Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lK1DKi27B4.dll

Overview

General Information

Sample name:lK1DKi27B4.dll
renamed because original name is a hash value
Original sample name:d908e4fef54e64e1e5d8a2a91851a2f5794a2ba625690e8e30911ca06f9d2b8b.exe
Analysis ID:1524003
MD5:0246f502105fb05afbebb9901642cba0
SHA1:aadccd1ad344910c4cf83845eff287193c61cb08
SHA256:d908e4fef54e64e1e5d8a2a91851a2f5794a2ba625690e8e30911ca06f9d2b8b
Tags:exeRhysidauser-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3684 cmdline: loaddll64.exe "C:\Users\user\Desktop\lK1DKi27B4.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 5232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1544 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 480 cmdline: rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1072 cmdline: rundll32.exe C:\Users\user\Desktop\lK1DKi27B4.dll,start MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5440 cmdline: rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",start MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: lK1DKi27B4.dllReversingLabs: Detection: 54%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.4% probability
Source: lK1DKi27B4.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 5.252.177.228 443Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 85.239.52.252 443Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 80.87.206.189 443Jump to behavior
Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
Source: Joe Sandbox ViewASN Name: PINDC-ASRU PINDC-ASRU
Source: Joe Sandbox ViewASN Name: RAINBOW-HKRainbownetworklimitedHK RAINBOW-HKRainbownetworklimitedHK
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.206.189
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.206.189
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.206.189
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.206.189
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.206.189
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.206.189
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.52.252
Source: unknownTCP traffic detected without corresponding DNS query: 5.252.177.228
Source: unknownTCP traffic detected without corresponding DNS query: 5.252.177.228
Source: unknownTCP traffic detected without corresponding DNS query: 5.252.177.228
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE126D39A0 recv,3_2_00007FFE126D39A0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: classification engineClassification label: mal60.evad.winDLL@10/0@0/3
Source: C:\Windows\System32\rundll32.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5232:120:WilError_03
Source: lK1DKi27B4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\lK1DKi27B4.dll,start
Source: lK1DKi27B4.dllReversingLabs: Detection: 54%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\lK1DKi27B4.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\lK1DKi27B4.dll,start
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",start
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\lK1DKi27B4.dll,startJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",startJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: lK1DKi27B4.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: lK1DKi27B4.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: lK1DKi27B4.dllStatic PE information: real checksum: 0xefc6 should be: 0x1e064
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 6100Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 4432Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 4432Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 2424Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 2424Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 5500Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 5500Thread sleep time: -180000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: rundll32.exe, 00000003.00000002.3563616826.000002B1591B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll==
Source: rundll32.exe, 00000004.00000002.3563543617.000001A592568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllNN
Source: rundll32.exe, 00000005.00000002.3563579123.000001DA89F88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllpp
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 5.252.177.228 443Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 85.239.52.252 443Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 80.87.206.189 443Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
111
Process Injection
1
Rundll32
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
lK1DKi27B4.dll54%ReversingLabsWin64.Backdoor.Supper
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
5.252.177.228
unknownMoldova Republic of
39798MIVOCLOUDMDtrue
80.87.206.189
unknownRussian Federation
34665PINDC-ASRUtrue
85.239.52.252
unknownRussian Federation
134121RAINBOW-HKRainbownetworklimitedHKtrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524003
Start date and time:2024-10-02 14:04:33 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:lK1DKi27B4.dll
renamed because original name is a hash value
