Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
94.159.113.82.dll.dll

Overview

General Information

Sample name:94.159.113.82.dll.dll
(renamed file extension from exe to dll)
Original sample name:94.159.113.82.dll.exe
Analysis ID:1545965
MD5:e32d64da480b63435d9b559e718354d2
SHA1:aff97210b69e95313c6b28d4bd87346f97b6c637
SHA256:65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c
Tags:94-159-113-82--8888dllexeuser-JAMESWT_MHT
Infos:

Detection

Strela Stealer
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Strela Stealer
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2808 cmdline: loaddll64.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 2136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3132 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4476 cmdline: rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5952 cmdline: rundll32.exe C:\Users\user\Desktop\94.159.113.82.dll.dll,Entry MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3336 cmdline: rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",Entry MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.1454549340.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
    00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
      00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.7ff8e84ec404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              3.2.rundll32.exe.7ff8e84ec404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                4.2.rundll32.exe.7ff8e84ec404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                  6.2.rundll32.exe.7ff8e84ec404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                    6.2.rundll32.exe.7ff8e84ec404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                      Click to see the 4 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 94.159.113.82.dll.dllReversingLabs: Detection: 34%
                      Source: 94.159.113.82.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84A33303_2_00007FF8E84A3330
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84A2D303_2_00007FF8E84A2D30
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84CE2203_2_00007FF8E84CE220
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84C96B03_2_00007FF8E84C96B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84CF0003_2_00007FF8E84CF000
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84E14203_2_00007FF8E84E1420
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84E98903_2_00007FF8E84E9890
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8E84E145B3_2_00007FF8E84E145B
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000143A84415403_2_00000143A8441540
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000143A84471AC3_2_00000143A84471AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000143A8441A303_2_00000143A8441A30
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000143A844F3D83_2_00000143A844F3D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACABF3D84_2_000002DFACABF3D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACAB71AC4_2_000002DFACAB71AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACAB15404_2_000002DFACAB1540
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACAB1A304_2_000002DFACAB1A30
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000230D343F3D86_2_00000230D343F3D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000230D3431A306_2_00000230D3431A30
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000230D34371AC6_2_00000230D34371AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000230D34315406_2_00000230D3431540
                      Source: 94.159.113.82.dll.dllStatic PE information: No import functions for PE file found
                      Source: classification engineClassification label: mal56.troj.winDLL@10/0@0/0
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2136:120:WilError_03
                      Source: 94.159.113.82.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\94.159.113.82.dll.dll,Entry
                      Source: 94.159.113.82.dll.dllReversingLabs: Detection: 34%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\94.159.113.82.dll.dll,Entry
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",Entry
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\94.159.113.82.dll.dll,EntryJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",EntryJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: 94.159.113.82.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: 94.159.113.82.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000143A844BA92 push esp; ret 3_2_00000143A844BA95
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000143A844CB94 push ecx; retf 0000h3_2_00000143A844CB95
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACABCB94 push ecx; retf 0000h4_2_000002DFACABCB95
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACAC75CE push ecx; retf 003Fh4_2_000002DFACAC762E
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002DFACABBA92 push esp; ret 4_2_000002DFACABBA95
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000230D343CB94 push ecx; retf 0000h6_2_00000230D343CB95
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000230D343BA92 push esp; ret 6_2_00000230D343BA95
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\loaddll64.exe TID: 420Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1Jump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8e84ec404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.7ff8e84ec404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8e84ec404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ff8e84ec404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ff8e84ec404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.7ff8e84ec404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.7ff8e84a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8e84a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ff8e84a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1454549340.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1425795730.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5952, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3336, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8e84ec404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.7ff8e84ec404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8e84ec404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ff8e84ec404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ff8e84ec404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.7ff8e84ec404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.7ff8e84a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8e84a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ff8e84a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1454549340.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1425795730.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5952, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3336, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Rundll32
                      OS Credential Dumping11
                      Virtualization/Sandbox Evasion
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Virtualization/Sandbox Evasion
                      LSASS Memory1
                      System Information Discovery
                      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Process Injection
                      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1545965 Sample: 94.159.113.82.dll.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 56 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected Strela Stealer 2->21 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      94.159.113.82.dll.dll34%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      s-part-0044.t-0009.fb-t-msedge.net
                      13.107.253.72
                      truefalse
                        unknown
                        fp2e7a.wpc.phicdn.net
                        192.229.221.95
                        truefalse
                          unknown
                          No contacted IP infos
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1545965
                          Start date and time:2024-10-31 11:03:32 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 2m 46s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:94.159.113.82.dll.dll
                          (renamed file extension from exe to dll)
                          Original Sample Name:94.159.113.82.dll.exe
                          Detection:MAL
                          Classification:mal56.troj.winDLL@10/0@0/0
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 95%
                          • Number of executed functions: 14
                          • Number of non-executed functions: 23
                          Cookbook Comments:
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): dllhost.exe
                          • Excluded IPs from analysis (whitelisted): 52.149.20.212
                          • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, ocsp.edge.digicert.com, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                          • Not all processes where analyzed, report is missing behavior information
                          • VT rate limit hit for: 94.159.113.82.dll.dll
                          TimeTypeDescription
                          06:04:30API Interceptor1x Sleep call for process: loaddll64.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          fp2e7a.wpc.phicdn.net169778715180725424.jsGet hashmaliciousStrela DownloaderBrowse
                          • 192.229.221.95
                          https://invite.bublup.com/q6fU7gLtMrfSGet hashmaliciousHTMLPhisherBrowse
                          • 192.229.221.95
                          27459322381917527648.jsGet hashmaliciousStrela DownloaderBrowse
                          • 192.229.221.95
                          10765717746537784.jsGet hashmaliciousStrela DownloaderBrowse
                          • 192.229.221.95
                          http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          file.exeGet hashmaliciousLummaCBrowse
                          • 192.229.221.95
                          new order - PO 351081.exeGet hashmaliciousAgentTeslaBrowse
                          • 192.229.221.95
                          https://www.kwconnect.com/redirect?url=https%3A%2F%2Fwww.ingenieriawj.com/trx/#XdGFtYXJhLnBlcmVpcmFkZWplc3VzQGRhaWljaGktc2Fua3lvLmV1Get hashmaliciousHTMLPhisherBrowse
                          • 192.229.221.95
                          https://uslpsz.efkbkot.xyz/e7e68e62c/JV9-MXEwfF9fJSVeKl/8jaSp4fjVfMW/EzJV4vXiNeJHw9OXxufDBAZSp5YzkhdDNlZG8lN0AjJGd-fD8kIXJ8Kg2Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://mindmeters.bizGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          s-part-0044.t-0009.fb-t-msedge.nethttps://assets-usa.mkt.dynamics.com/a915fd66-2592-ef11-8a66-00224803a417/digitalassets/standaloneforms/3d7495e3-e695-ef11-8a69-000d3a3501d6Get hashmaliciousMamba2FABrowse
                          • 13.107.253.72
                          https://www.google.mx/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Biw.%C2%ADgc%C2%ADrvn%C2%ADm0.%C2%ADza%C2%AD.c%E2%80%8Bo%C2%ADm%2Ffylee%2Fimages%2Fsf_rand_string_mixed(24)/toto@dgtresor.gouv.frGet hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          http://demettei.comGet hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          https://dzentec-my.sharepoint.com/:u:/g/personal/i_lahmer_entec-dz_com/EdYp5IxQ-uxJivnPAqSzv40BZiCX7sphz7Kj8JDyRBKqpQ?e=wqutC4&xsdata=MDV8MDJ8c2NvdHRkaWF6QGRlbWVpbmVlc3RhdGVzLmNvbXw2YjUyZTY2NWViYzI0M2MxZGE1NjA4ZGNmNzI0NDEwY3xkMTRiYThjYzk2NDI0NzNhYTE0ZWY3NzIxODgzMzJmZXwwfDB8NjM4NjU2OTgyMzMwNDY2MDIzfFVua25vd258VFdGcGJHWnNiM2Q4ZXlKV0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2TW4wPXwwfHx8&sdata=ZnFidXdudm9CbXlMY3MxYTAxVjk3N2plVFdSTHZ5MVlZOGdkRkRZNEUxYz0%3dGet hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          https://link.edgepilot.com/s/8e0e5379/EMW5cxymxkqj1qgquAdAJg?u=https://1drv.ms/o/c/67a50aba8b4bc7df/Es0QkMhT9wJGqs_vzb8xaRQBgzED6dWk5_dCMe34N16rYQ?e=5%253aTtRWoI%26sharingv2=true%26fromShare=true%26at=9&c=E,1,DNZ_Csfpwg3nzWxVo2TSq2LzcEM3C6hdkfA-QbvL5dwYrcj0RsSt_vroZV-UqAThZkP5E_WMmdbQ82a_nveA3iNTPpg_CIcQxQFCbK60ykcRIVrxnkr2VnkbdtuE&typo=1Get hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          https://www.shareholds.com/eur/9fb868a2-97de-4fa6-bb9a-6e2bdc7c734d/99db7d04-72ba-41ea-a52e-2744d29c7f66/e845cf48-2115-4cda-904c-fc80c835df32/login?id=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 hashmaliciousHTMLPhisher, Microsoft PhishingBrowse
                          • 13.107.253.72
                          https://onedrive.live.com/redir?resid=A2C259BD24DEB977%211517&authkey=%21AMV6sdjMIZf95vs&page=View&wd=target%28Quick%20Notes.one%7C8266a05f-045a-4cc0-bddc-4debc90069bb%2FNotera%20H6TYD9J4rDFDFECZC-HUYW%7Ca949d04d-b4e2-4509-b99f-d04546199b7b%2F%29&wdorigin=NavigationUrlGet hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          ES Ny kontraktsrunda.msgGet hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          file.exeGet hashmaliciousCredential FlusherBrowse
                          • 13.107.253.72
                          EXTERNALRoger Moczygemba shared DIRECT MED CLINIC - CONFIDENTIAL with you.msgGet hashmaliciousUnknownBrowse
                          • 13.107.253.72
                          No context
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                          Entropy (8bit):7.3275976376954555
                          TrID:
                          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                          • Win64 Executable (generic) (12005/4) 10.17%
                          • Generic Win/DOS Executable (2004/3) 1.70%
                          • DOS Executable Generic (2002/1) 1.70%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                          File name:94.159.113.82.dll.dll
                          File size:425'984 bytes
                          MD5:e32d64da480b63435d9b559e718354d2
                          SHA1:aff97210b69e95313c6b28d4bd87346f97b6c637
                          SHA256:65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c
                          SHA512:8e1d0ae4d1537ce18de577674255350dd4bb73f5b2dfb185c9b8b9695c0f081f7e5501da123622528daf13a73943dffc7031d9187a2e00759c13168e5c38e685
                          SSDEEP:6144:0zAcM4oqgAcjMPkvfJs3CeTqehGtXLEqNhNuLsYWkqitvqP7UOsX2IX27pxAl6Fo:0AcM5pjFH+CelQtXLEeKLZMPsm7Al0p
                          TLSH:6794CF24FC7AD059ECE38072BF29D221D1662E7BDF1D2266A1EC4D404054DEFB52A1BB
                          File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...l1"g.........." ................0-....................................................`........................................
                          Icon Hash:7ae282899bbab082
                          Entrypoint:0x180002d30
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x180000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x6722316C [Wed Oct 30 13:15:24 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:
                          Instruction
                          inc ecx
                          push edi
                          inc ecx
                          push esi
                          inc ecx
                          push esp
                          push esi
                          push edi
                          push ebp
                          push ebx
                          push eax
                          mov eax, dword ptr [0006670Fh]
                          inc esp
                          mov eax, dword ptr [0006670Ch]
                          inc esp
                          lea ebx, dword ptr [eax-01h]
                          inc esp
                          imul ebx, eax
                          inc ebp
                          mov edx, ebx
                          inc ecx
                          not edx
                          inc ebp
                          mov ecx, edx
                          inc ecx
                          and ecx, D2AA348Dh
                          inc esp
                          mov edi, edx
                          inc esp
                          and edi, ebx
                          inc esp
                          mov ebx, ebx
                          inc ebp
                          mov edi, ebx
                          inc ecx
                          xor edi, 0F184C9Ah
                          inc ebp
                          and edi, ebx
                          inc ecx
                          and ebx, 2D55CB72h
                          inc ebp
                          or ebx, ecx
                          inc esp
                          mov eax, ebx
                          xor eax, 29414802h
                          inc ecx
                          xor ebx, D2AA348Dh
                          mov ecx, edi
                          not ecx
                          inc esp
                          mov ebp, ebx
                          and ebp, 161C9371h
                          and eax, E9E36C8Eh
                          or eax, ebp
                          inc ecx
                          or ebx, ecx
                          and ecx, 161C9371h
                          and edi, E9E36C8Eh
                          or edi, ecx
                          xor edi, eax
                          inc ecx
                          not ebx
                          inc ecx
                          or ebx, edi
                          inc esp
                          mov eax, ebx
                          not eax
                          and eax, 42B35279h
                          inc ecx
                          and ebx, BD4CAD86h
                          inc ecx
                          or ebx, eax
                          inc esp
                          mov eax, ebx
                          and eax, 01h
                          inc ecx
                          xor ebx, BD4CAD87h
                          inc ecx
                          or ebx, eax
                          inc esp
                          mov eax, ebx
                          not eax
                          inc esp
                          mov ecx, edx
                          and ecx, BB0EB11Ah
                          and ebx, 44F14EE5h
                          or ebx, ecx
                          mov edx, ebx
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x4b0000x47.rdata
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000x1a8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x60.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x49fa70x4a000fdb8918e6430ea5398fae9c2144872afFalse0.6443266997466216data6.792587224644498IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x4b0000x1080x200308a0ae10b14504162d1d14cd1c21df1False0.298828125data3.0907339362177764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x4c0000x1d4980x1d6000c51fb4af0fddb6e9b0ca1ca23212a38False0.8658909574468086data7.729026462495868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0x6a0000x600x2004991a695e7c4be8f5933ff807bbdd21cFalse0.177734375PEX Binary Archive1.1106520083640667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0x6b0000x1a80x200a3e915e0923731bd5fc6ef6d5ff6d820False0.486328125data4.190620030451981IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_MANIFEST0x6b0600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                          NameOrdinalAddress
                          Entry10x180001010
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 31, 2024 11:04:23.324624062 CET1.1.1.1192.168.2.90x4159No error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                          Oct 31, 2024 11:04:23.324624062 CET1.1.1.1192.168.2.90x4159No error (0)dual.s-part-0044.t-0009.fb-t-msedge.nets-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                          Oct 31, 2024 11:04:23.324624062 CET1.1.1.1192.168.2.90x4159No error (0)s-part-0044.t-0009.fb-t-msedge.net13.107.253.72A (IP address)IN (0x0001)false
                          Oct 31, 2024 11:04:44.942229033 CET1.1.1.1192.168.2.90xca78No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                          Oct 31, 2024 11:04:44.942229033 CET1.1.1.1192.168.2.90xca78No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:06:04:27
                          Start date:31/10/2024
                          Path:C:\Windows\System32\loaddll64.exe
                          Wow64 process (32bit):false
                          Commandline:loaddll64.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll"
                          Imagebase:0x7ff6b65f0000
                          File size:165'888 bytes
                          MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:1
                          Start time:06:04:27
                          Start date:31/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff70f010000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:06:04:27
                          Start date:31/10/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1
                          Imagebase:0x7ff7edca0000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:06:04:27
                          Start date:31/10/2024
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe C:\Users\user\Desktop\94.159.113.82.dll.dll,Entry
                          Imagebase:0x7ff7dd3b0000
                          File size:71'680 bytes
                          MD5 hash:EF3179D498793BF4234F708D3BE28633
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:06:04:27
                          Start date:31/10/2024
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",#1
                          Imagebase:0x7ff7dd3b0000
                          File size:71'680 bytes
                          MD5 hash:EF3179D498793BF4234F708D3BE28633
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.1425795730.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:true

