Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bcr1Wl2Jn0.dll

Overview

General Information

Sample name:Bcr1Wl2Jn0.dll
renamed because original name is a hash value
Original sample name:a874d842bd0c7e96f5305a01bed07edbdf4cc6f7.dll
Analysis ID:1558478
MD5:73435ca7af760c73a527ec2f25d8c757
SHA1:a874d842bd0c7e96f5305a01bed07edbdf4cc6f7
SHA256:2642784805da2fedd52c929b0988e1e75512db90eb94ec2551b673db515dfe6b
Tags:dlluser-NDA0E
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Creates an autostart registry key pointing to binary in C:\Windows
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Entry point lies outside standard sections
Found evasive API chain (may stop execution after accessing registry keys)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7764 cmdline: loaddll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7812 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7848 cmdline: rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • cmd.exe (PID: 7912 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • PING.EXE (PID: 7964 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
    • rundll32.exe (PID: 7824 cmdline: rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,Scheduler MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 2948 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7824 -s 1700 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 8092 cmdline: rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler MD5: 889B99C52A60DD49227C5E485A016679)
      • cmd.exe (PID: 8112 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 8164 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • rundll32.exe (PID: 1056 cmdline: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler MD5: 889B99C52A60DD49227C5E485A016679)
    • cmd.exe (PID: 7616 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 7924 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • rundll32.exe (PID: 8016 cmdline: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler MD5: 889B99C52A60DD49227C5E485A016679)
    • cmd.exe (PID: 7980 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 7952 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Bcr1Wl2Jn0.dllWinnti_NlaifSvcWinnti sample - file NlaifSvc.dllFlorian Roth
  • 0x43519:$x1: cracked by ximo
  • 0x435ce:$x1: cracked by ximo
  • 0x43683:$x1: cracked by ximo
  • 0x43738:$x1: cracked by ximo
  • 0x437ed:$x1: cracked by ximo
  • 0x438a2:$x1: cracked by ximo
  • 0x43957:$x1: cracked by ximo
  • 0x43a0c:$x1: cracked by ximo
  • 0x43ac1:$x1: cracked by ximo
  • 0x43b76:$x1: cracked by ximo
SourceRuleDescriptionAuthorStrings
3.2.rundll32.exe.10000000.0.unpackWinnti_NlaifSvcWinnti sample - file NlaifSvc.dllFlorian Roth
  • 0x43519:$x1: cracked by ximo
  • 0x435ce:$x1: cracked by ximo
  • 0x43683:$x1: cracked by ximo
  • 0x43738:$x1: cracked by ximo
  • 0x437ed:$x1: cracked by ximo
  • 0x438a2:$x1: cracked by ximo
  • 0x43957:$x1: cracked by ximo
  • 0x43a0c:$x1: cracked by ximo
  • 0x43ac1:$x1: cracked by ximo
  • 0x43b76:$x1: cracked by ximo

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 7824, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SHR
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Bcr1Wl2Jn0.dllAvira: detected
Source: Bcr1Wl2Jn0.dllReversingLabs: Detection: 78%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
Source: Bcr1Wl2Jn0.dllJoe Sandbox ML: detected
Source: Bcr1Wl2Jn0.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000E763 lstrcpy,lstrcat,lstrcat,FindFirstFileA,FindNextFileA,lstrcpy,lstrcat,lstrcat,_strcmpi,PathIsDirectoryA,6D0A2DD0,_mbscpy,_mbscpy,strchr,strchr,strchr,_mbscpy,atoi,CreateDirectoryA,Sleep,FindClose,3_2_1000E763
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D49E strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,strrchr,_strcmpi,_mbscpy,FindClose,FindNextFileA,FindClose,3_2_1000D49E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100058AC FindFirstFileA,3_2_100058AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100069DD _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose,3_2_100069DD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000EBE4 strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose,3_2_1000EBE4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006DB7 _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,6D0A2C70,FindNextFileA,FindClose,3_2_10006DB7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100057EC GetLogicalDriveStringsA,3_2_100057EC
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.241 18530Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.251 6658Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.240 18963Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.43.161 12388Jump to behavior
Source: global trafficTCP traffic: 107.163.56.241 ports 18530,0,1,3,5,8
Source: global trafficTCP traffic: 107.163.56.240 ports 18963,1,3,6,8,9
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: global trafficTCP traffic: 192.168.2.9:49708 -> 107.163.56.241:18530
Source: global trafficTCP traffic: 192.168.2.9:49707 -> 107.163.43.161:12388
Source: global trafficTCP traffic: 192.168.2.9:49716 -> 107.163.56.251:6658
Source: global trafficTCP traffic: 192.168.2.9:49732 -> 107.163.56.240:18963
Source: Joe Sandbox ViewASN Name: TAKE2US TAKE2US
Source: Joe Sandbox ViewASN Name: TAKE2US TAKE2US
Source: Joe Sandbox ViewASN Name: TAKE2US TAKE2US
Source: Joe Sandbox ViewASN Name: TAKE2US TAKE2US
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.241
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.43.161
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.241
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.43.161
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.241
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.43.161
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.241
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.43.161
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.241
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.43.161
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.240
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.240
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100050C5 recv,3_2_100050C5
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://%s.qzone.qq.com/main
Source: rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://%s.qzone.qq.com/mainMozilla/4.0
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.43.161:12388/2112.html0U
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.43.161:12388/2112.htmlM
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.43.161:12388/2112.htmlg
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240/
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240/sApps
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2912506439.0000000005DFD000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://107.163.56.240:18963/main.php
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.php7
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phpF
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phpO
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phpT
Source: rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phphttp://107.163.56.241:18530/www.shinhan.com
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phpi
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phptP
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phpu
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.240:18963/main.phpz
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://107.163.56.241:18530/
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.241:18530//joy.asp?sid=rungnejcndvgnJLeFe5vteX8v2LUicbtudb8mteYmJe0nta
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://67.229.227.140:999/ver.asp?v=%s
Source: rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://67.229.227.140:999/ver.asp?v=%sfound~
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://blog.sina.com.cn/u/%s
Source: rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllString found in binary or memory: http://blog.sina.com.cn/u/%sMozilla/4.0
Source: Amcache.hve.17.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100052CF OpenClipboard,3_2_100052CF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004E8E SetClipboardData,3_2_10004E8E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004F4C GetClipboardData,3_2_10004F4C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004788 GetAsyncKeyState,3_2_10004788

System Summary

barindex
Source: Bcr1Wl2Jn0.dll, type: SAMPLEMatched rule: Winnti sample - file NlaifSvc.dll Author: Florian Roth
Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti sample - file NlaifSvc.dll Author: Florian Roth
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005F3C GetProcessHeap,RtlAllocateHeap,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_10005F3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005FD3 NtQueryInformationFile,3_2_10005FD3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10011C72: sprintf,CreateFileA,DeviceIoControl,GetLastError,FormatMessageA,CloseHandle,memset,_mbscpy,memset,_mbscpy,3_2_10011C72
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100059A0 DeleteService,3_2_100059A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004804 CreateProcessAsUserA,3_2_10004804
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005238 ExitWindowsEx,3_2_10005238
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100150F33_2_100150F3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F2003_2_1000F200
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100122E43_2_100122E4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001E5EC3_2_1001E5EC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100186423_2_10018642
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001A67B3_2_1001A67B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001D7483_2_1001D748
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001C8503_2_1001C850
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100158833_2_10015883
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10015B403_2_10015B40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001DB5D3_2_1001DB5D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001DD4D3_2_1001DD4D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001BD603_2_1001BD60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10001000 appears 296 times
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7824 -s 1700
Source: Bcr1Wl2Jn0.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: Bcr1Wl2Jn0.dll, type: SAMPLEMatched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: Bcr1Wl2Jn0.dllStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: classification engineClassification label: mal100.troj.evad.winDLL@33/5@0/5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10011C72 sprintf,CreateFileA,DeviceIoControl,GetLastError,FormatMessageA,CloseHandle,memset,_mbscpy,memset,_mbscpy,3_2_10011C72
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005EBA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,3_2_10005EBA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005912 AdjustTokenPrivileges,3_2_10005912
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10007DDE 6D0A2DD0,6D0A2DD0,6D0A2DD0,strrchr,strncpy,strncpy,GetSystemInfo,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,strlen,sscanf,3_2_10007DDE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005821 GetDiskFreeSpaceExA,3_2_10005821
Source: C:\Windows\SysWOW64\rundll32.exeCode function: _mbscpy,_mbscat,OpenSCManagerA,CreateServiceA,GetLastError,OpenServiceA,StartServiceA,wsprintfA,RegOpenKeyA,lstrlen,RegSetValueExA,memset,wsprintfA,RegCreateKeyA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,memset,_mbscpy,RegOpenKeyExA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,RegCloseKey,3_2_1000ABAC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D3D5 CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,DebugActiveProcess,GetLastError,Process32Next,CloseHandle,3_2_1000D3D5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100114B0 CoCreateInstance,3_2_100114B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005000 LockResource,3_2_10005000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000AAC4 OpenSCManagerA,OpenServiceA,ChangeServiceConfigA,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,Sleep,CloseServiceHandle,CloseServiceHandle,3_2_1000AAC4
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\11221450Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7972:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7624:120:WilError_03
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\107.163.56.251:6658
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\M107.163.56.251:6658
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8120:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7824
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7920:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f703b555-ec16-4272-ab88-12a4f48e925fJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,Scheduler
Source: Bcr1Wl2Jn0.dllReversingLabs: Detection: 78%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,Scheduler
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7824 -s 1700
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,SchedulerJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",SchedulerJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: mfc42.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp60.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: avicap32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006843 LoadLibraryA,GetProcAddress,GetExtendedUdpTable,malloc,GetExtendedUdpTable,htons,free,FreeLibrary,3_2_10006843
Source: initial sampleStatic PE information: section where entry point is pointing to: .fdss
Source: Bcr1Wl2Jn0.dllStatic PE information: section name: .fdss
Source: Bcr1Wl2Jn0.dllStatic PE information: section name: .fds
Source: Bcr1Wl2Jn0.dllStatic PE information: section name: .fs
Source: Bcr1Wl2Jn0.dllStatic PE information: section name: ds
Source: Bcr1Wl2Jn0.dllStatic PE information: section name: .imports
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000FEA3 push dword ptr [esp+3Ch]; retn 0040h3_2_10035AF1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001000 push dword ptr [esp+14h]; retn 0018h3_2_10036C9F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001000 push eax; mov dword ptr [esp], 63000AC9h3_2_10036D03
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10033000 pushfd ; retf 3_2_10033070
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001010 pushfd ; mov dword ptr [esp], edx3_2_10001011
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003407B push dword ptr [esp+50h]; retn 0054h3_2_10034085
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100210E0 push eax; ret 3_2_1002110E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100010F9 push 4E1E2108h; mov dword ptr [esp], edx3_2_10001131
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100010F9 pushad ; mov dword ptr [esp], F651B473h3_2_10001136
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100010F9 push edx; mov dword ptr [esp], 1815BBB4h3_2_100342D5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D143 pushad ; mov dword ptr [esp], esi3_2_1000D15B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001199 pushfd ; mov dword ptr [esp], edx3_2_1000119A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003442B pushfd ; mov dword ptr [esp], ecx3_2_10034436
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003442B push 1392E45Eh; mov dword ptr [esp], ecx3_2_1003443E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003448E push dword ptr [esp+24h]; retn 0028h3_2_100344A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000E56F push dword ptr [esp+2Ch]; retn 0030h3_2_1003882F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003463D push dword ptr [esp+34h]; retn 0038h3_2_10034E37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000C792 push dword ptr [esp+48h]; retn 004Ch3_2_10033600
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000C7A8 push dword ptr [esp+48h]; retn 004Ch3_2_10033600
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B7BC pushfd ; mov dword ptr [esp], ebp3_2_10034F78
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B7CC push dword ptr [esp+34h]; retn 0038h3_2_10034E37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003383A pushfd ; mov dword ptr [esp], esi3_2_1003384B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B8EA push 8C58C68Fh; mov dword ptr [esp], eax3_2_10033F47
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B8EA pushfd ; mov dword ptr [esp], eax3_2_100348EE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10039A98 pushfd ; mov dword ptr [esp], 12F3A3B1h3_2_1003CFBC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10033AD2 pushfd ; mov dword ptr [esp], ecx3_2_10033ADD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10033AD2 push 8C58C68Fh; mov dword ptr [esp], eax3_2_10033F47
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000E6EA pushfd ; mov dword ptr [esp], E0DA7D61h3_2_10034B0F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10034D73 pushfd ; mov dword ptr [esp], eax3_2_1000B84B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10034DF3 push dword ptr [esp+34h]; retn 0038h3_2_10034E37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035EA4 push dword ptr [esp+48h]; retn 004Ch3_2_1003BC28

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: sprintf,CreateFileA,DeviceIoControl,GetLastError,FormatMessageA,CloseHandle,memset,_mbscpy,memset,_mbscpy, \\.\PHYSICALDRIVE%d3_2_10011C72

Boot Survival

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: sprintf,CreateFileA,DeviceIoControl,GetLastError,FormatMessageA,CloseHandle,memset,_mbscpy,memset,_mbscpy, \\.\PHYSICALDRIVE%d3_2_10011C72
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SHRJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000AAC4 OpenSCManagerA,OpenServiceA,ChangeServiceConfigA,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,Sleep,CloseServiceHandle,CloseServiceHandle,3_2_1000AAC4
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SHRJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SHRJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005BDF ClearEventLogA,3_2_10005BDF
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F2003_2_1000F200
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_3-10376
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_3-10050
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 8.1 %
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F2003_2_1000F200
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8020Thread sleep time: -18000000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8020Thread sleep time: -1800000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000E763 lstrcpy,lstrcat,lstrcat,FindFirstFileA,FindNextFileA,lstrcpy,lstrcat,lstrcat,_strcmpi,PathIsDirectoryA,6D0A2DD0,_mbscpy,_mbscpy,strchr,strchr,strchr,_mbscpy,atoi,CreateDirectoryA,Sleep,FindClose,3_2_1000E763
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D49E strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,strrchr,_strcmpi,_mbscpy,FindClose,FindNextFileA,FindClose,3_2_1000D49E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100058AC FindFirstFileA,3_2_100058AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100069DD _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose,3_2_100069DD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000EBE4 strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose,3_2_1000EBE4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006DB7 _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,6D0A2C70,FindNextFileA,FindClose,3_2_10006DB7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100057EC GetLogicalDriveStringsA,3_2_100057EC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10007DDE 6D0A2DD0,6D0A2DD0,6D0A2DD0,strrchr,strncpy,strncpy,GetSystemInfo,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,strlen,sscanf,3_2_10007DDE
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
Source: Amcache.hve.17.drBinary or memory string: VMware
Source: Amcache.hve.17.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.17.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.17.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.17.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.17.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.17.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.17.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.17.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.17.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.17.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.17.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.17.drBinary or memory string: vmci.sys
Source: Amcache.hve.17.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.17.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.17.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.17.drBinary or memory string: VMware20,1
Source: Amcache.hve.17.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.17.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.17.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ons\\VMwareHostO
Source: Amcache.hve.17.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
Source: Amcache.hve.17.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.17.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.17.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.17.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.17.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.17.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.17.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.17.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004DF5 BlockInput,3_2_10004DF5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006843 LoadLibraryA,GetProcAddress,GetExtendedUdpTable,malloc,GetExtendedUdpTable,htons,free,FreeLibrary,3_2_10006843
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006322 GetProcessHeap,HeapFree,_strnicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,CloseHandle,memset,strrchr,_strnicmp,CloseHandle,CloseHandle,lstrlen,_strnicmp,OpenProcess,GetModuleFileNameExA,_strnicmp,GetCurrentProcess,DuplicateHandle,CloseHandle,CloseHandle,HeapFree,3_2_10006322
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000558A SetUnhandledExceptionFilter,3_2_1000558A

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.241 18530Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.251 6658Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.240 18963Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.43.161 12388Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004E04 keybd_event,3_2_10004E04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004E1F mouse_event,3_2_10004E1F
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100048C9 SetSecurityDescriptorDacl,3_2_100048C9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004925 AllocateAndInitializeSid,3_2_10004925
Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,memcpy,3_2_1000960F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: strlen,memset,___crtGetLocaleInfoEx,lstrcpy,3_2_1000C295
Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,3_2_1000949C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,GetModuleFileNameA,strrchr,_mbscat,strrchr,CreateMutexA,GetLastError,ReleaseMutex,CloseHandle,ReleaseMutex,CloseHandle,GetTickCount,srand,rand,rand,Sleep,SetFileAttributesA,wsprintfA,_mbscpy,_mbscat,_mbscat,Sleep,memset,_mbscat,_mbscat,_mbscat,MoveFileA,Concurrency::details::platform::__CreateTimerQueueTimer,___crtGetLocaleInfoEx,rand,rand,rand,rand,rand,rand,rand,MoveFileExA,Sleep,memset,___crtGetTimeFormatEx,3_2_1000D7E3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: memset,wsprintfA,6D0A2DD0,memset,___crtGetTimeFormatEx,GetLastError,6E6BACE0,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,6D0A2DD0,MultiByteToWideChar,WideCharToMultiByte,6D0A2DD0,WideCharToMultiByte,6D0A2C70,6E6C0850,6D0A2C70,6E6CDC60,6E6CDC60,6E6D4490,6E6C9380,strlen,6E6BC7F0,6E6BC7F0,wsprintfA,strlen,6D0A2C70,strrchr,6E6BC7F0,6E6BC7F0,3_2_10009A63
Source: C:\Windows\SysWOW64\rundll32.exeCode function: memset,wsprintfA,6D0A2DD0,memset,___crtGetTimeFormatEx,6E6BACE0,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,6D0A2DD0,MultiByteToWideChar,WideCharToMultiByte,6D0A2DD0,WideCharToMultiByte,6D0A2C70,6E6C0850,6D0A2C70,6E6CDC60,6E6CDC60,6E6D4490,6E6C9380,strlen,6E6BC7F0,6E6BC7F0,wsprintfA,strlen,6D0A2C70,strrchr,6E6BC7F0,6E6BC7F0,6E6BC7F0,6E6BC7F0,3_2_10009FAB
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001F343 SetFilePointer,SetFilePointer,GetLocalTime,SystemTimeToFileTime,3_2_1001F343
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004996 LookupAccountNameA,3_2_10004996
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10008C6A memset,GetVersionExA,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,sprintf,3_2_10008C6A
Source: Amcache.hve.17.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.17.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.17.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.17.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.17.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup,3_2_10007225
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
11
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
11
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts12
Service Execution
1
Valid Accounts
1
Valid Accounts
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol11
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt12
Windows Service
11
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron11
Registry Run Keys / Startup Folder
12
Windows Service
1
DLL Side-Loading
NTDS25
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchd1
Bootkit
111
Process Injection
1
Masquerading
LSA Secrets141
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
Registry Run Keys / Startup Folder
1
Valid Accounts
Cached Domain Credentials31
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
Virtualization/Sandbox Evasion
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
Access Token Manipulation
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
Process Injection
/etc/passwd and /etc/shadow1
Remote System Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Bootkit
Network Sniffing1
System Network Configuration Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
Rundll32
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Indicator Removal
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1558478 Sample: Bcr1Wl2Jn0.dll Startdate: 19/11/2024 Architecture: WINDOWS Score: 100 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus / Scanner detection for submitted sample 2->80 82 Multi AV Scanner detection for submitted file 2->82 84 3 other signatures 2->84 9 loaddll32.exe 1 2->9         started        11 rundll32.exe 2->11         started        13 rundll32.exe 2->13         started        process3 process4 15 rundll32.exe 1 7 9->15         started        19 cmd.exe 1 9->19         started        21 rundll32.exe 9->21         started        23 conhost.exe 9->23         started        25 cmd.exe 11->25         started        27 cmd.exe 13->27         started        dnsIp5 58 107.163.43.161, 12388 TAKE2US United States 15->58 60 107.163.56.240, 18963 TAKE2US United States 15->60 62 2 other IPs or domains 15->62 64 System process connects to network (likely due to code injection or exploit) 15->64 66 Found evasive API chain (may stop execution after checking mutex) 15->66 68 Contains functionality to infect the boot sector 15->68 74 2 other signatures 15->74 29 WerFault.exe 20 16 15->29         started        70 Uses ping.exe to sleep 19->70 72 Uses ping.exe to check the status of other devices and networks 19->72 31 rundll32.exe 19->31         started        33 cmd.exe 21->33         started        36 conhost.exe 25->36         started        38 PING.EXE 1 25->38         started        40 conhost.exe 27->40         started        42 PING.EXE 1 27->42         started        signatures6 process7 signatures8 44 cmd.exe 1 31->44         started        76 Uses ping.exe to sleep 33->76 47 conhost.exe 33->47         started        49 PING.EXE 1 33->49         started        process9 signatures10 86 Uses ping.exe to sleep 44->86 51 PING.EXE 1 44->51         started        54 conhost.exe 44->54         started        process11 dnsIp12 56 127.0.0.1 unknown unknown 51->56