Original Sample Name:d908e4fef54e64e1e5d8a2a91851a2f5794a2ba625690e8e30911ca06f9d2b8b.exe
Detection:MAL
Classification:mal60.evad.winDLL@10/0@0/3
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 7
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: lK1DKi27B4.dll
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
85.239.52.252donbologniese.com_443_64s.exeGet hashmaliciousCobaltStrikeBrowse
    donbologniese.com_443_64s.exeGet hashmaliciousCobaltStrikeBrowse
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      MIVOCLOUDMDupdate.jsGet hashmaliciousNetSupport RATBrowse
      • 5.181.159.137
      MRSPBASd65554AB.dll.dllGet hashmaliciousUnknownBrowse
      • 94.158.245.136
      MRSPBASd65554AB.dll.dllGet hashmaliciousUnknownBrowse
      • 94.158.245.136
      Update.jsGet hashmaliciousNetSupport RATBrowse
      • 5.181.159.137
      ZWlwrTM9HK.exeGet hashmaliciousRemcosBrowse
      • 5.181.156.117
      Gez0dmj6yl.exeGet hashmaliciousDCRatBrowse
      • 94.158.244.70
      update.jsGet hashmaliciousNetSupport RATBrowse
      • 5.181.159.28
      17E503AEF3804C0513838FB4AE3E00F323B1260BF753D99DBF0AE415BA54DE11.exeGet hashmaliciousBdaejec, RaccoonBrowse
      • 194.180.191.241
      updates.jsGet hashmaliciousNetSupport RATBrowse
      • 194.180.191.69
      PINDC-ASRUhttps://trstwalsecu.com/Get hashmaliciousUnknownBrowse
      • 91.215.85.16
      https://metamaskinf.com/Get hashmaliciousUnknownBrowse
      • 91.215.85.79
      http://mygovau-service.com/Get hashmaliciousUnknownBrowse
      • 91.215.85.79
      PO-001.exeGet hashmaliciousFormBookBrowse
      • 91.215.85.23
      PO #86637.exeGet hashmaliciousFormBookBrowse
      • 91.215.85.23
      https://91.215.85.55Get hashmaliciousUnknownBrowse
      • 91.215.85.55
      file.exeGet hashmaliciousPhorpiexBrowse
      • 194.93.26.70
      invoice.exeGet hashmaliciousFormBookBrowse
      • 91.215.85.23
      Purchase order.exeGet hashmaliciousFormBookBrowse
      • 91.215.85.23
      RAINBOW-HKRainbownetworklimitedHKnPyo7vtpRl.dllGet hashmaliciousUnknownBrowse
      • 45.86.230.68
      rdl3kBqbTy.dllGet hashmaliciousUnknownBrowse
      • 45.86.230.68
      nPyo7vtpRl.dllGet hashmaliciousUnknownBrowse
      • 45.86.230.68
      rdl3kBqbTy.dllGet hashmaliciousUnknownBrowse
      • 45.86.230.68
      file.exeGet hashmaliciousUnknownBrowse
      • 85.239.52.241
      file.exeGet hashmaliciousUnknownBrowse
      • 85.239.52.241
      Havarti.dllGet hashmaliciousUnknownBrowse
      • 45.86.230.68
      https://www.izmailovo.ru/contacts/Get hashmaliciousHTMLPhisherBrowse
      • 45.92.176.235
      http://iskhelp.co.uk/rd/5IFNPS23345ktRZ2482qejogtfkrk1638BHXWAAYQYFQDJLF6525/368L16Get hashmaliciousUnknownBrowse
      • 85.239.34.168
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
      Entropy (8bit):1.3730080047022892
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:lK1DKi27B4.dll
      File size:89'984 bytes
      MD5:0246f502105fb05afbebb9901642cba0
      SHA1:aadccd1ad344910c4cf83845eff287193c61cb08
      SHA256:d908e4fef54e64e1e5d8a2a91851a2f5794a2ba625690e8e30911ca06f9d2b8b
      SHA512:8e95d1065ed683b671ff8e5835f6d832027594c7eaafdfd5ef5c3d26ed01e500db0512096caf6c714791a53ba739bf942490c83261f2f24076850ac011f5dd57
      SSDEEP:384:gWXQWPQUtdK3TQYIyTjWLH2CekEbZykA2nKTb8dEwEsH:g3dyL3ej1n/KTQqdsH
      TLSH:2C93A862F261C8ADC52BF3F196C762B275F439590728396F4391A5F83F2993D1B34920
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...'..f.N........&"...(.0..........@9....................................................`... ............................
      Icon Hash:7ae282899bbab082
      Entrypoint:0x180003940
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x180000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x66868227 [Thu Jul 4 11:06:15 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:6a1060e817f2dd8e2db1b1d07029ac5c
      Instruction
      push ebp
      dec eax
      mov ebp, esp
      dec eax
      sub esp, 20h
      dec eax
      mov dword ptr [ebp+10h], ecx
      mov dword ptr [ebp+18h], edx
      dec esp
      mov dword ptr [ebp+20h], eax
      cmp dword ptr [ebp+18h], 03h
      jnbe 00007FC5D0C90533h
      cmp dword ptr [ebp+18h], 02h
      jnc 00007FC5D0C9052Ch
      cmp dword ptr [ebp+18h], 00000000h
      je 00007FC5D0C90526h
      cmp dword ptr [ebp+18h], 01h
      jne 00007FC5D0C90521h
      mov ecx, 00000000h
      call 00007FC5D0C90970h
      mov ecx, eax
      call 00007FC5D0C90959h
      dec eax
      mov eax, dword ptr [ebp+10h]
      dec eax
      mov dword ptr [000226C1h], eax
      jmp 00007FC5D0C90503h
      nop
      mov eax, 00000001h
      dec eax
      add esp, 20h
      pop ebp
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      push ebp
      dec eax
      sub esp, 00000240h
      dec eax
      lea ebp, dword ptr [esp+00000080h]
      dec eax
      mov dword ptr [ebp+000001D0h], ecx
      dec eax
      mov dword ptr [ebp+000001D8h], edx
      inc esp
      mov dword ptr [ebp+000001E0h], eax
      dec esp
      mov dword ptr [ebp+000001E8h], ecx
      dec eax
      cmp dword ptr [ebp+000001D0h], FFFFFFFFh
      jne 00007FC5D0C9050Ch
