263568516-1334768457
                        • Opcode ID: 546b6895c88b09568fec376d36931aa0017aa98502e8ac3a5dc6997455b00f37
                        • Instruction ID: b085bb8a0ff2970e27125f06a549749a86b54a2cb1974cf97a02f8dad3018f24
                        • Opcode Fuzzy Hash: 546b6895c88b09568fec376d36931aa0017aa98502e8ac3a5dc6997455b00f37
                        • Instruction Fuzzy Hash: C0F08272605204ABDB00DBA0DD91FAA7B78AB1460AF24411EB80A67B40EB705948C7F5

                        Control-flow Graph

                        APIs
                        • lstrcmpiW.KERNEL32(00000000,?,00000000,00000000), ref: 6CE82442
                        Strings
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: lstrcmpi
                        • String ID: l
                        • API String ID: 1586166983-1545559182
                        • Opcode ID: e0efdb97ff8547791781877e144e33be14ee0be5516492ce30ea1ed9678b89d2
                        • Instruction ID: e1c0def32172ac9c117cb66823a86fa09ecef05cf5c7ead275d0a0976652c980
                        • Opcode Fuzzy Hash: e0efdb97ff8547791781877e144e33be14ee0be5516492ce30ea1ed9678b89d2
                        • Instruction Fuzzy Hash: C8F0ECB1A01144ABCB10EFA0DD55FAA7738DB11245F10811AF80A7A740FB30695D8BD1

                        Control-flow Graph

                        APIs
                        • WSAIoctl.WS2_32(6CE9BECA,?,?,?,?,?,?,?,?,6CE9BECA,?), ref: 6CEA6E6E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Ioctl
                        • String ID:
                        • API String ID: 3041054344-0
                        • Opcode ID: e5164d6e9a043cc33a0dfd0081897696ff7543e8e543c1de4412f5ba0eaf207a
                        • Instruction ID: 4613fcd09aae01b727ba0f1a3d6b92c33bbbc6dfe2026b8ef4e4cac0fecee273
                        • Opcode Fuzzy Hash: e5164d6e9a043cc33a0dfd0081897696ff7543e8e543c1de4412f5ba0eaf207a
                        • Instruction Fuzzy Hash: 78014B72614108AFCB04DF98EC52EEB37B8EB48308F11421CF90DA7A40EB30E815CBA0

                        Control-flow Graph

                        APIs
                        • RegCreateKeyExW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000000,6CEE84A4,00000001), ref: 6CE8D8DE
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 42ebdabaf0f3a3298f3d3faf7bbc0c3a8ebac1e780cd962516603c73262dd555
                        • Instruction ID: e8f611f2b8cfbfb81ce3aa832a431215dba45d0358bb4b2c2f2261ff00e1a71b
                        • Opcode Fuzzy Hash: 42ebdabaf0f3a3298f3d3faf7bbc0c3a8ebac1e780cd962516603c73262dd555
                        • Instruction Fuzzy Hash: D4016DB6604109ABCB04DFA8DC52EEB77B9EB5C304F108219F919A7740EB30E955CBA0

                        Control-flow Graph

                        APIs
                        • InternetConnectA.WININET(00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 6CEA511B
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: ConnectInternet
                        • String ID:
                        • API String ID: 3050416762-0
                        • Opcode ID: fa3b5b37f8e31db0820d1f5f7d22bc587c6e8aa2dc2a7da8b8f995f46328823f
                        • Instruction ID: 8c7f42a87647157d9390217b28fc4951fca6e92971326b9556cc9bb56f198a36
                        • Opcode Fuzzy Hash: fa3b5b37f8e31db0820d1f5f7d22bc587c6e8aa2dc2a7da8b8f995f46328823f
                        • Instruction Fuzzy Hash: 7C016D72A14108ABCB04CF94DC92EEB37F8AF9C605F10810CB91AA7640EB30D85587A0

                        Control-flow Graph

                        APIs
                        • RegEnumValueA.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 6CEA19FA
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: EnumValue
                        • String ID:
                        • API String ID: 2814608202-0
                        • Opcode ID: 20ce2bc16f4c7ff91853472f5b9da6c61f7ebc4ae2c3b03cd78e90dc3b3cfcab
                        • Instruction ID: 813c267f68a46cd2d0df7131174db675912f20b8e32ffaa6b59a090feb2170b8
                        • Opcode Fuzzy Hash: 20ce2bc16f4c7ff91853472f5b9da6c61f7ebc4ae2c3b03cd78e90dc3b3cfcab
                        • Instruction Fuzzy Hash: 66016DB2604108AFCB04CFD5DC61EEF77B9AB48605F10421DB909A7640EB30E915CBA5