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Bcr1Wl2Jn0.dll79%ReversingLabsWin32.Backdoor.Venik
Bcr1Wl2Jn0.dll100%AviraTR/Spy.Gen
Bcr1Wl2Jn0.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://107.163.56.240:18963/main.php70%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phptP0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.php0%Avira URL Cloudsafe
http://107.163.56.241:18530//joy.asp?sid=rungnejcndvgnJLeFe5vteX8v2LUicbtudb8mteYmJe0nta0%Avira URL Cloudsafe
http://107.163.43.161:12388/2112.html0U0%Avira URL Cloudsafe
http://107.163.56.240/sApps0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phpz0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phpu0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phphttp://107.163.56.241:18530/www.shinhan.com0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phpT0%Avira URL Cloudsafe
http://%s.qzone.qq.com/mainMozilla/4.00%Avira URL Cloudsafe
http://%s.qzone.qq.com/main0%Avira URL Cloudsafe
http://67.229.227.140:999/ver.asp?v=%sfound~0%Avira URL Cloudsafe
http://107.163.56.241:18530/0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phpi0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phpO0%Avira URL Cloudsafe
http://107.163.43.161:12388/2112.htmlg0%Avira URL Cloudsafe
http://67.229.227.140:999/ver.asp?v=%s0%Avira URL Cloudsafe
http://107.163.56.240/0%Avira URL Cloudsafe
http://107.163.43.161:12388/2112.htmlM0%Avira URL Cloudsafe
http://107.163.56.240:18963/main.phpF0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://107.163.56.241:18530//joy.asp?sid=rungnejcndvgnJLeFe5vteX8v2LUicbtudb8mteYmJe0ntarundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.phptPrundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.43.161:12388/2112.html0Urundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.phphttp://107.163.56.241:18530/www.shinhan.comrundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240/sAppsrundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.phprundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2912506439.0000000005DFD000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp, Bcr1Wl2Jn0.dllfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.phpzrundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.phpurundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.phpTrundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.240:18963/main.php7rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://67.229.227.140:999/ver.asp?v=%sfound~rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
    • Avira URL Cloud: safe
    unknown
    http://blog.sina.com.cn/u/%sMozilla/4.0rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
      high
      http://%s.qzone.qq.com/mainrundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.17.drfalse
        high
        http://%s.qzone.qq.com/mainMozilla/4.0rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
        • Avira URL Cloud: safe
        unknown
        http://blog.sina.com.cn/u/%srundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
          high
          http://107.163.56.240:18963/main.phpOrundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.240:18963/main.phpirundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.241:18530/rundll32.exe, rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.43.161:12388/2112.htmlgrundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.240/rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://67.229.227.140:999/ver.asp?v=%srundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dllfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.43.161:12388/2112.htmlMrundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.240:18963/main.phpFrundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          107.163.43.161
          unknownUnited States
          20248TAKE2UStrue
          107.163.56.241
          unknownUnited States
          20248TAKE2UStrue
          107.163.56.251
          unknownUnited States
          20248TAKE2UStrue
          107.163.56.240
          unknownUnited States
          20248TAKE2UStrue
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1558478
          Start date and time:2024-11-19 14:06:45 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 58s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:30
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Bcr1Wl2Jn0.dll
          renamed because original name is a hash value
          Original Sample Name:a874d842bd0c7e96f5305a01bed07edbdf4cc6f7.dll
          Detection:MAL
          Classification:mal100.troj.evad.winDLL@33/5@0/5
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 40
          • Number of non-executed functions: 108
          Cookbook Comments:
          • Found application associated with file extension: .dll
          • Override analysis time to 240s for rundll32
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 104.208.16.94
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • VT rate limit hit for: Bcr1Wl2Jn0.dll
          TimeTypeDescription
          08:07:39API Interceptor26x Sleep call for process: rundll32.exe modified
          08:07:40API Interceptor1x Sleep call for process: loaddll32.exe modified
          08:10:13API Interceptor1x Sleep call for process: WerFault.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          107.163.56.241OL50O9ho5M.dllGet hashmaliciousUnknownBrowse
            107.163.56.251OL50O9ho5M.dllGet hashmaliciousUnknownBrowse
              02hNixBIvP.exeGet hashmaliciousUnknownBrowse
                abc.dllGet hashmaliciousUnknownBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  s-part-0017.t-0009.t-msedge.net32YBHccuG9.dllGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  r7F41la3x6.exeGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  JGWfssorui.dllGet hashmaliciousDanaBotBrowse
                  • 13.107.246.45
                  JGWfssorui.dllGet hashmaliciousDanaBotBrowse
                  • 13.107.246.45
                  QZ1hM316xc.exeGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  FjMBwo1meU.xlsxGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  QZ1hM316xc.exeGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  XptKgJ8M27.exeGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  5vcrbMCVE7.dllGet hashmaliciousDanaBotBrowse
                  • 13.107.246.45
                  VKxD9FFAj0.dllGet hashmaliciousDanaBotBrowse
                  • 13.107.246.45
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  TAKE2USOL50O9ho5M.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.251
                  81mieek02V.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  Vb1S2HJcnN.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  VqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                  • 107.163.43.253
                  yakuza.m68k.elfGet hashmaliciousUnknownBrowse
                  • 107.163.215.236
                  DHL_doc.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  wODub61gZe.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.249
                  mips.elfGet hashmaliciousMiraiBrowse
                  • 107.163.25.123
                  INVOICES.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  sh4.elfGet hashmaliciousMiraiBrowse
                  • 23.231.236.168
                  TAKE2USOL50O9ho5M.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.251
                  81mieek02V.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  Vb1S2HJcnN.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  VqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                  • 107.163.43.253
                  yakuza.m68k.elfGet hashmaliciousUnknownBrowse
                  • 107.163.215.236
                  DHL_doc.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  wODub61gZe.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.249
                  mips.elfGet hashmaliciousMiraiBrowse
                  • 107.163.25.123
                  INVOICES.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  sh4.elfGet hashmaliciousMiraiBrowse
                  • 23.231.236.168
                  TAKE2USOL50O9ho5M.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.251
                  81mieek02V.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  Vb1S2HJcnN.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  VqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                  • 107.163.43.253
                  yakuza.m68k.elfGet hashmaliciousUnknownBrowse
                  • 107.163.215.236
                  DHL_doc.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  wODub61gZe.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.249
                  mips.elfGet hashmaliciousMiraiBrowse
                  • 107.163.25.123
                  INVOICES.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  sh4.elfGet hashmaliciousMiraiBrowse
                  • 23.231.236.168
                  TAKE2USOL50O9ho5M.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.251
                  81mieek02V.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  Vb1S2HJcnN.dllGet hashmaliciousUnknownBrowse
                  • 107.163.56.110
                  VqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                  • 107.163.43.253
                  yakuza.m68k.elfGet hashmaliciousUnknownBrowse
                  • 107.163.215.236
                  DHL_doc.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  wODub61gZe.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.249
                  mips.elfGet hashmaliciousMiraiBrowse
                  • 107.163.25.123
                  INVOICES.exeGet hashmaliciousFormBookBrowse
                  • 107.163.130.253
                  sh4.elfGet hashmaliciousMiraiBrowse
                  • 23.231.236.168
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):1.1166881713750934
                  Encrypted:false
                  SSDEEP:192:4gJU9i0OlV0BU/wjeTGraZWO3sJzuiFgZ24IO84ci:GiFl2BU/wjelRAzuiFgY4IO84ci
                  MD5:B29006656970F2CF06825DB6BB754897
                  SHA1:25F2C3336AD71E4E7A3F0C8B6EB6A4F1EB5A7E9D
                  SHA-256:1493E87BCD70AE9F0E668488E03C16656AB3AA41CD15F3A42C4FA8E069CD5380
                  SHA-512:90236B7BFF458346C87637524D6AF0F27E3C43A2ACAC0ECA33F5846141822432BA760F5334960115DDE4FD3456D8AE4747B7EB70C0E738E87F03366C47B9325F
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.4.9.5.2.8.4.2.2.9.2.4.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.4.9.5.2.8.4.7.9.1.7.3.4.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.9.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.3.b.d.3.6.0.-.8.a.7.4.-.4.2.0.b.-.b.a.0.3.-.a.f.2.1.a.e.1.f.5.a.7.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.4.1.b.7.4.e.3.-.e.2.0.a.-.4.c.a.3.-.a.e.d.e.-.d.3.e.6.4.d.f.0.3.7.8.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.9.0.-.0.0.0.1.-.0.0.1.4.-.4.9.2.3.-.8.6.0.1.8.4.3.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.u.n.d.l.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Tue Nov 19 13:08:04 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):160684
                  Entropy (8bit):2.02444473660092
                  Encrypted:false
                  SSDEEP:384:XWAnW3axDe4H5HbObbCKVxjdTxNdH3B0PTnX9gumZcrnQSJ68tcoKgY:LWqReK5bOtxhTXe98unpByoa
                  MD5:1C3DE8167A5D83824900074C1D36F5C6
                  SHA1:197552B649411943CA28A71F7487DA9E3D02D039
                  SHA-256:C7FC315EFCE4084CC889FED971DF51F4E9B3EF6767BEEB5534764451D74CD50F
                  SHA-512:E4973270968B203BB1A7CDC4CBDAA714E56EC197AB695BAF770FAF2B74FFE3222F44BDAAA70700E6200761B772930F600CFCBCC95437E92CFC83B97388BCD8EA
                  Malicious:false
                  Preview:MDMP..a..... .........<g............t...............|...........(Z..........T.......8...........T...........PB..\1..........L(..........8*..............................................................................eJ.......*......GenuineIntel............T.............<g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8398
                  Entropy (8bit):3.6911494149246598
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJU9686YwM6Fgmf8Okprn89b4lsfGJUhom:R6lXJG686Yz6Fgmf8OB4+fp
                  MD5:26B1422C9CC5E310B7897BFD47CF116E
                  SHA1:279C663593E7E543CB521019A45BB032569B1EDE
                  SHA-256:5412208E324DC95B926B76977532788138D0CDDAB9787267047E106353D96AA7
                  SHA-512:95A0F645F396B6991F4188B0D89438738C8207F72527E05A8D0AC3976E43FA28FCFB30253B7CE05FC549E55AAEAE6094F0114EED1C160D48A63E196DB70C512C
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.2.4.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4791
                  Entropy (8bit):4.476815757073948
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zswJg77aI9H0WpW8VYwYm8M4JCdPbEFl/mq+q8vjPbm8GScSxd:uIjf2I7Nt7VQJu2eqKfBJ3xd
                  MD5:4A7717939B9B09703B00EA1A24CE8464
                  SHA1:5F5F2A4B0A76F07F0F1C86021B1403DBC8C6B491
                  SHA-256:999735F40EAA4142D5C9E082EFD19F3284155F86E8A670E1217776652218F6F9
                  SHA-512:323768C4736DCC596A7E579B4D46557A275910E214A5321A658851148D59587BCBC80D98411AAB54AA9056D6B7696B7CC8237F5FA0E7AFA92789AA81EDE01A25
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="594970" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.394698853150088
                  Encrypted:false
                  SSDEEP:6144:bl4fiJoH0ncNXiUjt10qCG/gaocYGBoaUMMhA2NX4WABlBuNAyOBSqa:Z4vFCMYQUMM6VFYSyU
                  MD5:5FAE6F875D39410754D07F8098B32161
                  SHA1:5DEAB3A569EC1E5DB65DABFD59C03E4466E71B15
                  SHA-256:C0FBA05292A80D6F28030098BE18166666911DCBE50B4A6231A915ADBCBE991E
                  SHA-512:C1096E1814E600924C92EF63F593B705F050E1AA26FF944A27A53A6191A29ACA7EA9B013BA1D773FDD8E5D0937F43F4DC9983AF1A313472A2BBB8344AFB546FD
                  Malicious:false
                  Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.Y~..:..............................................................................................................................................................................................................................................................................................................................................<ii%........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Entropy (8bit):6.335742224666194
                  TrID:
                  • Win32 Dynamic Link Library (generic) (1002004/3) 97.04%
                  • Win32 EXE Yoda's Crypter (26571/9) 2.57%
                  • Generic Win/DOS Executable (2004/3) 0.19%
                  • DOS Executable Generic (2002/1) 0.19%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Bcr1Wl2Jn0.dll
                  File size:308'798 bytes
                  MD5:73435ca7af760c73a527ec2f25d8c757
                  SHA1:a874d842bd0c7e96f5305a01bed07edbdf4cc6f7
                  SHA256:2642784805da2fedd52c929b0988e1e75512db90eb94ec2551b673db515dfe6b
                  SHA512:4dce6d119b2c3a02e50d5a9fe2fc5484aec947f4f2b3b2ba46053648aaaa98bd7b3b9db7d78ba0829cbbb9a4d115cd03bac9c93fa43b98c5722a118dcd3a6c2e
                  SSDEEP:6144:Obvk4UVDf6zkudDYPRtS4jg0rk1qU7VInDWLDIRfP4zybj:Ob9QTPlBrk1qUxkcMxvP
                  TLSH:82648D00D680C63EC1F306F699F3D27EB92CBE7013A6A58753945C6A1FB38E57961287
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... B..N...N...N...B...N.F.....N.......N.......N.......N...@...N.m.D...N...O.\.N.m.E...N.=.H...N.m.J...N.Rich..N................
                  Icon Hash:7ae282899bbab082
                  Entrypoint:0x100213d5
                  Entrypoint Section:.fdss
                  Digitally signed:false
                  Imagebase:0x10000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
                  DLL Characteristics:
                  Time Stamp:0x56515A58 [Sun Nov 22 06:02:00 2015 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f92f51a42d87c233e3a6c84e3f6e8e4a
                  Instruction
                  push ebp
                  mov ebp, esp
                  push ebx
                  mov ebx, dword ptr [ebp+08h]
                  push esi
                  mov esi, dword ptr [ebp+0Ch]
                  push edi
                  mov edi, dword ptr [ebp+10h]
                  test esi, esi
                  jne 00007FCD94D1926Bh
                  cmp dword ptr [1002E528h], 00000000h
                  jmp 00007FCD94D19288h
                  cmp esi, 01h
                  je 00007FCD94D19267h
                  cmp esi, 02h
                  jne 00007FCD94D19284h
                  mov eax, dword ptr [1002E544h]
                  test eax, eax
                  je 00007FCD94D1926Bh
                  push edi
                  push esi
                  push ebx
                  call eax
                  test eax, eax
                  je 00007FCD94D1926Eh
                  push edi
                  push esi
                  push ebx
                  call 00007FCD94D1917Ah
                  test eax, eax
                  jne 00007FCD94D19266h
                  xor eax, eax
                  jmp 00007FCD94D192B0h
                  push edi
                  push esi
                  push ebx
                  call 00007FCD94D03F8Bh
                  cmp esi, 01h
                  mov dword ptr [ebp+0Ch], eax
                  jne 00007FCD94D1926Eh
                  test eax, eax
                  jne 00007FCD94D19299h
                  push edi
                  push eax
                  push ebx
                  call 00007FCD94D19156h
                  test esi, esi
                  je 00007FCD94D19267h
                  cmp esi, 03h
                  jne 00007FCD94D19288h
                  push edi
                  push esi
                  push ebx
                  call 00007FCD94D19145h
                  test eax, eax
                  jne 00007FCD94D19265h
                  and dword ptr [ebp+0Ch], eax
                  cmp dword ptr [ebp+0Ch], 00000000h
                  je 00007FCD94D19273h
                  mov eax, dword ptr [1002E544h]
                  test eax, eax
                  je 00007FCD94D1926Ah
                  push edi
                  push esi
                  push ebx
                  call eax
                  mov dword ptr [ebp+0Ch], eax
                  mov eax, dword ptr [ebp+0Ch]
                  pop edi
                  pop esi
                  pop ebx
                  pop ebp
                  retn 000Ch
                  jmp dword ptr [10022288h]
                  jmp dword ptr [10022290h]
                  jmp dword ptr [10022294h]
                  jmp dword ptr [100220B4h]
                  jmp dword ptr [100220A8h]
                  jmp dword ptr [10022058h]
                  jmp dword ptr [10022328h]
                  Programming Language:
                  • [IMP] VS2008 SP1 build 30729
                  • [ C ] VS98 (6.0) build 8168
                  • [C++] VS98 (6.0) build 8168
                  • [RES] VS98 (6.0) cvtres build 1720
                  • [LNK] VS98 (6.0) imp/exp build 8168
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x4a3280x40.fs
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x4c0000x118.imports
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x4d0000x1cf0.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x220000x38c.fdss
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .fdss0x10000x270000x26c00616be2da5da5cc64368d007df30ed7c8False0.3819430443548387data5.966385683381847IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .fds0x280000x220000x21400d512b92807e143dbd97b4835a8b8d11dFalse0.5838228383458647data6.190677445613359IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .fs0x4a0000x10000x400ca92c4a5a58d8f944fc303cb98ef5feaFalse0.470703125data3.9294239228795704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  ds0x4b0000x10000x2007805f27e1b3a7702fd08c1b531386f51False0.115234375data0.697818995102615IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .imports0x4c0000x10000xe0081a732a204cf30470fe1b776dd3cdd0cFalse0.39341517857142855data4.765592855118727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .reloc0x4d0000x20000x1e00b3cad4098adb9eac6bf89428bbec93f8False0.8096354166666667data6.703375832904703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  DLLImport
                  ADVAPI32.dllQueryServiceStatus, LookupPrivilegeValueA, RegQueryInfoKeyA, RegEnumValueA, CreateServiceA, RegCreateKeyA, OpenSCManagerA, OpenServiceA, ChangeServiceConfigA, StartServiceA, CloseServiceHandle, AdjustTokenPrivileges, RegOpenKeyA, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegOpenKeyExA, OpenProcessToken
                  KERNEL32.DLLCreateToolhelp32Snapshot, UnmapViewOfFile, CreateFileMappingA, MapViewOfFile, GetFileInformationByHandle, FileTimeToSystemTime, SetFileTime, GetFileAttributesA, LocalFileTimeToFileTime, GetCurrentDirectoryA, SystemTimeToFileTime, FormatMessageA, CreateProcessA, GetLocalTime, VirtualQuery, lstrcatA, DeviceIoControl, SetFileAttributesA, MoveFileA, LocalFree, Process32First, lstrcmpiA, DebugActiveProcess, Process32Next, ExpandEnvironmentStringsA, GetModuleHandleA, InterlockedIncrement, CopyFileA, InterlockedExchange, CreateMutexA, ReleaseMutex, SetLastError, WinExec, lstrcpyA, LoadLibraryA, GetProcAddress, CloseHandle, WriteFile, SetFilePointer, CreateFileA, GetModuleFileNameA, GetCurrentProcess, HeapFree, HeapAlloc, GetProcessHeap, WideCharToMultiByte, TerminateThread, WaitForSingleObject, CreateThread, GetCurrentProcessId, TerminateProcess, OpenProcess, GetTickCount, MoveFileExA, DeleteFileA, Sleep, lstrlenA, DuplicateHandle, FreeLibrary, FindClose, FindNextFileA, FindFirstFileA, ReadFile, GetFileSize, InterlockedDecrement, GetSystemInfo, WriteProcessMemory, CreateDirectoryA, ReadProcessMemory, VirtualQueryEx, GlobalFree, GlobalAlloc, GetVersionExA, GetSystemDefaultUILanguage, GlobalMemoryStatusEx, MultiByteToWideChar, GetLastError, GetSystemDirectoryA
                  MFC42.DLL
                  MSVCP60.dll??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z, ?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z, ?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z, ?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ, ??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, ??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
                  MSVCRT.dllrand, strchr, strncpy, sscanf, __CxxFrameHandler, wcscat, memcpy, malloc, free, _strnicmp, strcpy, srand, memcmp, _stricmp, strrchr, strcat, time, localtime, strftime, vsprintf, sprintf, strlen, memset, atoi, strcspn, strstr, _except_handler3, _CxxThrowException, tolower, toupper, strcmp, wcscpy, strncat, calloc, _mbsstr, _mbsnbcpy, _strcmpi, wcslen, _mbsicmp, __dllonexit, _onexit, ??1type_info@@UAE@XZ, _initterm, _adjust_fdiv, _memicmp
                  NETAPI32.dllNetbios
                  OLEAUT32.dllSafeArrayGetVartype, SafeArrayAccessData, SafeArrayUnaccessData, VariantChangeType, SysAllocStringByteLen, SafeArrayCreate, SafeArrayDestroy, SysFreeString, SysAllocString, VariantInit, SysStringLen, VariantClear
                  PSAPI.DLLGetModuleFileNameExA
                  SHLWAPI.dllPathIsDirectoryA, PathFileExistsA, StrStrIA
                  USER32.dllGetDesktopWindow, wsprintfA
                  WS2_32.dllinet_addr, htonl, sendto, closesocket, WSACleanup, send, __WSAFDIsSet, recv, connect, setsockopt, WSAIoctl, WSAStartup, socket, htons, ntohs, bind, ioctlsocket, select, recvfrom, WSAGetLastError
                  ntdll.dllNtQueryInformationFile, NtQuerySystemInformation
                  ole32.dllCoInitializeSecurity, CoUninitialize, CoInitializeEx, CoInitialize, CoSetProxyBlanket, CoCreateInstance
                  NameOrdinalAddress
                  Scheduler10x1000fff3
                  TimestampSource PortDest PortSource IPDest IP
                  Nov 19, 2024 14:07:41.361695051 CET4970818530192.168.2.9107.163.56.241
                  Nov 19, 2024 14:07:41.361695051 CET4970712388192.168.2.9107.163.43.161
                  Nov 19, 2024 14:07:42.346915960 CET4970818530192.168.2.9107.163.56.241
                  Nov 19, 2024 14:07:42.346915960 CET4970712388192.168.2.9107.163.43.161
                  Nov 19, 2024 14:07:44.347201109 CET4970818530192.168.2.9107.163.56.241
                  Nov 19, 2024 14:07:44.349358082 CET4970712388192.168.2.9107.163.43.161
                  Nov 19, 2024 14:07:48.346923113 CET4970818530192.168.2.9107.163.56.241
                  Nov 19, 2024 14:07:48.346923113 CET4970712388192.168.2.9107.163.43.161
                  Nov 19, 2024 14:07:56.346930027 CET4970818530192.168.2.9107.163.56.241
                  Nov 19, 2024 14:07:56.347012043 CET4970712388192.168.2.9107.163.43.161
                  Nov 19, 2024 14:08:03.376070976 CET497166658192.168.2.9107.163.56.251
                  Nov 19, 2024 14:08:04.378278971 CET497166658192.168.2.9107.163.56.251
                  Nov 19, 2024 14:08:06.378304958 CET497166658192.168.2.9107.163.56.251
                  Nov 19, 2024 14:08:10.378268957 CET497166658192.168.2.9107.163.56.251
                  Nov 19, 2024 14:08:18.378190041 CET497166658192.168.2.9107.163.56.251
                  Nov 19, 2024 14:10:14.416896105 CET4973218963192.168.2.9107.163.56.240
                  Nov 19, 2024 14:10:14.417112112 CET4973318963192.168.2.9107.163.56.240
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Nov 19, 2024 14:07:34.233550072 CET1.1.1.1192.168.2.90x497No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                  Nov 19, 2024 14:07:34.233550072 CET1.1.1.1192.168.2.90x497No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll"
                  Imagebase:0x1d0000
                  File size:126'464 bytes
                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1
                  Imagebase:0xc50000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,Scheduler
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                  Imagebase:0xc50000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:7
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:08:07:37
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\PING.EXE
                  Wow64 process (32bit):true
                  Commandline:ping 127.0.0.1 -n 3
                  Imagebase:0xfa0000
                  File size:18'944 bytes
                  MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:10
                  Start time:08:07:40
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:11
                  Start time:08:07:40
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                  Imagebase:0xc50000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:12
                  Start time:08:07:40
                  Start date:19/11/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:13
                  Start time:08:07:40
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\PING.EXE
                  Wow64 process (32bit):true
                  Commandline:ping 127.0.0.1 -n 3
                  Imagebase:0xfa0000
                  File size:18'944 bytes
                  MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:17
                  Start time:08:08:04
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7824 -s 1700
                  Imagebase:0x580000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:19
                  Start time:08:08:13
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:20
                  Start time:08:08:13
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                  Imagebase:0xc50000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:21
                  Start time:08:08:13
                  Start date:19/11/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:22
                  Start time:08:08:14
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\PING.EXE
                  Wow64 process (32bit):true
                  Commandline:ping 127.0.0.1 -n 3
                  Imagebase:0xfa0000
                  File size:18'944 bytes
                  MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:23
                  Start time:08:08:21
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler
                  Imagebase:0x5d0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:24
                  Start time:08:08:21
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                  Imagebase:0xc50000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:25
                  Start time:08:08:21
                  Start date:19/11/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:26
                  Start time:08:08:21
                  Start date:19/11/2024
                  Path:C:\Windows\SysWOW64\PING.EXE
                  Wow64 process (32bit):true
                  Commandline:ping 127.0.0.1 -n 3
                  Imagebase:0xfa0000
                  File size:18'944 bytes
                  MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.7%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:17.6%
                    Total number of Nodes:425
                    Total number of Limit Nodes:12
                    execution_graph 9945 10002583 9948 1000258d 9945->9948 9947 1000258b 9951 10001000 9948->9951 9950 1000259a GetProcAddress 9950->9947 9952 10036c63 9951->9952 9952->9950 9953 10001723 9956 1000172d 9953->9956 9955 1000172b 9957 10001000 9956->9957 9958 1000173a GetProcAddress 9957->9958 9958->9955 9959 100015a3 9962 100015ad LoadLibraryA 9959->9962 9961 100015ab 9962->9961 9975 10005784 GetShortPathNameA 9976 10009806 _mbscpy 9977 10009888 strstr 9976->9977 9978 100099ec WSAStartup htons 9976->9978 9980 100098a5 9977->9980 9981 10009958 _mbscpy 9977->9981 9993 100086c0 inet_addr inet_addr 9978->9993 9997 1000949c 9980->9997 9984 1000996e strstr 9981->9984 9984->9978 9988 10009987 strcspn strncpy strcspn atoi 9984->9988 9985 10009a5b 9986 10009a4c closesocket 9986->9985 9988->9978 9989 10009940 _mbscpy 9992 1000993e 9989->9992 9990 100098d3 strcspn strstr 9991 10009911 strcspn strncpy 9990->9991 9990->9992 9991->9992 9992->9984 9994 100086e6 9993->9994 9996 100086ef socket connect 9993->9996 10010 10004733 gethostbyname 9994->10010 9996->9985 9996->9986 9998 100094a9 9997->9998 10011 10004d54 InternetOpenA 9998->10011 10000 100094eb 10007 1000958b strstr 10000->10007 10012 10004d73 InternetOpenUrlA 10000->10012 10002 1000951c 10003 1000952e memset 10002->10003 10009 10009572 10002->10009 10013 10004d96 InternetReadFile 10003->10013 10006 10009563 10014 10004db1 InternetCloseHandle 10006->10014 10007->9989 10007->9990 10015 10004db1 InternetCloseHandle 10009->10015 10010->9996 10011->10000 10012->10002 10013->10006 10014->10009 10015->10007 10022 10005a8d RegCreateKeyExA 10029 1000fff3 10065 10008a9a 10029->10065 10031 10010002 CreateMutexA GetLastError 10032 10010043 wsprintfA 6D1D1DA0 10031->10032 10033 1001003a 10031->10033 10035 100100a0 10032->10035 10036 1001008b Sleep DeleteFileA 10032->10036 10033->10032 10034 100100a5 10033->10034 10037 10005eba GetCurrentProcess OpenProcessToken LookupPrivilegeValueA AdjustTokenPrivileges CloseHandle 10034->10037 10036->10035 10038 100100b1 10037->10038 10039 100100b9 PathIsDirectoryA 10038->10039 10040 10010146 6 API calls 10039->10040 10041 100100ce 10039->10041 10042 10008c6a 10 API calls 10040->10042 10069 1000eae6 10040->10069 10075 1000c5dd 10040->10075 10077 1000bddd WSAStartup 10040->10077 10043 10006843 8 API calls 10041->10043 10045 100101ea 10042->10045 10044 100100d5 10043->10044 10046 100100e7 10044->10046 10047 100100fb CreateDirectoryA 10044->10047 10048 100101f2 CreateThread 10045->10048 10049 10010207 CreateThread Sleep CreateThread CreateThread Sleep 10045->10049 10051 1000622a 29 API calls 10046->10051 10052 10010123 10047->10052 10053 1001010e Sleep DeleteFileA 10047->10053 10048->10049 10123 1000cb08 6D0A2DD0 10048->10123 10050 10006800 RegOpenKeyExA 10049->10050 10084 10007225 9 API calls 10049->10084 10106 1000ef29 GetSystemDirectoryA GetSystemDirectoryA 10049->10106 10054 10010261 10050->10054 10055 100100f8 10051->10055 10056 10006800 RegOpenKeyExA 10052->10056 10053->10052 10057 10010285 Sleep CreateThread Sleep 10054->10057 10058 10010265 Sleep CreateThread 10054->10058 10055->10047 10059 10010128 10056->10059 10060 100102ad 10057->10060 10136 1000f9df 10057->10136 10058->10057 10145 1000ba90 6D0A2DD0 WSAStartup 10058->10145 10061 10010141 10059->10061 10062 1001012c CreateThread 10059->10062 10060->10035 10063 100102b6 Sleep 10060->10063 10064 1000c43a 43 API calls 10061->10064 10062->10061 10067 1000fea3 Sleep 10062->10067 10063->10060 10064->10040 10066 1003f530 10065->10066 10068 10035acc 10067->10068 10074 1000eaec 10069->10074 10070 1000ebde 10071 1000e763 128 API calls 10071->10074 10072 1000ebce Sleep 10072->10074 10074->10070 10074->10071 10074->10072 10155 10005812 GetDriveTypeA 10074->10155 10076 1000c5ec 10075->10076 10156 10004cad CreateMutexA 10077->10156 10079 1000be18 10157 1000535b GetLastError 10079->10157 10081 1000be26 10082 1000be73 CloseHandle 10081->10082 10083 1000be36 CreateThread WaitForSingleObject CloseHandle Sleep 10081->10083 10083->10081 10086 10007357 10084->10086 10085 10007891 closesocket closesocket WSACleanup 10086->10085 10087 100073f3 select 10086->10087 10090 100074b2 10086->10090 10091 100074b7 memset 10086->10091 10088 10007430 WSAGetLastError Sleep 10087->10088 10089 1000744c memset recvfrom 10087->10089 10088->10086 10089->10086 10090->10085 10158 1000713b memset memcpy strlen 10091->10158 10093 100074e4 wsprintfA StrStrIA 10094 10007593 malloc memcpy memcpy htons 10093->10094 10095 10007547 StrStrIA 10093->10095 10096 10007589 10094->10096 10098 1000760f 13 API calls 10094->10098 10095->10096 10097 1000755d StrStrIA 10095->10097 10096->10094 10096->10098 10102 100075fd htons 10096->10102 10097->10096 10101 10007573 StrStrIA 10097->10101 10099 100077d2 inet_addr 10098->10099 10100 100077bf inet_addr 10098->10100 10103 100077e3 memcpy memcpy sendto 10099->10103 10100->10103 10101->10094 10101->10096 10102->10098 10104 1000787c 10103->10104 10104->10086 10105 1000788a 10104->10105 10105->10085 10107 10001000 10106->10107 10108 1000ef93 _mbscat 10107->10108 10109 10001000 10108->10109 10110 1000efb0 _mbscat 6D0A2DD0 10109->10110 10114 1000eff5 10110->10114 10111 1000f1da 6D0A2C70 10113 10004cea wvsprintfA 10113->10114 10114->10111 10114->10113 10115 1000f082 memset 10114->10115 10117 1000f0c5 Sleep 10114->10117 10118 1000f161 strlen 10114->10118 10160 10008e20 10114->10160 10175 1000960f 10115->10175 10117->10114 10119 1000f175 strcmp 10118->10119 10120 1000f1a7 10118->10120 10119->10120 10121 1000f18d wsprintfA 10119->10121 10122 1000f1b8 6D1D1DA0 Sleep 10120->10122 10121->10120 10122->10114 10127 1000cb3b 10123->10127 10124 1000ccf4 6D0A2C70 10125 10008e20 6 API calls 10125->10127 10126 10004cea wvsprintfA 10126->10127 10127->10124 10127->10125 10127->10126 10128 1000cbc8 memset 10127->10128 10130 1000cc02 Sleep 10127->10130 10131 1000cc9b strlen 10127->10131 10129 1000960f 7 API calls 10128->10129 10129->10127 10130->10127 10132 1000ccb2 strcmp 10131->10132 10133 1000cce3 Sleep 10131->10133 10132->10133 10134 1000ccc7 wsprintfA 10132->10134 10133->10127 10215 100084f9 10134->10215 10137 1000f9ec 10136->10137 10138 1000fa36 RegOpenKeyExA 10137->10138 10139 1000fbaf 10137->10139 10140 1000fb92 RegCloseKey Sleep 10137->10140 10142 1000fad7 memset memset RegEnumValueA 10137->10142 10138->10140 10141 1000fa5c RegQueryInfoKeyA 10138->10141 10140->10137 10141->10137 10141->10140 10142->10137 10143 1000fb63 StrStrIA 10142->10143 10143->10137 10144 1000fb79 RegDeleteValueA 10143->10144 10144->10137 10376 10004cad CreateMutexA 10145->10376 10147 1000bad5 10377 1000535b GetLastError 10147->10377 10149 1000bb7d CloseHandle 10150 1000bafb memset 10378 10009fab memset wsprintfA 6D0A2DD0 memset 10150->10378 10152 1000bae3 10152->10149 10152->10150 10153 1000bb30 CreateThread WaitForSingleObject CloseHandle Sleep 10152->10153 10154 1000bb23 Sleep 10152->10154 10153->10152 10154->10152 10155->10074 10156->10079 10157->10081 10159 10007188 10158->10159 10159->10093 10198 10004cea 10160->10198 10164 10008e68 10165 10008e76 10164->10165 10166 10008e6f 10164->10166 10202 1000584f CreateFileA 10165->10202 10166->10114 10168 10008e9b 10174 10008ead 10168->10174 10203 10005876 ReadFile 10168->10203 10170 10008ecb 10204 10005434 CloseHandle 10170->10204 10172 10008eda 10205 10005326 StrStrIA 10172->10205 10174->10166 10176 1000963b 10175->10176 10207 10004d54 InternetOpenA 10176->10207 10178 10009644 10179 10009656 10178->10179 10208 10004d73 InternetOpenUrlA 10178->10208 10179->10114 10181 10009679 10182 10009685 10181->10182 10183 100096a8 10181->10183 10209 10004db1 InternetCloseHandle 10182->10209 10185 100096b1 memset 10183->10185 10186 1000972f 10183->10186 10211 10004d96 InternetReadFile 10185->10211 10213 10004db1 InternetCloseHandle 10186->10213 10188 1000968e 10210 10004db1 InternetCloseHandle 10188->10210 10190 10009738 10214 10004db1 InternetCloseHandle 10190->10214 10192 100096e3 memcpy 10193 10009720 10192->10193 10194 10009718 10192->10194 10212 10005434 CloseHandle 10193->10212 10194->10185 10194->10193 10197 1000972c 10197->10186 10206 10004cd3 wvsprintfA 10198->10206 10200 10004d07 10201 10005304 PathFileExistsA 10200->10201 10201->10164 10202->10168 10203->10170 10204->10172 10205->10174 10206->10200 10207->10178 10208->10181 10209->10188 10210->10179 10211->10192 10212->10197 10213->10190 10214->10179 10216 10008506 10215->10216 10229 10007dde 14 API calls 10216->10229 10218 1000850c wsprintfA 10230 10007f89 10218->10230 10222 100085f9 10237 1000793b 10222->10237 10224 10008615 10225 10008627 10224->10225 10226 1000862c OpenProcess 10224->10226 10225->10133 10226->10225 10227 10008650 10226->10227 10227->10225 10228 10008674 CreateThread 10227->10228 10228->10227 10352 10008377 10228->10352 10229->10218 10266 100210e0 10230->10266 10233 10007fe2 10234 1000805a wsprintfA wsprintfA CreateDirectoryA 10233->10234 10235 10007feb _mbscat _mbscat _mbscat _mbscat strchr 10233->10235 10236 100067ac CreateFileA strlen WriteFile CloseHandle 10234->10236 10235->10233 10236->10222 10238 100210e0 10237->10238 10239 1000795d memset CoInitializeEx CoInitializeSecurity CoCreateInstance 10238->10239 10268 10010360 6D0A2DD0 10239->10268 10241 100079f6 10274 100103f0 10241->10274 10244 10010360 3 API calls 10245 10007aba 10244->10245 10277 100102d0 6D0A2DD0 10245->10277 10247 10007aef 10248 100103f0 4 API calls 10247->10248 10249 10007b38 10248->10249 10250 100103f0 4 API calls 10249->10250 10257 10007b4a 10250->10257 10251 10007d72 VariantClear VariantClear 10252 10007d98 CoUninitialize 10251->10252 10252->10224 10253 10007ba4 10253->10251 10254 10007ba9 VariantInit VariantInit VariantInit 10254->10257 10256 10010360 6D0A2DD0 SysAllocString _CxxThrowException 10256->10257 10257->10251 10257->10253 10257->10254 10257->10256 10262 10011290 6 API calls 10257->10262 10283 10011290 10257->10283 10260 100103f0 4 API calls 10261 10007cbf _strcmpi 10260->10261 10261->10257 10263 10007d29 _mbscpy 10262->10263 10264 100103f0 4 API calls 10263->10264 10265 10007d4b StrStrIA 10264->10265 10265->10257 10267 10007f96 _mbscpy strchr 10266->10267 10267->10233 10269 10010398 10268->10269 10271 100103a4 10268->10271 10287 100104c0 SysAllocString 10269->10287 10272 100103d7 10271->10272 10291 100214a2 10271->10291 10272->10241 10300 10010440 10274->10300 10278 10010308 10277->10278 10280 10010314 10277->10280 10321 10010470 10278->10321 10281 10010347 10280->10281 10282 100214a2 LockFreeStack _CxxThrowException 10280->10282 10281->10247 10282->10281 10284 100112a1 10283->10284 10285 10007c9d _mbscpy 10283->10285 10336 100105a0 10284->10336 10285->10260 10288 10010502 10287->10288 10289 100104f2 10287->10289 10288->10271 10289->10288 10290 100214a2 LockFreeStack _CxxThrowException 10289->10290 10290->10288 10294 10021633 10291->10294 10298 10021657 10294->10298 10297 100214ad 10297->10272 10299 10021649 _CxxThrowException 10298->10299 10299->10297 10301 1001044f 10300->10301 10303 10007a3f CoSetProxyBlanket wcscat 10300->10303 10304 10010510 InterlockedDecrement 10301->10304 10303->10244 10305 1001052a 10304->10305 10306 10010546 10304->10306 10305->10306 10308 10010560 10305->10308 10306->10303 10313 100105f0 10308->10313 10311 10010585 10311->10306 10312 10010579 6D0A2C70 10312->10311 10316 10010610 10313->10316 10317 10010621 SysFreeString 10316->10317 10318 1001062d 10316->10318 10317->10318 10319 10010636 6D0A2C70 10318->10319 10320 1001056f 10318->10320 10319->10320 10320->10311 10320->10312 10326 100214ee 10321->10326 10323 100104b1 10323->10280 10325 100214a2 LockFreeStack _CxxThrowException 10325->10323 10327 10010494 10326->10327 10328 100214fd lstrlen 10326->10328 10327->10323 10327->10325 10329 100210e0 10328->10329 10330 10021516 MultiByteToWideChar 10329->10330 10331 10021553 SysAllocString 10330->10331 10332 10021531 GetLastError 10330->10332 10331->10327 10333 1002154b 10332->10333 10334 1002153d GetLastError 10332->10334 10335 100214a2 LockFreeStack _CxxThrowException 10333->10335 10334->10333 10335->10331 10337 100105b0 10336->10337 10338 100105dc 10336->10338 10342 10021563 10337->10342 10338->10285 10341 100214a2 LockFreeStack _CxxThrowException 10341->10338 10343 10021573 wcslen 6D0A2DD0 10342->10343 10344 100105bb 10342->10344 10345 10021597 WideCharToMultiByte 10343->10345 10346 1002158d 10343->10346 10344->10338 10344->10341 10345->10344 10348 100215ac GetLastError 10345->10348 10347 100214a2 LockFreeStack _CxxThrowException 10346->10347 10347->10345 10349 100215b8 GetLastError 10348->10349 10350 100215c6 10348->10350 10349->10350 10351 100214a2 LockFreeStack _CxxThrowException 10350->10351 10351->10344 10353 100083b5 10352->10353 10354 100083bd 6D0A2DD0 10352->10354 10353->10354 10358 100083dd 10354->10358 10355 100084cb 6D0A2C70 CloseHandle 10356 100083f2 10356->10355 10357 100083f7 VirtualQueryEx 10357->10356 10357->10358 10358->10355 10358->10356 10358->10357 10359 10008451 6D0A2C70 6D0A2DD0 10358->10359 10360 1000847e ReadProcessMemory 10358->10360 10362 1000805f 10358->10362 10359->10360 10360->10358 10363 1000806c 10362->10363 10364 100082f7 10363->10364 10365 10008088 10363->10365 10368 100082f9 10363->10368 10364->10358 10365->10364 10367 100080b5 memcmp 10365->10367 10366 10008334 memcmp 10366->10368 10369 100082f2 10367->10369 10370 100080dc wsprintfA 10367->10370 10368->10364 10368->10366 10369->10358 10371 10007f89 7 API calls 10370->10371 10372 10008139 wsprintfA wsprintfA CreateDirectoryA 10371->10372 10375 100067ac CreateFileA strlen WriteFile CloseHandle 10372->10375 10374 100081c9 14 API calls 10374->10369 10375->10374 10376->10147 10377->10152 10397 10004d54 InternetOpenA 10378->10397 10380 1000a087 10381 1000a0a5 10380->10381 10398 10004d73 InternetOpenUrlA 10380->10398 10381->10152 10383 1000a0cb 10383->10381 10384 1000a0f1 6E6BACE0 10383->10384 10390 1000a113 10384->10390 10385 1000a120 memset 10399 10004d96 InternetReadFile 10385->10399 10386 1000a2b8 6E6CDC60 6E6CDC60 6E6D4490 6E6C9380 strlen 10387 1000a373 6E6BC7F0 6E6BC7F0 10386->10387 10388 1000a3a7 wsprintfA strlen 10386->10388 10387->10381 10396 1000a3e4 6D0A2C70 strrchr 10388->10396 10390->10385 10390->10386 10392 1000a181 9 API calls 10390->10392 10393 1000a17c 10390->10393 10392->10390 10393->10386 10394 1000a4c1 6E6BC7F0 6E6BC7F0 10394->10381 10395 1000a489 6E6BC7F0 6E6BC7F0 10395->10381 10396->10394 10396->10395 10397->10380 10398->10383 10399->10390 10406 100213d5 10407 100213e8 10406->10407 10409 100213f1 10406->10409 10410 10021439 10407->10410 10411 10021419 10407->10411 10412 1002132a 3 API calls 10407->10412 10409->10407 10409->10411 10414 1002132a 10409->10414 10410->10411 10413 1002132a 3 API calls 10410->10413 10412->10410 10413->10411 10415 10021332 10414->10415 10416 10021368 10415->10416 10417 10021353 malloc 10415->10417 10419 10021392 10415->10419 10416->10407 10417->10416 10418 1002136c _initterm 10417->10418 10418->10416 10419->10416 10420 100213bf free 10419->10420 10420->10416 10421 10008ff9 RegOpenKeyExA 10422 1000903a 10421->10422 10423 1000909d _mbscpy 10421->10423 10442 10005af9 RegQueryValueExA 10422->10442 10424 100090ae 10423->10424 10444 1000883b 10424->10444 10427 10009076 10443 10005abc RegCloseKey 10427->10443 10430 10009085 _mbscpy 10430->10424 10432 100090c6 GlobalMemoryStatusEx 10433 100090fa __aulldiv 10432->10433 10434 10004cea wvsprintfA 10433->10434 10435 10009139 _mbscpy GetSystemDefaultUILanguage 10434->10435 10466 10008f00 10435->10466 10438 100091a4 _mbscpy 10440 100091d7 10438->10440 10439 100091bf 10441 10004cea wvsprintfA 10439->10441 10441->10440 10442->10427 10443->10430 10445 10008855 10444->10445 10446 1000885a strlen 10444->10446 10451 10008c6a memset GetVersionExA 10445->10451 10446->10445 10447 10008873 GlobalAlloc memset _mbscpy 10446->10447 10448 100088aa 10447->10448 10449 100088f1 GlobalFree 10448->10449 10450 100088c9 memset _mbscpy 10448->10450 10449->10445 10450->10449 10452 10008cca _mbscpy 10451->10452 10454 10008ce5 10451->10454 10452->10454 10453 10008d12 10456 10008d3f 10453->10456 10457 10008d24 _mbscpy 10453->10457 10454->10453 10455 10008cf7 _mbscpy 10454->10455 10455->10453 10458 10008d6c 10456->10458 10459 10008d51 _mbscpy 10456->10459 10457->10456 10460 10008d99 10458->10460 10461 10008d7e _mbscpy 10458->10461 10459->10458 10462 10008dab _mbscpy 10460->10462 10464 10008dc6 10460->10464 10461->10460 10462->10464 10463 10008df3 sprintf 10463->10432 10464->10463 10465 10008dd8 _mbscpy 10464->10465 10465->10463 10467 10004cea wvsprintfA 10466->10467 10468 10008f39 10467->10468 10483 10005304 PathFileExistsA 10468->10483 10470 10008f48 10471 10008f56 10470->10471 10472 10008f4f 10470->10472 10484 1000584f CreateFileA 10471->10484 10472->10438 10472->10439 10474 10008f7b 10482 10008f8d 10474->10482 10485 10005876 ReadFile 10474->10485 10476 10008fab 10486 10005434 CloseHandle 10476->10486 10478 10008fba 10487 10005326 StrStrIA 10478->10487 10480 10008fcb 10480->10482 10488 10005326 StrStrIA 10480->10488 10482->10472 10483->10470 10484->10474 10485->10476 10486->10478 10487->10480 10488->10482 10489 1000249d 10492 100024a7 10489->10492 10491 100024a5 10493 10001000 10492->10493 10494 100024b4 GetProcAddress 10493->10494 10494->10491 10495 10005b9e RegSetValueExA