                          Target ID:6
                          Start time:06:04:30
                          Start date:31/10/2024
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe "C:\Users\user\Desktop\94.159.113.82.dll.dll",Entry
                          Imagebase:0x7ff7dd3b0000
                          File size:71'680 bytes
                          MD5 hash:EF3179D498793BF4234F708D3BE28633
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000006.00000002.1454549340.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:22.3%
                            Dynamic/Decrypted Code Coverage:84%
                            Signature Coverage:16%
                            Total number of Nodes:25
                            Total number of Limit Nodes:3
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: ,,l$-,l$-,l$-,l$5\cl$5\cl$5\cl$H[@H$H[@H$LTc-$LTc-$LTc-$Sax!$Sax!$YbUw$YbUw$YbUw$f{:n}$f|+u$f|+u$+pP$+pP$+pP$?d*$?d*$?d*$?d*
                            • API String ID: 0-3994297466
                            • Opcode ID: 25c2f33aa9478bde86dd6623c9eb8a2061181ed5676b0cc15c3b8e2767726043
                            • Instruction ID: b24831de404775a87c03f00531ba488c91a144a15af6d53a534c8a93177d867f
                            • Opcode Fuzzy Hash: 25c2f33aa9478bde86dd6623c9eb8a2061181ed5676b0cc15c3b8e2767726043
                            • Instruction Fuzzy Hash: 9844086BFB59110BFB0CC9B68DA23EB4BC353E5359F1AF4395906D7296DC7E884A0204

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread
                            • String ID: 5
                            • API String ID: 2422867632-2226203566
                            • Opcode ID: fec50be18cec05fb1f2d2de2c440bef84976441ada21ca2d20ea2fb0305f6d76
                            • Instruction ID: 6daa9c8f620e2d131226814a4c8483425737dd2d8254eb7a24db4cafa99b62ed
                            • Opcode Fuzzy Hash: fec50be18cec05fb1f2d2de2c440bef84976441ada21ca2d20ea2fb0305f6d76
                            • Instruction Fuzzy Hash: 8A2190712546448BE709EF70D88A6EAB7E1FBA4301F60452EF097D71B2EE3986458702

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Volume$MountNamePoint
                            • String ID:
                            • API String ID: 1269602640-0
                            • Opcode ID: 0177a58ad0feb6b794dd3b4ec03ae6edbb9575ae31101b3539175058fe829bc5
                            • Instruction ID: 84fffd3b54b9933392a5adc8f0b2ddc9640f9e7c910cccf91d95081221d61f3a
                            • Opcode Fuzzy Hash: 0177a58ad0feb6b794dd3b4ec03ae6edbb9575ae31101b3539175058fe829bc5
                            • Instruction Fuzzy Hash: E40162705086848FFB06EB28D898BD677E1F768301F108569E0CAD72A5DEBD8658C751

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExitProcess
                            • String ID:
                            • API String ID: 621844428-0
                            • Opcode ID: bf6664ce3ce6688347f466b549bb248f323f25cd8840df242701a1179d4e4307
                            • Instruction ID: f0b1c97a790f3cd36418a869d7e9aea7edcb985fa1e6026b92bca8da7e28dcd1
                            • Opcode Fuzzy Hash: bf6664ce3ce6688347f466b549bb248f323f25cd8840df242701a1179d4e4307
                            • Instruction Fuzzy Hash: F6D017347402040BFE5CBBB599983A92696CB65301F3018387992CB6E3CD3C8A088642