                        Control-flow Graph

                        APIs
                        • WSARecv.WS2_32(?,?,?,?,?,?,?), ref: 6CEA7046
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Recv
                        • String ID:
                        • API String ID: 4192927123-0
                        • Opcode ID: a1f6ca555e67e30c40b5dc61dcf2bf49858314ba2b8d33b199eab9ad5cb75642
                        • Instruction ID: f0e4b931f4437802967709f3ab0d13bc117a657748ec47da6b10f8c04df147de
                        • Opcode Fuzzy Hash: a1f6ca555e67e30c40b5dc61dcf2bf49858314ba2b8d33b199eab9ad5cb75642
                        • Instruction Fuzzy Hash: 82F04FB2A1910CAFCB40DF94DC56F9B37BCFB58209F10421DF909A7A40EB34A915C7A0

                        Control-flow Graph

                        APIs
                        • WSASend.WS2_32(?,?,?,?,?,?,?,?,00000000), ref: 6CEA6FC6
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Send
                        • String ID:
                        • API String ID: 121738739-0
                        • Opcode ID: e033bd954ee8d381dc19d8aa34f6531abeee5acfbbe06548b2a696377ec44678
                        • Instruction ID: 2aca3aaf9bde469993b7917dfb8d46d787779f643a7183ffb12a0b3818e22d0d
                        • Opcode Fuzzy Hash: e033bd954ee8d381dc19d8aa34f6531abeee5acfbbe06548b2a696377ec44678
                        • Instruction Fuzzy Hash: 19F04471A25108AFCB00DF98DC56F9B377CEB59305F10811EB909E7B40EB30A8198BA0
                        APIs
                        • DnsQuery_A.DNSAPI(?,?,?,?,?,?,?,00000000,6CEA0D49,52.90.110.169,00000004), ref: 6CEA1D03
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Query_
                        • String ID:
                        • API String ID: 428220571-0
                        • Opcode ID: f7408dd71358cb9f69357706b032417194a37731b2feb4c1bfc7f24e1e1a92e6
                        • Instruction ID: fb1f18c5a2e4fd3728518136802d9492fedaaef20e82570fedfd43670926189c
                        • Opcode Fuzzy Hash: f7408dd71358cb9f69357706b032417194a37731b2feb4c1bfc7f24e1e1a92e6
                        • Instruction Fuzzy Hash: E8F062B2B05109ABCB44DF94ECA1FEF3778FB44A45F10851DF909A6680FB349959C7A0