                    Control-flow Graph

                    APIs
                    • lstrcpy.KERNEL32(00000000,1000EBC9), ref: 1000E791
                    • lstrcat.KERNEL32(00000000,1002B328), ref: 1000E7A3
                    • lstrcat.KERNEL32(00000000,*.*), ref: 1000E7B5
                    • FindFirstFileA.KERNEL32(00000000,?), ref: 1000E7C9
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 1000E7F3
                    • lstrcpy.KERNEL32(00000000,1000EBC9), ref: 1000E844
                    • lstrcat.KERNEL32(00000000,1002B330), ref: 1000E856
                    • lstrcat.KERNEL32(00000000,?), ref: 1000E86A
                    • _strcmpi.MSVCRT ref: 1000E87C
                    • PathIsDirectoryA.SHLWAPI(00000000), ref: 1000E8CD
                    • 6D0A2DD0.MFC42(00A00000), ref: 1000E906
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: lstrcat$FileFindlstrcpy$DirectoryFirstNextPath_strcmpi
                    • String ID: %s\%s$*.*$/image.php$107.163.56.240:18963/main.php$11221450$NPKI$P
                    • API String ID: 562152879-1605710944
                    • Opcode ID: 2fbdfabf51252c2224889a1b619a4f45c2a3459a8a334f7d9c777a225b8bf926
                    • Instruction ID: 19444b947d153ba7138296ce0e6c54724dfe7cb5038b80b89ac979f494543493
                    • Opcode Fuzzy Hash: 2fbdfabf51252c2224889a1b619a4f45c2a3459a8a334f7d9c777a225b8bf926
                    • Instruction Fuzzy Hash: 6991A6B59002A8AFEB64CBA4CC84BDE77B9EB58341F0044E5E30DA6141DB75AF98CF51

                    Control-flow Graph

                    APIs
                    • sprintf.MSVCRT ref: 10011C8E
                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 10011CB4
                    • DeviceIoControl.KERNEL32(000000FF,00074080,00000000,00000000,?,00000018,10011A6D,00000000), ref: 10011CF0
                    • GetLastError.KERNEL32(00000400,?,00000000,00000000), ref: 10011D0C
                    • FormatMessageA.KERNEL32(00001300,00000000,00000000), ref: 10011D1A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ControlCreateDeviceErrorFileFormatLastMessagesprintf
                    • String ID: \\.\PHYSICALDRIVE%d
                    • API String ID: 1111953355-613073274
                    • Opcode ID: 9f30885270635e6f7f4378129046c2ac62e5a9f342dcb6496bc87d1829db50c4
                    • Instruction ID: ac9daaf844bbbce85607c204d6ced58bc456b83f5b99ea7e7b7fe265a51f8282
                    • Opcode Fuzzy Hash: 9f30885270635e6f7f4378129046c2ac62e5a9f342dcb6496bc87d1829db50c4
                    • Instruction Fuzzy Hash: C351A6B5A00218ABEB24CF54CC41BDD7775EF85704F148294F6096A2C1DB729A94CF55

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 168 10006843-100068ad LoadLibraryA GetProcAddress GetExtendedUdpTable 169 100068c3-100068e0 malloc 168->169 170 100068af-100068b6 168->170 172 100068e2-100068e8 169->172 173 100068ed-10006916 GetExtendedUdpTable 169->173 170->169 171 100068b8-100068be 170->171 176 100069d9-100069dc 171->176 172->176 174 10006918-1000691a 173->174 175 1000691f-10006929 173->175 174->176 177 1000693a-10006948 175->177 178 100069b6-100069d3 free FreeLibrary 177->178 179 1000694a-10006994 htons 177->179 178->176 180 100069b1 179->180 181 10006996-100069af 179->181 180->177 181->178
                    APIs
                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 10006865
                    • GetProcAddress.KERNEL32(?,GetExtendedUdpTable), ref: 1000687D
                    • GetExtendedUdpTable.IPHLPAPI(00000000,00000000,00000001,00000002,00000001,00000000), ref: 1000689A
                    • malloc.MSVCRT ref: 100068CA
                    • GetExtendedUdpTable.IPHLPAPI(00000000,00000000,00000001,00000002,00000001,00000000), ref: 10006903
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ExtendedTable$AddressLibraryLoadProcmalloc
                    • String ID: GetExtendedUdpTable$iphlpapi.dll$z
                    • API String ID: 2385667234-347336574
                    • Opcode ID: 5328ac57c6a4c2ab5cc262d5627e7cd2f3de5afe600d25952e17e25023f3c01c
                    • Instruction ID: e72f5ed3c2909e77353821d2c1bd01ab583724ea6bb6368f571f4905b0ca2030
                    • Opcode Fuzzy Hash: 5328ac57c6a4c2ab5cc262d5627e7cd2f3de5afe600d25952e17e25023f3c01c
                    • Instruction Fuzzy Hash: 3541E9F09002289BDB24DB50CD85BD8B7B9EB88304F20C5E9E70967295D7709EC6CF59

                    Control-flow Graph

                    APIs
                      • Part of subcall function 10004D54: InternetOpenA.WININET(10009786,?,?,?,?), ref: 10004D6B
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 10009674
                    Strings
                    • TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1, xrefs: 10009631
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: FormatInternetOpenTime___crt
                    • String ID: TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1
                    • API String ID: 483802873-1756078650
                    • Opcode ID: 1c552b1c28aa3bc19c23a19089090d0fa10cbf4bb900b856f0b97fb28ca6ac2c
                    • Instruction ID: edbbad18566889c42df8cf001e4eb437ffe5273fdd268d158c28225184eb7580
                    • Opcode Fuzzy Hash: 1c552b1c28aa3bc19c23a19089090d0fa10cbf4bb900b856f0b97fb28ca6ac2c
                    • Instruction Fuzzy Hash: F5311DF6D00208EBEB20DB94CC86BCD73B8EB44340F5185A4E70877285E775AB948B99

                    Control-flow Graph

                    APIs
                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 10005EC6
                    • OpenProcessToken.ADVAPI32(00000000), ref: 10005ECD
                    • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 10005EE5
                    • AdjustTokenPrivileges.KERNELBASE(?,00000000,00000001,00000000,00000000,00000000), ref: 10005F1F
                    • CloseHandle.KERNEL32(?), ref: 10005F29
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                    • String ID:
                    • API String ID: 3038321057-0
                    • Opcode ID: f6b6b03c6faaef396f20f0d52fdbd3e93666b8a4be3b0b9069461b6b7524bcc7
                    • Instruction ID: efa5140f03dfd4bc98f9291f5672f447fd415e0b54fcefeffd77d2d0beff28df
                    • Opcode Fuzzy Hash: f6b6b03c6faaef396f20f0d52fdbd3e93666b8a4be3b0b9069461b6b7524bcc7
                    • Instruction Fuzzy Hash: FB012D70A1020AABFB14CFE4CC85BBF77B8EB88741F208515FA05D6284D6799A42CB60

                    Control-flow Graph

                    APIs
                    • CreateMutexA.KERNEL32(00000000,00000001,M107.163.56.251:6658,1002B5F8), ref: 10010016
                    • GetLastError.KERNEL32 ref: 10010022
                    • wsprintfA.USER32 ref: 1001006D
                    • 6D1D1DA0.KERNEL32(?,00000000), ref: 1001007F
                    • Sleep.KERNEL32(000007D0), ref: 10010090
                    • DeleteFileA.KERNEL32(00000000), ref: 1001009A
                    • PathIsDirectoryA.SHLWAPI(C:\Users\user\Desktop\11221450), ref: 100100C4
                    • CreateDirectoryA.KERNEL32(C:\Users\user\Desktop\11221450,00000000), ref: 10010102
                    • Sleep.KERNEL32(000007D0), ref: 10010113
                    • DeleteFileA.KERNEL32(00000000), ref: 1001011D
                    • CreateThread.KERNEL32(00000000,00000000,1000FEA3,00000000,00000000,00000000), ref: 1001013B
                    • CreateThread.KERNEL32(00000000,00000000,1000C5DD,00000000,00000000,00000000), ref: 10010155
                    • Sleep.KERNEL32(000003E8), ref: 10010160
                    • WSAStartup.WS2_32(00000202,?), ref: 10010172
                    • CreateThread.KERNEL32(00000000,00000000,1000BDDD,107.163.56.251:6658,00000000,00000000), ref: 10010190
                    • CreateThread.KERNEL32(00000000,00000000,1000EAE6,00000000,00000000,00000000), ref: 100101A5
                    • Sleep.KERNEL32(00000BB8), ref: 100101B0
                    • CreateThread.KERNEL32(00000000,00000000,1000CB08,00000000,00000000,00000000), ref: 10010201
                    • CreateThread.KERNEL32(00000000,00000000,1000EF29,00000000,00000000,00000000), ref: 10010216
                    • Sleep.KERNEL32(00000BB8), ref: 10010221
                    • CreateThread.KERNEL32(00000000,00000000,10007225,00000000,00000000,00000000), ref: 10010236
                    • CreateThread.KERNEL32(00000000,00000000,1000C753,00000000,00000000,00000000), ref: 1001024B
                    • Sleep.KERNEL32(000927C0), ref: 10010256
                    • Sleep.KERNEL32(000927C0), ref: 1001026A
                    • CreateThread.KERNEL32(00000000,00000000,1000BA90,00000000,00000000,00000000), ref: 1001027F
                    • Sleep.KERNEL32(0000EA60), ref: 1001028A
                    • CreateThread.KERNEL32(00000000,00000000,1000F9DF,00000000,00000000,00000000), ref: 1001029F
                    • Sleep.KERNEL32(000000FF), ref: 100102A7
                    • Sleep.KERNEL32(0036EE80), ref: 100102BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Create$SleepThread$DeleteDirectoryFile$ErrorLastMutexPathStartupwsprintf
                    • String ID: 107.163.56.251:6658$123$C:\Users\user\Desktop$C:\Users\user\Desktop\11221450$M107.163.56.251:6658$SeDebugPrivilege$cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "%s"
                    • API String ID: 1343898817-338724970
                    • Opcode ID: fefafe8ab9288ea41c363e7c11848018cdd40a52e75ac5e3db2d34ff6eba06cf
                    • Instruction ID: 202ca25a55749d9caac28ba7abe87623cc4d3d132b78e06582e95a8dd985acec
                    • Opcode Fuzzy Hash: fefafe8ab9288ea41c363e7c11848018cdd40a52e75ac5e3db2d34ff6eba06cf
                    • Instruction Fuzzy Hash: 31616F30B81324BBF720DBA08C4BF9A7661EB14B42F604594F749BD1D0DBF066928F56

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strcspnstrstr$_mbscpy$___crtstrncpy$FormatInfoLocaleStartupTimeatoiclosesocketconnecthtonsmemsetsocket
                    • String ID: http://
                    • API String ID: 2442996125-1121587658
                    • Opcode ID: ac03bdceba01dc52bc363b04a17981fe5360d76d08a8c37df158606eb789235e
                    • Instruction ID: 328f30d5f0abd543537b81f1a207a30335c7fdbd19ea60133f8a33c6dacf31c1
                    • Opcode Fuzzy Hash: ac03bdceba01dc52bc363b04a17981fe5360d76d08a8c37df158606eb789235e
                    • Instruction Fuzzy Hash: 4151CF71900218BFEF14DBA4DC89BDA77BCEF45304F1041A8F649A6144EB319B99CFA2

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: DirectorySleepSystem_mbscat$memsetstrcmpstrlenwsprintf
                    • String ID: 127.0.0.1$8.8.8.8$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$cmd.exe /c ipconfig /flushdns$http://107.163.56.240:18963/main.php
                    • API String ID: 3822996416-3520984710
                    • Opcode ID: 478b8cb0c0f7ccba3f2f6706072005746783b3e90f3ddc4b12865efafb868220
                    • Instruction ID: 1b7d056821bea9ffcc31071dd2aa98b9aaa464bf06ce50bac68d0a223335520a
                    • Opcode Fuzzy Hash: 478b8cb0c0f7ccba3f2f6706072005746783b3e90f3ddc4b12865efafb868220
                    • Instruction Fuzzy Hash: 1571A1B5D04218ABEB60CB68DCC5BD9B3B5EB58340F1041E8E60CA7281DB75AF858F91

                    Control-flow Graph

                    APIs
                    • RegOpenKeyExA.KERNEL32(80000002,?,00000000,000F003F,?), ref: 10009030
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 10009071
                      • Part of subcall function 10005AF9: RegQueryValueExA.KERNEL32(?,?,?,?,?,?), ref: 10005B14
                      • Part of subcall function 10005ABC: RegCloseKey.KERNEL32(?), ref: 10005AC3
                    • _mbscpy.MSVCRT(?,?), ref: 10009093
                    • _mbscpy.MSVCRT(?,Find CPU Error), ref: 100090A6
                    • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 100090DA
                    • __aulldiv.LIBCMT ref: 100090F5
                    • __aulldiv.LIBCMT ref: 10009103
                    • _mbscpy.MSVCRT(?,11221450,?,?,00000400,00000000), ref: 1000914A
                    • GetSystemDefaultUILanguage.KERNEL32(?,?,?,?,00000400,00000000), ref: 10009152
                    • _mbscpy.MSVCRT(?,00000000,?,?,?,?,?,?,00000400,00000000), ref: 100091B5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscpy$__aulldiv$CloseDefaultFormatGlobalLanguageMemoryOpenQueryStatusSystemTimeValue___crt
                    • String ID: %u MB$11221450$@$Find CPU Error$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$http://107.163.56.240:18963/main.php
                    • API String ID: 1484250483-2547790904
                    • Opcode ID: c2c0c32ab576b11e6bd5d6c35985afb97b9d528d25e0feedbf34843814d19808
                    • Instruction ID: cefe20e9956c0aeb191ec147d5f548dd9efc5a21e1516fd84fccf84d5fb5ed44
                    • Opcode Fuzzy Hash: c2c0c32ab576b11e6bd5d6c35985afb97b9d528d25e0feedbf34843814d19808
                    • Instruction Fuzzy Hash: B941D8F99012186BEB10DB54DC89FDA7379EF54340F4482A8F608A7285EB74AA84CB95

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 183 10011e80-10011ef4 memset * 2 Netbios 184 10011f06-10011f10 183->184 185 10011ef6-10011f01 183->185 187 10011f21-10011f32 184->187 186 10012078-1001207b 185->186 188 10011f74-10011f82 187->188 189 10011f34-10011f6e Netbios 187->189 192 10011f94-10012003 memset _mbscpy Netbios 188->192 193 10011f84-10011f8f 188->193 190 10011f70 189->190 191 10011f72 189->191 190->188 191->187 195 10012012-10012076 sprintf 192->195 196 10012005-10012010 192->196 193->186 195->186 196->186
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Netbiosmemset
                    • String ID: %02X%02X%02X%02X%02X%02X$3
                    • API String ID: 1915571530-847158874
                    • Opcode ID: e682560842b1c5bbc8f73b42685206b775cb85e69039e3f260726e3811ab9e07
                    • Instruction ID: 995f6e05dfeb694b0f45a1fd62118eef7e3e694447b149082da1e2005757cfe0
                    • Opcode Fuzzy Hash: e682560842b1c5bbc8f73b42685206b775cb85e69039e3f260726e3811ab9e07
                    • Instruction Fuzzy Hash: 2D518F7592065A8BDB36CB14CC42BE9B3B8EF95300F4441F8A44CAA242EBB49BD4DF45