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 454 143a8442050-143a8442076 MessageBoxA
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message
                            • String ID:
                            • API String ID: 2030045667-0
                            • Opcode ID: 4c2fd0a914b7ba21d3acfa36acad50b2e0ddb8d668cb0b05972da9b0caa7b8c6
                            • Instruction ID: c092d3f5cc9ad05945e7761e4822e93b8ddb175e52b7450221b7c49769eb2abf
                            • Opcode Fuzzy Hash: 4c2fd0a914b7ba21d3acfa36acad50b2e0ddb8d668cb0b05972da9b0caa7b8c6
                            • Instruction Fuzzy Hash: 75C0123011140946E708BB34EC595E132A8FB8C301FD185359407C6450E96D81885B82
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 'nKq$'nKq$'nKq$,=&s$,=&s$,=&s$TyG@$UyG@$UyG@$n|Y$n|Y$n|Y$n|Y
                            • API String ID: 0-114208488
                            • Opcode ID: a4e7e06349bf808e6aaef3c30c32d5b9d9932c729c6e3bc24c70a987921a05f2
                            • Instruction ID: 979ae5a3a1d9d2bcf45401181419989ed92a6aeccd3a8a7d3c72e720522687d7
                            • Opcode Fuzzy Hash: a4e7e06349bf808e6aaef3c30c32d5b9d9932c729c6e3bc24c70a987921a05f2
                            • Instruction Fuzzy Hash: DA4466ABBF57190AEB1099F689817DB7BC293A5358F1B74385E00D7613E8FEDC492240

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 695 7ff8e84c96b0-7ff8e84c96ca 696 7ff8e84c96f8-7ff8e84c96fd 695->696 697 7ff8e84c9700-7ff8e84c9705 696->697 698 7ff8e84c9bb0-7ff8e84c9bb5 697->698 699 7ff8e84c970b-7ff8e84c9710 697->699 702 7ff8e84ca390-7ff8e84ca395 698->702 703 7ff8e84c9bbb-7ff8e84c9bc0 698->703 700 7ff8e84c9716-7ff8e84c971b 699->700 701 7ff8e84c9b60-7ff8e84c9b65 699->701 704 7ff8e84ca3d1-7ff8e84ca3d6 700->704 705 7ff8e84c9721-7ff8e84c9726 700->705 708 7ff8e84ca4a9-7ff8e84ca4ae 701->708 709 7ff8e84c9b6b-7ff8e84c9b70 701->709 706 7ff8e84ca4cf-7ff8e84ca4d4 702->706 707 7ff8e84ca39b-7ff8e84ca3a0 702->707 710 7ff8e84c9bc6-7ff8e84c9bcb 703->710 711 7ff8e84ca473-7ff8e84ca478 703->711 722 7ff8e84ca3dc-7ff8e84ca3e1 704->722 723 7ff8e84ccefe-7ff8e84cd276 704->723 712 7ff8e84c972c-7ff8e84c9731 705->712 713 7ff8e84cab78-7ff8e84cb13e 705->713 718 7ff8e84cd9aa-7ff8e84ce1f0 706->718 719 7ff8e84ca4da-7ff8e84ca4df 706->719 716 7ff8e84cc7b4-7ff8e84cced3 707->716 717 7ff8e84ca3a6-7ff8e84ca3ab 707->717 714 7ff8e84ca4b4-7ff8e84ca4b9 708->714 715 7ff8e84cd973-7ff8e84cd97d 708->715 720 7ff8e84cb155-7ff8e84cb4ae 709->720 721 7ff8e84c9b76-7ff8e84c9b7b 709->721 726 7ff8e84cbcb5-7ff8e84cc291 710->726 727 7ff8e84c9bd1-7ff8e84c9bd6 710->727 724 7ff8e84cd944-7ff8e84cd953 711->724 725 7ff8e84ca47e-7ff8e84ca483 711->725 729 7ff8e84c96d0-7ff8e84c96f3 712->729 730 7ff8e84c9733-7ff8e84c9738 712->730 736 7ff8e84cb142-7ff8e84cb14a 713->736 731 7ff8e84cd995-7ff8e84cd99f 714->731 732 7ff8e84ca4bf-7ff8e84ca4c4 714->732 737 7ff8e84cd982-7ff8e84cd98a 715->737 741 7ff8e84cced6-7ff8e84ccede 716->741 742 7ff8e84ca3b1-7ff8e84ca3b6 717->742 743 7ff8e84ccee9-7ff8e84ccef3 717->743 728 7ff8e84ce1f5-7ff8e84ce1fd 718->728 719->697 733 7ff8e84ca4e5-7ff8e84cab73 719->733 720->737 734 7ff8e84c9b81-7ff8e84c9b86 721->734 735 7ff8e84cb4b3-7ff8e84cbcb0 721->735 744 7ff8e84ca3e7-7ff8e84ca3ec 722->744 745 7ff8e84cd27b-7ff8e84cd93f 722->745 723->728 724->699 746 7ff8e84cd959 724->746 747 7ff8e84cd95e-7ff8e84cd968 725->747 748 7ff8e84ca489-7ff8e84ca48e 725->748 726->699 738 7ff8e84cc297 726->738 739 7ff8e84cc29c-7ff8e84cc7a9 727->739 740 7ff8e84c9bdc-7ff8e84c9be1 727->740 728->699 751 7ff8e84ce203 728->751 729->696 730->697 752 7ff8e84c973a-7ff8e84c9b57 730->752 731->699 750 7ff8e84cd9a5 731->750 732->697 753 7ff8e84ca4ca-7ff8e84ce218 732->753 733->728 734->697 754 7ff8e84c9b8c-7ff8e84c9b9b 734->754 735->737 736->699 755 7ff8e84cb150 736->755 737->699 763 7ff8e84cd990 737->763 738->698 756 7ff8e84cc7ac-7ff8e84cc7af 739->756 740->697 757 7ff8e84c9be7-7ff8e84ca38a 740->757 741->699 758 7ff8e84ccee4 741->758 742->697 759 7ff8e84ca3bc-7ff8e84ca3c6 742->759 743->699 760 7ff8e84ccef9 743->760 744->697 761 7ff8e84ca3f2-7ff8e84ca468 744->761 745->728 746->698 747->699 762 7ff8e84cd96e 747->762 748->697 749 7ff8e84ca494-7ff8e84ca49e 748->749 749->699 764 7ff8e84ca4a4 749->764 750->698 751->698 752->736 754->699 766 7ff8e84c9ba1-7ff8e84c9bab 754->766 755->698 756->741 757->756 758->698 759->699 767 7ff8e84ca3cc 759->767 760->698 761->699 768 7ff8e84ca46e 761->768 762->698 763->698 764->698 766->698 767->698 768->698
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$ 4%$!4%$!4%$!4%$!4%
                            • API String ID: 0-302812754
                            • Opcode ID: b7dfd2572995f458074e6c517d4f4a9144ff4208f9255b60967fd99ff7b54782
                            • Instruction ID: c0dce2b755a37956ac54be705aff4191db547c85c6c542be961051ecf0da1fb3
                            • Opcode Fuzzy Hash: b7dfd2572995f458074e6c517d4f4a9144ff4208f9255b60967fd99ff7b54782
                            • Instruction Fuzzy Hash: BF737D6BFF56041AFB1089B68A857DB6BD353A5358F1BB4349E04D7323E8BED84A1240
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: @G1$@G1$@G1$',/\$',/\$',/\
                            • API String ID: 0-999703189
                            • Opcode ID: 9a9157d99710c5bb047f186d2b8deb4e1adaff335d204ccaccdff04718ee4737
                            • Instruction ID: b3b08efdbd83036d057e4946b9c8caae37e2a35e87aa7391aeae8bc9d2796b71
                            • Opcode Fuzzy Hash: 9a9157d99710c5bb047f186d2b8deb4e1adaff335d204ccaccdff04718ee4737
                            • Instruction Fuzzy Hash: 99D33A6BFB5A150BFB0CC8B69DA23EB57C353E1318F1AF4395906C7296DCBE88491244
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: $vO`$$vO`$+,Rr$+,Rr$@}$@}
                            • API String ID: 0-4243004784
                            • Opcode ID: 374e23b437ea78a890d7d56343eda0ceaaed1df76908d37c21a0757807995875
                            • Instruction ID: c608043ada52139f5caab7edd7a63ea556689c539b9e753e1d7adf45830b56f2
                            • Opcode Fuzzy Hash: 374e23b437ea78a890d7d56343eda0ceaaed1df76908d37c21a0757807995875
                            • Instruction Fuzzy Hash: 42A24D72B5C2424BEB3089699180BBF6BD1E754398F116031DB498BBD2CB7DECD89B05