                        Control-flow Graph

                        APIs
                        • CreateThread.KERNEL32(00000000,?,?,?,?,?,00000000,6CE812EE,?,6CE812EE,?,6CEAD944,00000001,6CEAD96C,00000001), ref: 6CE8F872
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: CreateThread
                        • String ID:
                        • API String ID: 2422867632-0
                        • Opcode ID: a1d407f4ceb3a984b8162ea2cadef2e56ccac9566f0bf5735e478b369c1cb7cb
                        • Instruction ID: 1a42932363e1e5cd0e4dbdd408b45f3effd68363b925ec8cb7265e54456a5584
                        • Opcode Fuzzy Hash: a1d407f4ceb3a984b8162ea2cadef2e56ccac9566f0bf5735e478b369c1cb7cb
                        • Instruction Fuzzy Hash: 59F06272606208ABCB04DFD4EC91E9B37B8AB48345F104619F90AD7640EB34A9158BA5
                        APIs
                        • GetTokenInformation.KERNELBASE(00020008,?,?,?,?,00020008,00000000), ref: 6CE9678E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: InformationToken
                        • String ID:
                        • API String ID: 4114910276-0
                        • Opcode ID: 06f4e1a2e0f566807c1b2aabf9ad85495cf5a0226c7c1b970a292c309a239f96
                        • Instruction ID: bdfb8d4e487a03d6c28cc7f8c5b3176f2c7debf957f8d3720b743495c34e65e4
                        • Opcode Fuzzy Hash: 06f4e1a2e0f566807c1b2aabf9ad85495cf5a0226c7c1b970a292c309a239f96
                        • Instruction Fuzzy Hash: 1FF03076604208ABCB14DFA8DC91EEA37BCAB0C755F10451AF909ABB50EB30999487E1
                        APIs
                        • InternetOpenA.WININET(00000000,?,?,?,?,00000000,00001000), ref: 6CEA1B4E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: InternetOpen
                        • String ID:
                        • API String ID: 2038078732-0
                        • Opcode ID: cc879212c7855eb57e35613cf95cfed93a69d81cf516b270a30dc5bf24a694c3
                        • Instruction ID: cb56ad12b7412243622093fb5a9249a8709abedc210d451213c88302fff148d9
                        • Opcode Fuzzy Hash: cc879212c7855eb57e35613cf95cfed93a69d81cf516b270a30dc5bf24a694c3
                        • Instruction Fuzzy Hash: AAF06D71B14108BBCB40DFA4DCA1EEF777CAB44605F10411DB90AA7680EF30995987A1
                        APIs
                        • setsockopt.WS2_32(00000003,?,?,?,?,00000003,00000000), ref: 6CEA2C3E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: setsockopt
                        • String ID:
                        • API String ID: 3981526788-0
                        • Opcode ID: c5b1b4b3e419ab0ed83a0509ddc9befa90158ff9db27e1d30f84762b1f9c3a5e
                        • Instruction ID: 6004a41f7204ed73308ec8c302431bfaabd8628bf1d74be05f5685c4cb9e0b66
                        • Opcode Fuzzy Hash: c5b1b4b3e419ab0ed83a0509ddc9befa90158ff9db27e1d30f84762b1f9c3a5e
                        • Instruction Fuzzy Hash: 01F09072B051086BCB04EFA8DC61F9A77BCFB59704F10861DFD09A7640EB3099198BA2
                        APIs
                        • SetTimer.USER32(00000000,?,?,?,00000000,00000000,?,?,?,6CE81206,?,6CEAD9A0,00000000,6CEA8224,00000004,C0505E62), ref: 6CE93ECA
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Timer
                        • String ID:
                        • API String ID: 2870079774-0
                        • Opcode ID: 56654d688cba4db2c231f9121af9a06f498e296e7f54518e8ff607e79e739fb6
                        • Instruction ID: 46d27fa4973faa6ff89af96066cb0917980d8305fb13b55f553bca78b9235440
                        • Opcode Fuzzy Hash: 56654d688cba4db2c231f9121af9a06f498e296e7f54518e8ff607e79e739fb6
                        • Instruction Fuzzy Hash: 33F08272A05608BBCB00DFA4EC55EAE7778EF05605F104519F90AA7750EB34A91C87E2
                        APIs
                        • RegisterServiceCtrlHandlerExW.ADVAPI32(6CE81430,?,?,6CE81430,00000000,?,6CEAD8E8), ref: 6CE82506
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: CtrlHandlerRegisterService
                        • String ID:
                        • API String ID: 1823773585-0
                        • Opcode ID: 97390639a6fd860d89ad6acf329edb0117ee5a65e0896cff3ca60bdf0b71e4cf
                        • Instruction ID: be52d966357fcf3a2bc2a94486cea8cccf8aa67c9e94ec78e5c7ff8f005dc370