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 197 1000cb08-1000cb38 6D0A2DD0 198 1000cb3b-1000cb42 197->198 199 1000ccf4-1000cd19 6D0A2C70 198->199 200 1000cb48-1000cb86 call 10008e20 198->200 202 1000cb8b-1000cb90 200->202 203 1000cb92-1000cbad call 10004cea 202->203 204 1000cbaf-1000cbc5 call 10004cea 202->204 209 1000cbc8-1000cc00 memset call 1000960f 203->209 204->209 212 1000cc02-1000cc0f Sleep 209->212 213 1000cc14-1000cc2f 209->213 212->198 214 1000cc40-1000cc4c 213->214 215 1000cc9b-1000ccb0 strlen 214->215 216 1000cc4e-1000cc5a 214->216 219 1000ccb2-1000ccc5 strcmp 215->219 220 1000cce3-1000ccef Sleep 215->220 217 1000cc61-1000cc63 216->217 218 1000cc5c-1000cc60 216->218 221 1000cc80-1000cc97 217->221 222 1000cc65-1000cc7e 217->222 218->217 219->220 223 1000ccc7-1000ccde wsprintfA call 100084f9 219->223 220->198 224 1000cc99 221->224 222->224 223->220 224->214
                    APIs
                    • 6D0A2DD0.MFC42(00080000), ref: 1000CB24
                    • memset.MSVCRT ref: 1000CBD2
                    • Sleep.KERNEL32(000927C0), ref: 1000CC09
                    • strlen.MSVCRT ref: 1000CCA5
                    • strcmp.MSVCRT ref: 1000CCBB
                    • wsprintfA.USER32 ref: 1000CCD5
                      • Part of subcall function 100084F9: wsprintfA.USER32 ref: 1000853B
                      • Part of subcall function 100084F9: wsprintfA.USER32 ref: 100085AF
                      • Part of subcall function 100084F9: wsprintfA.USER32 ref: 100085CE
                      • Part of subcall function 100084F9: CreateDirectoryA.KERNEL32(%s|%s,00000000), ref: 100085E0
                    • Sleep.KERNEL32(000927C0), ref: 1000CCE9
                    • 6D0A2C70.MFC42(?), ref: 1000CD04
                    Strings
                    • http://107.163.56.240:18963/main.php, xrefs: 1000CBAF
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: wsprintf$Sleep$CreateDirectorymemsetstrcmpstrlen
                    • String ID: http://107.163.56.240:18963/main.php
                    • API String ID: 3532960077-1318255662
                    • Opcode ID: a2fd0fa5f4125b30e3ece5b914d13249209fb656e10afc631c9f1bb3dbf1883b
                    • Instruction ID: acf207941c7ebc88904dff186f98427c2258807a785c7ff7885373aecb3466dd
                    • Opcode Fuzzy Hash: a2fd0fa5f4125b30e3ece5b914d13249209fb656e10afc631c9f1bb3dbf1883b
                    • Instruction Fuzzy Hash: 38518AB5D0061CABEB10CB94CC82FEFB7B5EF48341F1444A8E508A7245D771AB858F91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 227 1000c43a-1000c46e strstr 228 1000c470 227->228 229 1000c475-1000c496 6D0A2DD0 227->229 230 1000c5ce-1000c5dc 228->230 231 1000c498-1000c49e call 10011a40 229->231 232 1000c4ab 229->232 235 1000c4a3-1000c4a9 231->235 234 1000c4b5-1000c50a _mbscpy 232->234 236 1000c526 234->236 237 1000c50c-1000c524 234->237 235->234 238 1000c530-1000c5c6 call 10008c6a call 10004cea call 1000c063 call 10004cea call 10009751 236->238 237->238 249 1000c5cb 238->249 249->230
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscpystrstr
                    • String ID: %s/joy.asp?sid=%s$%s|NULL|%s|%s$11221450$http://$http://107.163.56.241:18530/
                    • API String ID: 3519433431-1877419398
                    • Opcode ID: 6946f5982ec368157c32b6bd765652cabcb3cb23660f669ec0a4ae49c5e04ca8
                    • Instruction ID: 96c4c4460f3670001d58eb54bbc12df5c97e6194365fac138d2a8c86e213b446
                    • Opcode Fuzzy Hash: 6946f5982ec368157c32b6bd765652cabcb3cb23660f669ec0a4ae49c5e04ca8
                    • Instruction Fuzzy Hash: EC4156F5D00218AFEB20CF14DC81B9AB7B4EB85240F4045F9E70967281EB356A898F5A

                    Control-flow Graph

                    APIs
                    • WSAStartup.WS2_32(00000202,?), ref: 1000BDF8
                      • Part of subcall function 10004CAD: CreateMutexA.KERNEL32(00000000,00000000,1000BAD5,?,1000BAD5,00000000,00000000,0x5d65r455f), ref: 10004CBC
                      • Part of subcall function 1000535B: GetLastError.KERNEL32(?,1000BAE3), ref: 1000535E
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000B74E,?,00000000,00000000), ref: 1000BE47
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000BE56
                    • CloseHandle.KERNEL32(?), ref: 1000BE60
                    • Sleep.KERNEL32(00002710), ref: 1000BE6B
                    • CloseHandle.KERNEL32(?), ref: 1000BE7A
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateHandle$ErrorLastMutexObjectSingleSleepStartupThreadWait
                    • String ID:
                    • API String ID: 3243752880-0
                    • Opcode ID: 8771a04588f9dc2f16d17a829460210603032358937fc65401b82ea2910729cc
                    • Instruction ID: e824f486e2537cd13a86d57df264f215c657a490cf5d40ca5208cd8ad212e3ab
                    • Opcode Fuzzy Hash: 8771a04588f9dc2f16d17a829460210603032358937fc65401b82ea2910729cc
                    • Instruction Fuzzy Hash: 0411AD74A44208FBFB14DFE0CC9AFEDB774EB44711F204594FB0A9A2D0CA705A918B95

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 286 10008f00-10008f43 call 10004cea call 10005304 290 10008f48-10008f4d 286->290 291 10008f56-10008f8b call 1000584f 290->291 292 10008f4f-10008f51 290->292 296 10008f91-10008fd0 call 10005876 call 10005434 call 10005326 291->296 297 10008f8d-10008f8f 291->297 293 10008ff4-10008ff8 292->293 304 10008fd2-10008fd4 296->304 305 10008fd6-10008fe9 call 10005326 296->305 297->293 304->293 308 10008feb-10008fed 305->308 309 10008fef 305->309 308->293 309->293
                    APIs
                      • Part of subcall function 10005304: PathFileExistsA.SHLWAPI(10008E68,?,10008E68,00000000,?,?,?), ref: 1000530B
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMTD ref: 10008F76
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
                    • String ID: %s\lang.ini$C:\Users\user\Desktop$http://$search
                    • API String ID: 1721638100-1499676851
                    • Opcode ID: be59e332c173b8a5ceace86f63752d4cd59112b78e0c4a578100695009e00cb7
                    • Instruction ID: 60212f5056ad82ff0ae5ea45a156ac378cfaaf25f5a26cee64a353fcc168191f
                    • Opcode Fuzzy Hash: be59e332c173b8a5ceace86f63752d4cd59112b78e0c4a578100695009e00cb7
                    • Instruction Fuzzy Hash: 9D21C8759042097BEB60C674DC02FDB7369EB24380F5045B4BB88E6185EBB5FB848B95