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1477 7ff8e84ce220-7ff8e84ce666 1478 7ff8e84ce670-7ff8e84ce678 1477->1478 1479 7ff8e84ce6d0-7ff8e84ce6d6 1478->1479 1480 7ff8e84ce67a-7ff8e84ce680 1478->1480 1481 7ff8e84cebe0-7ff8e84cebe6 1479->1481 1482 7ff8e84ce6dc-7ff8e84ce6e2 1479->1482 1483 7ff8e84ce686-7ff8e84ce68c 1480->1483 1484 7ff8e84ce730-7ff8e84ce736 1480->1484 1491 7ff8e84cebec-7ff8e84cebf2 1481->1491 1492 7ff8e84cecdb-7ff8e84cece1 1481->1492 1485 7ff8e84ce6e8-7ff8e84ce6ee 1482->1485 1486 7ff8e84cec69-7ff8e84cec6f 1482->1486 1489 7ff8e84ce692-7ff8e84ce698 1483->1489 1490 7ff8e84cec2b-7ff8e84cec31 1483->1490 1487 7ff8e84ce73c-7ff8e84ce742 1484->1487 1488 7ff8e84cec9e-7ff8e84ceca4 1484->1488 1495 7ff8e84ce6f4-7ff8e84ce6fa 1485->1495 1496 7ff8e84ced3d-7ff8e84ced46 1485->1496 1499 7ff8e84cec75-7ff8e84cec7b 1486->1499 1500 7ff8e84cee97-7ff8e84cee9d 1486->1500 1501 7ff8e84cee17-7ff8e84cee1f 1487->1501 1502 7ff8e84ce748-7ff8e84ce751 1487->1502 1505 7ff8e84cecaa-7ff8e84cecb3 1488->1505 1506 7ff8e84ceebb-7ff8e84ceec1 1488->1506 1503 7ff8e84ced17-7ff8e84ced20 1489->1503 1504 7ff8e84ce69e-7ff8e84ce6a4 1489->1504 1497 7ff8e84cec37-7ff8e84cec40 1490->1497 1498 7ff8e84cee70-7ff8e84cee79 1490->1498 1507 7ff8e84cee47-7ff8e84cee4d 1491->1507 1508 7ff8e84cebf8-7ff8e84cebfe 1491->1508 1493 7ff8e84cece7-7ff8e84ceced 1492->1493 1494 7ff8e84ceedf-7ff8e84ceee8 1492->1494 1521 7ff8e84cef96-7ff8e84cefa4 1493->1521 1522 7ff8e84cecf3-7ff8e84cecfb 1493->1522 1494->1478 1515 7ff8e84ceeee-7ff8e84ceef6 1494->1515 1523 7ff8e84ce700-7ff8e84ce706 1495->1523 1524 7ff8e84cef38-7ff8e84cef4d 1495->1524 1496->1478 1526 7ff8e84ced4c-7ff8e84ced54 1496->1526 1497->1478 1512 7ff8e84cec46-7ff8e84cec4c 1497->1512 1498->1478 1509 7ff8e84cee7f-7ff8e84cee87 1498->1509 1516 7ff8e84cec81-7ff8e84cec89 1499->1516 1517 7ff8e84cefde-7ff8e84ceff9 1499->1517 1510 7ff8e84ceea3-7ff8e84ceeab 1500->1510 1511 7ff8e84cefa9-7ff8e84cefb8 1500->1511 1501->1478 1528 7ff8e84cee25-7ff8e84cee2d 1501->1528 1502->1478 1527 7ff8e84ce757-7ff8e84ce761 1502->1527 1503->1478 1525 7ff8e84ced26-7ff8e84ced2e 1503->1525 1518 7ff8e84cef06-7ff8e84cef33 1504->1518 1519 7ff8e84ce6aa-7ff8e84ce6b2 1504->1519 1505->1478 1520 7ff8e84cecb9-7ff8e84cecc1 1505->1520 1513 7ff8e84ceec7-7ff8e84ceecf 1506->1513 1514 7ff8e84cefbd-7ff8e84cefc2 1506->1514 1529 7ff8e84cefc7-7ff8e84cefd9 1507->1529 1530 7ff8e84cee53-7ff8e84cee5b 1507->1530 1531 7ff8e84cec04-7ff8e84cec0e 1508->1531 1532 7ff8e84cef75-7ff8e84cef87 1508->1532 1509->1478 1534 7ff8e84cee8d-7ff8e84cee92 1509->1534 1510->1478 1535 7ff8e84ceeb1-7ff8e84ceeb6 1510->1535 1511->1478 1536 7ff8e84cec52-7ff8e84cec5a 1512->1536 1537 7ff8e84cef8c-7ff8e84cef91 1512->1537 1513->1478 1538 7ff8e84ceed5-7ff8e84ceeda 1513->1538 1514->1478 1515->1478 1539 7ff8e84ceefc-7ff8e84cef01 1515->1539 1516->1478 1540 7ff8e84cec8f-7ff8e84cec99 1516->1540 1518->1478 1519->1478 1541 7ff8e84ce6b4-7ff8e84ce6bc 1519->1541 1520->1478 1542 7ff8e84cecc7-7ff8e84cecd6 1520->1542 1521->1478 1522->1478 1543 7ff8e84ced01-7ff8e84ced12 1522->1543 1544 7ff8e84cef52-7ff8e84cef70 1523->1544 1545 7ff8e84ce70c-7ff8e84ce714 1523->1545 1524->1478 1525->1478 1546 7ff8e84ced34-7ff8e84ced38 1525->1546 1526->1478 1547 7ff8e84ced5a-7ff8e84cee12 1526->1547 1527->1478 1548 7ff8e84ce767-7ff8e84ce76f 1527->1548 1528->1478 1549 7ff8e84cee33-7ff8e84cee42 1528->1549 1529->1478 1530->1478 1550 7ff8e84cee61-7ff8e84cee6b 1530->1550 1531->1478 1533 7ff8e84cec14-7ff8e84cec1c 1531->1533 1532->1478 1533->1478 1551 7ff8e84cec22-7ff8e84cec26 1533->1551 1534->1478 1535->1478 1536->1478 1552 7ff8e84cec60-7ff8e84cec64 1536->1552 1537->1478 1538->1478 1539->1478 1540->1478 1541->1478 1553 7ff8e84ce6be-7ff8e84ce6c2 1541->1553 1542->1478 1543->1478 1544->1478 1545->1478 1554 7ff8e84ce71a-7ff8e84ce71f 1545->1554 1546->1478 1547->1478 1548->1478 1555 7ff8e84ce775-7ff8e84cebcd 1548->1555 1549->1478 1550->1478 1551->1478 1552->1478 1553->1478 1554->1478 1555->1478
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: FIDo$FIDo
                            • API String ID: 0-2295895458
                            • Opcode ID: 76bf83e0f9d15f89800d96bc67aec44f6a24a0c9b90c119a6afcc87a74c4f547
                            • Instruction ID: 2c1e0b59a75572e6753c4a907a738778997ebee709fdbc206603d1ccbc3b588f
                            • Opcode Fuzzy Hash: 76bf83e0f9d15f89800d96bc67aec44f6a24a0c9b90c119a6afcc87a74c4f547
                            • Instruction Fuzzy Hash: 8962BC67BA86011BFF248975C1803EF2BD2E791388F25B434DE4987B66DB7DE8495B00
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: _clrfp
                            • String ID:
                            • API String ID: 3618594692-0
                            • Opcode ID: 09a635efb40557e66d19d789cd03176a2828270b47717be0ddc9dc138ea1ed53
                            • Instruction ID: 0567a6f5e25a852719426537a32c296387f99ff7f26d7b19a3bd298deacfe8d1
                            • Opcode Fuzzy Hash: 09a635efb40557e66d19d789cd03176a2828270b47717be0ddc9dc138ea1ed53
                            • Instruction Fuzzy Hash: 13C15E31510A4D8FEB9DDF1CC48AB9577E0FB69304F258599E8A9CB2B2C335D952CB01
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 261e522a800823edeadb38c00b9b95b250f8c2e9b563d41526eb5dd2f4eee498
                            • Instruction ID: cfe9dd521586e04fb3882c16a954efd272021a71d0945fe93674adba91f1afad
                            • Opcode Fuzzy Hash: 261e522a800823edeadb38c00b9b95b250f8c2e9b563d41526eb5dd2f4eee498
                            • Instruction Fuzzy Hash: 8CD11A6BBE56100BEF0C88B689E23E75BC353E6358F1BF4399905C7296D8BE9C4E5104
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425108083.00007FF8E84A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E84A0000, based on PE: true
                            • Associated: 00000003.00000002.1425093844.00007FF8E84A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425154660.00007FF8E84EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425171612.00007FF8E84EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.1425194662.00007FF8E850B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff8e84a0000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 82af362a0954b65281fab3dbfc4bd730a4a5dfcadb2df4e7435bf0d1f38c720e
                            • Instruction ID: 361b28d38ee2f353d3a8c187848c4c24e19c1580f54a6c4594a7eb7c7da3cae9
                            • Opcode Fuzzy Hash: 82af362a0954b65281fab3dbfc4bd730a4a5dfcadb2df4e7435bf0d1f38c720e
                            • Instruction Fuzzy Hash: 45D19ABBB7950007FB09897658A33FB5BC3639531DF1AB839AD06D7291E9BDDC490204
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: beb6ef0740fca4777ef060016385f250c52519df02de5653defd5d9bfbafd29e
                            • Instruction ID: 6c331eb5b07d51ecacc1b21332a889cdbe223d2cb48353b501abe3f4ddf553f2
                            • Opcode Fuzzy Hash: beb6ef0740fca4777ef060016385f250c52519df02de5653defd5d9bfbafd29e
                            • Instruction Fuzzy Hash: 06E13470558B488FE769EF18D8897EA77E1FB98305F20462EE48EC3161DF349645CB82
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1f432bef4d8a1500742c93c345c90908278f3b425d70456be5894f74d0482f2c
                            • Instruction ID: 226e880602076ab9de0eb9cb600777f993259328ca4843f79da16a79ac43b792
                            • Opcode Fuzzy Hash: 1f432bef4d8a1500742c93c345c90908278f3b425d70456be5894f74d0482f2c
                            • Instruction Fuzzy Hash: BAB1A971258A494FEB69EF24DC597FA73E1FBA4301F20422ED49BC31A1DF349A058B81
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90e9beff2eaa7c7f876a80ef3703abb4a76fb9d45624bea63be5c4672b97ae7c
                            • Instruction ID: c65be6fc5b5884ed8b0de5cae7c8e0fc202938b9e2cc94f6a545c6d04c893b2c
                            • Opcode Fuzzy Hash: 90e9beff2eaa7c7f876a80ef3703abb4a76fb9d45624bea63be5c4672b97ae7c
                            • Instruction Fuzzy Hash: 04512632318E0C4FDB0CDF6CE4996B573D2F7AC310B25822EE44AC72A6DA70D9468781