                        • Opcode Fuzzy Hash: 97390639a6fd860d89ad6acf329edb0117ee5a65e0896cff3ca60bdf0b71e4cf
                        • Instruction Fuzzy Hash: 44F027B6A001486BDB00DFA0DD11FEE3778EB55705F10465DFC0A6BB41EF30A81987A8
                        APIs
                        • connect.WS2_32(6CE9BECA,?,?,6CE9BECA,?), ref: 6CEA6DE6
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: connect
                        • String ID:
                        • API String ID: 1959786783-0
                        • Opcode ID: 13f9e97e149f5cdbe8335b4c64d89c63184ded4badde6ed66134c57fe737ed1b
                        • Instruction ID: 3310d591e8cad704c33c0f861f49dc48279fb7b212e70b73c8cd0c4da8725cb1
                        • Opcode Fuzzy Hash: 13f9e97e149f5cdbe8335b4c64d89c63184ded4badde6ed66134c57fe737ed1b
                        • Instruction Fuzzy Hash: 15F0A771A15108BBCB00EBA5EC56FAE777CEB15205F10851EF809ABB40FB3165198B90
                        APIs
                        • LookupPrivilegeValueW.ADVAPI32(00000028,?,?,00000028,00000000), ref: 6CE96566
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: LookupPrivilegeValue
                        • String ID:
                        • API String ID: 3899507212-0
                        • Opcode ID: d2f207155d64f10515dd1b3dae1c49791d30d4e5aa0567db7fe694b9794fa068
                        • Instruction ID: cd20b614f3e88471f3b0bc1a90f40a3a6840e64ada96450c781b694f75dc80b2
                        • Opcode Fuzzy Hash: d2f207155d64f10515dd1b3dae1c49791d30d4e5aa0567db7fe694b9794fa068
                        • Instruction Fuzzy Hash: 5CF02775A01108ABCB50DFA8DD45EEE377CDB08745F10451EF809A7740EB30550887E1
                        APIs
                        • ioctlsocket.WS2_32(00000003,?,?,00000003,00000000), ref: 6CEA2D66
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: ioctlsocket
                        • String ID:
                        • API String ID: 3577187118-0
                        • Opcode ID: 463b3e5d47e2ad82ab1cc4bdd463165625fbbb6fb0e4fff3ae5cf3da7b6576b2
                        • Instruction ID: 6553337dd7ad908ba7b912fc5712e07f83c4b62fd22d2264c0071a9bdcfe36b0
                        • Opcode Fuzzy Hash: 463b3e5d47e2ad82ab1cc4bdd463165625fbbb6fb0e4fff3ae5cf3da7b6576b2
                        • Instruction Fuzzy Hash: 45F02735B40248ABCB00EBA0EC60FAE37B8FB10605F10411EF8097AB80EB70585987E5
                        APIs
                        • getsockname.WS2_32(FC1009F2,?,?,FC1009F2,00000010,6CE9BF40,?), ref: 6CEA6ED6
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: getsockname
                        • String ID:
                        • API String ID: 3358416759-0
                        • Opcode ID: 13cca028c386c51ec53bae820b4cad851a2d710f18c420132883d10678d4e387
                        • Instruction ID: a5f63471e7d9fce7e99b33de44b046acac4bca869c50b3ad128d10b036ed59d0
                        • Opcode Fuzzy Hash: 13cca028c386c51ec53bae820b4cad851a2d710f18c420132883d10678d4e387
                        • Instruction Fuzzy Hash: 55F0A771A16208ABDB00EFA4DC63FEF3778DB01309F10411DF809AAB41EB3069198790
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,?,00000008,N@l,6CE8404E,?,00000000,?), ref: 6CE82816
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 39a4ae830c281b74fd1f762a6bfe4b3c49601a544540a6a5a3552a51100ffd6a
                        • Instruction ID: 4c14b08a0a202b5337777d405445d2fe49dab12bbd8a8a575a36b4e5703e091b
                        • Opcode Fuzzy Hash: 39a4ae830c281b74fd1f762a6bfe4b3c49601a544540a6a5a3552a51100ffd6a
                        • Instruction Fuzzy Hash: 73F0A775B06208BBCB00DBA0DD95EBE7779FF61206F20451DF809AA740EB30554887A5
                        APIs
                        • socket.WS2_32(00000003,?,?,00000003,00000000), ref: 6CEA2B56
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: socket
                        • String ID:
                        • API String ID: 98920635-0
                        • Opcode ID: 072595e1d6b7f8387fc649a00f4edd6762ef10e5f1195790eada7e452568c27d
                        • Instruction ID: 94fcd2bc5ec275dc85754276f18bc2801f0f8c34600f26cab22fe2c4f31c2585
                        • Opcode Fuzzy Hash: 072595e1d6b7f8387fc649a00f4edd6762ef10e5f1195790eada7e452568c27d