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 316 10008e20-10008e6d call 10004cea call 10005304 321 10008e76-10008eab call 1000584f 316->321 322 10008e6f-10008e71 316->322 326 10008eb1-10008ef0 call 10005876 call 10005434 call 10005326 321->326 327 10008ead-10008eaf 321->327 324 10008efb-10008eff 322->324 334 10008ef2-10008ef4 326->334 335 10008ef6 326->335 327->324 334->324 335->324
                    APIs
                      • Part of subcall function 10005304: PathFileExistsA.SHLWAPI(10008E68,?,10008E68,00000000,?,?,?), ref: 1000530B
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMTD ref: 10008E96
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
                    • String ID: %s\lang.ini$C:\Users\user\Desktop$http://
                    • API String ID: 1721638100-706420813
                    • Opcode ID: e8b56968c5584ac666961f005e415167df33ef20945c2fef5e91b7dddfcd262a
                    • Instruction ID: 524591cf8a4eee935b205e257a8c60c4d1d170a2f2a088a70314005468ca3b98
                    • Opcode Fuzzy Hash: e8b56968c5584ac666961f005e415167df33ef20945c2fef5e91b7dddfcd262a
                    • Instruction Fuzzy Hash: CD21DAB5D04248B7EB20C664DC41FCB7368DB54790F1045A4FB89A61C5EBB1BBC48F95
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _inittermfreemalloc
                    • String ID: kvPiv
                    • API String ID: 1678931842-848721698
                    • Opcode ID: 32bd48cbedac31db7fc202db5474fc450ca80691310f4af71ef2a1824f5b65be
                    • Instruction ID: a13e4d924212a13dcf2931888b3098d0df1cffd824a8125765e678fcc9b3a535
                    • Opcode Fuzzy Hash: 32bd48cbedac31db7fc202db5474fc450ca80691310f4af71ef2a1824f5b65be
                    • Instruction Fuzzy Hash: 4D114C366646B1EBF314DF61EC84AC937E6FB64359BB14019E804D65A0F731AD828B50
                    APIs
                      • Part of subcall function 10004D54: InternetOpenA.WININET(10009786,?,?,?,?), ref: 10004D6B
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 100097B3
                    Strings
                    • TW96aWxsYS80LjAgKGNvbXBhdGlibGUp, xrefs: 10009773
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: FormatInternetOpenTime___crt
                    • String ID: TW96aWxsYS80LjAgKGNvbXBhdGlibGUp
                    • API String ID: 483802873-1918919809
                    • Opcode ID: 70449c398292e22e77c7340437fd52007b27366e81dc92532d215e76e86d941f
                    • Instruction ID: aa3042b00974eb3661dab9a980acd1570a60d3873d689b260169291dcc9804a7
                    • Opcode Fuzzy Hash: 70449c398292e22e77c7340437fd52007b27366e81dc92532d215e76e86d941f
                    • Instruction Fuzzy Hash: 271121F9D00208EBEB20DB50CC46B8D73B4DB44380F2181A5F6087B285EA75BA948B99
                    APIs
                    • GetProcAddress.KERNEL32(753A0000,00000000), ref: 100043D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID: Q2xvc2VXaW5kb3c=
                    • API String ID: 190572456-2652562148
                    • Opcode ID: fbc0b191b7f26a15644bc567497c0b691dff815fb9515091f55041d4ba3a90e7
                    • Instruction ID: 86b06878a34977032f00de5cded76d8bf0c7f73d773c853c7e08730fcfccc261
                    • Opcode Fuzzy Hash: fbc0b191b7f26a15644bc567497c0b691dff815fb9515091f55041d4ba3a90e7
                    • Instruction Fuzzy Hash: 50C08CF580021C6FF600EBE4ADCAE423BACE70C2997100022FB0DC2216EB32A05186A2
                    APIs
                    • GetProcAddress.KERNEL32(6DFB0000,00000000), ref: 100024BE
                    Strings
                    • TmV0TG9jYWxHcm91cEVudW0=, xrefs: 100024AA
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID: TmV0TG9jYWxHcm91cEVudW0=
                    • API String ID: 190572456-980335172
                    • Opcode ID: 4c51d861e7fd02144a7db00ae8db112198e28f32e65c5de3b64188d75a474123
                    • Instruction ID: 94a68914744b6255420893e6e3bedd0a82bd00ad7f141df6458ff9631ea00634
                    • Opcode Fuzzy Hash: 4c51d861e7fd02144a7db00ae8db112198e28f32e65c5de3b64188d75a474123
                    • Instruction Fuzzy Hash: 1EC080F540061C6FF200D7D8ACC5E41379CD3482997100011F60DC2211D53160414652
                    APIs
                    • GetProcAddress.KERNEL32(6DFB0000,00000000), ref: 100024EC
                    Strings
                    • TmV0TG9jYWxHcm91cEFkZE1lbWJlcnM=, xrefs: 100024D8
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID: TmV0TG9jYWxHcm91cEFkZE1lbWJlcnM=
                    • API String ID: 190572456-3430808999
                    • Opcode ID: 2859fcc0f97cbaf8f8a39a9c3ca047e8023cc2ef79e200a45133f090903b1013
                    • Instruction ID: 0e6cf0e7949062256b1582b677e2dc4b335822ba4defa2ba0336d22a514f21fc
                    • Opcode Fuzzy Hash: 2859fcc0f97cbaf8f8a39a9c3ca047e8023cc2ef79e200a45133f090903b1013
                    • Instruction Fuzzy Hash: 38C080F5C0061C6FF300D7D4ACC9D4137DCD3081997100011F70DC2211D73160414652
                    APIs
                    • GetProcAddress.KERNEL32(6DFB0000,00000000), ref: 10002576
                    Strings
                    • TmV0QXBpQnVmZmVyRnJlZQ==, xrefs: 10002562
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID: TmV0QXBpQnVmZmVyRnJlZQ==
                    • API String ID: 190572456-3244026974
                    • Opcode ID: 4dfb2dc32d8d45aa0c1131dfe6f868fa75675e8bfe7981136751ebd02a99021a
                    • Instruction ID: ff91b108fad4cc851aac3f9e389e9e2a63f3c8257eb8f5e683f791925ec63412
                    • Opcode Fuzzy Hash: 4dfb2dc32d8d45aa0c1131dfe6f868fa75675e8bfe7981136751ebd02a99021a
                    • Instruction Fuzzy Hash: 21C08CF680161CAFF200DBE4ACCAE823BACD3082A97110022F60EC3212E631B041C662
                    APIs
                    • GetProcAddress.KERNEL32(76F70000,00000000), ref: 100025A4
                    Strings
                    • R2V0U2VjdXJpdHlEZXNjcmlwdG9yQ29udHJvbA==, xrefs: 10002590
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID: R2V0U2VjdXJpdHlEZXNjcmlwdG9yQ29udHJvbA==
                    • API String ID: 190572456-3292411561
                    • Opcode ID: 1d48e16200f9b9f298709b5dcea94d537105a9f624fa3b7e2dd664796b368c7d
                    • Instruction ID: c4aeed86ffe8b449379c60583828ab32e035c01f2a5dfc01b8ce5ea512c12cf6
                    • Opcode Fuzzy Hash: 1d48e16200f9b9f298709b5dcea94d537105a9f624fa3b7e2dd664796b368c7d
                    • Instruction Fuzzy Hash: A5C08CF580026CAFF700DBE4ACCAE4237ACF30829D7100022FA0AC3212E721A44186A2
                    APIs
                    • GetProcAddress.KERNEL32(76F70000,00000000), ref: 10001744
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID: U2V0RXJyb3JNb2Rl
                    • API String ID: 190572456-495186574
                    • Opcode ID: 0aa649e1d36acdcdedc86aa3030a6d3833cf809a082bd0010dd5db48b3c8f688
                    • Instruction ID: b616446aa3eae8f0e246bd7a0e97171c4ab2d65e5c8aa983a289ca1212d1c33e
                    • Opcode Fuzzy Hash: 0aa649e1d36acdcdedc86aa3030a6d3833cf809a082bd0010dd5db48b3c8f688
                    • Instruction Fuzzy Hash: A6C08CF980021CABF300DBE4ACC6E46379CF30C19D7A00423F60AC2612EB31B40287A3
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID: C:\Program Files
                    • API String ID: 3472027048-1387799010
                    • Opcode ID: b3865f1773a3df5841c7476650eb2ea4794f304571f036a323e11238ceeefbc7
                    • Instruction ID: c4e0b3600881029edc50d20150f75f5e2cc0ea145c3db068fc966fb5d715c26f
                    • Opcode Fuzzy Hash: b3865f1773a3df5841c7476650eb2ea4794f304571f036a323e11238ceeefbc7
                    • Instruction Fuzzy Hash: DB314BB4D04298DBEB10CFA4C9816DEBBB0FB08344F248499D806B7346D37AAE46DB55
                    APIs
                    • inet_addr.WS2_32(?), ref: 100086CA
                    • inet_addr.WS2_32(?), ref: 100086D7
                      • Part of subcall function 10004733: gethostbyname.WS2_32(?), ref: 1000473A
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: inet_addr$gethostbyname
                    • String ID:
                    • API String ID: 2998999989-0
                    • Opcode ID: bb45a3487608896cfbf36d0f50aaacc2a051598b0221e32025faafd4cdf23f35
                    • Instruction ID: 7e645cfb302764e8d8533147197651d5e6009befd3d72f555b77b30a82d9c00f
                    • Opcode Fuzzy Hash: bb45a3487608896cfbf36d0f50aaacc2a051598b0221e32025faafd4cdf23f35
                    • Instruction Fuzzy Hash: 93F0D0B9A14208EFDB10DFA4C48898DBBB4FB48251F208595ED4997309D735EB51DF50
                    APIs
                    • RegCreateKeyExA.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 10005AB4
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: bca9ff1eb5be66ae6672d46cc0f94d350eff6bc44041ef987f654cf8287df7d2
                    • Instruction ID: 4cfd926ed5ee4b74160d84ed1ccf0fcb76e3c9c35cbabeff5299be230ac46b6e
                    • Opcode Fuzzy Hash: bca9ff1eb5be66ae6672d46cc0f94d350eff6bc44041ef987f654cf8287df7d2
                    • Instruction Fuzzy Hash: 5CE0FEB6214109AB8B44CF8DD890DEB77EDAB8C654B158248BA1DD3254D634E8518BA4
                    APIs
                    • RegOpenKeyExA.KERNEL32(000F003F,00000000,10010261,80000000,1000682F,?,1000682F,80000000,10010261,00000000,000F003F,?,?,?,10010261), ref: 10005B68
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: 08a337b6385868c0f675b507c6987362c60cd516618c9477459b3f79bd5ed091
                    • Instruction ID: 003bc1bca6d8c776606440d32dd4298a63b416cb58658e6586ac9de98fafa826
                    • Opcode Fuzzy Hash: 08a337b6385868c0f675b507c6987362c60cd516618c9477459b3f79bd5ed091
                    • Instruction Fuzzy Hash: 20D092B221420DAB8B04CF88D880CDB37EDAB8C610B008108FA0DC3200C630E9518BA0
                    APIs
                    • InternetOpenA.WININET(10009786,?,?,?,?), ref: 10004D6B
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: InternetOpen
                    • String ID:
                    • API String ID: 2038078732-0
                    • Opcode ID: 90c0bf59dd08bd5d87e8d08355b5a90ac8499dc7e9f0787b89098dff34845f0b
                    • Instruction ID: 01f520d78d0293c333997eaa499525b6bf33e0a14dea869d1b4eebbdcbea7866
                    • Opcode Fuzzy Hash: 90c0bf59dd08bd5d87e8d08355b5a90ac8499dc7e9f0787b89098dff34845f0b
                    • Instruction Fuzzy Hash: E4D092B221020DAB8B04CF88D884C9B77ADAB8C600B008108BA0DC3210C630E951CBA0
                    APIs
                    • GetShortPathNameA.KERNEL32(?,?,?), ref: 10005793
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: NamePathShort
                    • String ID:
                    • API String ID: 1295925010-0
                    • Opcode ID: a2b2b71d08cffb2413e2815f424846c236d11f47ef861f68627a2a105e900391
                    • Instruction ID: ceb44158fe26a4df53ddd6796a7450bcc70568043160c05e16c1b80753528501
                    • Opcode Fuzzy Hash: a2b2b71d08cffb2413e2815f424846c236d11f47ef861f68627a2a105e900391
                    • Instruction Fuzzy Hash: 64C04C7A11420CABCB04DFD8DC84CAB77EDAB8C610B14C508FA1D87200DA31F9118BA4
                    APIs
                    • CreateMutexA.KERNEL32(00000000,00000000,1000BAD5,?,1000BAD5,00000000,00000000,0x5d65r455f), ref: 10004CBC
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CreateMutex
                    • String ID:
                    • API String ID: 1964310414-0
                    • Opcode ID: bb1b3a1bc0f12fc904b8b3d4bb6a8e82535589da7040e946a222171785d456a3
                    • Instruction ID: 7a9713bbb07ef6c8d943612d259fbcec43348370ec0d3c79817316860ce7ebf9
                    • Opcode Fuzzy Hash: bb1b3a1bc0f12fc904b8b3d4bb6a8e82535589da7040e946a222171785d456a3
                    • Instruction Fuzzy Hash: ABC04C7611424CABCB04DFD8DC84CAB37ADFB8C610B148548FA1D87200C730F9119BA4
                    APIs
                    • LoadLibraryA.KERNEL32(04B31050,?,100015AB), ref: 100015B6
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 7b9efe137b9a3625fa2be7c8f2c66eb373832209af40d9067f265c298ba25b99
                    • Instruction ID: aa9e6f373e50f86635e89be718cfcb74191758a12ce1f5a61408757a6cf1a103
                    • Opcode Fuzzy Hash: 7b9efe137b9a3625fa2be7c8f2c66eb373832209af40d9067f265c298ba25b99
                    • Instruction Fuzzy Hash: C4B0927240432C9FE600DBE89CC9C1237ACB3086093A00452E90AC3A21D730A402CA96
                    APIs
                    • LoadLibraryA.KERNEL32(0341D020,?,100015EB), ref: 100015F6
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 7c04ac33f73942233e9bc7669ccbfea438ff98b86e57c92f0219278dcb297bdc
                    • Instruction ID: 29f41251ce689b307b62650387fb13a5c84ed48d826cf923518eb1e266bdb45f
                    • Opcode Fuzzy Hash: 7c04ac33f73942233e9bc7669ccbfea438ff98b86e57c92f0219278dcb297bdc
                    • Instruction Fuzzy Hash: EAB0927240432D9BE700DBE89CCAC0137ACA7086087604412E909C3A21D630A4428B52
                    APIs
                    • LoadLibraryA.KERNEL32(0341A008,?,1000164B), ref: 10001656
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: c6caff2039d44a6e5aa75d4bb98cb9209e82c10100db12a54ea678f8e826c46d
                    • Instruction ID: ba1e3f7c76a82d39c198cdf2c2322580641102d8f53e3edecd95e5ced58cbd87
                    • Opcode Fuzzy Hash: c6caff2039d44a6e5aa75d4bb98cb9209e82c10100db12a54ea678f8e826c46d
                    • Instruction Fuzzy Hash: B8B0927244432C9BE600DBE99CC8C0137ACE608A083604412E90A83A21D630A4428F92
                    APIs
                    • LoadLibraryA.KERNEL32(03414FE0,?,100016EB), ref: 100016F6
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: ffcc3db7b2bdde7f73629938805343ac14b0e3f16aaf80ff0ed903defb3ce77a
                    • Instruction ID: ceafc5a161691708641d67a93fab1652c5b609e1f825db1f72d2572ab5d16a00
                    • Opcode Fuzzy Hash: ffcc3db7b2bdde7f73629938805343ac14b0e3f16aaf80ff0ed903defb3ce77a
                    • Instruction Fuzzy Hash: DDB0927240432C9BF600DBE89CC8D1677ACB6086083604822E909D3A21D630A4428B92
                    APIs
                    • PathFileExistsA.SHLWAPI(10008E68,?,10008E68,00000000,?,?,?), ref: 1000530B
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID:
                    • API String ID: 1174141254-0
                    • Opcode ID: 8fbd92a01ea9a44224101bdf60dc518226490cae3da14b9b4e0f38dd0ac429c9
                    • Instruction ID: 6f4f072259eb8095dc5d08f605961f37381177791d3a9d26a151bb050024273c
                    • Opcode Fuzzy Hash: 8fbd92a01ea9a44224101bdf60dc518226490cae3da14b9b4e0f38dd0ac429c9
                    • Instruction Fuzzy Hash: 87B0123100030C97CA005BD8D848CC537DC964C5007004001F50CC3100CA30F4004690
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: gethostbyname
                    • String ID:
                    • API String ID: 930432418-0
                    • Opcode ID: 406ea3a98ef40a00d8bec193654c218e6d6cc0861c4cd66da68cf03bb168c3d3
                    • Instruction ID: ed7e62d2018f1f5fe489a5e2af283e66eb16d0056b782be615d6e68807e7cafe
                    • Opcode Fuzzy Hash: 406ea3a98ef40a00d8bec193654c218e6d6cc0861c4cd66da68cf03bb168c3d3
                    • Instruction Fuzzy Hash: 1EB0123140030C97CA005BE8D84CC95779CD6085047000400F50C83500C631F4004A90
                    APIs
                    • GetDriveTypeA.KERNEL32(1000EBB8,?,1000EBB8,1002B35C), ref: 10005819
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: DriveType
                    • String ID:
                    • API String ID: 338552980-0
                    • Opcode ID: 2a186cc019d29aeb2781d42997b730e683c4d9d36727cc720603f04b3b6f70d0
                    • Instruction ID: 70a1fadde607be084ccef56658dda61e356474f6f706b475b9c53b19a0d7fe5b
                    • Opcode Fuzzy Hash: 2a186cc019d29aeb2781d42997b730e683c4d9d36727cc720603f04b3b6f70d0
                    • Instruction Fuzzy Hash: 0FB0123100030C97CA005BD8D848C8577DC970C6407408000F60C83101CA70F4004AD0
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Close
                    • String ID:
                    • API String ID: 3535843008-0
                    • Opcode ID: bad93dd7ba07adfec8e7d5db093e91b400f46df775f4aea040612f4a0dfc6238
                    • Instruction ID: d309ecb02fbcf521f446e64dffd2c407881538d3ff2428412e6fd22df4654e57
                    • Opcode Fuzzy Hash: bad93dd7ba07adfec8e7d5db093e91b400f46df775f4aea040612f4a0dfc6238
                    • Instruction Fuzzy Hash: A5B0123200430C97CA005BD8D848CC5379CD60C5007000051F50CC3100C730F4004A90
                    APIs
                    • memset.MSVCRT ref: 10011A5B
                      • Part of subcall function 10011C72: sprintf.MSVCRT ref: 10011C8E
                      • Part of subcall function 10011C72: CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 10011CB4
                      • Part of subcall function 10011E80: memset.MSVCRT ref: 10011E9A
                      • Part of subcall function 10011E80: memset.MSVCRT ref: 10011EB0
                      • Part of subcall function 10011E80: Netbios.NETAPI32(00000037), ref: 10011EDB
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$CreateFileNetbiossprintf
                    • String ID:
                    • API String ID: 2265170204-0
                    • Opcode ID: a4332b1645f862f82f7eb4b219ddf43da0a854aa1b97c9327c3544342e36a4f3
                    • Instruction ID: dceb83b943926abd5faf33fd0d5094280e9a27f0c6a434b0c500408138b30427
                    • Opcode Fuzzy Hash: a4332b1645f862f82f7eb4b219ddf43da0a854aa1b97c9327c3544342e36a4f3
                    • Instruction Fuzzy Hash: 99E09A74A04208FBCB08DBD4ED52B9EB7B8DF00340F1000A9F9056B381DAB2EF009AD4
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 4fce0586221d5b7f2ab32fed1b7aed4802dceffac77cf3fcc1f851374ffc7c6a
                    • Instruction ID: 48dbc91ac08fb344a6ac96d98cd474edb1b2e67bc503a630d425958a5cdb5dd6
                    • Opcode Fuzzy Hash: 4fce0586221d5b7f2ab32fed1b7aed4802dceffac77cf3fcc1f851374ffc7c6a
                    • Instruction Fuzzy Hash: D3D02B30508300BED612B7A98D49C4B7EB6EB50B40F014A2CB1D050263837B00A0E563
                    APIs
                      • Part of subcall function 10005EBA: GetCurrentProcess.KERNEL32(00000028,?), ref: 10005EC6
                      • Part of subcall function 10005EBA: OpenProcessToken.ADVAPI32(00000000), ref: 10005ECD
                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1000D856
                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1000D86A
                    • strrchr.MSVCRT ref: 1000D879
                    • _mbscat.MSVCRT ref: 1000D891
                    • strrchr.MSVCRT ref: 1000D8A2
                      • Part of subcall function 10005EBA: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 10005EE5
                      • Part of subcall function 10005EBA: AdjustTokenPrivileges.KERNELBASE(?,00000000,00000001,00000000,00000000,00000000), ref: 10005F1F
                      • Part of subcall function 10005EBA: CloseHandle.KERNEL32(?), ref: 10005F29
                    • CreateMutexA.KERNEL32(00000000,00000001,M107.163.56.251:6658), ref: 1000D8E2
                    • GetLastError.KERNEL32 ref: 1000D8EE
                    • ReleaseMutex.KERNEL32(?), ref: 1000D916
                    • CloseHandle.KERNEL32(?), ref: 1000D923
                    • ReleaseMutex.KERNEL32(?), ref: 1000D952
                    • CloseHandle.KERNEL32(?), ref: 1000D95F
                    • GetTickCount.KERNEL32 ref: 1000DA2C
                    • srand.MSVCRT ref: 1000DA33
                    • rand.MSVCRT ref: 1000DA3C
                    • rand.MSVCRT ref: 1000DAAA
                    • Sleep.KERNEL32(00000064), ref: 1000DAE5
                    • SetFileAttributesA.KERNEL32(c:\,00000002), ref: 1000DAF4
                    • wsprintfA.USER32 ref: 1000DB0D
                    • _mbscpy.MSVCRT(00000000,c:\), ref: 1000DB24
                      • Part of subcall function 1000D747: GetTickCount.KERNEL32 ref: 1000D75F
                      • Part of subcall function 1000D747: srand.MSVCRT ref: 1000D766
                      • Part of subcall function 1000D747: rand.MSVCRT ref: 1000D76F
                      • Part of subcall function 1000D747: rand.MSVCRT ref: 1000D7BA
                    • _mbscat.MSVCRT ref: 1000DB71
                    • _mbscat.MSVCRT ref: 1000DB87
                      • Part of subcall function 10004DC0: CreateDirectoryA.KERNEL32(?,?), ref: 10004DCB
                    • Sleep.KERNEL32(00000064), ref: 1000DBA2
                    • memset.MSVCRT ref: 1000DBB3
                    • _mbscat.MSVCRT ref: 1000DBD8
                    • _mbscat.MSVCRT ref: 1000DBEE
                    • _mbscat.MSVCRT ref: 1000DC02
                    • MoveFileA.KERNEL32(00000000,00000000), ref: 1000DC18
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMTD ref: 1000DC41
                      • Part of subcall function 1000584F: CreateFileA.KERNEL32(00000080,00000003,00000000,00000000,80000000,00000000,10008E9B,?,10008E9B,00000000,80000000,00000000,00000000,00000003,00000080,00000000), ref: 1000586E
                    • ___crtGetLocaleInfoEx.LIBCMTD ref: 1000DC5C
                      • Part of subcall function 1000556F: SetFilePointer.KERNEL32(?,?,?,?), ref: 10005582
                      • Part of subcall function 10005434: CloseHandle.KERNEL32(10008EDA,?,10008EDA,000000FF), ref: 1000543B
                      • Part of subcall function 10005558: GetModuleFileNameA.KERNEL32(?,?,?), ref: 10005567
                    • rand.MSVCRT ref: 1000DC89
                    • rand.MSVCRT ref: 1000DC9B
                    • rand.MSVCRT ref: 1000DCAD
                    • rand.MSVCRT ref: 1000DCBF
                    • rand.MSVCRT ref: 1000DCD1
                    • rand.MSVCRT ref: 1000DCE3
                    • rand.MSVCRT ref: 1000DCF5
                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000DD32
                      • Part of subcall function 10005BF2: CopyFileA.KERNEL32(?,?,?), ref: 10005C01
                    • Sleep.KERNEL32(00001388), ref: 1000DD55
                    • memset.MSVCRT ref: 1000DD66
                      • Part of subcall function 10005650: 6D1D18A0.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 1000567B
                      • Part of subcall function 10005304: PathFileExistsA.SHLWAPI(10008E68,?,10008E68,00000000,?,?,?), ref: 1000530B
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 1000DDD2
                      • Part of subcall function 10004FB3: ShellExecuteA.SHELL32(?,?,?,?,?,?), ref: 10004FCE
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: rand$File$_mbscat$CloseCreateHandle$ModuleMutexNameSleep$CountMoveProcessReleaseTickTimerToken___crtmemsetsrandstrrchr$AdjustAttributesConcurrency::details::platform::__CopyCurrentDirectoryErrorExecuteExistsFormatInfoLastLocaleLookupOpenPathPointerPrivilegePrivilegesQueueShellTimeValue_mbscpywsprintf
                    • String ID: %s\%c%c%c%c%c%c%c.exe$%s\ReadMe.txt$.txt$123$3ept4x7um2ql1d9vfa08or5nwcihzbkgsyz6$M107.163.56.251:6658$SeDebugPrivilege$SeDebugPrivilege$WinSta0\Default$\ReadMe.txt$c:\$c:\windows\system32$c:\wiseman.exe$c:\wiseman.exe$launch
                    • API String ID: 652726865-1276110213
                    • Opcode ID: 7301c903defd3cd70dc9b3d825b2f00b4d4087626143eb540bbaa64f9a2eb160
                    • Instruction ID: e7302aca530db56d1bf951a45ff3e4a786c1631362df480cdb7b9b2581457961
                    • Opcode Fuzzy Hash: 7301c903defd3cd70dc9b3d825b2f00b4d4087626143eb540bbaa64f9a2eb160
                    • Instruction Fuzzy Hash: 12F1F5B1D00218ABFB20DB60CC96FDA7775EB54301F4045E9F709A6181EBB66B948F61
                    APIs
                    • WSAStartup.WS2_32(00000202,?), ref: 1000729A
                    • socket.WS2_32(00000002,00000002,00000000), ref: 100072A6
                    • socket.WS2_32(00000002,00000002,00000000), ref: 100072B8
                    • htons.WS2_32(00000035), ref: 100072CF
                    • inet_addr.WS2_32(127.0.0.1), ref: 100072E1
                    • htons.WS2_32(00000035), ref: 100072F8
                    • inet_addr.WS2_32(?), ref: 1000730C
                    • bind.WS2_32(?,00000002,00000010), ref: 10007328
                    • ioctlsocket.WS2_32(?,8004667E,00000001), ref: 1000734B
                    • select.WS2_32(00000000,00000000,00000000,00000000,000003E8), ref: 1000741B
                    • WSAGetLastError.WS2_32 ref: 10007430
                    • Sleep.KERNEL32(000003E8), ref: 10007441
                    • memset.MSVCRT ref: 10007464
                    • recvfrom.WS2_32(?,00000000,00000200,00000000,?,00000010), ref: 1000748F
                    • memset.MSVCRT ref: 100074C2
                      • Part of subcall function 1000713B: memset.MSVCRT ref: 10007157
                      • Part of subcall function 1000713B: memcpy.MSVCRT(?,-0000000C,-00000010), ref: 10007171
                      • Part of subcall function 1000713B: strlen.MSVCRT ref: 1000717D
                    • wsprintfA.USER32 ref: 10007513
                    • StrStrIA.SHLWAPI(www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c,00000000), ref: 10007528
                    • StrStrIA.SHLWAPI(00000000,alyac), ref: 10007553
                    • StrStrIA.SHLWAPI(00000000,ahnlab), ref: 10007569
                    • StrStrIA.SHLWAPI(00000000,v3lite), ref: 1000757F
                    • malloc.MSVCRT ref: 10007595
                    • memcpy.MSVCRT(?,00000000,00000002), ref: 100075B4
                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 100075D1
                    • htons.WS2_32(00008180), ref: 100075DE
                    • htons.WS2_32(00008182), ref: 10007602
                    • memcpy.MSVCRT(?,?,00000002), ref: 1000761F
                    • htons.WS2_32(00000001), ref: 10007629
                    • memcpy.MSVCRT(?,?,00000002), ref: 10007646
                    • htons.WS2_32(0000C00C), ref: 10007685
                    • memcpy.MSVCRT(00000000,?,00000002), ref: 100076A2
                    • htons.WS2_32(00000001), ref: 100076BB
                    • memcpy.MSVCRT(00000000,?,00000002), ref: 100076DF
                    • htons.WS2_32(00000001), ref: 100076F8
                    • memcpy.MSVCRT(00000000,?,00000002), ref: 1000771C
                    • htonl.WS2_32(0000007B), ref: 10007735
                    • memcpy.MSVCRT(00000000,?,00000004), ref: 10007758
                    • htons.WS2_32(00000004), ref: 10007771
                    • memcpy.MSVCRT(00000000,?,00000002), ref: 10007795
                    • inet_addr.WS2_32(1002D030), ref: 100077C4
                    • inet_addr.WS2_32(127.0.0.1), ref: 100077D7
                    • memcpy.MSVCRT(00000000,00000000,00000004), ref: 100077FA
                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 1000783F
                    • sendto.WS2_32(?,00000000,00000000,00000000,?,00000010), ref: 10007867
                    • closesocket.WS2_32(?), ref: 10007898
                    • closesocket.WS2_32(?), ref: 100078A5
                    • WSACleanup.WS2_32 ref: 100078AB
                    Strings
                    • 127.0.0.1, xrefs: 100077D2
                    • ahnlab, xrefs: 1000755D
                    • 127.0.0.1, xrefs: 100072DC
                    • %s|, xrefs: 10007507
                    • alyac, xrefs: 10007547
                    • @, xrefs: 100073BE
                    • www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c, xrefs: 10007523
                    • v3lite, xrefs: 10007573
                    • 8.8.8.8, xrefs: 10007261
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memcpy$htons$inet_addr$memset$closesocketsocket$CleanupErrorLastSleepStartupbindhtonlioctlsocketmallocrecvfromselectsendtostrlenwsprintf
                    • String ID: %s|$127.0.0.1$127.0.0.1$8.8.8.8$@$ahnlab$alyac$v3lite$www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c
                    • API String ID: 3038323916-584143555
                    • Opcode ID: ec22ab86a417ae1e4f9f74b60d11c1c3b79606598b03a26890ee4ca86a7e9a34
                    • Instruction ID: 3390842cec86af49ff68c52d0698ecfc573ce0de94bd3180ff3bf18654662f0a
                    • Opcode Fuzzy Hash: ec22ab86a417ae1e4f9f74b60d11c1c3b79606598b03a26890ee4ca86a7e9a34
                    • Instruction Fuzzy Hash: B1025E75D04229ABEB64CB54CC89BE9B7B4FF48300F0045E9E60DA6295D7786B84CF91
                    APIs
                    • _mbscpy.MSVCRT(00000000,%SystemRoot%\System32\svchost.exe -k ), ref: 1000AC15
                    • _mbscat.MSVCRT ref: 1000AC28
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1000AC57
                    • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000010,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000AC9E
                    • GetLastError.KERNEL32 ref: 1000ACB3
                    • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 1000ACD0
                    Strings
                    • %SystemRoot%\System32\svchost.exe -k , xrefs: 1000AC09
                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost, xrefs: 1000AE3B
                    • SYSTEM\CurrentControlSet\Services\%s\Parameters, xrefs: 1000AD6E
                    • ServiceDll, xrefs: 1000ADD8
                    • RegOpenKeyEx(Svchost), xrefs: 1000AE78
                    • RegSetValueEx(Svchost\krnlsrvc), xrefs: 1000AECF
                    • SYSTEM\CurrentControlSet\Services\%s, xrefs: 1000AD01
                    • Description, xrefs: 1000AD42
                    • RegSetValueEx(ServiceDll), xrefs: 1000ADFD
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: OpenService$CreateErrorLastManager_mbscat_mbscpy
                    • String ID: %SystemRoot%\System32\svchost.exe -k $Description$RegOpenKeyEx(Svchost)$RegSetValueEx(ServiceDll)$RegSetValueEx(Svchost\krnlsrvc)$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost$SYSTEM\CurrentControlSet\Services\%s$SYSTEM\CurrentControlSet\Services\%s\Parameters$ServiceDll
                    • API String ID: 3611292957-660433390
                    • Opcode ID: fdd77ce7bfc91025276ee73616ce416ce080ae0130899ba4a85b8e3b0fcc4d2e
                    • Instruction ID: fc4fc097f2df58436204c54070e46900803d4f9edc1039ca72ef93cdf2176969
                    • Opcode Fuzzy Hash: fdd77ce7bfc91025276ee73616ce416ce080ae0130899ba4a85b8e3b0fcc4d2e
                    • Instruction Fuzzy Hash: 51A11EB5900218BBEB25DF90DC89FEE7778EB48740F504598F609A6281D774AA85CFA0
                    APIs
                    • memset.MSVCRT ref: 1000A00F
                    • wsprintfA.USER32 ref: 1000A027
                    • 6D0A2DD0.MFC42(0007D000), ref: 1000A035
                    • memset.MSVCRT ref: 1000A063
                      • Part of subcall function 10004D54: InternetOpenA.WININET(10009786,?,?,?,?), ref: 10004D6B
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 1000A0C6
                    Strings
                    • http://blog.sina.com.cn/u/%s, xrefs: 1000A01B
                    • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0), xrefs: 1000A07D
                    • title, xrefs: 1000A2BA
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$FormatInternetOpenTime___crtwsprintf
                    • String ID: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)$http://blog.sina.com.cn/u/%s$title
                    • API String ID: 1034901129-1204782975