      mov eax, FFFFFFFFh
      jmp 00007FC5D0C905E3h
      mov dword ptr [ebp-50h], 00000000h
      mov dword ptr [ebp+000001BCh], 00000000h
      jmp 00007FC5D0C9051Dh
      mov eax, dword ptr [ebp+000001BCh]
      dec eax
      mov eax, dword ptr [ebp+eax*8-48h]
      dec eax
      cmp dword ptr [ebp+000001D0h], eax
      je 00007FC5D0C90514h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x270000x42.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x280000x850.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x290000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x282500x1d8.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x2f500x300037f8eecfe39194401dbac3a7c1c56c10False0.4117838541666667data5.457968090728284IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x40000xa000xa00634a9af8d3f2fa0d38820d577fb0fbebFalse0.1640625PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows1.2570850017054678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x50000x1100x2000e32780154d4a86e51e0a0301cf96fc7False0.36328125data3.2847442780382976IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .bss0x60000x200500x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .edata0x270000x420x200fa3c406df5eb87a4ea8cde5cd404d450False0.123046875data0.6992317266973137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .idata0x280000x8500xa00292e0dbff605f6a37700d204af178cefFalse0.3140625data3.7572216558531455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x290000xc0x200f31f27cadb3c557842599b1db61e752cFalse0.041015625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      ADVAPI32.dllGetSidSubAuthority, GetSidSubAuthorityCount, GetTokenInformation, OpenProcessToken
      KERNEL32.dllCloseHandle, CreateMutexA, CreatePipe, CreateProcessA, GetComputerNameA, GetCurrentProcess, GetExitCodeProcess, GetFileSize, GetModuleFileNameA, GetVersionExA, ReadFile, ReleaseMutex, SetHandleInformation, Sleep, TerminateProcess, VerSetConditionMask, VerifyVersionInfoA, WaitForSingleObject, WriteFile
      msvcrt.dll_beginthread, exit, fclose, fopen, free, fwrite, getenv, malloc, memcpy, memset, rand, sprintf, srand, wcstombs, _time64
      NETAPI32.dllNetApiBufferFree, NetGetJoinInformation
      WS2_32.dllWSAStartup, __WSAFDIsSet, closesocket, connect, freeaddrinfo, getaddrinfo, htons, inet_addr, inet_ntop, ntohs, recv, select, send, socket
      NameOrdinalAddress
      start10x1800037e0
      TimestampSource PortDest PortSource IPDest IP
      Oct 2, 2024 14:05:28.212074041 CEST49730443192.168.2.480.87.206.189
      Oct 2, 2024 14:05:28.212141037 CEST4434973080.87.206.189192.168.2.4
      Oct 2, 2024 14:05:28.212254047 CEST49730443192.168.2.480.87.206.189
      Oct 2, 2024 14:05:28.213798046 CEST49730443192.168.2.480.87.206.189
      Oct 2, 2024 14:05:28.213816881 CEST4434973080.87.206.189192.168.2.4
      Oct 2, 2024 14:05:28.213893890 CEST4434973080.87.206.189192.168.2.4
      Oct 2, 2024 14:05:28.216700077 CEST49731443192.168.2.480.87.206.189
      Oct 2, 2024 14:05:28.216799021 CEST4434973180.87.206.189192.168.2.4
      Oct 2, 2024 14:05:28.216892004 CEST49731443192.168.2.480.87.206.189
      Oct 2, 2024 14:05:28.217983961 CEST49731443192.168.2.480.87.206.189
      Oct 2, 2024 14:05:28.218019962 CEST4434973180.87.206.189192.168.2.4
      Oct 2, 2024 14:05:28.218049049 CEST4434973180.87.206.189192.168.2.4
      Oct 2, 2024 14:05:31.217607975 CEST49732443192.168.2.485.239.52.252
      Oct 2, 2024 14:05:31.217703104 CEST4434973285.239.52.252192.168.2.4
      Oct 2, 2024 14:05:31.217796087 CEST49732443192.168.2.485.239.52.252
      Oct 2, 2024 14:05:31.219151020 CEST49732443192.168.2.485.239.52.252
      Oct 2, 2024 14:05:31.219187975 CEST4434973285.239.52.252192.168.2.4
      Oct 2, 2024 14:05:31.219317913 CEST4434973285.239.52.252192.168.2.4
      Oct 2, 2024 14:08:28.222085953 CEST49740443192.168.2.485.239.52.252
      Oct 2, 2024 14:08:28.222094059 CEST49741443192.168.2.485.239.52.252
      Oct 2, 2024 14:08:28.222127914 CEST4434974085.239.52.252192.168.2.4
      Oct 2, 2024 14:08:28.222140074 CEST4434974185.239.52.252192.168.2.4
      Oct 2, 2024 14:08:28.222204924 CEST49740443192.168.2.485.239.52.252
      Oct 2, 2024 14:08:28.222249031 CEST49741443192.168.2.485.239.52.252
      Oct 2, 2024 14:08:28.224687099 CEST49740443192.168.2.485.239.52.252
      Oct 2, 2024 14:08:28.224689007 CEST49741443192.168.2.485.239.52.252
      Oct 2, 2024 14:08:28.224699020 CEST4434974085.239.52.252192.168.2.4
      Oct 2, 2024 14:08:28.224704981 CEST4434974185.239.52.252192.168.2.4
      Oct 2, 2024 14:08:28.224734068 CEST4434974085.239.52.252192.168.2.4
      Oct 2, 2024 14:08:28.224736929 CEST4434974185.239.52.252192.168.2.4
      Oct 2, 2024 14:08:31.221951962 CEST49742443192.168.2.45.252.177.228
      Oct 2, 2024 14:08:31.221982002 CEST443497425.252.177.228192.168.2.4
      Oct 2, 2024 14:08:31.222084999 CEST49742443192.168.2.45.252.177.228
      Oct 2, 2024 14:08:31.224730015 CEST49742443192.168.2.45.252.177.228
      Oct 2, 2024 14:08:31.224745035 CEST443497425.252.177.228192.168.2.4
      Oct 2, 2024 14:08:31.224787951 CEST443497425.252.177.228192.168.2.4