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 932 143a8443fa0-143a8444007 call 143a8444f44 935 143a8444468-143a844446f call 143a8447744 932->935 936 143a844400d-143a8444010 932->936 936->935 937 143a8444016-143a844401c 936->937 939 143a8444022-143a8444026 937->939 940 143a84440eb-143a84440fd 937->940 939->940 944 143a844402c-143a8444037 939->944 942 143a84443b8-143a84443bc 940->942 943 143a8444103-143a8444107 940->943 947 143a84443f5-143a84443ff call 143a844308c 942->947 948 143a84443be-143a84443c5 942->948 943->942 945 143a844410d-143a8444118 943->945 944->940 946 143a844403d-143a8444042 944->946 945->942 949 143a844411e-143a8444125 945->949 946->940 950 143a8444048-143a8444052 call 143a844308c 946->950 947->935 960 143a8444401-143a8444420 call 143a844f970 947->960 948->935 951 143a84443cb-143a84443f0 call 143a8444470 948->951 953 143a84442e9-143a84442f5 949->953 954 143a844412b-143a8444166 call 143a844374c 949->954 950->960 965 143a8444058-143a8444083 call 143a844308c * 2 call 143a8443a54 950->965 951->947 953->947 961 143a84442fb-143a84442ff 953->961 954->953 969 143a844416c-143a8444176 954->969 962 143a844430f-143a8444317 961->962 963 143a8444301-143a844430d call 143a8443a14 961->963 962->947 968 143a844431d-143a844432a call 143a84435ec 962->968 963->962 976 143a8444330-143a8444338 963->976 1001 143a84440a3-143a84440ad call 143a844308c 965->1001 1002 143a8444085-143a8444089 965->1002 968->947 968->976 974 143a844417a-143a84441ac 969->974 978 143a84442d8-143a84442df 974->978 979 143a84441b2-143a84441be 974->979 981 143a844444b-143a8444467 call 143a844308c * 2 call 143a84476b8 976->981 982 143a844433e-143a8444342 976->982 978->974 985 143a84442e5-143a84442e6 978->985 979->978 983 143a84441c4-143a84441dd 979->983 981->935 986 143a8444344-143a8444353 call 143a8443a14 982->986 987 143a8444355-143a8444356 982->987 989 143a84441e3-143a8444228 call 143a8443a28 * 2 983->989 990 143a84442d5-143a84442d6 983->990 985->953 995 143a8444358-143a8444362 call 143a8444fdc 986->995 987->995 1013 143a844422a-143a8444250 call 143a8443a28 call 143a84446e0 989->1013 1014 143a8444266-143a844426c 989->1014 990->978 995->947 1008 143a8444368-143a84443b6 call 143a844367c call 143a8443880 995->1008 1001->940 1016 143a84440af-143a84440cf call 143a844308c * 2 call 143a8444fdc 1001->1016 1002->1001 1007 143a844408b-143a8444096 1002->1007 1007->1001 1009 143a8444098-143a844409d 1007->1009 1008->947 1009->935 1009->1001 1031 143a8444277-143a84442cb call 143a8443ecc 1013->1031 1032 143a8444252-143a8444264 1013->1032 1021 143a84442d0-143a84442d1 1014->1021 1022 143a844426e-143a8444272 1014->1022 1036 143a84440e6-143a84440e7 1016->1036 1037 143a84440d1-143a84440db call 143a84450cc 1016->1037 1021->990 1022->989 1031->1021 1032->1013 1032->1014 1036->940 1040 143a8444445-143a844444a call 143a84476b8 1037->1040 1041 143a84440e1-143a8444444 call 143a8442e64 call 143a8444a9c call 143a84452c8 1037->1041 1040->981 1041->1040
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                            • String ID: csm$csm$csm
                            • API String ID: 849930591-393685449
                            • Opcode ID: bda51bc3a0357f57d772c211ceca0e07ff0350a93b45b89eafa1cc507aec3172
                            • Instruction ID: b71ec4d7fc63b3b9f2b1f388fd8d3d41528b15cb4d5860276f63104eecbebe31
                            • Opcode Fuzzy Hash: bda51bc3a0357f57d772c211ceca0e07ff0350a93b45b89eafa1cc507aec3172
                            • Instruction Fuzzy Hash: B8F18830559B088FEB58EF58D445BE977E0FB64710F70065EE49AD32A6DB30DA41CB82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1232 143a8444820-143a8444868 call 143a8443034 call 143a844308c 1237 143a844486a-143a8444870 1232->1237 1238 143a84448a2-143a84448a6 1232->1238 1237->1238 1239 143a8444872-143a8444874 1237->1239 1240 143a844493a-143a844493e 1238->1240 1241 143a84448ac-143a84448b0 1238->1241 1242 143a8444886-143a8444888 1239->1242 1243 143a8444876-143a844487a 1239->1243 1246 143a8444940-143a844494c 1240->1246 1247 143a8444982-143a8444988 1240->1247 1244 143a84448b6-143a84448be 1241->1244 1245 143a8444a31 1241->1245 1242->1238 1248 143a844488a-143a8444896 1242->1248 1243->1248 1249 143a844487c-143a8444884 1243->1249 1244->1245 1252 143a84448c4-143a84448c8 1244->1252 1255 143a8444a36-143a8444a50 1245->1255 1253 143a8444962-143a844496e 1246->1253 1254 143a844494e-143a8444952 1246->1254 1250 143a84449f8-143a8444a2c call 143a8443fa0 1247->1250 1251 143a844498a-143a844498e 1247->1251 1248->1238 1258 143a8444898-143a844489c 1248->1258 1249->1238 1249->1242 1250->1245 1251->1250 1257 143a8444990-143a8444997 1251->1257 1259 143a8444927-143a8444935 call 143a8443618 1252->1259 1260 143a84448ca-143a84448cc 1252->1260 1253->1245 1256 143a8444974-143a844497c 1253->1256 1254->1253 1262 143a8444954-143a8444960 call 143a8443a14 1254->1262 1256->1245 1256->1247 1257->1250 1263 143a8444999-143a84449a1 1257->1263 1258->1238 1258->1245 1259->1245 1265 143a8444905-143a8444907 1260->1265 1266 143a84448ce-143a84448e0 call 143a8443ba4 1260->1266 1262->1247 1262->1253 1263->1250 1269 143a84449a3-143a84449b6 call 143a8443a28 1263->1269 1265->1259 1268 143a8444909-143a8444911 1265->1268 1274 143a8444a51-143a8444a57 call 143a8447744 1266->1274 1280 143a84448e6-143a84448e9 1266->1280 1273 143a8444917-143a844491b 1268->1273 1268->1274 1269->1250 1283 143a84449b8-143a84449f6 1269->1283 1273->1274 1278 143a8444921-143a8444925 1273->1278 1282 143a84448f5-143a8444900 call 143a8444db8 1278->1282 1280->1274 1284 143a84448ef-143a84448f3 1280->1284 1282->1245 1283->1255 1284->1282
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                            • String ID: csm$csm
                            • API String ID: 3896166516-3733052814
                            • Opcode ID: 1d2698259a612f2ee7ff18fa5726e536797fed5dba793eddb852fdfecdc1ddd2
                            • Instruction ID: f0d7c9e99464e87aa68f07a135625cb88bacb0175a04574437db7bc7cd551133
                            • Opcode Fuzzy Hash: 1d2698259a612f2ee7ff18fa5726e536797fed5dba793eddb852fdfecdc1ddd2
                            • Instruction Fuzzy Hash: 8D719130695B448FEBACDF2880487A4B3D0FB64315F74425E94EAD76E2CB70DA80C746

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1288 143a8442be0-143a8442c26 call 143a8443034 1291 143a8442c2c-143a8442c36 1288->1291 1292 143a8442d1d-143a8442d24 1288->1292 1294 143a8442d09-143a8442d0b 1291->1294 1293 143a8442dc8-143a8442dce 1292->1293 1297 143a8442d29-143a8442d37 1293->1297 1298 143a8442dd4 1293->1298 1295 143a8442d11 1294->1295 1296 143a8442c3b-143a8442c49 1294->1296 1295->1298 1302 143a8442d07 1296->1302 1303 143a8442c4f-143a8442c56 1296->1303 1299 143a8442dc6 1297->1299 1300 143a8442d3d-143a8442d45 1297->1300 1301 143a8442dd9-143a8442df6 1298->1301 1299->1293 1300->1299 1304 143a8442d47-143a8442d4b 1300->1304 1302->1294 1303->1302 1305 143a8442c5c-143a8442c61 1303->1305 1306 143a8442d8c-143a8442d9d 1304->1306 1307 143a8442d4d-143a8442d52 1304->1307 1305->1302 1308 143a8442c67-143a8442c6c 1305->1308 1311 143a8442daf-143a8442dc3 1306->1311 1312 143a8442d9f-143a8442da5 1306->1312 1313 143a8442d88-143a8442d8a 1307->1313 1314 143a8442d54-143a8442d60 1307->1314 1309 143a8442c89-143a8442c8f 1308->1309 1310 143a8442c6e-143a8442c81 1308->1310 1316 143a8442cb9-143a8442d02 call 143a8443000 call 143a8443030 1309->1316 1317 143a8442c91-143a8442c99 1309->1317 1325 143a8442c87 1310->1325 1326 143a8442d16-143a8442d18 1310->1326 1311->1299 1312->1299 1315 143a8442da7-143a8442dab 1312->1315 1313->1298 1313->1306 1318 143a8442d81-143a8442d86 1314->1318 1319 143a8442d62-143a8442d69 1314->1319 1315->1298 1321 143a8442dad 1315->1321 1316->1302 1317->1316 1322 143a8442c9b-143a8442ca9 call 143a844f830 1317->1322 1318->1313 1318->1314 1319->1318 1324 143a8442d6b-143a8442d74 1319->1324 1321->1299 1322->1316 1331 143a8442cab-143a8442cb1 1322->1331 1324->1318 1329 143a8442d76-143a8442d7f 1324->1329 1325->1302 1325->1309 1326->1301 1329->1313 1329->1318 1331->1316
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentImageNonwritable__except_validate_context_record
                            • String ID: csm
                            • API String ID: 3242871069-1018135373
                            • Opcode ID: d6c1345f67480e357b279f855e56577cf3eeb2642f55a01c02fffb8b22a130ce
                            • Instruction ID: 819361409ff65be934f76c6a3a105b0884599524406506315f3bdadfdd541b7c
                            • Opcode Fuzzy Hash: d6c1345f67480e357b279f855e56577cf3eeb2642f55a01c02fffb8b22a130ce
                            • Instruction Fuzzy Hash: 5F711770248E198BEF2CEE1CE485BB473D1FB64350F30416DE8D6C32A6EA72E9518785