                    • Opcode ID: 3a740cdc77181d912b1d27acf29a4a7927c5009d8da5c6244464c31014a86b1d
                    • Instruction ID: e515f712fb1f60d133b8907fa9568e81727eaea72b4f5efa335cc261a660f667
                    • Opcode Fuzzy Hash: 3a740cdc77181d912b1d27acf29a4a7927c5009d8da5c6244464c31014a86b1d
                    • Instruction Fuzzy Hash: F4E117B4D00268EFEB24CB58CC85BDEB7B0EB59300F1042D9EA09A7280DB756E85CF51
                    APIs
                    • memset.MSVCRT ref: 10009AC7
                    • wsprintfA.USER32 ref: 10009ADF
                    • 6D0A2DD0.MFC42(0007D000), ref: 10009AED
                    • memset.MSVCRT ref: 10009B1B
                      • Part of subcall function 10004D54: InternetOpenA.WININET(10009786,?,?,?,?), ref: 10004D6B
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 10009B7E
                    • GetLastError.KERNEL32 ref: 10009BA1
                    Strings
                    • http://%s.qzone.qq.com/main, xrefs: 10009AD3
                    • Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C)), xrefs: 10009B35
                    • title, xrefs: 10009D7E
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$ErrorFormatInternetLastOpenTime___crtwsprintf
                    • String ID: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C))$http://%s.qzone.qq.com/main$title
                    • API String ID: 1425117833-1009673476
                    • Opcode ID: af9113cb4ffbc33ea8bf1112b4c272e1fff90eb52ab290953b684fcac90727f6
                    • Instruction ID: 75add62b751d2a89d33563ab18894b4b61e0b6b77b5213ad1a6e48b09e06675d
                    • Opcode Fuzzy Hash: af9113cb4ffbc33ea8bf1112b4c272e1fff90eb52ab290953b684fcac90727f6
                    • Instruction Fuzzy Hash: 6DE106B4D04268EFEB24CB64CC85BEEB7B4EB59300F1041D9E609A7280DB716E85CF91
                    APIs
                    • GetProcessHeap.KERNEL32 ref: 1000634F
                      • Part of subcall function 100060BF: CreateFileA.KERNEL32(NUL,80000000,00000000,00000000,00000003,00000000,00000000), ref: 100060DE
                      • Part of subcall function 10005F3C: GetProcessHeap.KERNEL32(00000000,00008000), ref: 10005F4F
                      • Part of subcall function 10005F3C: RtlAllocateHeap.KERNEL32(00000000), ref: 10005F56
                    • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 100063BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Heap$Process$AllocateCreateFileFree
                    • String ID: Close Files Handle....Failure$Close Files Handle....Success$Handle: %d .... FileName: %s$Not found File %s $Not found File: %s $Process:%d Handle: %d ..%s.. FileName: %s$c:\am.log$c:\am.log$c:\am.log
                    • API String ID: 630072122-2461064422
                    • Opcode ID: 8e7af692e5636329d27fc5280d86b7502ef07358887e39e27f5fa48402cf5d40
                    • Instruction ID: 645c5e70bbac33feba3ad968f02ee579f9001a7514e99284e2577437101ece5e
                    • Opcode Fuzzy Hash: 8e7af692e5636329d27fc5280d86b7502ef07358887e39e27f5fa48402cf5d40
                    • Instruction Fuzzy Hash: 63C141B4900228AFEB24CB54CC86FD9B3B5EB58344F2085D8F609A7245DB75AED5CF90
                    APIs
                      • Part of subcall function 10004D54: InternetOpenA.WININET(10009786,?,?,?,?), ref: 10004D6B
                    • ___crtGetTimeFormatEx.LIBCMTD ref: 10009517
                      • Part of subcall function 10004D73: InternetOpenUrlA.WININET(80000100,00000000,00000000,1000C5CB,00000000,100097B8), ref: 10004D8E
                    • memset.MSVCRT ref: 1000953C
                    • ___crtGetLocaleInfoEx.LIBCMTD ref: 1000955E
                      • Part of subcall function 10004D96: InternetReadFile.WININET(00000400,?,00000000,100096E3), ref: 10004DA9
                      • Part of subcall function 10004DB1: InternetCloseHandle.WININET(100097ED), ref: 10004DB8
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Internet$Open___crt$CloseFileFormatHandleInfoLocaleReadTimememset
                    • String ID: $ $ $ $!$P$a$a$a$b$c$d$d$e$e$e$g$http$i$l$n$n$o$p$s$t$y
                    • API String ID: 484075888-3281237192
                    • Opcode ID: 14427c0ed575c54b6491988f781b5c61711229e33d5e049bd773e5419474779d
                    • Instruction ID: 2007758cba872cfcd8f6e98331750ef100b8103267b94e19ec89753a2b5b510a
                    • Opcode Fuzzy Hash: 14427c0ed575c54b6491988f781b5c61711229e33d5e049bd773e5419474779d
                    • Instruction Fuzzy Hash: 10413174D043C8EAFB11C6A8CC097DEBEB55B15744F0440D9D5882A282D7FA5798CBB6
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CountTick$Sleep$DeleteFile
                    • String ID: %c%c%c%c%c$%s\%c%c%c%c.%c%c%c$C:\Users\user\Desktop$InstallPath$QVNEU3ZjLmV4ZQ==$QVlSVFNydi5heWU=$RootDir$U09GVFdBUkVcQWhuTGFiXFYzTGl0ZQ==$U09GVFdBUkVcRVNUc29mdFxBTFlhYw==
                    • API String ID: 1805227871-554697558
                    • Opcode ID: 9afddebed4a4e8b3d803d6ed8e39db65abd5323c4276296a2fe8146688f0c2de
                    • Instruction ID: 6bdac8f9476eec08e9e208a458106ac04ec5b4e33c9511cad80c78820eb665b7
                    • Opcode Fuzzy Hash: 9afddebed4a4e8b3d803d6ed8e39db65abd5323c4276296a2fe8146688f0c2de
                    • Instruction Fuzzy Hash: 5FA1E9F1D00218ABFB15DB60CC85FEE76B6EB88311F4481A9F709B6285DB786B41CB51
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlen
                    • String ID: .txt
                    • API String ID: 39653677-2195685702
                    • Opcode ID: c50e63abc1ed21ce169ad536dfc37e2def676ba547544a4074c9d87b2f1db99d
                    • Instruction ID: da2023ba958a437e8159f0edfaac4ee8086fbd0d10ec377c4abfad880adb4c2a
                    • Opcode Fuzzy Hash: c50e63abc1ed21ce169ad536dfc37e2def676ba547544a4074c9d87b2f1db99d
                    • Instruction Fuzzy Hash: AD71B3B5C04218EBDB25EFA0DC85BEEB7B8FB18341F408599F91996144E735AB84CF60
                    APIs
                    • 6D0A2DD0.MFC42(00000004,?,?,?,?,?,?,?,?,?,?,?,?,1002AF1C,1000850C,?), ref: 10007E36
                    • 6D0A2DD0.MFC42(00000000), ref: 10007E5A
                    • 6D0A2DD0.MFC42(00000000), ref: 10007E8B
                    • strrchr.MSVCRT ref: 10007EA5
                    • strncpy.MSVCRT ref: 10007EBF
                    • strncpy.MSVCRT ref: 10007ED3
                    • GetSystemInfo.KERNEL32(1002AEEC), ref: 10007EE0
                    • GetCurrentProcess.KERNEL32(00000020,XGhvc3RzLmljcw==), ref: 10007EFE
                    • OpenProcessToken.ADVAPI32(00000000), ref: 10007F05
                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,1002AEE4), ref: 10007F16
                    • AdjustTokenPrivileges.ADVAPI32(76684758,00000000,00000001,00000010,00000000,00000000), ref: 10007F46
                    • CloseHandle.KERNEL32(76684758), ref: 10007F50
                    • strlen.MSVCRT ref: 10007F5B
                    • sscanf.MSVCRT ref: 10007F7C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ProcessTokenstrncpy$AdjustCloseCurrentHandleInfoLookupOpenPrivilegePrivilegesSystemValuesscanfstrlenstrrchr
                    • String ID: %[^$C:\Users\user\Desktop$SeDebugPrivilege$XGhvc3RzLmljcw==$etc\hosts
                    • API String ID: 285331769-3253940848
                    • Opcode ID: 5f626aa0109f6a187cd01f2752b3015fd619207408557f4039e5b680fe75abb7
                    • Instruction ID: 328226fcebd27085c81d03e9fdf447683c520cb5a300c2c2c943bb7813867aca
                    • Opcode Fuzzy Hash: 5f626aa0109f6a187cd01f2752b3015fd619207408557f4039e5b680fe75abb7
                    • Instruction Fuzzy Hash: ED4118B5900628AFE704DFD4DDC9F9A7BB4FB48304F244119EA04A7290E7B5B586CF91
                    APIs
                    • memset.MSVCRT ref: 10008CA2
                    • GetVersionExA.KERNEL32(0000009C), ref: 10008CBB
                    • _mbscpy.MSVCRT(00000000,1002A5F8), ref: 10008CDD
                    • _mbscpy.MSVCRT(00000000,2000), ref: 10008D0A
                    • _mbscpy.MSVCRT(00000000,1002A604), ref: 10008D37
                    • _mbscpy.MSVCRT(00000000,2003), ref: 10008D64
                    • _mbscpy.MSVCRT(00000000,Vista), ref: 10008D91
                    • _mbscpy.MSVCRT(00000000,2008), ref: 10008DBE
                    • _mbscpy.MSVCRT(00000000,1002A620), ref: 10008DEB
                    • sprintf.MSVCRT ref: 10008E0F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscpy$Versionmemsetsprintf
                    • String ID: 2000$2003$2008$Vista$Win %s SP%d
                    • API String ID: 3885147864-2264339393
                    • Opcode ID: b0dda3c9e9704149881d6b70f2d4795d212c9c5038a049737117f2f39d285b42
                    • Instruction ID: 77eacedbfa7f7fe8781faf61d33db6b13d9c70aa213e0c00e07d5b6916aea476
                    • Opcode Fuzzy Hash: b0dda3c9e9704149881d6b70f2d4795d212c9c5038a049737117f2f39d285b42
                    • Instruction Fuzzy Hash: 5F414CB5C00259EBEF24CB50EC4ABCDB7B4FB25345F4085EAE28862185DB755BC88F91
                    APIs
                    • memcpy.MSVCRT(?,?,0000012C), ref: 100186C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memcpy
                    • String ID: /../$/..\$\../$\..\
                    • API String ID: 3510742995-3885502717
                    • Opcode ID: 0099583ec3371849467ec9f54275ff051e44303e4fe799d6f4060d47469dad51
                    • Instruction ID: 9a1aa32fb16f76f9e15c91fcc0f4f4f6e0de75efd59efe9036ad9dbbfd9191c7
                    • Opcode Fuzzy Hash: 0099583ec3371849467ec9f54275ff051e44303e4fe799d6f4060d47469dad51
                    • Instruction Fuzzy Hash: 84521C74E042199FDB29CF68C895BDDB7B1FF49304F2481A9E959AB342D731AA81CF40
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlen
                    • String ID:
                    • API String ID: 39653677-0
                    • Opcode ID: 977d6aa2a66cf02e5eb0b43c96ef48471811bab0f4bc719f0e4928a6bb009116
                    • Instruction ID: 926a6b6b4829fdad5a48eee5d06f223062afaab11e92024be4e075249e096e26
                    • Opcode Fuzzy Hash: 977d6aa2a66cf02e5eb0b43c96ef48471811bab0f4bc719f0e4928a6bb009116
                    • Instruction Fuzzy Hash: B5619EB2C00298ABEB24CFA0DC85BEEB7B8FB04341F108599F519A2154D7359F84CFA0
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000D3E9
                    • Process32First.KERNEL32(00000000,00000128), ref: 1000D410
                    • lstrcmpiA.KERNEL32(?,ASDsvc.exe), ref: 1000D42A
                    • lstrcmpiA.KERNEL32(?,V3Lite.exe), ref: 1000D440
                    • DebugActiveProcess.KERNEL32(?), ref: 1000D451
                    • GetLastError.KERNEL32 ref: 1000D45B
                    • Process32Next.KERNEL32(00000000,00000128), ref: 1000D486
                    • CloseHandle.KERNEL32(00000000,00000002,00000000), ref: 1000D494
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Process32lstrcmpi$ActiveCloseCreateDebugErrorFirstHandleLastNextProcessSnapshotToolhelp32
                    • String ID: ASDsvc.exe$Name:%s,Err:%d$V3Lite.exe$c:\11.txt
                    • API String ID: 608465442-3371721576
                    • Opcode ID: 35caabe66487620923f73dc6bcef029880f2a6989d30a686548ce9d832097881
                    • Instruction ID: a3de1c484c0ff0f41d4c4eb311ab122c9ab8193aeb8075ee7d44cccd805fc309
                    • Opcode Fuzzy Hash: 35caabe66487620923f73dc6bcef029880f2a6989d30a686548ce9d832097881
                    • Instruction Fuzzy Hash: 30113D75D00218BBEB10EFA1CC85BDEB7B8EB48344F908999E215A2145D774AA85CF61
                    APIs
                    • _mbscpy.MSVCRT(00000000,?,?), ref: 10006DFE
                    • _mbscat.MSVCRT ref: 10006E12
                    • FindFirstFileA.KERNEL32(00000000,?,?,?,?,?), ref: 10006E28
                    • wsprintfA.USER32 ref: 10006E79
                    • strlen.MSVCRT ref: 10006E86
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 10006F72
                    • FindClose.KERNEL32(000000FF,?,?,?,?), ref: 10006F87
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Find$File$CloseFirstNext_mbscat_mbscpystrlenwsprintf
                    • String ID: %s\%s$\*.*
                    • API String ID: 1837839071-3247893053
                    • Opcode ID: e5535df46834fc9ddb26b1ccfc2d17500088a23ab9259e3a8e010982974df7e8
                    • Instruction ID: 2440652bd15ff8e6eaa9a308958dcc277bfe13f4e468759e469709181464b455
                    • Opcode Fuzzy Hash: e5535df46834fc9ddb26b1ccfc2d17500088a23ab9259e3a8e010982974df7e8
                    • Instruction Fuzzy Hash: 9E51AAF6900258ABDB14CB94DC84BEE73B9EB58301F1045E9F609A7245DB35AB88CF54
                    APIs
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1000AAD3
                    • OpenServiceA.ADVAPI32(00000000,00000000,000F01FF), ref: 1000AAF3
                    • ChangeServiceConfigA.ADVAPI32(00000000,000000FF,00000002,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000AB1E
                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 1000AB2C
                    • GetLastError.KERNEL32 ref: 1000AB36
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 1000AB4C
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 1000AB56
                    • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1000AB6B
                    • Sleep.KERNEL32(00000064), ref: 1000AB7D
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 1000AB8D
                    • CloseServiceHandle.ADVAPI32(00000000), ref: 1000AB97
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Service$CloseHandle$Open$ChangeConfigErrorLastManagerQuerySleepStartStatus
                    • String ID:
                    • API String ID: 3874167810-0
                    • Opcode ID: bba6f238baaf9cca25ab09d3ce2342ec4a8b6771aa0e50b5acd3a6fe71a3f31a
                    • Instruction ID: f423053ba5e51ed5b3dfd7871e9b23df293113642488d2f777d942f78633b468
                    • Opcode Fuzzy Hash: bba6f238baaf9cca25ab09d3ce2342ec4a8b6771aa0e50b5acd3a6fe71a3f31a
                    • Instruction Fuzzy Hash: 56214A78A00218FBFB10DBE4CCC8F9D77BAEB09761F200345EA05A6186C7749A81DB24
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Find$File$CloseFirstNext_mbscat_mbscpystrlenwsprintf
                    • String ID: %s\%s$\*.*
                    • API String ID: 1837839071-3247893053
                    • Opcode ID: c99d676474442853c0752dee0b8013e09eef1df9e24bfb4125041fcdc24b46ce
                    • Instruction ID: b1425089a467f23f8ccf7f8da9b04ec626d8d48fdd8cc5af3b7584fd2f615a50
                    • Opcode Fuzzy Hash: c99d676474442853c0752dee0b8013e09eef1df9e24bfb4125041fcdc24b46ce
                    • Instruction Fuzzy Hash: 0A41A9F6900118ABDB14CB94DC80BDE77B9EB58301F2485E9F60997245EB35AB88CF50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memsetstrlen
                    • String ID: Applications\iexplore.exe\shell\open\command$D$wINsTA0\dEFauLT
                    • API String ID: 841943882-2639649127
                    • Opcode ID: 4186b62925d03489557c7d6a744d14cb4d6aa589fb54ac11490702c3d445cf32
                    • Instruction ID: 9d13b316d50dd73b30fc64fb160f47868d1605c9bd796a93d971f2c642a19c96
                    • Opcode Fuzzy Hash: 4186b62925d03489557c7d6a744d14cb4d6aa589fb54ac11490702c3d445cf32
                    • Instruction Fuzzy Hash: 54415DB190025CABEB50CF50CC56BEB73B8EB45341F404588E60967281EBB66B89CF91
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00008000), ref: 10005F4F
                    • RtlAllocateHeap.KERNEL32(00000000), ref: 10005F56
                    • NtQuerySystemInformation.NTDLL(?,00000000,00008000,?), ref: 10005F79
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 10005F91
                    • HeapFree.KERNEL32(00000000), ref: 10005F98
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Heap$Process$AllocateFreeInformationQuerySystem
                    • String ID:
                    • API String ID: 4073547687-0
                    • Opcode ID: fa421480c3af7bdd40bca1bda39b4b7a12526123a1df123442dafb43f0f1f4f4
                    • Instruction ID: 6c64949c2fda0a623aee8140e43d1c032e6d4005dbe1664f83852c3263ea8444
                    • Opcode Fuzzy Hash: fa421480c3af7bdd40bca1bda39b4b7a12526123a1df123442dafb43f0f1f4f4
                    • Instruction Fuzzy Hash: 6B110675D04219FFEB00DBE4C948BAEB7B8FB58342F108968EA1693250D7799A81CB50
                    APIs
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,?,?,?,?,?,1001FCA6), ref: 1001F3BB
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 1001F40D
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: e07356c233d6851d149ce4e661d1cff096aa953cb373bb7e24827da135e15657
                    • Instruction ID: 48a290c9093e3f11dd492f44913f2ca40d6bf3ce9a607d2c265816181fa2b1c7
                    • Opcode Fuzzy Hash: e07356c233d6851d149ce4e661d1cff096aa953cb373bb7e24827da135e15657
                    • Instruction Fuzzy Hash: 4E5194759002099FDB14CFA8C494BDEBBB5BB48304F24C259E825AB391D775E945CFA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: Code too clever$insufficient lookahead$no future$wild scan
                    • API String ID: 0-1205821253
                    • Opcode ID: ffffd7e7bf95b8e76426c5e24294c4b2245091a4e2ce0604e5eb86e537bcc20b
                    • Instruction ID: 833f2951eaadcd835606261b93df60c7d4ef739d43d3d893d275862163d02827
                    • Opcode Fuzzy Hash: ffffd7e7bf95b8e76426c5e24294c4b2245091a4e2ce0604e5eb86e537bcc20b
                    • Instruction Fuzzy Hash: F7D10B74E0414A9FCB08CFA8C8949EEBBF2FF89348F1481A8D459AB345D735AA41CF44
                    Strings
                    • invalid literal/length code, xrefs: 1001572A
                    • invalid distance code, xrefs: 1001554C
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: invalid distance code$invalid literal/length code
                    • API String ID: 0-1393003055
                    • Opcode ID: 0aa14effd66f56fb2ad68d8c3f3fafcd2c43e0f32716675206f0a69f01099257
                    • Instruction ID: 088faa1eed008bce60876dcdc8d515551ea8ecd5600a09dd07154e6a01506fcf
                    • Opcode Fuzzy Hash: 0aa14effd66f56fb2ad68d8c3f3fafcd2c43e0f32716675206f0a69f01099257
                    • Instruction Fuzzy Hash: 60628F74E0520ADFCB08CF98C5909EEBBB2FF88314F248259D815AB355D735AA91CF94
                    Strings
                    • invalid literal/length code, xrefs: 10012626
                    • invalid distance code, xrefs: 100128F2
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: invalid distance code$invalid literal/length code
                    • API String ID: 0-1393003055
                    • Opcode ID: 11cb14a5374e910596fc5b570488d4db04790213d4fb0f1236439e73328b1b47
                    • Instruction ID: 343714719a1f4e9367ad39c9344e86e2aeab645b661284dda1b7cf89b2300665
                    • Opcode Fuzzy Hash: 11cb14a5374e910596fc5b570488d4db04790213d4fb0f1236439e73328b1b47
                    • Instruction Fuzzy Hash: 815254B8A04209DFCB08CF98C59099DBBB2FF8C314B25C599E819AB355D731EA51CF94
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: K
                    • API String ID: 0-856455061
                    • Opcode ID: e160860a9c31c979cddc7bdd37b2469b471d78a0edf540840504c3446d2c6856
                    • Instruction ID: be64ce4ea56ae2ff729ee4095f2c16fd9afa4c64b7be4d3cfcffd6d849276ff5
                    • Opcode Fuzzy Hash: e160860a9c31c979cddc7bdd37b2469b471d78a0edf540840504c3446d2c6856
                    • Instruction Fuzzy Hash: FD325C71A00249AFCB04CF98DC95EEE7B75FF88300F088568F9199F281D675DA68CB95
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: K
                    • API String ID: 0-856455061
                    • Opcode ID: 60322184bcf97f6a5dae0dfbd655d74d096ba38bd0de92ec6cc2b50ddee89e82
                    • Instruction ID: 13cd30b145176b83a50ea1d93efe1898842d2fb191c5ff5e9592714297f69bd4
                    • Opcode Fuzzy Hash: 60322184bcf97f6a5dae0dfbd655d74d096ba38bd0de92ec6cc2b50ddee89e82
                    • Instruction Fuzzy Hash: 16F15B71A00249AFCB04CF98DC95EEE7B75EF88300F08C568F9199F281D675DA64CBA5
                    APIs
                    • CreateProcessAsUserA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?), ref: 10004833
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CreateProcessUser
                    • String ID:
                    • API String ID: 2217836671-0
                    • Opcode ID: 464e50e2d407f37a84752b830f16678c1962b88c0ca6ae523cfa77ff76a35d66
                    • Instruction ID: dada26caca61fb62188d8dac9e18892904bbd52ffffd674216947e8ac7d19412
                    • Opcode Fuzzy Hash: 464e50e2d407f37a84752b830f16678c1962b88c0ca6ae523cfa77ff76a35d66
                    • Instruction Fuzzy Hash: 3FF048B2214109AF8B48CF8DDC90DEB77EEBB8C614B158208FA1DD3250D630E851CBA4
                    APIs
                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?), ref: 10004954
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AllocateInitialize
                    • String ID:
                    • API String ID: 220217950-0
                    • Opcode ID: d31b13ff96311ba46a1ad24a26c0386d19bfbef413bea620b12cb242059160d1
                    • Instruction ID: 90eb217eefec1c1fdc0b769d8b89dca4f8ae21869411f64d3a2a456763029fa7
                    • Opcode Fuzzy Hash: d31b13ff96311ba46a1ad24a26c0386d19bfbef413bea620b12cb242059160d1
                    • Instruction Fuzzy Hash: 72F04EB2214149AF8B48CF9DDC90DEB77EDAF8C614B159248FA1DD3250D630E851CBA4
                    APIs
                    • NtQueryInformationFile.NTDLL ref: 10005FFD
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: FileInformationQuery
                    • String ID:
                    • API String ID: 365787318-0
                    • Opcode ID: bec12c634777ad1a6b1182b89682b362db1a5c5fd4b7de0c20d7e62ffdaf3036
                    • Instruction ID: 577e262fd81ac71086ec76a3c5116955c632cb2abf2027a79d8cb05fcdf68b55
                    • Opcode Fuzzy Hash: bec12c634777ad1a6b1182b89682b362db1a5c5fd4b7de0c20d7e62ffdaf3036
                    • Instruction Fuzzy Hash: F0E01A75A00208BFDB04DF98C881EAFB7B8EB98300F008659FA159B344D670AA10CBD4
                    APIs
                    • CoCreateInstance.OLE32(00000000,10024578,1000FC00,1002B6A0,00000017,?,?,1000FC00,10024578,00000000,00000017), ref: 100114CC
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CreateInstance
                    • String ID:
                    • API String ID: 542301482-0
                    • Opcode ID: 7772389fc6f766d0a30d4ac0d8d1c9d8a4f5184d327a06e7fe100f837938a5ac
                    • Instruction ID: b63ec98ceaf2e436dc9e91b5981eb5a547416335e9ba9d76a1a5ab58316722bb
                    • Opcode Fuzzy Hash: 7772389fc6f766d0a30d4ac0d8d1c9d8a4f5184d327a06e7fe100f837938a5ac
                    • Instruction Fuzzy Hash: 7BD067B651410CBB8B04CFC9ED44CABB7ACEB4C310B50814DBA0897200D635AA109BA5
                    APIs
                    • mouse_event.USER32(?,?,?,?,?), ref: 10004E36
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: mouse_event
                    • String ID:
                    • API String ID: 2434400541-0
                    • Opcode ID: 576c41984f83ec839c8e702e36c6be6a39c5f14811bf847dc41e27320c36a33b
                    • Instruction ID: cd64bc9c04189baa85cc60a7def0010568bcfbf044096a859e3bd7374a512153
                    • Opcode Fuzzy Hash: 576c41984f83ec839c8e702e36c6be6a39c5f14811bf847dc41e27320c36a33b
                    • Instruction Fuzzy Hash: 0DD092B221020DAF8B04CF88D884CDB37ADAB8C610B008108BA0DC3200C630E8518BA5
                    APIs
                    • keybd_event.USER32(?,?,?,?), ref: 10004E17
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: keybd_event
                    • String ID:
                    • API String ID: 2665452162-0
                    • Opcode ID: 617cf7db5e6915c2b0c508f8c4f4d4cff8d0390f3248ef858c4897d067470bbb
                    • Instruction ID: f831d9c8cafff6064600b4124d045f46117a7ffc6ffe7c2727ae22ba67f01528
                    • Opcode Fuzzy Hash: 617cf7db5e6915c2b0c508f8c4f4d4cff8d0390f3248ef858c4897d067470bbb
                    • Instruction Fuzzy Hash: 93D0127600428D7BCF00CFD89C54CEB7BAC5A4C600B048044FA5CC7201C531E410C771
                    APIs
                    • ExitWindowsEx.USER32(?,?), ref: 10005243
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ExitWindows
                    • String ID:
                    • API String ID: 1089080001-0
                    • Opcode ID: 64bf6e278748b00d013a4a32cba81ad4439a5278214464d1529addb699a4a940
                    • Instruction ID: 9a2dd19b8ecf135439890cac36e4a679dfc02a0ed1c5e43b286b51b805b47a2f
                    • Opcode Fuzzy Hash: 64bf6e278748b00d013a4a32cba81ad4439a5278214464d1529addb699a4a940
                    • Instruction Fuzzy Hash: 52B0927611030CABCB04DFD8DC88CAA37ACAB8CA10B108004FA0D87240CA31F9408BA0
                    APIs
                    • GetLogicalDriveStringsA.KERNEL32(?,?), ref: 100057F7
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: DriveLogicalStrings
                    • String ID:
                    • API String ID: 2022863570-0
                    • Opcode ID: 70eb22c1a6d00f12bff02f03e2fe177aff5227be570b8c2aa0d73f05c82624e2
                    • Instruction ID: 3f99846e5fc03f1cd515f911f6ea334dcbd29f04822414012a5ac230d652ecea
                    • Opcode Fuzzy Hash: 70eb22c1a6d00f12bff02f03e2fe177aff5227be570b8c2aa0d73f05c82624e2
                    • Instruction Fuzzy Hash: A9B0927611030CABCB04DFD9DC84C9A37ECAB8CA10B108004FA0D87200CA31F9008BA0
                    APIs
                    • FindFirstFileA.KERNEL32(?,?), ref: 100058B7
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: FileFindFirst
                    • String ID:
                    • API String ID: 1974802433-0
                    • Opcode ID: 5eca5d366489734a7a21f4d98dc6090169ca2d963cdcb69d61f098a501044c64
                    • Instruction ID: 1268fd6e3a6fee96902ddf7f8e53f7d66be35c16e869bb3695433d0dc63322dc
                    • Opcode Fuzzy Hash: 5eca5d366489734a7a21f4d98dc6090169ca2d963cdcb69d61f098a501044c64
                    • Instruction Fuzzy Hash: 9EB0927611020CABCB18DFDCD884C9A37ECAB8C610B008104FA0D87200CA31F9008BA0
                    APIs
                    • ClearEventLogA.ADVAPI32(?,?), ref: 10005BEA
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ClearEvent
                    • String ID:
                    • API String ID: 3812438431-0
                    • Opcode ID: f203eab47a70755c18356ac29cbe419ab6d8e40207529b9c0f8b96ed8d86fdbd
                    • Instruction ID: 7434daefe77f6d47902705726ab8f34eda02ab0099602c090bfecb55a22fb0ef
                    • Opcode Fuzzy Hash: f203eab47a70755c18356ac29cbe419ab6d8e40207529b9c0f8b96ed8d86fdbd
                    • Instruction Fuzzy Hash: B2B092B611420CABCB04DFD8D894C9A37ACFB4C614B008005FA0D87200CB31F9008BA0
                    APIs
                    • SetClipboardData.USER32(?,?), ref: 10004E99
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ClipboardData
                    • String ID:
                    • API String ID: 2952336681-0
                    • Opcode ID: 4c2d815dfbc7fdf501c1777dd6ba7af959ca3632ae183eae8b59a95046527fde
                    • Instruction ID: 00ad4f47f5e7d0ee9b57b808d9b7f0335e52eb5749179ceb83dcd797ee5f95d7
                    • Opcode Fuzzy Hash: 4c2d815dfbc7fdf501c1777dd6ba7af959ca3632ae183eae8b59a95046527fde
                    • Instruction Fuzzy Hash: DFB092B612160CABEB04DFE8D888C9AB7ACAB4C610B008004FA1D87201CA32F940CBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: LockResource
                    • String ID:
                    • API String ID: 1236514755-0
                    • Opcode ID: 3e749300ccbe693ec0575a7745bab84133156a24157107f0119aad3db2aee462
                    • Instruction ID: 29e56bc91a9f9482983e27dc0ed5834eb45bd4535224dddbaac4bf5a93215658
                    • Opcode Fuzzy Hash: 3e749300ccbe693ec0575a7745bab84133156a24157107f0119aad3db2aee462
                    • Instruction Fuzzy Hash: EBB0123100030C97CA009BD8DC4CC95379C96089007100000F50C83500C634F4004690
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ClipboardOpen
                    • String ID:
                    • API String ID: 2793039342-0
                    • Opcode ID: 85cc18af20efb0ed10210da83868dc610a483086dbafa3db3a232c30decd0897
                    • Instruction ID: 7efb55d811d09cfa6076e2c53c0765dc55be4d0596901329b8c6f4113f5758ef
                    • Opcode Fuzzy Hash: 85cc18af20efb0ed10210da83868dc610a483086dbafa3db3a232c30decd0897
                    • Instruction Fuzzy Hash: 75B0123140030C9BCB006BD8D848C8537DCA6085007404000F50C83500CB30F40046D4
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 10005591
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 843600b42da012a431e407c697183c3c11a9610a4af2eca6a13b9f1dd00dca83
                    • Instruction ID: 3446f4351d0fb0315f265c1257496f9b218a963c1e1e8a386bbfb0b0138b3b89
                    • Opcode Fuzzy Hash: 843600b42da012a431e407c697183c3c11a9610a4af2eca6a13b9f1dd00dca83
                    • Instruction Fuzzy Hash: EEB0123100030C97DA005BD8D848C8577DC96086047008001F60CC3101CA30F8014690
                    APIs
                    • GetAsyncKeyState.USER32(?), ref: 1000478F
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AsyncState
                    • String ID:
                    • API String ID: 425341421-0
                    • Opcode ID: e94d98daf5c05d8a006fec42e0e7a589988ec3f17d50f2351a5b76225d7a0502
                    • Instruction ID: 941f2af9b74db5ebe652a3bc5d90ee6d32c6752af74bb884e1b1cde712639612
                    • Opcode Fuzzy Hash: e94d98daf5c05d8a006fec42e0e7a589988ec3f17d50f2351a5b76225d7a0502
                    • Instruction Fuzzy Hash: 80B0123100030C97CF005FE8D84CC85379CA6085007100500F50C83100C630F40046D0
                    APIs
                    • DeleteService.ADVAPI32(?), ref: 100059A7
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: DeleteService
                    • String ID:
                    • API String ID: 700001626-0
                    • Opcode ID: 3d1a12d7d29f744cd41fffeb751ef00794b376a3712858219c07fbdac142c431
                    • Instruction ID: f211721f13ae4b958aaaf00c1e1ea3e1c88187a953ac96f05739ed6fd255fc66
                    • Opcode Fuzzy Hash: 3d1a12d7d29f744cd41fffeb751ef00794b376a3712858219c07fbdac142c431
                    • Instruction Fuzzy Hash: 37B0123100030C97CA005BD8D848C8537DC96485407048010F50C83100CA70F40146A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: BlockInput
                    • String ID:
                    • API String ID: 3456056419-0
                    • Opcode ID: 00cc6d4a9d0643ef7b8e941bdf85a557af0a23005d1557f7ee21463ffd2efe28
                    • Instruction ID: 3baf6831cd208484881523ebff87dae9b7360ad4edd65dec015b26fc2e4f2711
                    • Opcode Fuzzy Hash: 00cc6d4a9d0643ef7b8e941bdf85a557af0a23005d1557f7ee21463ffd2efe28
                    • Instruction Fuzzy Hash: 86B0127100030CA7CB009BD8E84CC85379CB6086047000001F50C83100C730F84046D0
                    APIs
                    • GetClipboardData.USER32(?), ref: 10004F53
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ClipboardData
                    • String ID:
                    • API String ID: 2952336681-0
                    • Opcode ID: b72f90eb1e5c541c96a580534554b9dc2edb15d1cadf9cf10a60f21ae801f786