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:08:05:27
      Start date:02/10/2024
      Path:C:\Windows\System32\loaddll64.exe
      Wow64 process (32bit):false
      Commandline:loaddll64.exe "C:\Users\user\Desktop\lK1DKi27B4.dll"
      Imagebase:0x7ff6b8a40000
      File size:165'888 bytes
      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:08:05:27
      Start date:02/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:2
      Start time:08:05:27
      Start date:02/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1
      Imagebase:0x7ff6bece0000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:3
      Start time:08:05:27
      Start date:02/10/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe C:\Users\user\Desktop\lK1DKi27B4.dll,start
      Imagebase:0x7ff730870000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:4
      Start time:08:05:27
      Start date:02/10/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",#1
      Imagebase:0x7ff730870000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:5
      Start time:08:05:30
      Start date:02/10/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\lK1DKi27B4.dll",start
      Imagebase:0x7ff730870000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:14.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:2.8%
        Total number of Nodes:107
        Total number of Limit Nodes:3
        execution_graph 1066 7ffe126d2fea 1073 7ffe126d1e45 1066->1073 1068 7ffe126d307e 1069 7ffe126d19e8 2 API calls 1068->1069 1070 7ffe126d3097 1069->1070 1071 7ffe126d300b 1071->1068 1072 7ffe126d2317 2 API calls 1071->1072 1072->1071 1074 7ffe126d1e65 1073->1074 1076 7ffe126d1f14 1073->1076 1075 7ffe126d3da8 malloc 1074->1075 1074->1076 1075->1076 1076->1071 1077 7ffe126d2cbc 1083 7ffe126d2d11 1077->1083 1078 7ffe126d1c76 ReleaseMutex 1079 7ffe126d2e2a 1078->1079 1080 7ffe126d2e71 1079->1080 1081 7ffe126d2e31 1079->1081 1082 7ffe126d2317 2 API calls 1080->1082 1084 7ffe126d19e8 2 API calls 1081->1084 1085 7ffe126d2ea4 1082->1085 1083->1078 1092 7ffe126d2e44 1084->1092 1086 7ffe126d2ee8 1085->1086 1087 7ffe126d2ea8 1085->1087 1089 7ffe126d1e45 malloc 1086->1089 1088 7ffe126d19e8 2 API calls 1087->1088 1088->1092 1094 7ffe126d2f1f 1089->1094 1090 7ffe126d2fbe 1091 7ffe126d19e8 2 API calls 1090->1091 1091->1092 1093 7ffe126d39a0 __WSAFDIsSet 1093->1094 1094->1090 1094->1093 1095 7ffe126d2317 2 API calls 1094->1095 1095->1094 968 7ffe126d37e0 973 7ffe126d37fa 968->973 969 7ffe126d3816 970 7ffe126d3928 993 7ffe126d3d78 exit 970->993 973->969 973->970 974 7ffe126d309f 973->974 975 7ffe126d30ca 974->975 979 7ffe126d30d5 975->979 995 7ffe126d220d 975->995 979->973 980 7ffe126d39a0 __WSAFDIsSet 986 7ffe126d315a 980->986 981 7ffe126d324b 1037 7ffe126d2267 981->1037 983 7ffe126d3da8 malloc 983->986 985 7ffe126d1900 malloc ReleaseMutex 985->986 986->979 986->980 986->981 986->983 986->985 987 7ffe126d3d78 exit 986->987 992 7ffe126d19e8 ReleaseMutex __WSAFDIsSet 986->992 1012 7ffe126d2317 986->1012 1020 7ffe126d1c76 986->1020 1024 7ffe126d3ac7 986->1024 1028 7ffe126d20a9 986->1028 1033 7ffe126d2115 986->1033 987->986 992->986 994 7ffe126f8320 993->994 1041 7ffe126d3e78 CreateMutexA 995->1041 997 7ffe126d222e 998 7ffe126d3e78 CreateMutexA 997->998 999 7ffe126d224a 998->999 1000 7ffe126d28d9 999->1000 1001 7ffe126d2934 1000->1001 1043 7ffe126d2781 1001->1043 1003 7ffe126d2a1a 1004 7ffe126d3ac7 __WSAFDIsSet 1003->1004 1005 7ffe126d2a4e 1004->1005 1006 7ffe126d2a52 1005->1006 1047 7ffe126d39a0 1005->1047 1006->986 1008 7ffe126d2aa2 1008->1006 1010 7ffe126d3d78 exit 1008->1010 1009 7ffe126d2a8b 1009->1006 1009->1008 1011 7ffe126d3d78 exit 1009->1011 1010->1006 1011->1008 1015 7ffe126d2348 1012->1015 1018 7ffe126d233c 1012->1018 1016 7ffe126d3ac7 __WSAFDIsSet 1015->1016 1015->1018 1017 7ffe126d23fc 1016->1017 1017->1018 1019 7ffe126d3ac7 __WSAFDIsSet 1017->1019 1055 7ffe126d3e28 ReleaseMutex 1018->1055 1019->1018 1021 7ffe126d1c9c 1020->1021 1022 7ffe126d3e28 ReleaseMutex 1021->1022 1023 7ffe126d1d06 1022->1023 1023->986 1025 7ffe126d3b07 1024->1025 1027 7ffe126d3afd 1024->1027 1026 7ffe126d3ef0 __WSAFDIsSet 1025->1026 1025->1027 1026->1027 1027->986 1029 7ffe126d2115 2 API calls 1028->1029 1030 7ffe126d20b6 1029->1030 1031 7ffe126d3da8 malloc 1030->1031 1032 7ffe126d20c0 1031->1032 1032->986 1034 7ffe126d212d 1033->1034 1036 7ffe126d21bb 1033->1036 1034->1036 1057 7ffe126d19e8 1034->1057 1036->986 1038 7ffe126d2278 1037->1038 1039 7ffe126d19e8 2 API calls 1038->1039 1040 7ffe126d2297 1038->1040 1039->1038 1040->979 1042 7ffe126f8280 1041->1042 1044 7ffe126d27ac 1043->1044 1046 7ffe126d27fb 1044->1046 1051 7ffe126d3da8 malloc 1044->1051 1046->1003 1048 7ffe126d39e0 1047->1048 1050 7ffe126d39d6 1047->1050 1048->1050 1053 7ffe126d3ef0 __WSAFDIsSet 1048->1053 1050->1009 1052 7ffe126f8350 1051->1052 1054 7ffe126f83b8 1053->1054 1056 7ffe126f82d0 1055->1056 1058 7ffe126d1a0f 1057->1058 1062 7ffe126d1a4e 1058->1062 1063 7ffe126d2466 1058->1063 1059 7ffe126d3e28 ReleaseMutex 1060 7ffe126d1c6f 1059->1060 1060->1034 1062->1059 1064 7ffe126d2317 2 API calls 1063->1064 1065 7ffe126d2499 1064->1065 1065->1062