                        • Instruction Fuzzy Hash: 6AF08271F05108ABCB04EBA4DD65FAE37B8BB51605F10461DF8096A740EB34951887A5
                        APIs
                        • WSAStartup.WS2_32(00000202,?,00000202,?), ref: 6CEA6D23
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Startup
                        • String ID:
                        • API String ID: 724789610-0
                        • Opcode ID: 104984bb806ae106b05745398b08af831bfdd33fa04b341466745ddfb722462f
                        • Instruction ID: 83705a9a2feab9d79cfbeb292ef90978c5e8fbef147d30d91c87f4e81d7a4c32
                        • Opcode Fuzzy Hash: 104984bb806ae106b05745398b08af831bfdd33fa04b341466745ddfb722462f
                        • Instruction Fuzzy Hash: 76F0E531E262086BCB00ABA0DC1BFAD37BCEB11209F10411DF809BAB40FB3459088790
                        APIs
                        • shutdown.WS2_32(00000003,?,00000003,00000000), ref: 6CEA2CA2
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: shutdown
                        • String ID:
                        • API String ID: 2510479042-0
                        • Opcode ID: f2f87aeda8bd5d20395e2a4e214b6ff18726136c2d81b7d4fddeea7fde158fd3
                        • Instruction ID: fd2072759bd90137ae44118b9d87b7ad76b2f1dcd64314f74d7434d9410b9219
                        • Opcode Fuzzy Hash: f2f87aeda8bd5d20395e2a4e214b6ff18726136c2d81b7d4fddeea7fde158fd3
                        • Instruction Fuzzy Hash: 01F0A071B012086BCB04BBA0DC25FA937B8FB11B05F10051EF80ABAA40EB70590887E5
                        APIs
                        • SetThreadPriority.KERNEL32(00000000,?,00000000,000000FE), ref: 6CEA4FE2
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: PriorityThread
                        • String ID:
                        • API String ID: 2383925036-0
                        • Opcode ID: c3ac9273eea07180655fca22f99e20fed61d7dbcd753233650a1f39213eb8b45
                        • Instruction ID: 39ebb6b605c313cfe7388a8e3d4e7bbce4a0c6ab8adfd800968108b58bc8aa97
                        • Opcode Fuzzy Hash: c3ac9273eea07180655fca22f99e20fed61d7dbcd753233650a1f39213eb8b45
                        • Instruction Fuzzy Hash: 8AF0E575E15108AFDB00EBA0DC52FA97778EB10209F20811BF8096AF40EF7099198BD1
                        APIs
                        • closesocket.WS2_32(00000003,00000003,00000000), ref: 6CEA2CFE
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: closesocket
                        • String ID:
                        • API String ID: 2781271927-0
                        • Opcode ID: af4c9844355dc43bea9b47bb0db684cfd23ec7f1599f0449a497482a445470ac
                        • Instruction ID: b2a8fcfb241efc1c7b475b80c45d54eea5572dadd06789ec60a508458246ea9a
                        • Opcode Fuzzy Hash: af4c9844355dc43bea9b47bb0db684cfd23ec7f1599f0449a497482a445470ac
                        • Instruction Fuzzy Hash: FEE06571F162086BCB00B7A0DD25FA977B8EB51A05F10051DEC057A740EB74555C86E5
                        APIs
                        • InternetCloseHandle.WININET(6CEA153F,6CEA153F,00000000,00000000,00000000,00001000), ref: 6CEA1C8E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: CloseHandleInternet
                        • String ID:
                        • API String ID: 1081599783-0
                        • Opcode ID: ff07815fe318c2e20385c2962c4a34843083b1cc86f5601bd9be93ee5a7c4c83
                        • Instruction ID: 4a092b97b304e2fe8481afb04d10d362602436bd7116110bd838cfbabf2b9828
                        • Opcode Fuzzy Hash: ff07815fe318c2e20385c2962c4a34843083b1cc86f5601bd9be93ee5a7c4c83
                        • Instruction Fuzzy Hash: F9E0E571F051086BCB0096A0EE31AAE7778EB10A06F1041A9E8056A790FF30860986A1
                        APIs
                        • FindCloseChangeNotification.KERNEL32(00020008,00020008,00000000), ref: 6CE86F7E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 8da5561f0bd55c7864dc9dd75907bf5924ae6f0d8c93e592d47fad467bcc6149
                        • Instruction ID: 52127616dc32d297c9c7cfe3d4daccb3b60a60a89bccbee7823ab3eae4c591e7
                        • Opcode Fuzzy Hash: 8da5561f0bd55c7864dc9dd75907bf5924ae6f0d8c93e592d47fad467bcc6149
                        • Instruction Fuzzy Hash: 41E02B75A0A204AFCB00ABF0DC01FA9B738DB10205F10427FEC19ABB40FB7096088BD5
                        APIs