                    • Instruction ID: 954e834f1d5633d9c78c7ea24322f83793bd12d053b1b78d752a87b4747b0001
                    • Opcode Fuzzy Hash: b72f90eb1e5c541c96a580534554b9dc2edb15d1cadf9cf10a60f21ae801f786
                    • Instruction Fuzzy Hash: 06B0123100030C97CB00DBD8D849C85379CA608544B040400F50D93500C670F40046D1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: K
                    • API String ID: 0-856455061
                    • Opcode ID: 6339895d50acc4890fc2c4bdddf8fcb6dcb411804bfb3ba019924f03f03669d5
                    • Instruction ID: 4821ffda97bad3917eb01a0464c429c8a6cf820fb574935c82d8a63edae2efce
                    • Opcode Fuzzy Hash: 6339895d50acc4890fc2c4bdddf8fcb6dcb411804bfb3ba019924f03f03669d5
                    • Instruction Fuzzy Hash: 25715D31900249AFDB04CF98DC95FEE7B75FF88300F088568FA199B281D675D668CBA5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: bad d_code
                    • API String ID: 0-2582332627
                    • Opcode ID: 6a06471223b183ab37e18c2c26a020a3e59d19169f923bc6492eff2353404475
                    • Instruction ID: 2f6b2f45191638f2ae3ba07ee8899200e8ad8888839ee98c0dc0e920f83f02b8
                    • Opcode Fuzzy Hash: 6a06471223b183ab37e18c2c26a020a3e59d19169f923bc6492eff2353404475
                    • Instruction Fuzzy Hash: 9B71CE75E00549DBCB04CF99C895AEEBBB2FF8C304F148168E909AB345D735AA91CB94
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1b37a6b853c95436d675f261aeeac245198a5dd211321d123e97305fd4e0af68
                    • Instruction ID: 34f3d6fbe751ec779d85210cdb32b2997779c4aff4a46c926cb419fb41892b26
                    • Opcode Fuzzy Hash: 1b37a6b853c95436d675f261aeeac245198a5dd211321d123e97305fd4e0af68
                    • Instruction Fuzzy Hash: 06A15F74E05148EFCB08CF99C590A9DFBF2EF88304F28C1A9E859AB355D631AB51DB44
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6f6452a062c8f2a265baee484629dbee4564c7528d2c0588ec2e65be6e36cc06
                    • Instruction ID: 9283f13a6b71ff4d28867ba0371fcc3830cb864e567d112fffee3ea95ca30d3f
                    • Opcode Fuzzy Hash: 6f6452a062c8f2a265baee484629dbee4564c7528d2c0588ec2e65be6e36cc06
                    • Instruction Fuzzy Hash: 8261F230614549ABDB08CF2DC8916A97BE2EF8D358F55C128E829CF250D739EA91CF80
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f0f08fe30d273b37c940692163cb30ccdee1c039196807b4ec46aa2ae06ebd6c
                    • Instruction ID: 3e186bd40632953d342a1ca4b5c669cc8258e70e124af2b7e38ac243e047a4b5
                    • Opcode Fuzzy Hash: f0f08fe30d273b37c940692163cb30ccdee1c039196807b4ec46aa2ae06ebd6c
                    • Instruction Fuzzy Hash: 35610331610549AFDB08CF2DC891AA97BE2FF8D354F55C128E929CF350D639EA81CB40
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f74d87246cf27b264b773900421c286abf8d9b10f68190272cf576a4a94c4489
                    • Instruction ID: b646244c15df26bb11706b77c13e2002d061b3e9df5792a36ac078930f46edd7
                    • Opcode Fuzzy Hash: f74d87246cf27b264b773900421c286abf8d9b10f68190272cf576a4a94c4489
                    • Instruction Fuzzy Hash: FB51EF38A04149ABCB15CF58C4908EDB7F2FF8C354F25C199E9599B345C630AA92CB80
                    APIs
                    • memset.MSVCRT ref: 1000DE30
                    • memset.MSVCRT ref: 1000DE46
                    • memset.MSVCRT ref: 1000DE5C
                      • Part of subcall function 10005B51: RegOpenKeyExA.KERNEL32(000F003F,00000000,10010261,80000000,1000682F,?,1000682F,80000000,10010261,00000000,000F003F,?,?,?,10010261), ref: 10005B68
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$Open
                    • String ID: $JS0yNHMgJS0xNXMgJXMgXHJcbg==$JS0yNHMgJS0xNXMgJXMgXHJcbg==$JS0yNHMgJS0xNXMgMHgleCglZCkgXHJcbg==$JS0yNHMgJS0xNXMgXHJcbg==$JS0yNHMgJS0xNXMgXHJcbg==$REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ$[%s]
                    • API String ID: 276825008-1418283934
                    • Opcode ID: e69c9a474d398a8b05f591ddfb3d6d06423474bb97eaa632e0af6825814c9152
                    • Instruction ID: 113f87ce97fe6d344733f2fe9a47c20ccde4d7fba6159d7e819c2bc1bb10b482
                    • Opcode Fuzzy Hash: e69c9a474d398a8b05f591ddfb3d6d06423474bb97eaa632e0af6825814c9152
                    • Instruction Fuzzy Hash: C5E153B6D002589BEB14DF90DC85FDE77B8EB48340F404199F609B6284E775AE988FA1
                    APIs
                    • memset.MSVCRT ref: 1000797B
                    • CoInitializeEx.OLE32(00000000,00000000,Win32_process), ref: 10007987
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 1000799F
                    • CoCreateInstance.OLE32(100246B0,00000000,00000001,100245E0,00000000), ref: 100079BE
                      • Part of subcall function 10010360: 6D0A2DD0.MFC42(0000000C), ref: 10010380
                    • CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 10007A54
                    • wcscat.MSVCRT ref: 10007A97
                      • Part of subcall function 100102D0: 6D0A2DD0.MFC42(0000000C,00000000,1002AF20), ref: 100102F0
                    • VariantInit.OLEAUT32(1002AF10), ref: 10007BAD
                    • VariantInit.OLEAUT32(c:\1.txt), ref: 10007BB7
                    • VariantInit.OLEAUT32(1002A718), ref: 10007BC4
                    • _mbscpy.MSVCRT(00000000,00000000,FADB9516), ref: 10007CA5
                    • _strcmpi.MSVCRT ref: 10007CCB
                    • _mbscpy.MSVCRT(00000000,00000000,00000000), ref: 10007D31
                    • StrStrIA.SHLWAPI(100286FC,svchost.exe -k NetworkService), ref: 10007D57
                    • VariantClear.OLEAUT32(1002AF10), ref: 10007D76
                    • VariantClear.OLEAUT32(c:\1.txt), ref: 10007D80
                    • CoUninitialize.OLE32 ref: 10007DC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Variant$Init$ClearInitialize_mbscpy$BlanketCreateInstanceProxySecurityUninitialize_strcmpimemsetwcscat
                    • String ID: 5r455f$CommandLine$Name$ProcessID$SELECT * FROM $WQL$c:\1.txt$cheEntryInfoA$http$svchost.exe$svchost.exe -k NetworkService
                    • API String ID: 56062499-2074608166
                    • Opcode ID: aaf45c52288c47e4c4ac5a154b3a7f6ce62af5da4cf99c67da78fd531393a822
                    • Instruction ID: 189a79c95d12f2324ed77b7531e52b51722813dc0f720325a82f4d3d448fa42a
                    • Opcode Fuzzy Hash: aaf45c52288c47e4c4ac5a154b3a7f6ce62af5da4cf99c67da78fd531393a822
                    • Instruction Fuzzy Hash: D7D11879A01228ABDB24DB64CC89BDDB7F4FB48700F1081D9E119A7290DF75AB85CF90
                    APIs
                    • memcmp.MSVCRT(00000000,00000000,-00000001), ref: 100080CC
                    • wsprintfA.USER32 ref: 1000810B
                      • Part of subcall function 10007F89: _mbscpy.MSVCRT(00000000,www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c,U11dGV4,1002AF1C,10008569,00000000), ref: 10007FBC
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10007FD3
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 10007FFD
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000800E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000801E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000802F
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10008049
                    • wsprintfA.USER32 ref: 1000817F
                    • wsprintfA.USER32 ref: 1000819E
                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 100081B0
                      • Part of subcall function 100067AC: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 100067C8
                      • Part of subcall function 100067AC: strlen.MSVCRT ref: 100067DB
                      • Part of subcall function 100067AC: WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100067EC
                      • Part of subcall function 100067AC: CloseHandle.KERNEL32(656C6261), ref: 100067F6
                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000009,00000000), ref: 100081E7
                    • time.MSVCRT(00000000), ref: 10008208
                    • srand.MSVCRT ref: 10008212
                    • rand.MSVCRT ref: 1000821B
                    • rand.MSVCRT ref: 1000822D
                    • rand.MSVCRT ref: 1000823F
                    • rand.MSVCRT ref: 10008251
                    • rand.MSVCRT ref: 10008263
                    • rand.MSVCRT ref: 10008275
                    • wsprintfA.USER32 ref: 10008293
                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 100082B2
                    • CloseHandle.KERNEL32(?), ref: 100082C5
                    • Sleep.KERNEL32(000003E8), ref: 100082D0
                    • DeleteFileA.KERNEL32(?), ref: 100082DD
                    • memcmp.MSVCRT(00000000,00000000,-00000002), ref: 1000834E
                    Strings
                    • c:\windows\system32\drivers\%s\%s, xrefs: 10008192
                    • c:\windows\system32\drivers\etc\%c%c%c.%c%c%c, xrefs: 10008287
                    • %s\%s, xrefs: 100080FF
                    • c:\windows\system32\drivers\%s, xrefs: 10008173
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: rand$File_mbscatwsprintf$Create$CloseHandleWritememcmpstrchr$DeleteDirectoryMemoryProcessSleep_mbscpysrandstrlentime
                    • String ID: %s\%s$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s$c:\windows\system32\drivers\etc\%c%c%c.%c%c%c
                    • API String ID: 3843169200-1917988604
                    • Opcode ID: 1491cef888996cd526795351f172c59571ecb1c96255f6ff221f3e58b708ccc6
                    • Instruction ID: 1fc89b949b869141e7d21f023f72e52535fd7918e05709aa5f44e13cd79eb387
                    • Opcode Fuzzy Hash: 1491cef888996cd526795351f172c59571ecb1c96255f6ff221f3e58b708ccc6
                    • Instruction Fuzzy Hash: 8B81A370900218FFEB14CBA8CC85FD9777AFB88304F1485A8E609A7255DB75AB85CF51
                    APIs
                    • memcmp.MSVCRT(00000000,00000000,-00000001), ref: 100080CC
                    • wsprintfA.USER32 ref: 1000810B
                      • Part of subcall function 10007F89: _mbscpy.MSVCRT(00000000,www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c,U11dGV4,1002AF1C,10008569,00000000), ref: 10007FBC
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10007FD3
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 10007FFD
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000800E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000801E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000802F
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10008049
                    • wsprintfA.USER32 ref: 1000817F
                    • wsprintfA.USER32 ref: 1000819E
                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 100081B0
                      • Part of subcall function 100067AC: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 100067C8
                      • Part of subcall function 100067AC: strlen.MSVCRT ref: 100067DB
                      • Part of subcall function 100067AC: WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100067EC
                      • Part of subcall function 100067AC: CloseHandle.KERNEL32(656C6261), ref: 100067F6
                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000009,00000000), ref: 100081E7
                    • time.MSVCRT(00000000), ref: 10008208
                    • srand.MSVCRT ref: 10008212
                    • rand.MSVCRT ref: 1000821B
                    • rand.MSVCRT ref: 1000822D
                    • rand.MSVCRT ref: 1000823F
                    • rand.MSVCRT ref: 10008251
                    • rand.MSVCRT ref: 10008263
                    • rand.MSVCRT ref: 10008275
                    • wsprintfA.USER32 ref: 10008293
                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 100082B2
                    • CloseHandle.KERNEL32(?), ref: 100082C5
                    • Sleep.KERNEL32(000003E8), ref: 100082D0
                    • DeleteFileA.KERNEL32(?), ref: 100082DD
                    Strings
                    • c:\windows\system32\drivers\%s\%s, xrefs: 10008192
                    • c:\windows\system32\drivers\etc\%c%c%c.%c%c%c, xrefs: 10008287
                    • %s\%s, xrefs: 100080FF
                    • c:\windows\system32\drivers\%s, xrefs: 10008173
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: rand$File_mbscatwsprintf$Create$CloseHandleWritestrchr$DeleteDirectoryMemoryProcessSleep_mbscpymemcmpsrandstrlentime
                    • String ID: %s\%s$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s$c:\windows\system32\drivers\etc\%c%c%c.%c%c%c
                    • API String ID: 2821110951-1917988604
                    • Opcode ID: b3a0a7c7159a84962405ee64190d82e482e6a88e6c63d58b1461d50fb48282a3
                    • Instruction ID: 9b1f3f05a2db119796ee803a315ca48c205a346098eddc4b2f03f44ea683e2e5
                    • Opcode Fuzzy Hash: b3a0a7c7159a84962405ee64190d82e482e6a88e6c63d58b1461d50fb48282a3
                    • Instruction Fuzzy Hash: 9C51C370900218BFEB14CBA4CC89FD9777AFB88305F1484A8F309A6291DF796B498F51
                    APIs
                    Strings
                    • Error reading file, xrefs: 10019A42
                    • Caller: can only get memory of a memory zipfile, xrefs: 10019A66
                    • Zip-bug: trying to seek the unseekable, xrefs: 10019A9C
                    • Zip-bug: tried to change mind, but not allowed, xrefs: 10019AAE
                    • Couldn't create/open file, xrefs: 100199FD
                    • Caller: mixing creation and opening of zip, xrefs: 10019A8A
                    • Success, xrefs: 100199E5
                    • File not found in the zipfile, xrefs: 10019A21
                    • Zip-bug: the anticipated size turned out wrong, xrefs: 10019AA5
                    • Zipfile is corrupt or not a zipfile, xrefs: 10019A39
                    • Caller: additions to the zip have already been ended, xrefs: 10019A81
                    • Culdn't duplicate handle, xrefs: 100199F1
                    • Caller: not enough space allocated for memory zipfile, xrefs: 10019A6F
                    • Caller: there was a previous error, xrefs: 10019A78
                    • Error writing to file, xrefs: 10019A15
                    • Failed to allocate memory, xrefs: 10019A09
                    • unknown zip result code, xrefs: 10019852
                    • Zip-bug: internal initialisation not completed, xrefs: 10019A93
                    • Zip-bug: an internal error during flation, xrefs: 10019AB7
                    • Correct password required, xrefs: 10019A4B
                    • Caller: the file had already been partially unzipped, xrefs: 10019A5D
                    • Still more data to unzip, xrefs: 10019A2D
                    • Caller: faulty arguments, xrefs: 10019A54
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlen
                    • String ID: Caller: additions to the zip have already been ended$Caller: can only get memory of a memory zipfile$Caller: faulty arguments$Caller: mixing creation and opening of zip$Caller: not enough space allocated for memory zipfile$Caller: the file had already been partially unzipped$Caller: there was a previous error$Correct password required$Couldn't create/open file$Culdn't duplicate handle$Error reading file$Error writing to file$Failed to allocate memory$File not found in the zipfile$Still more data to unzip$Success$Zip-bug: an internal error during flation$Zip-bug: internal initialisation not completed$Zip-bug: the anticipated size turned out wrong$Zip-bug: tried to change mind, but not allowed$Zip-bug: trying to seek the unseekable$Zipfile is corrupt or not a zipfile$unknown zip result code
                    • API String ID: 39653677-623105054
                    • Opcode ID: 758aca4aa3c28b89c750bf8aad23f8a2e8376273e6f5f691afde7864671419ce
                    • Instruction ID: a83791a1f2fbf65fc3504aa118a75d67dc6fc6344bb7a2db01cb83caf290f6f2
                    • Opcode Fuzzy Hash: 758aca4aa3c28b89c750bf8aad23f8a2e8376273e6f5f691afde7864671419ce
                    • Instruction Fuzzy Hash: 41617770D08659DBDB61CF84D4443EEBAB0FF00345FE0869A99262E254D7B5A6C8DBC3
                    APIs
                    Strings
                    • Still more data to unzip, xrefs: 100209F0
                    • Zip-bug: tried to change mind, but not allowed, xrefs: 10020A65
                    • Caller: the file had already been partially unzipped, xrefs: 10020A14
                    • Success, xrefs: 100209A8
                    • Zip-bug: trying to seek the unseekable, xrefs: 10020A53
                    • Caller: there was a previous error, xrefs: 10020A2F
                    • Zip-bug: the anticipated size turned out wrong, xrefs: 10020A5C
                    • Caller: can only get memory of a memory zipfile, xrefs: 10020A1D
                    • Caller: not enough space allocated for memory zipfile, xrefs: 10020A26
                    • Caller: additions to the zip have already been ended, xrefs: 10020A38
                    • Caller: mixing creation and opening of zip, xrefs: 10020A41
                    • Couldn't create/open file, xrefs: 100209C0
                    • Zipfile is corrupt or not a zipfile, xrefs: 100209F9
                    • Caller: faulty arguments, xrefs: 10020A0B
                    • unknown zip result code, xrefs: 10020822
                    • Culdn't duplicate handle, xrefs: 100209B4
                    • Zip-bug: internal initialisation not completed, xrefs: 10020A4A
                    • File not found in the zipfile, xrefs: 100209E4
                    • Zip-bug: an internal error during flation, xrefs: 10020A6E
                    • Failed to allocate memory, xrefs: 100209CC
                    • Error writing to file, xrefs: 100209D8
                    • Error reading file, xrefs: 10020A02
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlenstrncpy
                    • String ID: Caller: additions to the zip have already been ended$Caller: can only get memory of a memory zipfile$Caller: faulty arguments$Caller: mixing creation and opening of zip$Caller: not enough space allocated for memory zipfile$Caller: the file had already been partially unzipped$Caller: there was a previous error$Couldn't create/open file$Culdn't duplicate handle$Error reading file$Error writing to file$Failed to allocate memory$File not found in the zipfile$Still more data to unzip$Success$Zip-bug: an internal error during flation$Zip-bug: internal initialisation not completed$Zip-bug: the anticipated size turned out wrong$Zip-bug: tried to change mind, but not allowed$Zip-bug: trying to seek the unseekable$Zipfile is corrupt or not a zipfile$unknown zip result code
                    • API String ID: 3366577668-1255542691
                    • Opcode ID: d8374c3ad5f4ebd14834886504741f0533b2edd860437b87c5c23429274d2f67
                    • Instruction ID: ec3a13afa7cd80cc0a229431ce520e6303d2f69214dbb925724a83a4e5159c47
                    • Opcode Fuzzy Hash: d8374c3ad5f4ebd14834886504741f0533b2edd860437b87c5c23429274d2f67
                    • Instruction Fuzzy Hash: BE619B70D0435DEADF61CF90E4447AEB7B2FB04385FE0C65AA81226162C7F54A84DB83
                    APIs
                    • StrStrIA.SHLWAPI(?,cmd.exe), ref: 1000623D
                    • GetCurrentProcessId.KERNEL32 ref: 1000625B
                      • Part of subcall function 10005CE2: _mbscpy.MSVCRT(00000000,00000000), ref: 10005D1A
                      • Part of subcall function 10005CE2: CreateFileA.KERNEL32(?,10000000,00000007,00000000,00000004,00000080,00000000), ref: 10005D95
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CreateCurrentFileProcess_mbscpy
                    • String ID: %s.%d$C:\Windows\6C4DA6FB\svchsot.exe$C:\Windows\6C4DA6FB\svchsot.exe$C:\Windows\6C4DA6FB\svchsot.vir$cmd.exe$cmd.exe$self
                    • API String ID: 121295410-3617494418
                    • Opcode ID: 2cd0d02b9790060a8ae0d77817feb3be9d08b7b95a69bdfdf9f3c30ea61bf2ee
                    • Instruction ID: 11dda13007a575690e2789da7b2ac66cc1117108efdf45987319c1011c6ab237
                    • Opcode Fuzzy Hash: 2cd0d02b9790060a8ae0d77817feb3be9d08b7b95a69bdfdf9f3c30ea61bf2ee
                    • Instruction Fuzzy Hash: 9F21D275900214FBFB00EFF4DC8AF9A3769EF1A351F208054FB0996180DF7296A58BA1
                    APIs
                    • RegOpenKeyA.ADVAPI32(80000002,?,00000000), ref: 1000A9C6
                    • _CxxThrowException.MSVCRT(?,10024C88), ref: 1000A9EB
                    • RegQueryValueExA.ADVAPI32(00000000,DLLPath,00000000,00000002,00000000,00000080), ref: 1000AA0A
                    • _CxxThrowException.MSVCRT(1002E0FC,10024C88), ref: 1000AA2F
                    • StrStrIA.SHLWAPI(00000000,mp3), ref: 1000AA40
                    • lstrlen.KERNEL32(?,00000000), ref: 1000AA50
                    • 6D1D1DA0.KERNEL32(sc stop RemoteAccess,00000000), ref: 1000AA7A
                    • 6D1D1DA0.KERNEL32(sc config RemoteAccess start= auto,00000000), ref: 1000AA87
                    • 6D1D1DA0.KERNEL32(net start RemoteAccess,00000000), ref: 1000AA94
                    • RegCloseKey.ADVAPI32(00000000), ref: 1000AAAD
                    Strings
                    • DLLPath, xrefs: 1000AA5D
                    • sc stop RemoteAccess, xrefs: 1000AA75
                    • sc config RemoteAccess start= auto, xrefs: 1000AA82
                    • mp3, xrefs: 1000AA34
                    • DLLPath, xrefs: 1000AA01
                    • U1lTVEVNXEN1cnJlbnRDb250cm9sU2V0XFNlcnZpY2VzXFJlbW90ZUFjY2Vzc1xSb3V0ZXJNYW5hZ2Vyc1xJcA==, xrefs: 1000A982
                    • net start RemoteAccess, xrefs: 1000AA8F
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ExceptionThrow$CloseOpenQueryValuelstrlen
                    • String ID: DLLPath$DLLPath$U1lTVEVNXEN1cnJlbnRDb250cm9sU2V0XFNlcnZpY2VzXFJlbW90ZUFjY2Vzc1xSb3V0ZXJNYW5hZ2Vyc1xJcA==$mp3$net start RemoteAccess$sc config RemoteAccess start= auto$sc stop RemoteAccess
                    • API String ID: 1704467221-3685978068
                    • Opcode ID: ad9174915639a06eaf530e16f97f94d3facbc0bd19862eabbce3580c61a70436
                    • Instruction ID: 43c9b28ce93485f090b6302de8d1e2f99a1725c96703827c3c982aa9faeb6eb3
                    • Opcode Fuzzy Hash: ad9174915639a06eaf530e16f97f94d3facbc0bd19862eabbce3580c61a70436
                    • Instruction Fuzzy Hash: BA418FB5900218BFEB10DFD4DD89FEEBB78EB49740F504158F205B6281DB785A85CBA1
                    APIs
                    • _mbscpy.MSVCRT(00000000,00000000), ref: 10005D1A
                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 10005D32
                    • strrchr.MSVCRT ref: 10005D41
                    • CreateFileA.KERNEL32(?,10000000,00000007,00000000,00000004,00000080,00000000), ref: 10005D95
                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 10005DBC
                    • time.MSVCRT(00000000), ref: 10005DC4
                    • localtime.MSVCRT(?), ref: 10005DDA
                    • strftime.MSVCRT ref: 10005DF2
                    • vsprintf.MSVCRT ref: 10005E48
                    • sprintf.MSVCRT ref: 10005E75
                    • strlen.MSVCRT ref: 10005E8B
                    • WriteFile.KERNEL32(?,?,00000000,00000000), ref: 10005EA2
                    • CloseHandle.KERNEL32(?), ref: 10005EAF
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleModuleNamePointerWrite_mbscpylocaltimesprintfstrftimestrlenstrrchrtimevsprintf
                    • String ID: %s%s$log.txt
                    • API String ID: 4258924203-1489102009
                    • Opcode ID: c49ee3aaf1ee1162d53095b1f85a859aca8ff1944970cf77330318e6a4c8fa1f
                    • Instruction ID: 4248ec1d1ae275c58dfadc2bb918cf7de6159c9ba061f12476aacb7595d00ccb
                    • Opcode Fuzzy Hash: c49ee3aaf1ee1162d53095b1f85a859aca8ff1944970cf77330318e6a4c8fa1f
                    • Instruction Fuzzy Hash: 29519375D00268EBEB25CB94CC8DBDA7778EB68301F0045D5E709A6280DBB55AC9CF91
                    APIs
                      • Part of subcall function 10007DDE: 6D0A2DD0.MFC42(00000004,?,?,?,?,?,?,?,?,?,?,?,?,1002AF1C,1000850C,?), ref: 10007E36
                      • Part of subcall function 10007DDE: 6D0A2DD0.MFC42(00000000), ref: 10007E5A
                      • Part of subcall function 10007DDE: 6D0A2DD0.MFC42(00000000), ref: 10007E8B
                      • Part of subcall function 10007DDE: strrchr.MSVCRT ref: 10007EA5
                      • Part of subcall function 10007DDE: strncpy.MSVCRT ref: 10007EBF
                      • Part of subcall function 10007DDE: strncpy.MSVCRT ref: 10007ED3
                      • Part of subcall function 10007DDE: GetSystemInfo.KERNEL32(1002AEEC), ref: 10007EE0
                      • Part of subcall function 10007DDE: GetCurrentProcess.KERNEL32(00000020,XGhvc3RzLmljcw==), ref: 10007EFE
                      • Part of subcall function 10007DDE: OpenProcessToken.ADVAPI32(00000000), ref: 10007F05
                      • Part of subcall function 10007DDE: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,1002AEE4), ref: 10007F16
                      • Part of subcall function 10007DDE: AdjustTokenPrivileges.ADVAPI32(76684758,00000000,00000001,00000010,00000000,00000000), ref: 10007F46
                      • Part of subcall function 10007DDE: CloseHandle.KERNEL32(76684758), ref: 10007F50
                      • Part of subcall function 10007DDE: strlen.MSVCRT ref: 10007F5B
                      • Part of subcall function 10007DDE: sscanf.MSVCRT ref: 10007F7C
                    • wsprintfA.USER32 ref: 1000853B
                      • Part of subcall function 10007F89: _mbscpy.MSVCRT(00000000,www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c,U11dGV4,1002AF1C,10008569,00000000), ref: 10007FBC
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10007FD3
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 10007FFD
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000800E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000801E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000802F
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10008049
                    • wsprintfA.USER32 ref: 100085AF
                    • wsprintfA.USER32 ref: 100085CE
                    • CreateDirectoryA.KERNEL32(%s|%s,00000000), ref: 100085E0
                      • Part of subcall function 100067AC: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 100067C8
                      • Part of subcall function 100067AC: strlen.MSVCRT ref: 100067DB
                      • Part of subcall function 100067AC: WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100067EC
                      • Part of subcall function 100067AC: CloseHandle.KERNEL32(656C6261), ref: 100067F6
                      • Part of subcall function 1000793B: memset.MSVCRT ref: 1000797B
                      • Part of subcall function 1000793B: CoInitializeEx.OLE32(00000000,00000000,Win32_process), ref: 10007987
                      • Part of subcall function 1000793B: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 1000799F
                      • Part of subcall function 1000793B: CoCreateInstance.OLE32(100246B0,00000000,00000001,100245E0,00000000), ref: 100079BE
                      • Part of subcall function 1000793B: CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 10007A54
                      • Part of subcall function 1000793B: wcscat.MSVCRT ref: 10007A97
                    • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 1000863A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscat$CreateProcesswsprintf$CloseFileHandleInitializeOpenTokenstrchrstrlenstrncpy$AdjustBlanketCurrentDirectoryInfoInstanceLookupPrivilegePrivilegesProxySecuritySystemValueWrite_mbscpymemsetsscanfstrrchrwcscat
                    • String ID: %s\%s$%s|%s$65r455f$ROOT\CIMv2$Win32_process$ZU11dGV4$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s
                    • API String ID: 2046235666-808396485
                    • Opcode ID: b96300de3a959b6f6867844c2c09bc134bfcc2d97d8e8c2f8824ba90d23407a5
                    • Instruction ID: 0c0eef8aac9374081f6669d655c3be3116369b3939affcc587e91564fd5685db
                    • Opcode Fuzzy Hash: b96300de3a959b6f6867844c2c09bc134bfcc2d97d8e8c2f8824ba90d23407a5
                    • Instruction Fuzzy Hash: 6F41B771900A6CAFEB20CBA8CC89FDA77B5FB84304F1005E4E609B6245DB766BD58F45
                    APIs
                    • LoadLibraryA.KERNEL32(urlmon.dll), ref: 10009348
                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 10009359
                    • GetProcAddress.KERNEL32(?,URLDownloadToCacheFileA), ref: 10009391
                    • GetProcAddress.KERNEL32(?,GetUrlCacheEntryInfoA), ref: 100093A6
                    • 6D0A2DD0.MFC42(00000050), ref: 100093B4
                    • _mbscat.MSVCRT ref: 1000941F
                    • _mbscat.MSVCRT ref: 10009435
                    • _mbscat.MSVCRT ref: 10009449
                    • memset.MSVCRT ref: 10009459
                      • Part of subcall function 10005650: 6D1D18A0.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 1000567B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscat$AddressLibraryLoadProc$memset
                    • String ID: GetUrlCacheEntryInfoA$URLDownloadToCacheFileA$WinSta0\Default$urlmon.dll$wininet.dll
                    • API String ID: 2031231167-1569318151
                    • Opcode ID: f7d6bb5f31c818de67eb5a63dee420d289c95f98f2b932ae06146ede7481fa11
                    • Instruction ID: 81b372d6bc21d2fef04a9a1ddd25012b240df206b743b4629fc927ee19ea9d3e
                    • Opcode Fuzzy Hash: f7d6bb5f31c818de67eb5a63dee420d289c95f98f2b932ae06146ede7481fa11
                    • Instruction Fuzzy Hash: 2031C7B5D042586FEB10CBA0DC85FEFBB74EB18701F5004A5F709A6280DB756A84CF55
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _strcmpi$strstr$strrchr
                    • String ID: .aye$.dll$.exe$.sys$AYLaunch.exe$V3Lite.exe
                    • API String ID: 4200840081-2419393344
                    • Opcode ID: a66008e92193723ad6069ec4cb46ca3f240866ecbfae53507d4d6401f2827d7e
                    • Instruction ID: 466c2cd852741ed10da6fcfff3d329652218b2498b962fc8da7131ac82429ea1
                    • Opcode Fuzzy Hash: a66008e92193723ad6069ec4cb46ca3f240866ecbfae53507d4d6401f2827d7e
                    • Instruction Fuzzy Hash: 4A1173B4900189F7EB10CBA4ED49AAE37A8EF043C6F544164FD05A6205E733EF24C7A1
                    APIs
                    • 6D0A2DD0.MFC42(00080000), ref: 1000C876
                    • memset.MSVCRT ref: 1000C932
                    • Sleep.KERNEL32(000927C0,1002AEE0), ref: 1000C981
                    • strlen.MSVCRT ref: 1000CA1E
                    • wsprintfA.USER32 ref: 1000CA40
                      • Part of subcall function 10007F89: _mbscpy.MSVCRT(00000000,www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c,U11dGV4,1002AF1C,10008569,00000000), ref: 10007FBC
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10007FD3
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 10007FFD
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000800E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000801E
                      • Part of subcall function 10007F89: _mbscat.MSVCRT ref: 1000802F
                      • Part of subcall function 10007F89: strchr.MSVCRT ref: 10008049