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00007FFE126D203A 1 Function_00007FFE126D2CBC 3 Function_00007FFE126D1F2B 1->3 8 Function_00007FFE126D39A0 1->8 15 Function_00007FFE126D2317 1->15 19 Function_00007FFE126D1D10 1->19 26 Function_00007FFE126D1F81 1->26 27 Function_00007FFE126D1C76 1->27 39 Function_00007FFE126D19E8 1->39 40 Function_00007FFE126D1FE3 1->40 43 Function_00007FFE126D2AD2 1->43 46 Function_00007FFE126D1E45 1->46 2 Function_00007FFE126D152F 4 Function_00007FFE126D3DA8 5 Function_00007FFE126D3E28 6 Function_00007FFE126D20A9 6->4 17 Function_00007FFE126D2115 6->17 24 Function_00007FFE126D1000 6->24 7 Function_00007FFE126D309F 7->0 7->4 7->6 7->8 12 Function_00007FFE126D209C 7->12 13 Function_00007FFE126D3D16 7->13 7->15 16 Function_00007FFE126D3C93 7->16 7->17 7->19 21 Function_00007FFE126D220D 7->21 23 Function_00007FFE126D1900 7->23 7->27 29 Function_00007FFE126D3D78 7->29 30 Function_00007FFE126D17F4 7->30 38 Function_00007FFE126D2267 7->38 7->39 7->40 42 Function_00007FFE126D28D9 7->42 45 Function_00007FFE126D3AC7 7->45 47 Function_00007FFE126D1640 7->47 32 Function_00007FFE126D3EF0 8->32 9 Function_00007FFE126D24A0 10 Function_00007FFE126D3DA1 11 Function_00007FFE126D3E21 14 Function_00007FFE126D1596 14->2 31 Function_00007FFE126D156F 14->31 15->5 15->13 15->19 36 Function_00007FFE126D3BED 15->36 15->45 18 Function_00007FFE126D140E 17->18 17->39 20 Function_00007FFE126D3E91 28 Function_00007FFE126D3E78 21->28 22 Function_00007FFE126D1788 44 Function_00007FFE126D16D0 22->44 23->4 23->5 25 Function_00007FFE126D2781 25->4 27->5 30->44 33 Function_00007FFE126D3E71 34 Function_00007FFE126D1D6A 35 Function_00007FFE126D2FEA 35->3 35->12 35->14 35->15 35->19 35->39 35->46 37 Function_00007FFE126D2466 37->15 38->39 39->5 39->18 39->37 41 Function_00007FFE126D37E0 41->7 41->29 41->30 42->8 42->9 42->25 42->29 42->30 42->45 45->32 46->4 47->2 48 Function_00007FFE126D3940