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1334 143a8444470-143a84444a3 1335 143a84444a9-143a84444cb call 143a844308c 1334->1335 1336 143a84446bc-143a84446d6 1334->1336 1339 143a8444528-143a844453a 1335->1339 1340 143a84444cd-143a84444e1 call 143a844308c 1335->1340 1341 143a84446d7-143a84446df call 143a8447744 1339->1341 1342 143a8444540-143a8444584 call 143a844374c 1339->1342 1340->1339 1352 143a84444e3-143a84444e9 1340->1352 1342->1336 1349 143a844458a-143a8444595 1342->1349 1351 143a844459c-143a84445d7 1349->1351 1353 143a844469b-143a84446b6 1351->1353 1354 143a84445dd-143a84445e9 1351->1354 1352->1339 1355 143a84444eb-143a84444f1 1352->1355 1353->1336 1353->1351 1354->1353 1356 143a84445ef-143a8444614 1354->1356 1355->1339 1357 143a84444f3-143a8444522 call 143a8443534 1355->1357 1358 143a8444647-143a844464a 1356->1358 1359 143a8444616-143a8444622 call 143a8443a14 1356->1359 1357->1336 1357->1339 1358->1353 1361 143a844464c-143a8444696 call 143a8443ecc 1358->1361 1366 143a8444624-143a8444627 1359->1366 1367 143a844463f-143a8444640 1359->1367 1361->1353 1368 143a8444637 1366->1368 1369 143a8444629-143a8444635 call 143a8443a14 1366->1369 1367->1358 1371 143a8444639-143a844463d 1368->1371 1369->1371 1371->1353 1371->1367
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1425025961.00000143A8441000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000143A8441000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_143a8441000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallTranslator
                            • String ID: MOC$RCC
                            • API String ID: 3163161869-2084237596
                            • Opcode ID: defcd56cab28add25d698ecca6325f30bff9252b91cf191f8f0c67d00d085a97
                            • Instruction ID: a07cac90da68fbffea6d651b189f294dfec4de21cbe22293ee9246f7e9b266ba
                            • Opcode Fuzzy Hash: defcd56cab28add25d698ecca6325f30bff9252b91cf191f8f0c67d00d085a97
                            • Instruction Fuzzy Hash: 5471C830518B488FE768DF58C446BE5B7E0FBA8700F244A5EE4D9C3162D774E581CB82

                            Execution Graph

                            Execution Coverage:1.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:28
                            Total number of Limit Nodes:4

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread
                            • String ID: 5
                            • API String ID: 2422867632-2226203566
                            • Opcode ID: fec50be18cec05fb1f2d2de2c440bef84976441ada21ca2d20ea2fb0305f6d76
                            • Instruction ID: 425da2bf2a97ffc9ec10701d8dca2fc5504948912c5099cbf190b3b48da3e5e1
                            • Opcode Fuzzy Hash: fec50be18cec05fb1f2d2de2c440bef84976441ada21ca2d20ea2fb0305f6d76
                            • Instruction Fuzzy Hash: F821B0752146448BE784EF70DA9D2FA77E1FB94301F404A3FF14BDA1A2EE3889048706

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileType
                            • String ID:
                            • API String ID: 3081899298-0
                            • Opcode ID: 88ec0ce35036a5a1fbcf623ebc041bb5733b6e3fce95a42db7acf307199213a2
                            • Instruction ID: da26a10b7e43c94bb91a73a832195bce59ed259b03499e4ff01bb140417a2273
                            • Opcode Fuzzy Hash: 88ec0ce35036a5a1fbcf623ebc041bb5733b6e3fce95a42db7acf307199213a2
                            • Instruction Fuzzy Hash: 7131EE34408E195EE7E5DF2CC4A86B4B6D0FB19360F64035AE45BEB2E4CA34DCA2C785

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Volume$MountNamePoint
                            • String ID:
                            • API String ID: 1269602640-0
                            • Opcode ID: 0177a58ad0feb6b794dd3b4ec03ae6edbb9575ae31101b3539175058fe829bc5
                            • Instruction ID: 376d03362cc7fac2f3289893764aed02a0a0143420e782f5090dacf0d4e051db
                            • Opcode Fuzzy Hash: 0177a58ad0feb6b794dd3b4ec03ae6edbb9575ae31101b3539175058fe829bc5
                            • Instruction Fuzzy Hash: 740144305085448FFB46AB28D998BE677A1F768305F008569E0CAD72A5DE7C8A58C741

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExitProcess
                            • String ID:
                            • API String ID: 621844428-0
                            • Opcode ID: bf6664ce3ce6688347f466b549bb248f323f25cd8840df242701a1179d4e4307
                            • Instruction ID: 4d24652e14d0511c5274f4a5f1102bad9aa14b6b1275fde5bc129abe09b881ac
                            • Opcode Fuzzy Hash: bf6664ce3ce6688347f466b549bb248f323f25cd8840df242701a1179d4e4307
                            • Instruction Fuzzy Hash: 7BD017287002040BEA9C7BB4DAEC3792662CB45201F041839B90BCB6E3CD399C048746

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 61 2dfacab2050-2dfacab2076 MessageBoxA
                            APIs
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message
                            • String ID:
                            • API String ID: 2030045667-0
                            • Opcode ID: 4c2fd0a914b7ba21d3acfa36acad50b2e0ddb8d668cb0b05972da9b0caa7b8c6
                            • Instruction ID: c092d3f5cc9ad05945e7761e4822e93b8ddb175e52b7450221b7c49769eb2abf
                            • Opcode Fuzzy Hash: 4c2fd0a914b7ba21d3acfa36acad50b2e0ddb8d668cb0b05972da9b0caa7b8c6
                            • Instruction Fuzzy Hash: 75C0123011140946E708BB34EC595E132A8FB8C301FD185359407C6450E96D81885B82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 78 2dfacab3fa0-2dfacab4007 call 2dfacab4f44 81 2dfacab4468-2dfacab446f call 2dfacab7744 78->81 82 2dfacab400d-2dfacab4010 78->82 82->81 83 2dfacab4016-2dfacab401c 82->83 86 2dfacab40eb-2dfacab40fd 83->86 87 2dfacab4022-2dfacab4026 83->87 89 2dfacab43b8-2dfacab43bc 86->89 90 2dfacab4103-2dfacab4107 86->90 87->86 88 2dfacab402c-2dfacab4037 87->88 88->86 92 2dfacab403d-2dfacab4042 88->92 93 2dfacab43be-2dfacab43c5 89->93 94 2dfacab43f5-2dfacab43ff call 2dfacab308c 89->94 90->89 91 2dfacab410d-2dfacab4118 90->91 91->89 95 2dfacab411e-2dfacab4125 91->95 92->86 96 2dfacab4048-2dfacab4052 call 2dfacab308c 92->96 93->81 97 2dfacab43cb-2dfacab43f0 call 2dfacab4470 93->97 94->81 106 2dfacab4401-2dfacab4420 call 2dfacabf970 94->106 99 2dfacab42e9-2dfacab42f5 95->99 100 2dfacab412b-2dfacab4166 call 2dfacab374c 95->100 96->106 109 2dfacab4058-2dfacab4083 call 2dfacab308c * 2 call 2dfacab3a54 96->109 97->94 99->94 107 2dfacab42fb-2dfacab42ff 99->107 100->99 114 2dfacab416c-2dfacab4176 100->114 111 2dfacab4301-2dfacab430d call 2dfacab3a14 107->111 112 2dfacab430f-2dfacab4317 107->112 147 2dfacab4085-2dfacab4089 109->147 148 2dfacab40a3-2dfacab40ad call 2dfacab308c 109->148 111->112 122 2dfacab4330-2dfacab4338 111->122 112->94 113 2dfacab431d-2dfacab432a call 2dfacab35ec 112->113 113->94 113->122 120 2dfacab417a-2dfacab41ac 114->120 124 2dfacab42d8-2dfacab42df 120->124 125 2dfacab41b2-2dfacab41be 120->125 127 2dfacab433e-2dfacab4342 122->127 128 2dfacab444b-2dfacab4467 call 2dfacab308c * 2 call 2dfacab76b8 122->128 124->120 131 2dfacab42e5-2dfacab42e6 124->131 125->124 129 2dfacab41c4-2dfacab41dd 125->129 132 2dfacab4355-2dfacab4356 127->132 133 2dfacab4344-2dfacab4353 call 2dfacab3a14 127->133 128->81 135 2dfacab42d5-2dfacab42d6 129->135 136 2dfacab41e3-2dfacab4228 call 2dfacab3a28 * 2 129->136 131->99 141 2dfacab4358-2dfacab4362 call 2dfacab4fdc 132->141 133->141 135->124 161 2dfacab422a-2dfacab4250 call 2dfacab3a28 call 2dfacab46e0 136->161 162 2dfacab4266-2dfacab426c 136->162 141->94 157 2dfacab4368-2dfacab43b6 call 2dfacab367c call 2dfacab3880 141->157 147->148 153 2dfacab408b-2dfacab4096 147->153 148->86 159 2dfacab40af-2dfacab40cf call 2dfacab308c * 2 call 2dfacab4fdc 148->159 153->148 158 2dfacab4098-2dfacab409d 153->158 157->94 158->81 158->148 182 2dfacab40d1-2dfacab40db call 2dfacab50cc 159->182 183 2dfacab40e6-2dfacab40e7 159->183 177 2dfacab4277-2dfacab42cb call 2dfacab3ecc 161->177 178 2dfacab4252-2dfacab4264 161->178 166 2dfacab426e-2dfacab4272 162->166 167 2dfacab42d0-2dfacab42d1 162->167 166->136 167->135 177->167 178->161 178->162 186 2dfacab40e1-2dfacab4444 call 2dfacab2e64 call 2dfacab4a9c call 2dfacab52c8 182->186 187 2dfacab4445-2dfacab444a call 2dfacab76b8 182->187 183->86 186->187 187->128
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                            • String ID: csm$csm$csm
                            • API String ID: 849930591-393685449
                            • Opcode ID: bda51bc3a0357f57d772c211ceca0e07ff0350a93b45b89eafa1cc507aec3172
                            • Instruction ID: 2e66b7b2ebd788b20b10b67e0a3eaa0f9b997779a8c42d920d5d1048fd517757
                            • Opcode Fuzzy Hash: bda51bc3a0357f57d772c211ceca0e07ff0350a93b45b89eafa1cc507aec3172
                            • Instruction Fuzzy Hash: 0FF15E34518B088BEB94EF68D5597B9B7E0FB59310F54066EE44ECB292DB30DC81CB86