                        • gethostbyname.WS2_32(00000003,00000003,00000000), ref: 6CE9D95E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: gethostbyname
                        • String ID:
                        • API String ID: 930432418-0
                        • Opcode ID: 3d9c8818b140329275c6fbea3a2bee1968353c585ccb24839adbd4f3b2502547
                        • Instruction ID: 4a290a9412f4c533e7a163e839c5dfc47f0a311353c9db32dae872f0f13d6796
                        • Opcode Fuzzy Hash: 3d9c8818b140329275c6fbea3a2bee1968353c585ccb24839adbd4f3b2502547
                        • Instruction Fuzzy Hash: FDE02B31A013087BEB00A7A0EC05EAE7778DB0120AF20052AF81576780FB3055688790
                        APIs
                        • VirtualAlloc.KERNEL32(?,?,?,?,?,6CE9E40E), ref: 6CE8371A
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 6f2ec50960bd643e10b8631dedb6d4a0c6e5289dcdeda61d24b8a07c78a0613f
                        • Instruction ID: 3007209e0a294bdc59c0a8d8d549c73dc553df99a7d5bc1a2fb9ce24330a7bd0
                        • Opcode Fuzzy Hash: 6f2ec50960bd643e10b8631dedb6d4a0c6e5289dcdeda61d24b8a07c78a0613f
                        • Instruction Fuzzy Hash: D2F089716062086BCB00DFE4DE91FAE3B78EF45205F10455EF94967B40EB709D1487B5
                        APIs
                        • Sleep.KERNEL32(6CE81519,6CE81519,00000BB8,00000000,00000000), ref: 6CE8225E
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 539890e455612d7508a560c53b0ae10f4af404193b79e02c4625de433d70bf54
                        • Instruction ID: 113cb766d75d38e330af3a1e38eb2c0ecf656a92e2b50fdef64185e8c1c43cc4
                        • Opcode Fuzzy Hash: 539890e455612d7508a560c53b0ae10f4af404193b79e02c4625de433d70bf54
                        • Instruction Fuzzy Hash: 4EE02BB1A022046BCB00BFF4DE59FAA3778EF11305F100169F8496A741FB30640986D5
                        APIs
                        • CreateFileW.KERNEL32(00000000,6CEA835C,00000016,F6A49D28,6CEB1084,40000000,00000001,00000000,00000004,00000000,00000000), ref: 6CE826DB
                        • GetLastError.KERNEL32 ref: 6CE82713
                        • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 6CE82725
                        • WriteFile.KERNEL32(000000FF,?,?,?,00000000), ref: 6CE8273D
                        • CloseHandle.KERNEL32(000000FF), ref: 6CE82747
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: File$CloseCreateErrorHandleLastPointerWrite
                        • String ID:
                        • API String ID: 170361235-0
                        • Opcode ID: 30198114ddba95179757ace6dfa3ac440d4ac0202d6def9216e970d78db4cc85
                        • Instruction ID: c99615e953a2c4e496ffd6e62a53ce618fe655a7a89c13a637f1ab3a303db829
                        • Opcode Fuzzy Hash: 30198114ddba95179757ace6dfa3ac440d4ac0202d6def9216e970d78db4cc85
                        • Instruction Fuzzy Hash: 7C217F75B40204AFDF24CFE4EE8AF9D37B5EB55704F20821AF605AB2C0DB70AA019B54
                        APIs
                        Memory Dump Source
                        • Source File: 0000001E.00000002.3277871077.000000006CE81000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CE80000, based on PE: true
                        • Associated: 0000001E.00000002.3277854933.000000006CE80000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277898499.000000006CEA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277914121.000000006CEAD000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277940027.000000006CF06000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 0000001E.00000002.3277959764.000000006CF1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_30_2_6ce80000_rundll32.jbxd
                        Similarity
                        • API ID: codecvt
                        • String ID:
                        • API String ID: 3662085145-0
                        • Opcode ID: f45ff2e2872abc948ef01e181b3dd1947064de060e6b3adfaa9dcc5962e23236
                        • Instruction ID: 2b0d0c3dc94e33ccd47e35a21c35a08a0fbd04e72691939625e916644ed08740
                        • Opcode Fuzzy Hash: f45ff2e2872abc948ef01e181b3dd1947064de060e6b3adfaa9dcc5962e23236
                        • Instruction Fuzzy Hash: 9B31A278B0160ADBDB14EF94E594BADB7B1BB8A308F304829C52137790D7B51988CF91