        Control-flow Graph

        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 250b3cbcb5efe2920a029ed85891f84527add1ac77ac3d1621b7e5906bf462df
        • Instruction ID: 43c2acf09557af6208bc80463049b7404a0c56ef6998bab631554d408ed6a217
        • Opcode Fuzzy Hash: 250b3cbcb5efe2920a029ed85891f84527add1ac77ac3d1621b7e5906bf462df
        • Instruction Fuzzy Hash: B931AB72B04AC98AE7708F66DC407DC33A1F7097B8F044266DE685BBD8DBB495508B40

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 7ffe126d309f-7ffe126d30d3 call 7ffe126d3e90 3 7ffe126d30d5-7ffe126d30da 0->3 4 7ffe126d30df-7ffe126d311b call 7ffe126d3ec8 call 7ffe126d3ec0 call 7ffe126d3ee0 0->4 5 7ffe126d37d9-7ffe126d37df 3->5 12 7ffe126d311d-7ffe126d3122 4->12 13 7ffe126d3142-7ffe126d315f call 7ffe126d220d call 7ffe126d28d9 4->13 15 7ffe126d3138-7ffe126d313d 12->15 16 7ffe126d3124-7ffe126d3130 call 7ffe126d3ee8 12->16 22 7ffe126d3186 13->22 23 7ffe126d3161-7ffe126d3166 13->23 15->5 16->15 26 7ffe126d318e-7ffe126d31b1 call 7ffe126d39a0 22->26 24 7ffe126d317c-7ffe126d3181 23->24 25 7ffe126d3168-7ffe126d316f call 7ffe126d3ee8 23->25 24->5 30 7ffe126d3174 25->30 31 7ffe126d31b7-7ffe126d31bb 26->31 32 7ffe126d3790-7ffe126d3791 26->32 30->24 33 7ffe126d379a-7ffe126d379f 31->33 34 7ffe126d31c1-7ffe126d31c5 31->34 32->33 36 7ffe126d37b5-7ffe126d37c8 call 7ffe126d3e18 call 7ffe126d2267 33->36 37 7ffe126d37a1-7ffe126d37ad call 7ffe126d3ee8 33->37 34->33 35 7ffe126d31cb-7ffe126d31f0 call 7ffe126d3d16 call 7ffe126d3da8 34->35 50 7ffe126d31f7-7ffe126d31ff 35->50 48 7ffe126d37ca-7ffe126d37cf call 7ffe126d3e18 36->48 49 7ffe126d37d4 36->49 37->36 48->49 49->5 52 7ffe126d3244 50->52 53 7ffe126d3201-7ffe126d323a call 7ffe126d39a0 50->53 55 7ffe126d3245-7ffe126d3249 52->55 53->50 63 7ffe126d323c-7ffe126d3242 53->63 57 7ffe126d324b-7ffe126d3250 55->57 58 7ffe126d326f-7ffe126d3273 55->58 59 7ffe126d3256-7ffe126d326a call 7ffe126d3d90 57->59 60 7ffe126d3793-7ffe126d3794 57->60 61 7ffe126d3275-7ffe126d327d 58->61 62 7ffe126d327f-7ffe126d3284 58->62 59->60 60->33 61->62 65 7ffe126d32a3-7ffe126d32be call 7ffe126d3c93 61->65 66 7ffe126d328a-7ffe126d329e call 7ffe126d3d90 62->66 67 7ffe126d3796-7ffe126d3797 62->67 63->55 73 7ffe126d32c4-7ffe126d32d9 call 7ffe126d1d10 65->73 74 7ffe126d3510-7ffe126d3516 65->74 66->67 67->33 87 7ffe126d33a8-7ffe126d33b8 call 7ffe126d1c76 73->87 88 7ffe126d32df-7ffe126d32fa call 7ffe126d1900 73->88 75 7ffe126d351c-7ffe126d3531 call 7ffe126d1d10 74->75 76 7ffe126d3679-7ffe126d367f 74->76 95 7ffe126d3537-7ffe126d3553 call 7ffe126d1900 call 7ffe126d20a9 75->95 96 7ffe126d3642-7ffe126d365e call 7ffe126d209c call 7ffe126d1640 75->96 78 7ffe126d36cb-7ffe126d36d1 76->78 79 7ffe126d3681-7ffe126d3687 76->79 85 7ffe126d36db-7ffe126d36e5 call 7ffe126d17f4 78->85 86 7ffe126d36d3-7ffe126d36d9 78->86 82 7ffe126d368d-7ffe126d3698 79->82 83 7ffe126d3742-7ffe126d3747 79->83 82->83 94 7ffe126d369e-7ffe126d36b3 call 7ffe126d1d10 82->94 83->26 89 7ffe126d374d-7ffe126d3761 call 7ffe126d3d90 83->89 