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 197 2dfacab4820-2dfacab4868 call 2dfacab3034 call 2dfacab308c 202 2dfacab486a-2dfacab4870 197->202 203 2dfacab48a2-2dfacab48a6 197->203 202->203 206 2dfacab4872-2dfacab4874 202->206 204 2dfacab493a-2dfacab493e 203->204 205 2dfacab48ac-2dfacab48b0 203->205 209 2dfacab4982-2dfacab4988 204->209 210 2dfacab4940-2dfacab494c 204->210 207 2dfacab4a31 205->207 208 2dfacab48b6-2dfacab48be 205->208 211 2dfacab4886-2dfacab4888 206->211 212 2dfacab4876-2dfacab487a 206->212 216 2dfacab4a36-2dfacab4a50 207->216 208->207 213 2dfacab48c4-2dfacab48c8 208->213 219 2dfacab498a-2dfacab498e 209->219 220 2dfacab49f8-2dfacab4a2c call 2dfacab3fa0 209->220 214 2dfacab494e-2dfacab4952 210->214 215 2dfacab4962-2dfacab496e 210->215 211->203 217 2dfacab488a-2dfacab4896 211->217 212->217 218 2dfacab487c-2dfacab4884 212->218 222 2dfacab48ca-2dfacab48cc 213->222 223 2dfacab4927-2dfacab4935 call 2dfacab3618 213->223 214->215 224 2dfacab4954-2dfacab4960 call 2dfacab3a14 214->224 215->207 226 2dfacab4974-2dfacab497c 215->226 217->203 221 2dfacab4898-2dfacab489c 217->221 218->203 218->211 219->220 227 2dfacab4990-2dfacab4997 219->227 220->207 221->203 221->207 230 2dfacab48ce-2dfacab48e0 call 2dfacab3ba4 222->230 231 2dfacab4905-2dfacab4907 222->231 223->207 224->209 224->215 226->207 226->209 227->220 228 2dfacab4999-2dfacab49a1 227->228 228->220 233 2dfacab49a3-2dfacab49b6 call 2dfacab3a28 228->233 239 2dfacab4a51-2dfacab4a57 call 2dfacab7744 230->239 244 2dfacab48e6-2dfacab48e9 230->244 231->223 237 2dfacab4909-2dfacab4911 231->237 233->220 247 2dfacab49b8-2dfacab49f6 233->247 238 2dfacab4917-2dfacab491b 237->238 237->239 238->239 242 2dfacab4921-2dfacab4925 238->242 246 2dfacab48f5-2dfacab4900 call 2dfacab4db8 242->246 244->239 248 2dfacab48ef-2dfacab48f3 244->248 246->207 247->216 248->246
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                            • String ID: csm$csm
                            • API String ID: 3896166516-3733052814
                            • Opcode ID: 1d2698259a612f2ee7ff18fa5726e536797fed5dba793eddb852fdfecdc1ddd2
                            • Instruction ID: 1b2cd2745b1367e833901a31049f21ef5756ca7561df76fcb98b396f467bd4b8
                            • Opcode Fuzzy Hash: 1d2698259a612f2ee7ff18fa5726e536797fed5dba793eddb852fdfecdc1ddd2
                            • Instruction Fuzzy Hash: C1715E34614A498BEBE89B58C16C374B7D1FB58311F64427F949ECA692CF70DC80C74A

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 253 2dfacab2be0-2dfacab2c26 call 2dfacab3034 256 2dfacab2d1d-2dfacab2d24 253->256 257 2dfacab2c2c-2dfacab2c36 253->257 259 2dfacab2dc8-2dfacab2dce 256->259 258 2dfacab2d09-2dfacab2d0b 257->258 260 2dfacab2c3b-2dfacab2c49 258->260 261 2dfacab2d11 258->261 262 2dfacab2d29-2dfacab2d37 259->262 263 2dfacab2dd4 259->263 265 2dfacab2d07 260->265 266 2dfacab2c4f-2dfacab2c56 260->266 261->263 267 2dfacab2d3d-2dfacab2d45 262->267 268 2dfacab2dc6 262->268 264 2dfacab2dd9-2dfacab2df6 263->264 265->258 266->265 269 2dfacab2c5c-2dfacab2c61 266->269 267->268 270 2dfacab2d47-2dfacab2d4b 267->270 268->259 269->265 273 2dfacab2c67-2dfacab2c6c 269->273 271 2dfacab2d4d-2dfacab2d52 270->271 272 2dfacab2d8c-2dfacab2d9d 270->272 274 2dfacab2d88-2dfacab2d8a 271->274 275 2dfacab2d54-2dfacab2d60 271->275 278 2dfacab2daf-2dfacab2dc3 272->278 279 2dfacab2d9f-2dfacab2da5 272->279 276 2dfacab2c89-2dfacab2c8f 273->276 277 2dfacab2c6e-2dfacab2c81 273->277 274->263 274->272 280 2dfacab2d62-2dfacab2d69 275->280 281 2dfacab2d81-2dfacab2d86 275->281 283 2dfacab2cb9-2dfacab2d02 call 2dfacab3000 call 2dfacab3030 276->283 284 2dfacab2c91-2dfacab2c99 276->284 292 2dfacab2c87 277->292 293 2dfacab2d16-2dfacab2d18 277->293 278->268 279->268 282 2dfacab2da7-2dfacab2dab 279->282 280->281 285 2dfacab2d6b-2dfacab2d74 280->285 281->274 281->275 282->263 288 2dfacab2dad 282->288 283->265 284->283 289 2dfacab2c9b-2dfacab2ca9 call 2dfacabf830 284->289 285->281 290 2dfacab2d76-2dfacab2d7f 285->290 288->268 289->283 296 2dfacab2cab-2dfacab2cb1 289->296 290->274 290->281 292->265 292->276 293->264 296->283
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentImageNonwritable__except_validate_context_record
                            • String ID: csm
                            • API String ID: 3242871069-1018135373
                            • Opcode ID: d6c1345f67480e357b279f855e56577cf3eeb2642f55a01c02fffb8b22a130ce
                            • Instruction ID: 99ca3458fff3d23582d8663ab1e64b13f10c5c33c30a53bd2f064f79fa86aedc
                            • Opcode Fuzzy Hash: d6c1345f67480e357b279f855e56577cf3eeb2642f55a01c02fffb8b22a130ce
                            • Instruction Fuzzy Hash: 2471C534208A098BEBA8AE5CD59977477D1FB54350F10427FE88BCB296EA31EC518789

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000004.00000002.1425671249.000002DFACAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002DFACAB1000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_2dfacab1000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallTranslator
                            • String ID: MOC$RCC
                            • API String ID: 3163161869-2084237596
                            • Opcode ID: defcd56cab28add25d698ecca6325f30bff9252b91cf191f8f0c67d00d085a97
                            • Instruction ID: 706fdb6c6358967835eb8e8b22c81cdf1291d547621d7aab021fe9a30ac1b285
                            • Opcode Fuzzy Hash: defcd56cab28add25d698ecca6325f30bff9252b91cf191f8f0c67d00d085a97
                            • Instruction Fuzzy Hash: 4B719330518B488FE7A4DF18C55A7A9B7E0FB99300F144A6EE48EC7151DB74ED81C786

                            Execution Graph

                            Execution Coverage:1.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:21
                            Total number of Limit Nodes:2

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread
                            • String ID: 5
                            • API String ID: 2422867632-2226203566
                            • Opcode ID: fec50be18cec05fb1f2d2de2c440bef84976441ada21ca2d20ea2fb0305f6d76
                            • Instruction ID: 1efcb70095475473116f4d4b5ea59cd28590f4ec7a066c230679fa8702cfdc4c
                            • Opcode Fuzzy Hash: fec50be18cec05fb1f2d2de2c440bef84976441ada21ca2d20ea2fb0305f6d76
                            • Instruction Fuzzy Hash: A421AE712546488BE744FBB0D89D2EA77E1FB95301F50456AF047D66A2EE3CE604C712

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Volume$MountNamePoint
                            • String ID:
                            • API String ID: 1269602640-0
                            • Opcode ID: 0177a58ad0feb6b794dd3b4ec03ae6edbb9575ae31101b3539175058fe829bc5
                            • Instruction ID: 81d751778c677dd425bfc2d7c95b0bf93758de6a38b85342db6ed8fae4dd191e
                            • Opcode Fuzzy Hash: 0177a58ad0feb6b794dd3b4ec03ae6edbb9575ae31101b3539175058fe829bc5
                            • Instruction Fuzzy Hash: 150144315086488FFB06AB68D8DCBD676E1F769301F008569A0CAD72A5DE7CC658C751

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExitProcess
                            • String ID:
                            • API String ID: 621844428-0
                            • Opcode ID: bf6664ce3ce6688347f466b549bb248f323f25cd8840df242701a1179d4e4307
                            • Instruction ID: 62b9b29bf7981675c229a7b136e85a77c8c84831f741765484aadb564e125d7d
                            • Opcode Fuzzy Hash: bf6664ce3ce6688347f466b549bb248f323f25cd8840df242701a1179d4e4307
                            • Instruction Fuzzy Hash: 17D017207412090BEA587BF499EE3292696CB46211F0018787902CBAE3CD3DEA088652