108 7ffe126d36fb-7ffe126d3700 call 7ffe126d3d78 85->108 109 7ffe126d36e7-7ffe126d36f3 call 7ffe126d3ee8 85->109 86->85 90 7ffe126d3705-7ffe126d370b 86->90 110 7ffe126d34cb-7ffe126d34f5 call 7ffe126d1fe3 call 7ffe126d3ac7 87->110 111 7ffe126d33be-7ffe126d33cb 87->111 106 7ffe126d32fc-7ffe126d3312 88->106 107 7ffe126d3314-7ffe126d3329 call 7ffe126d19e8 88->107 89->26 90->83 101 7ffe126d370d-7ffe126d3713 90->101 94->83 125 7ffe126d36b9-7ffe126d36c9 call 7ffe126d19e8 94->125 138 7ffe126d3589-7ffe126d3599 call 7ffe126d203a 95->138 139 7ffe126d3555-7ffe126d356a call 7ffe126d19e8 95->139 96->83 141 7ffe126d3664-7ffe126d3674 call 7ffe126d19e8 96->141 101->83 112 7ffe126d3715-7ffe126d3723 101->112 106->107 118 7ffe126d3348-7ffe126d336e call 7ffe126d2317 106->118 142 7ffe126d3766-7ffe126d3767 107->142 143 7ffe126d332f-7ffe126d3343 call 7ffe126d3d90 107->143 108->90 109->108 110->83 161 7ffe126d34fb-7ffe126d350b call 7ffe126d19e8 110->161 121 7ffe126d33cd-7ffe126d33e2 call 7ffe126d19e8 111->121 122 7ffe126d3401-7ffe126d3476 call 7ffe126d3da8 * 2 call 7ffe126d3db0 call 7ffe126d3d70 111->122 112->83 124 7ffe126d3725-7ffe126d372a 112->124 118->83 156 7ffe126d3374-7ffe126d3389 call 7ffe126d19e8 118->156 154 7ffe126d33e8-7ffe126d33fc call 7ffe126d3d90 121->154 155 7ffe126d3772-7ffe126d3773 121->155 122->83 192 7ffe126d347c-7ffe126d3491 call 7ffe126d19e8 122->192 133 7ffe126d372c-7ffe126d3740 call 7ffe126d3d90 124->133 134 7ffe126d3799 124->134 125->83 133->134 134->33 171 7ffe126d359b-7ffe126d35b5 call 7ffe126d2115 call 7ffe126d19e8 138->171 172 7ffe126d35d4-7ffe126d35f3 call 7ffe126d3d70 138->172 168 7ffe126d377e-7ffe126d377f 139->168 169 7ffe126d3570-7ffe126d3584 call 7ffe126d3d90 139->169 141->83 142->26 143->142 154->155 155->26 180 7ffe126d376c-7ffe126d376d 156->180 181 7ffe126d338f-7ffe126d33a3 call 7ffe126d3d90 156->181 161->83 168->26 169->168 199 7ffe126d35bb-7ffe126d35cf call 7ffe126d3d90 171->199 200 7ffe126d3784-7ffe126d3785 171->200 189 7ffe126d3629-7ffe126d362e 172->189 190 7ffe126d35f5-7ffe126d360a call 7ffe126d19e8 172->190 180->26 181->180 189->96 194 7ffe126d3630-7ffe126d3639 189->194 202 7ffe126d378a-7ffe126d378b 190->202 203 7ffe126d3610-7ffe126d3624 call 7ffe126d3d90 190->203 206 7ffe126d34a7-7ffe126d34ac 192->206 207 7ffe126d3493-7ffe126d349f call 7ffe126d3d90 192->207 194->96 198 7ffe126d363b-7ffe126d363f 194->198 198->96 199->200 200->26 202->26 203->202 211 7ffe126d3778-7ffe126d3779 206->211 212 7ffe126d34b2-7ffe126d34c6 call 7ffe126d3d90 206->212 207->206 211->26 212->211
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: liaf
        • API String ID: 0-3481663875
        • Opcode ID: 01c6d76bda9126618951cd3760031493797e14687e462e1af93c14874b591ed2
        • Instruction ID: 1815570204ea87a02523db5265119ebf5dd9e438cee587fe5635f3870e16cb73
        • Opcode Fuzzy Hash: 01c6d76bda9126618951cd3760031493797e14687e462e1af93c14874b591ed2
        • Instruction Fuzzy Hash: 5B228465F08A0E8AFB109BB6C8453FC27B0AB44778F100675DEAD577E5DEBCA4908B50

        Control-flow Graph

        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: 85.239.52.252
        • API String ID: 0-4133895869
        • Opcode ID: 421dd87a0d27a0c76f46dfa8495513125952184b43221609c272ec00e8ca2d45
        • Instruction ID: e774d4484743c30b1db98d9b04d5fbddc39f844791b4d37adb2ee287f6eb1380
        • Opcode Fuzzy Hash: 421dd87a0d27a0c76f46dfa8495513125952184b43221609c272ec00e8ca2d45
        • Instruction Fuzzy Hash: 53516E62B04A9A8EFB20DBB6D8403EC3771EB05358F444075EA4D5BBDADEB8D544C740

        Control-flow Graph

        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: 85.239.52.252
        • API String ID: 0-4133895869
        • Opcode ID: e08b65984c26dac0a8beb3c579eefe30f9128f87e759a4a5ac4c391046419c8c
        • Instruction ID: 22036587bed18a3fdc5a0752282134b139502b696d3aa1940f54a75cdbc00075
        • Opcode Fuzzy Hash: e08b65984c26dac0a8beb3c579eefe30f9128f87e759a4a5ac4c391046419c8c
        • Instruction Fuzzy Hash: F23193B1F04A8E4BEFB49B368D053F922D19B45364F004075E94D8B7F5EE6CA5118F41

        Control-flow Graph

        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a7e99f209dc4062eadb156062b447773cbafa840fde06c7853fffa51e9a8b985
        • Instruction ID: 82fcf1792fa0db14a25acb9e1ff9c5934ca651055929d3643d65b948d016e6da
        • Opcode Fuzzy Hash: a7e99f209dc4062eadb156062b447773cbafa840fde06c7853fffa51e9a8b985
        • Instruction Fuzzy Hash: C8414D72F04A1D8AFB10CBA6D9043AC37B0AB447A8F100575DE5D27BE9DFB89A048B50

        Control-flow Graph

        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9992356da82e1d633c7628dcd7da512874a6c4761e0cbd30ad5e3bc235e4a76d
        • Instruction ID: 0e8a0385d8e0d44208ab2631eade80b13115992ed8854e7861ebd3ef4b7c10de
        • Opcode Fuzzy Hash: 9992356da82e1d633c7628dcd7da512874a6c4761e0cbd30ad5e3bc235e4a76d
        • Instruction Fuzzy Hash: 7A31DA72A04AC98AE7709F6ADC407DC73A1F719778F004276DE589BBD8DBB496508B40

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 356 7ffe126d220d-7ffe126d2266 call 7ffe126d3e78 * 2
        Memory Dump Source
        • Source File: 00000003.00000002.3563707197.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000003.00000002.3563689883.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563728330.00007FFE126D4000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563748752.00007FFE126D5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.3563789553.00007FFE126F8000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe126d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b30b0dd98c189ec07417ee6450ca6486aab83f3bfc1e95cf89db179afefbdeec
        • Instruction ID: 1750e25ecbe32318b4d3de63ed0fecb7ea6666f543eed64210896379d2db3c1b
        • Opcode Fuzzy Hash: b30b0dd98c189ec07417ee6450ca6486aab83f3bfc1e95cf89db179afefbdeec
        • Instruction Fuzzy Hash: 67E04661F08F498BF3405B63FC623663298EB48761F504078E59C4BBE2DE7DE8A14B80