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 42 230d3432050-230d3432076 MessageBoxA
                            APIs
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message
                            • String ID:
                            • API String ID: 2030045667-0
                            • Opcode ID: 4c2fd0a914b7ba21d3acfa36acad50b2e0ddb8d668cb0b05972da9b0caa7b8c6
                            • Instruction ID: c092d3f5cc9ad05945e7761e4822e93b8ddb175e52b7450221b7c49769eb2abf
                            • Opcode Fuzzy Hash: 4c2fd0a914b7ba21d3acfa36acad50b2e0ddb8d668cb0b05972da9b0caa7b8c6
                            • Instruction Fuzzy Hash: 75C0123011140946E708BB34EC595E132A8FB8C301FD185359407C6450E96D81885B82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 59 230d3433fa0-230d3434007 call 230d3434f44 62 230d3434468-230d343446f call 230d3437744 59->62 63 230d343400d-230d3434010 59->63 63->62 64 230d3434016-230d343401c 63->64 66 230d3434022-230d3434026 64->66 67 230d34340eb-230d34340fd 64->67 66->67 71 230d343402c-230d3434037 66->71 69 230d3434103-230d3434107 67->69 70 230d34343b8-230d34343bc 67->70 69->70 74 230d343410d-230d3434118 69->74 72 230d34343f5-230d34343ff call 230d343308c 70->72 73 230d34343be-230d34343c5 70->73 71->67 75 230d343403d-230d3434042 71->75 72->62 87 230d3434401-230d3434420 call 230d343f970 72->87 73->62 77 230d34343cb-230d34343f0 call 230d3434470 73->77 74->70 79 230d343411e-230d3434125 74->79 75->67 76 230d3434048-230d3434052 call 230d343308c 75->76 76->87 90 230d3434058-230d3434083 call 230d343308c * 2 call 230d3433a54 76->90 77->72 80 230d343412b-230d3434166 call 230d343374c 79->80 81 230d34342e9-230d34342f5 79->81 80->81 95 230d343416c-230d3434176 80->95 81->72 88 230d34342fb-230d34342ff 81->88 92 230d3434301-230d343430d call 230d3433a14 88->92 93 230d343430f-230d3434317 88->93 128 230d34340a3-230d34340ad call 230d343308c 90->128 129 230d3434085-230d3434089 90->129 92->93 107 230d3434330-230d3434338 92->107 93->72 94 230d343431d-230d343432a call 230d34335ec 93->94 94->72 94->107 100 230d343417a-230d34341ac 95->100 104 230d34341b2-230d34341be 100->104 105 230d34342d8-230d34342df 100->105 104->105 110 230d34341c4-230d34341dd 104->110 105->100 112 230d34342e5-230d34342e6 105->112 108 230d343444b-230d3434467 call 230d343308c * 2 call 230d34376b8 107->108 109 230d343433e-230d3434342 107->109 108->62 113 230d3434355-230d3434356 109->113 114 230d3434344-230d3434353 call 230d3433a14 109->114 116 230d34341e3-230d3434228 call 230d3433a28 * 2 110->116 117 230d34342d5-230d34342d6 110->117 112->81 122 230d3434358-230d3434362 call 230d3434fdc 113->122 114->122 142 230d3434266-230d343426c 116->142 143 230d343422a-230d3434250 call 230d3433a28 call 230d34346e0 116->143 117->105 122->72 137 230d3434368-230d34343b6 call 230d343367c call 230d3433880 122->137 128->67 140 230d34340af-230d34340cf call 230d343308c * 2 call 230d3434fdc 128->140 129->128 133 230d343408b-230d3434096 129->133 133->128 138 230d3434098-230d343409d 133->138 137->72 138->62 138->128 163 230d34340d1-230d34340db call 230d34350cc 140->163 164 230d34340e6-230d34340e7 140->164 146 230d34342d0-230d34342d1 142->146 147 230d343426e-230d3434272 142->147 158 230d3434252-230d3434264 143->158 159 230d3434277-230d34342cb call 230d3433ecc 143->159 146->117 147->116 158->142 158->143 159->146 167 230d34340e1-230d3434444 call 230d3432e64 call 230d3434a9c call 230d34352c8 163->167 168 230d3434445-230d343444a call 230d34376b8 163->168 164->67 167->168 168->108
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                            • String ID: csm$csm$csm
                            • API String ID: 849930591-393685449
                            • Opcode ID: bda51bc3a0357f57d772c211ceca0e07ff0350a93b45b89eafa1cc507aec3172
                            • Instruction ID: 7b43e49062b3d754d20867cd09b70d221547ce4720107e2b4bac6fc2670e0390
                            • Opcode Fuzzy Hash: bda51bc3a0357f57d772c211ceca0e07ff0350a93b45b89eafa1cc507aec3172
                            • Instruction Fuzzy Hash: 53F16130558B0C8BEB54EFA8C4997E977E0FB59310F5005ADE449C7692DB3CEA81CB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 178 230d3434820-230d3434868 call 230d3433034 call 230d343308c 183 230d34348a2-230d34348a6 178->183 184 230d343486a-230d3434870 178->184 185 230d343493a-230d343493e 183->185 186 230d34348ac-230d34348b0 183->186 184->183 187 230d3434872-230d3434874 184->187 190 230d3434982-230d3434988 185->190 191 230d3434940-230d343494c 185->191 188 230d3434a31 186->188 189 230d34348b6-230d34348be 186->189 192 230d3434886-230d3434888 187->192 193 230d3434876-230d343487a 187->193 198 230d3434a36-230d3434a50 188->198 189->188 195 230d34348c4-230d34348c8 189->195 200 230d343498a-230d343498e 190->200 201 230d34349f8-230d3434a2c call 230d3433fa0 190->201 196 230d3434962-230d343496e 191->196 197 230d343494e-230d3434952 191->197 192->183 194 230d343488a-230d3434896 192->194 193->194 199 230d343487c-230d3434884 193->199 194->183 203 230d3434898-230d343489c 194->203 204 230d3434927-230d3434935 call 230d3433618 195->204 205 230d34348ca-230d34348cc 195->205 196->188 208 230d3434974-230d343497c 196->208 197->196 206 230d3434954-230d3434960 call 230d3433a14 197->206 199->183 199->192 200->201 202 230d3434990-230d3434997 200->202 201->188 202->201 209 230d3434999-230d34349a1 202->209 203->183 203->188 204->188 211 230d3434905-230d3434907 205->211 212 230d34348ce-230d34348e0 call 230d3433ba4 205->212 206->190 206->196 208->188 208->190 209->201 215 230d34349a3-230d34349b6 call 230d3433a28 209->215 211->204 214 230d3434909-230d3434911 211->214 219 230d3434a51-230d3434a57 call 230d3437744 212->219 225 230d34348e6-230d34348e9 212->225 214->219 220 230d3434917-230d343491b 214->220 215->201 228 230d34349b8-230d34349f6 215->228 220->219 223 230d3434921-230d3434925 220->223 227 230d34348f5-230d3434900 call 230d3434db8 223->227 225->219 229 230d34348ef-230d34348f3 225->229 227->188 228->198 229->227
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                            • String ID: csm$csm
                            • API String ID: 3896166516-3733052814
                            • Opcode ID: 1d2698259a612f2ee7ff18fa5726e536797fed5dba793eddb852fdfecdc1ddd2
                            • Instruction ID: dbbdf9ccc864d1ee4cc1c850996e919f0366003410048db951aa166f745886a1
                            • Opcode Fuzzy Hash: 1d2698259a612f2ee7ff18fa5726e536797fed5dba793eddb852fdfecdc1ddd2
                            • Instruction Fuzzy Hash: 66717130558A4D8BEBA8DB6880ED3A877D1FF54311F5442AE9499C7BD2C73CE980CB52

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 234 230d3432be0-230d3432c26 call 230d3433034 237 230d3432d1d-230d3432d24 234->237 238 230d3432c2c-230d3432c36 234->238 239 230d3432dc8-230d3432dce 237->239 240 230d3432d09-230d3432d0b 238->240 243 230d3432dd4 239->243 244 230d3432d29-230d3432d37 239->244 241 230d3432d11 240->241 242 230d3432c3b-230d3432c49 240->242 241->243 248 230d3432d07 242->248 249 230d3432c4f-230d3432c56 242->249 247 230d3432dd9-230d3432df6 243->247 245 230d3432dc6 244->245 246 230d3432d3d-230d3432d45 244->246 245->239 246->245 250 230d3432d47-230d3432d4b 246->250 248->240 249->248 251 230d3432c5c-230d3432c61 249->251 252 230d3432d4d-230d3432d52 250->252 253 230d3432d8c-230d3432d9d 250->253 251->248 254 230d3432c67-230d3432c6c 251->254 255 230d3432d54-230d3432d60 252->255 256 230d3432d88-230d3432d8a 252->256 259 230d3432daf-230d3432dc3 253->259 260 230d3432d9f-230d3432da5 253->260 257 230d3432c89-230d3432c8f 254->257 258 230d3432c6e-230d3432c81 254->258 264 230d3432d62-230d3432d69 255->264 265 230d3432d81-230d3432d86 255->265 256->243 256->253 262 230d3432c91-230d3432c99 257->262 263 230d3432cb9-230d3432d02 call 230d3433000 call 230d3433030 257->263 271 230d3432c87 258->271 272 230d3432d16-230d3432d18 258->272 259->245 260->245 261 230d3432da7-230d3432dab 260->261 261->243 267 230d3432dad 261->267 262->263 268 230d3432c9b-230d3432ca9 call 230d343f830 262->268 263->248 264->265 270 230d3432d6b-230d3432d74 264->270 265->255 265->256 267->245 268->263 277 230d3432cab-230d3432cb1 268->277 270->265 275 230d3432d76-230d3432d7f 270->275 271->248 271->257 272->247 275->256 275->265 277->263
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentImageNonwritable__except_validate_context_record
                            • String ID: csm
                            • API String ID: 3242871069-1018135373
                            • Opcode ID: d6c1345f67480e357b279f855e56577cf3eeb2642f55a01c02fffb8b22a130ce
                            • Instruction ID: 602f5051d62de544f01ab369ee14467ca210fac3b99ebbba529068d6223a8a07
                            • Opcode Fuzzy Hash: d6c1345f67480e357b279f855e56577cf3eeb2642f55a01c02fffb8b22a130ce
                            • Instruction Fuzzy Hash: 0971F730248A0D8BEF68EE9CD4D977873D1FB54390F1041ADE886C3696EA3DF9518791

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000006.00000002.1454406762.00000230D3431000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000230D3431000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_6_2_230d3431000_rundll32.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallTranslator
                            • String ID: MOC$RCC
                            • API String ID: 3163161869-2084237596
                            • Opcode ID: defcd56cab28add25d698ecca6325f30bff9252b91cf191f8f0c67d00d085a97
                            • Instruction ID: 9d274e90a92a2f48768fac8bd3df831fdbbd1077340b908e1241efab2d7ecb30
                            • Opcode Fuzzy Hash: defcd56cab28add25d698ecca6325f30bff9252b91cf191f8f0c67d00d085a97
                            • Instruction Fuzzy Hash: A371B230558B4C8FE764DF58C4967A9B7E0FB98300F044A9EE489C3661DB7CE681CB92