                      • Part of subcall function 100067AC: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 100067C8
                      • Part of subcall function 100067AC: strlen.MSVCRT ref: 100067DB
                      • Part of subcall function 100067AC: WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100067EC
                      • Part of subcall function 100067AC: CloseHandle.KERNEL32(656C6261), ref: 100067F6
                    • strcmp.MSVCRT ref: 1000CAC2
                    • Sleep.KERNEL32(000927C0), ref: 1000CAD1
                    • 6D0A2C70.MFC42(?), ref: 1000CAF2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscat$FileSleepstrchrstrlen$CloseCreateHandleWrite_mbscpymemsetstrcmpwsprintf
                    • String ID: c:\1.txt$http://107.163.56.240:18963/main.php$iOffset
                    • API String ID: 2734459437-992998774
                    • Opcode ID: 62c49d23e810b540595c03879687863abd5c18ef2c365e92dfbdf838936c5712
                    • Instruction ID: 38d56a867debf3668477e47f832bb14d7cc83a34d2ec41b954da4208bafbb5ac
                    • Opcode Fuzzy Hash: 62c49d23e810b540595c03879687863abd5c18ef2c365e92dfbdf838936c5712
                    • Instruction Fuzzy Hash: F771AEB5D04218ABEB21CB64CC85BDAB7B5EF59340F1445E8E50CA7242EB35AE84CF51
                    APIs
                    • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,00000000,000F003F,00000000), ref: 1000FA4E
                    • RegQueryInfoKeyA.ADVAPI32(00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 1000FA9C
                    • memset.MSVCRT ref: 1000FAE5
                    • memset.MSVCRT ref: 1000FAFB
                    • RegEnumValueA.ADVAPI32(?,?,?,?,00000000,?,?,?), ref: 1000FB54
                    • StrStrIA.SHLWAPI(?,svchsot.exe), ref: 1000FB6F
                    • RegDeleteValueA.ADVAPI32(?,?), ref: 1000FB87
                    • RegCloseKey.ADVAPI32(00000000), ref: 1000FB99
                    • Sleep.KERNEL32(000493E0), ref: 1000FBA4
                    Strings
                    • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 1000FA44
                    • svchsot.exe, xrefs: 1000FB63
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Valuememset$CloseDeleteEnumInfoOpenQuerySleep
                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run$svchsot.exe
                    • API String ID: 1121228644-2172464104
                    • Opcode ID: 9d00bb194b07a1bb5b771fdc727d592163efcfe6b350b88652163b49e7477233
                    • Instruction ID: c6f70cebfc850f900d70c9a4584eddebb96ea2d54561a80a661612636b8fad89
                    • Opcode Fuzzy Hash: 9d00bb194b07a1bb5b771fdc727d592163efcfe6b350b88652163b49e7477233
                    • Instruction Fuzzy Hash: 87416475A40168ABEB24CB54CD45FD9B3B8FB48740F1081D9E349A6180DBF4AEC8DFA4
                    APIs
                    • 6D0A2DD0.MFC42(00001218), ref: 1000BA9E
                    • WSAStartup.WS2_32(00000202,?), ref: 1000BAC1
                      • Part of subcall function 10004CAD: CreateMutexA.KERNEL32(00000000,00000000,1000BAD5,?,1000BAD5,00000000,00000000,0x5d65r455f), ref: 10004CBC
                      • Part of subcall function 1000535B: GetLastError.KERNEL32(?,1000BAE3), ref: 1000535E
                    • memset.MSVCRT ref: 1000BB06
                      • Part of subcall function 10009FAB: memset.MSVCRT ref: 1000A00F
                      • Part of subcall function 10009FAB: wsprintfA.USER32 ref: 1000A027
                      • Part of subcall function 10009FAB: 6D0A2DD0.MFC42(0007D000), ref: 1000A035
                      • Part of subcall function 10009FAB: memset.MSVCRT ref: 1000A063
                    • Sleep.KERNEL32(0002BF20), ref: 1000BB28
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000B74E,?,00000000,00000000), ref: 1000BB4E
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000BB5D
                    • CloseHandle.KERNEL32(?), ref: 1000BB67
                    • Sleep.KERNEL32(0002BF20), ref: 1000BB72
                    • CloseHandle.KERNEL32(?), ref: 1000BB84
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$CloseCreateHandleSleep$ErrorLastMutexObjectSingleStartupThreadWaitwsprintf
                    • String ID: 0x5d65r455f$5762479093
                    • API String ID: 1532593739-2446933972
                    • Opcode ID: 90b165341638962a43fa45282257a807a34577580cd2d4540be06a2edf098663
                    • Instruction ID: ee4fe3ff80eea35deae1171875856fc337cdd1930f9e5ee3871eb6d0d01d88b9
                    • Opcode Fuzzy Hash: 90b165341638962a43fa45282257a807a34577580cd2d4540be06a2edf098663
                    • Instruction Fuzzy Hash: 922184B5A40214BBF710DBE0CD8BFDD7774EB55741F2041A4FA09962C8DB706A508B96
                    APIs
                    • 6D0A2DD0.MFC42(00001218), ref: 1000BC80
                    • WSAStartup.WS2_32(00000202,?), ref: 1000BCA3
                      • Part of subcall function 10004CAD: CreateMutexA.KERNEL32(00000000,00000000,1000BAD5,?,1000BAD5,00000000,00000000,0x5d65r455f), ref: 10004CBC
                      • Part of subcall function 1000535B: GetLastError.KERNEL32(?,1000BAE3), ref: 1000535E
                    • memset.MSVCRT ref: 1000BCE8
                      • Part of subcall function 10009A63: memset.MSVCRT ref: 10009AC7
                      • Part of subcall function 10009A63: wsprintfA.USER32 ref: 10009ADF
                      • Part of subcall function 10009A63: 6D0A2DD0.MFC42(0007D000), ref: 10009AED
                      • Part of subcall function 10009A63: memset.MSVCRT ref: 10009B1B
                    • Sleep.KERNEL32(0002BF20), ref: 1000BD0A
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000B74E,?,00000000,00000000), ref: 1000BD30
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000BD3F
                    • CloseHandle.KERNEL32(?), ref: 1000BD49
                    • Sleep.KERNEL32(001B7740), ref: 1000BD54
                    • CloseHandle.KERNEL32(?), ref: 1000BD66
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$CloseCreateHandleSleep$ErrorLastMutexObjectSingleStartupThreadWaitwsprintf
                    • String ID: 0x5d65r455f$2073372682
                    • API String ID: 1532593739-3710683282
                    • Opcode ID: 49c9037b9e7f85ad7b75e71d7193d141d6e57ea3cefd491c3a196fbb3dd1ee87
                    • Instruction ID: ec3ba378adc137da86a7fa9cbe3624fdafc09a65b00566f21923adef7c9e2253
                    • Opcode Fuzzy Hash: 49c9037b9e7f85ad7b75e71d7193d141d6e57ea3cefd491c3a196fbb3dd1ee87
                    • Instruction Fuzzy Hash: 93218475A40214BBFB10DFE0CC8AFDD7774EB54741F2041A5F6099A2D5EB706A508B92
                    APIs
                      • Part of subcall function 1000DDEE: memset.MSVCRT ref: 1000DE30
                      • Part of subcall function 1000DDEE: memset.MSVCRT ref: 1000DE46
                      • Part of subcall function 1000DDEE: memset.MSVCRT ref: 1000DE5C
                    • wsprintfA.USER32 ref: 1000F97A
                    • DeleteFileA.KERNEL32(00000000), ref: 1000F98A
                    • memset.MSVCRT ref: 1000F99E
                    • wsprintfA.USER32 ref: 1000F9B9
                    • DeleteFileA.KERNEL32(00000000), ref: 1000F9C9
                    • DeleteFileA.KERNEL32(C:\1.vbs), ref: 1000F9D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memset$DeleteFile$wsprintf
                    • String ID: %s\ASDSvc.exe$%s\V3Lite.exe$C:\1.vbs$InstallPath$U09GVFdBUkVcQWhuTGFiXFYzTGl0ZQ==
                    • API String ID: 1479746147-790033058
                    • Opcode ID: 76510e5ad0f0a7d840a7ac59a9f66772fcdb44f7757913529646aec1d244dc55
                    • Instruction ID: 3f8b95e0ea3bd24813ccbb7ad79f06d8baedde75e715387043a4284ac7343189
                    • Opcode Fuzzy Hash: 76510e5ad0f0a7d840a7ac59a9f66772fcdb44f7757913529646aec1d244dc55
                    • Instruction Fuzzy Hash: A311D6B5810618BBE710D7A4DC89FE6B378EB24300F4001D4F748A6181EBB126D88B91
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s%s$%s%s%s
                    • API String ID: 0-1506711308
                    • Opcode ID: eab33404b238c489d90b1fa0550affde5a457bca50048384b33eff5656b845af
                    • Instruction ID: 7f3d1bd727637aae945e036ecbbf7404439f41d044326d2380a7333964229f50
                    • Opcode Fuzzy Hash: eab33404b238c489d90b1fa0550affde5a457bca50048384b33eff5656b845af
                    • Instruction Fuzzy Hash: 7B0215B4904228DBDB26CF54C984BA9B7B9EB49305F1482D9E81DAB291D730EFC5CF50
                    APIs
                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 1001EAD1
                    • GetFileSize.KERNEL32(?,00000000), ref: 1001EBA0
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 1001EBBD
                    • ReadFile.KERNEL32(?,?,00000002,?,00000000), ref: 1001EBD3
                    • SetFilePointer.KERNEL32(?,00000024,00000000,00000000), ref: 1001EBE3
                    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 1001EBF9
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$PointerRead$HandleInformationSize
                    • String ID: ($PE
                    • API String ID: 2979504256-3347799738
                    • Opcode ID: fe54d1f251eca4ebab7ed7a7db03ff5dc34b9185225e73e372399f2878510901
                    • Instruction ID: a2f518cc74f5bf6d3c6c6775fd81b0518a7a4a596ada43fd48c2c3d5df82ea48
                    • Opcode Fuzzy Hash: fe54d1f251eca4ebab7ed7a7db03ff5dc34b9185225e73e372399f2878510901
                    • Instruction Fuzzy Hash: 27810D71E00248ABEB08CFD4D895BAEB7B5FF88340F148129F515AB294D734E886CF94
                    APIs
                      • Part of subcall function 10006322: GetProcessHeap.KERNEL32 ref: 1000634F
                      • Part of subcall function 100067AC: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 100067C8
                      • Part of subcall function 100067AC: strlen.MSVCRT ref: 100067DB
                      • Part of subcall function 100067AC: WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100067EC
                      • Part of subcall function 100067AC: CloseHandle.KERNEL32(656C6261), ref: 100067F6
                    • CloseHandle.KERNEL32 ref: 1000C6D1
                    • Sleep.KERNEL32(00001388), ref: 1000C6DC
                    • MoveFileExA.KERNEL32(00000000,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000C6EF
                    • CopyFileA.KERNEL32(00000000,?,00000000), ref: 1000C702
                    • DeleteFileA.KERNEL32(00000000), ref: 1000C70F
                    • Sleep.KERNEL32(000003E8), ref: 1000C71A
                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 1000C736
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleSleep$CopyDeleteHeapMoveProcessWritestrlen
                    • String ID: %s\data.db$C:\Users\user\Desktop$hosts
                    • API String ID: 3797919734-538028608
                    • Opcode ID: efc404cb1c36cd2c8ce508b618bdaed85bcec96449d26f1028287ccc5fd69aa9
                    • Instruction ID: f5900b32a1c57befda946730cab26c328d09066f7718e655d8f69fd7b70c79ee
                    • Opcode Fuzzy Hash: efc404cb1c36cd2c8ce508b618bdaed85bcec96449d26f1028287ccc5fd69aa9
                    • Instruction Fuzzy Hash: A421B0B6A00218BBEB14CFA4DC85FCA3769FB58710F104294FB199B1C0DBB1AA85CB50
                    APIs
                    • _mbscpy.MSVCRT(00000000,www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c,U11dGV4,1002AF1C,10008569,00000000), ref: 10007FBC
                    • strchr.MSVCRT ref: 10007FD3
                    • _mbscat.MSVCRT ref: 10007FFD
                    • _mbscat.MSVCRT ref: 1000800E
                    • _mbscat.MSVCRT ref: 1000801E
                    • _mbscat.MSVCRT ref: 1000802F
                    • strchr.MSVCRT ref: 10008049
                    Strings
                    • U11dGV4, xrefs: 10007F96
                    • www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c, xrefs: 10007FB0
                    • , xrefs: 10008005
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbscat$strchr$_mbscpy
                    • String ID: $U11dGV4$www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c
                    • API String ID: 702901625-1239733050
                    • Opcode ID: f326c0bdbb4f28ea7d5a4b7c8fd45c6401bdca4bcea2e6c00a19b61eabe8c604
                    • Instruction ID: 2bc11947cdbfdc4e0e0399083b1b6a46f6613d3c1d050bc1cbc246461a669991
                    • Opcode Fuzzy Hash: f326c0bdbb4f28ea7d5a4b7c8fd45c6401bdca4bcea2e6c00a19b61eabe8c604
                    • Instruction Fuzzy Hash: 91219379D00158ABDB11CFA8ED81BDD7774FB68302F5084A5EA0CA7244D6B5ABD48BA0
                    APIs
                    • 6D0A2DD0.MFC42(00001218), ref: 1000BB9E
                    • WSAStartup.WS2_32(00000202,?), ref: 1000BBC1
                      • Part of subcall function 10004CAD: CreateMutexA.KERNEL32(00000000,00000000,1000BAD5,?,1000BAD5,00000000,00000000,0x5d65r455f), ref: 10004CBC
                      • Part of subcall function 1000535B: GetLastError.KERNEL32(?,1000BAE3), ref: 1000535E
                    • CloseHandle.KERNEL32(?), ref: 1000BC66
                      • Part of subcall function 10009A63: memset.MSVCRT ref: 10009AC7
                      • Part of subcall function 10009A63: wsprintfA.USER32 ref: 10009ADF
                      • Part of subcall function 10009A63: 6D0A2DD0.MFC42(0007D000), ref: 10009AED
                      • Part of subcall function 10009A63: memset.MSVCRT ref: 10009B1B
                    • Sleep.KERNEL32(0002BF20), ref: 1000BC0D
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000B74E,?,00000000,00000000), ref: 1000BC33
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000BC42
                    • CloseHandle.KERNEL32(?), ref: 1000BC4C
                    • Sleep.KERNEL32(0002BF20), ref: 1000BC57
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateHandleSleepmemset$ErrorLastMutexObjectSingleStartupThreadWaitwsprintf
                    • String ID: 0x555dasfas$2963854030
                    • API String ID: 2708768594-3075894505
                    • Opcode ID: 03d7316357d5b6f0b54eb61b3d9c10b62b8007a06574dc34603a28af7f540005
                    • Instruction ID: d84f95eccd45cc1831ea6bca91d576b8e54f65b4ebe8b4c65b06786423185a31
                    • Opcode Fuzzy Hash: 03d7316357d5b6f0b54eb61b3d9c10b62b8007a06574dc34603a28af7f540005
                    • Instruction Fuzzy Hash: DB21B1B5A40214BBFB10DFE0CD8AFDD7775EB55341F2041A4FA099A284DB706A91CB52
                    APIs
                    • strlen.MSVCRT ref: 10010968
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 1001098D
                    • CoCreateInstance.OLE32(100246B0,00000000,00000001,Function_000245E0,?), ref: 100109A8
                      • Part of subcall function 10010360: 6D0A2DD0.MFC42(0000000C), ref: 10010380
                    • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,00000000,ROOT\CIMV2,00000000,00000000,00000000,00000000,00000000), ref: 10010A3B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: BlanketCreateInitializeInstanceProxySecuritystrlen
                    • String ID: WHERE $ROOT\CIMV2$SELECT * FROM $WQL
                    • API String ID: 570563250-2582412207
                    • Opcode ID: 98bf76f53860a594a0a0b1b9da7cabe3198b5f99b835eb4c1d9bb814207d1e67
                    • Instruction ID: 5cbe6ac5fde7eb26dc338a514e816c495378dc4111dc2c4ddae531228331e323
                    • Opcode Fuzzy Hash: 98bf76f53860a594a0a0b1b9da7cabe3198b5f99b835eb4c1d9bb814207d1e67
                    • Instruction Fuzzy Hash: 0EA10874A00249EBDB04CFA4CD95BEEB7B4FF14314F208258F5516B2D2D7B4AA86CB91
                    APIs
                    • ExpandEnvironmentStringsA.KERNEL32(%systemroot%\system32\csrss.exe,?,00000104), ref: 1000D24F
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000208), ref: 1000D288
                    • GetModuleHandleA.KERNEL32(ntdll.dll,NtQueryInformationProcess), ref: 1000D298
                    • GetProcAddress.KERNEL32(00000000), ref: 1000D29F
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000018,?), ref: 1000D2D6
                    • wcscpy.MSVCRT ref: 1000D312
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AddressByteCharCurrentEnvironmentExpandHandleModuleMultiProcProcessStringsWidewcscpy
                    • String ID: %systemroot%\system32\csrss.exe$NtQueryInformationProcess$ntdll.dll
                    • API String ID: 703503636-1587409518
                    • Opcode ID: 5b4e04cc3fdfb721d1f71ff26fba47fb89f303d233a3ec030fd47cff8edf33ff
                    • Instruction ID: d4a10707df85f749384b0f406625ba1c85e5810cd389dcc908323d6700f8676c
                    • Opcode Fuzzy Hash: 5b4e04cc3fdfb721d1f71ff26fba47fb89f303d233a3ec030fd47cff8edf33ff
                    • Instruction Fuzzy Hash: 04212F71910218BFEB65CBA4CC89FDABBB8EB48310F50419AE609E6291DB705B45CF61
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlen$strrchr$DirectoryPath_mbscpy
                    • String ID: 123
                    • API String ID: 2492324655-2286445522
                    • Opcode ID: 6ae7ca9b40b598d48eb85bbcc3ba575c99ff50f77e4743fd11b9f870836d6378
                    • Instruction ID: b10010325145a17280ae543c62f60846424ed8c502da58d9684bb6765ff15b86
                    • Opcode Fuzzy Hash: 6ae7ca9b40b598d48eb85bbcc3ba575c99ff50f77e4743fd11b9f870836d6378
                    • Instruction Fuzzy Hash: 634173FAD00248BBEB14CBA4DC42BDE77B5EF58340F1445A4F9099B241E636EB84CB91
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlen$strrchr$DirectoryPath_mbscpy
                    • String ID: 123
                    • API String ID: 2492324655-2286445522
                    • Opcode ID: 0216acf93dd336674bfca4f255ea5692cfb5bf92b0d8c78ebbaafcd0a2b3642d
                    • Instruction ID: 79c25a0058445eb4a21c39191d2c2c99bec266b48e571f529a8f3a9425a03f32
                    • Opcode Fuzzy Hash: 0216acf93dd336674bfca4f255ea5692cfb5bf92b0d8c78ebbaafcd0a2b3642d
                    • Instruction Fuzzy Hash: E531B8FAD00248BBEB10CBA4DC81ADE77B5EF58340F1445A4F9499B241E776EB848BD1
                    APIs
                    • CreateFileA.KERNEL32(NUL,80000000,00000000,00000000,00000003,00000000,00000000), ref: 100060DE
                    • CloseHandle.KERNEL32(000000FF), ref: 1000610B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateFileHandle
                    • String ID: NUL
                    • API String ID: 3498533004-1038343538
                    • Opcode ID: bacd73ea0e29112e69a3a4bd1fe7e27659f169c8efd550f9f9d80bd28413b36f
                    • Instruction ID: e9d1fb6442f0c914e32f04b904cbdd2044a8a5df72d57b902c957921bdc8d841
                    • Opcode Fuzzy Hash: bacd73ea0e29112e69a3a4bd1fe7e27659f169c8efd550f9f9d80bd28413b36f
                    • Instruction Fuzzy Hash: 7C313D7090022AEBEB10CBE4CC85BEEB7B6FF49344F344554EA117B286C730AA55DB91
                    APIs
                    • lstrlen.KERNEL32(00000000,Rvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1,SELECT * FROM ,1002AEF4,10010494,00000001,00000000,1002AF0C,10010314,00007325), ref: 10021500
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,c:\1.txt,00000001), ref: 10021527
                    • GetLastError.KERNEL32 ref: 10021537
                    • GetLastError.KERNEL32 ref: 1002153D
                    • SysAllocString.OLEAUT32(c:\1.txt), ref: 10021554
                    Strings
                    • SELECT * FROM , xrefs: 100214F5
                    • Rvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1, xrefs: 100214F6
                    • c:\1.txt, xrefs: 10021519, 10021553
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$AllocByteCharMultiStringWidelstrlen
                    • String ID: Rvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1$SELECT * FROM $c:\1.txt
                    • API String ID: 4196186757-3737772539
                    • Opcode ID: 784b38830f32eaa514aa5bd1c42134cdc8b8a0bef03c8b7befdc0e07884de4bc
                    • Instruction ID: 1fe5ed956030cf47e0064620fe093005c6aabeb1075080af0839e4b43014f2e2
                    • Opcode Fuzzy Hash: 784b38830f32eaa514aa5bd1c42134cdc8b8a0bef03c8b7befdc0e07884de4bc
                    • Instruction Fuzzy Hash: 7501F436500526F7E7209BA1DC85FDA3FA8EF613A1FB18031FD09D1090E730956286A1
                    APIs
                      • Part of subcall function 10005EBA: GetCurrentProcess.KERNEL32(00000028,?), ref: 10005EC6
                      • Part of subcall function 10005EBA: OpenProcessToken.ADVAPI32(00000000), ref: 10005ECD
                    • CreateMutexA.KERNEL32(00000000,00000001,Global\98012trt8-d8dfsf), ref: 1000AF86
                    • GetLastError.KERNEL32 ref: 1000AF8F
                    • ReleaseMutex.KERNEL32(?), ref: 1000AFC4
                    • CloseHandle.KERNEL32(?), ref: 1000AFCE
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: MutexProcess$CloseCreateCurrentErrorHandleLastOpenReleaseToken
                    • String ID: ERROR_ALREADY_EXISTS$Global\98012trt8-d8dfsf$SeDebugPrivilege$c:\11.txt
                    • API String ID: 1194210303-4205529783
                    • Opcode ID: 33d6c9e2637d354fe1692b1cfc5d348cc65f7f4e25ac4b6de4792443762265fe
                    • Instruction ID: bda5bf97716bd855d7aa97815c2b0071a65dd76f9c377fc55d067d3e89c7e2b6
                    • Opcode Fuzzy Hash: 33d6c9e2637d354fe1692b1cfc5d348cc65f7f4e25ac4b6de4792443762265fe
                    • Instruction Fuzzy Hash: 8AF0FF74D01309FBEB10DBE0DC89F8D7BB5EB15342F504155F90562251DB755684CB51
                    APIs
                    • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 1000A7E8
                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,0002001F,?), ref: 1000A80A
                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,0002001F,?), ref: 1000A8A2
                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,0002001F,?), ref: 1000A8DC
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Open$Create
                    • String ID:
                    • API String ID: 161609438-0
                    • Opcode ID: 48ce5e50f1d47d1142ff7ebc09636edddc09909f7c68f00c98578799335025ba
                    • Instruction ID: e3d78695a21ea1c89d74b4d509c2f3cee1bcccb682452cc6d6267459aaa28678
                    • Opcode Fuzzy Hash: 48ce5e50f1d47d1142ff7ebc09636edddc09909f7c68f00c98578799335025ba
                    • Instruction Fuzzy Hash: 83512F75A04209EFEB14CF95CC85FEE77B8EB49780F208219FA15A7284D775E981CB60
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000F6DA
                    • Process32First.KERNEL32(00000000,00000128), ref: 1000F701
                    • Process32Next.KERNEL32(00000000,00000128), ref: 1000F716
                    • lstrcmpiA.KERNEL32(00000000,?), ref: 1000F733
                    • wsprintfA.USER32 ref: 1000F77C
                    • CloseHandle.KERNEL32(00000000,00000000,00000128,00000002,00000000), ref: 1000F7F2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpiwsprintf
                    • String ID: pid_%d
                    • API String ID: 4001055788-1598735649
                    • Opcode ID: 7f93a367622f754b37ce18e9f8067485a0730c2609bd782d80c9590e221b1374
                    • Instruction ID: c9d53c2518a1c93e9c5bb71c043409e6e03239473161a3a160f8e14674c82ed7
                    • Opcode Fuzzy Hash: 7f93a367622f754b37ce18e9f8067485a0730c2609bd782d80c9590e221b1374
                    • Instruction Fuzzy Hash: 68314AB5C05218EBEB60DFA4CC85BEDB7B4EF08340F1044EAE50DA6255E6746B84DF52
                    APIs
                    • wcslen.MSVCRT ref: 10021576
                    • 6D0A2DD0.MFC42(00000002,100112AB,lNlcnZpY2VB,SELECT * FROM ,1002AF18,?,100105BB,?,?,1002AF20,100112AB), ref: 10021580
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,100112AB,000000FF,00000000,00000002,00000000,00000000,lNlcnZpY2VB,SELECT * FROM ,1002AF18,?,100105BB,?,?,1002AF20), ref: 100215A2
                    • GetLastError.KERNEL32(?,100105BB,?,?,1002AF20,100112AB), ref: 100215B2
                    • GetLastError.KERNEL32(?,100105BB,?,?,1002AF20,100112AB), ref: 100215B8
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$ByteCharMultiWidewcslen
                    • String ID: SELECT * FROM $lNlcnZpY2VB
                    • API String ID: 4237787585-3054530141
                    • Opcode ID: 63f7333e0d43ac2b533deb2593a2b329c250af2fae36de4d399b6129c952f325
                    • Instruction ID: f102809e0f6523f15fafc923be23898a7ca290de0f5e000ccec9650aaf4368e9
                    • Opcode Fuzzy Hash: 63f7333e0d43ac2b533deb2593a2b329c250af2fae36de4d399b6129c952f325
                    • Instruction Fuzzy Hash: 4FF0286A20427ABD9210A6726C84DBBBACCDEE12F47E2467AF515D2041D815AC0181F0
                    APIs
                    • strlen.MSVCRT ref: 1001E8B8
                      • Part of subcall function 10020E70: _mbsicmp.MSVCRT ref: 10020E7B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: _mbsicmpstrlen
                    • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                    • API String ID: 374816253-51310709
                    • Opcode ID: f4bf0dd4d1edf962b3c713ab39717860004c21d73e0f3ba02671baab590c8203
                    • Instruction ID: a7750ba6201be3bd96256ed1aa53058d6e7dfdb32adcc3c4209802cf8e7f6fb8
                    • Opcode Fuzzy Hash: f4bf0dd4d1edf962b3c713ab39717860004c21d73e0f3ba02671baab590c8203
                    • Instruction Fuzzy Hash: D3317579D04289F7CF44CAE0AD8199D73A6EB12385F604865FD049F201E632FF80BBA5
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 1000FBDA
                      • Part of subcall function 100114B0: CoCreateInstance.OLE32(00000000,10024578,1000FC00,1002B6A0,00000017,?,?,1000FC00,10024578,00000000,00000017), ref: 100114CC
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CreateInitializeInstance
                    • String ID: HTTP$kbstar
                    • API String ID: 3519745914-2680672251
                    • Opcode ID: c055f2331def5bf038289990834060b95847416c0c95277ab3e019e8c3a3d24e
                    • Instruction ID: c3a8321b607e1ec655a761ab1389a6ee785db716c21e47efde926ca263a9be4b
                    • Opcode Fuzzy Hash: c055f2331def5bf038289990834060b95847416c0c95277ab3e019e8c3a3d24e
                    • Instruction Fuzzy Hash: 63A11574D00648DFDB08DFA4C995BEDBBB1FF58344F20815CE412AB292EB34AA45DB91
                    APIs
                    • 6D0A2DD0.MFC42(00000001), ref: 100083C5
                    • VirtualQueryEx.KERNEL32(00000000,?,?,0000001C), ref: 10008408
                    • 6D0A2C70.MFC42(?), ref: 1000845B
                    • 6D0A2DD0.MFC42(00000001), ref: 1000846D
                    • ReadProcessMemory.KERNEL32(00000000,?,?,?,00000000), ref: 10008493
                    • 6D0A2C70.MFC42(?), ref: 100084D5
                    • CloseHandle.KERNEL32(00000000), ref: 100084EA
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CloseHandleMemoryProcessQueryReadVirtual
                    • String ID:
                    • API String ID: 1621033003-0
                    • Opcode ID: 347ac2dea0020b9146714a751a7a70b8fc7e73d781759a0550e63cebdd0eeda4
                    • Instruction ID: 4ce35375b4bad31ba0a910ff1afeab1654858517ab5a746a47daf2776de4f8ea
                    • Opcode Fuzzy Hash: 347ac2dea0020b9146714a751a7a70b8fc7e73d781759a0550e63cebdd0eeda4
                    • Instruction Fuzzy Hash: 8B51E3B5E00219AFEB14CFD8D981AAEB7B5FF88340F208129E945A7354D774AA81CF50
                    APIs
                    • GetFileAttributesA.KERNEL32(00000000), ref: 10019062
                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 10019073
                    • memcpy.MSVCRT(?,?,?), ref: 100190FA
                    • _mbscpy.MSVCRT(00000000,00000000), ref: 1001914D
                    • _mbscat.MSVCRT ref: 10019160
                    • GetFileAttributesA.KERNEL32(00000000), ref: 1001916F
                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 10019183
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: AttributesCreateDirectoryFile$_mbscat_mbscpymemcpy
                    • String ID:
                    • API String ID: 3659483993-0
                    • Opcode ID: 401fb6a168ac80da8bdcaef0b1af1669b1b76f47dcf4406e61fa6151f8434c8d
                    • Instruction ID: 9d745a1a41eb4a7a2a12bfbab4145b738384b9807def3fcce6aed419c037e121
                    • Opcode Fuzzy Hash: 401fb6a168ac80da8bdcaef0b1af1669b1b76f47dcf4406e61fa6151f8434c8d
                    • Instruction Fuzzy Hash: C7413579D04118ABCB19CFA4D894AEDBBB5EF59310F208699E9599B240D770EFC0CF90
                    APIs
                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 1000A65F
                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 1000A671
                    • _mbscat.MSVCRT ref: 1000A68C
                    • _mbscat.MSVCRT ref: 1000A6A9
                      • Part of subcall function 10005304: PathFileExistsA.SHLWAPI(10008E68,?,10008E68,00000000,?,?,?), ref: 1000530B
                      • Part of subcall function 1000A519: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 1000A556
                    Strings
                    • XGRyaXZlcnNcZXRjXGhvc3Rz, xrefs: 1000A677
                    • XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==, xrefs: 1000A694
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: DirectoryFileSystem_mbscat$CreateExistsPath
                    • String ID: XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==
                    • API String ID: 4049401565-2249354660
                    • Opcode ID: e51112dc785d1928c10711f1fc1f48a27090427b8d8f96e4dd1b392eaab60eb6
                    • Instruction ID: 12b72cb5e04ffb9a7e9ac27504f08d15284b6b879465d20345e618696946c61d
                    • Opcode Fuzzy Hash: e51112dc785d1928c10711f1fc1f48a27090427b8d8f96e4dd1b392eaab60eb6
                    • Instruction Fuzzy Hash: 9021F8FAC04208BBFB10D7A0DC45BCE7378DB14380F1086A5FB0996145EEB5ABC88B91
                    APIs
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10006CC5
                    • GetFileSize.KERNEL32(?,00000000), ref: 10006CEA
                    • 6D0A2DD0.MFC42(00000000), ref: 10006CF7
                    • memset.MSVCRT ref: 10006D35
                    • ReadFile.KERNEL32(?,?,00001000,?,00000000,?,?,?,00000000), ref: 10006D59
                    • CloseHandle.KERNEL32(?,00000000), ref: 10006DA7
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleReadSizememset
                    • String ID:
                    • API String ID: 849667651-0
                    • Opcode ID: 345e6e4b0dabb8e378e3d3a882bd2689d2b5d55bb3fac18a72f07d8a2e4f64a8
                    • Instruction ID: 20d629e5142875753669a35d1e811c0194670abf32d4287b49ac12e2b780f710
                    • Opcode Fuzzy Hash: 345e6e4b0dabb8e378e3d3a882bd2689d2b5d55bb3fac18a72f07d8a2e4f64a8
                    • Instruction Fuzzy Hash: DA316179A00294ABEB25CF54CC85BCAB375FB4C341F1085D5FA49A7284D6B4AAD4CF50
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Global_mbscpymemset$AllocFreestrlen
                    • String ID:
                    • API String ID: 3317734596-0
                    • Opcode ID: f45d5ceaf1e5b0f6367cab85ba0a1253f357690d66b4acb8c6414236b1e8fa04
                    • Instruction ID: 371cdc15c4be44a3cd0437dc71fa5aaac8cd8a0fdcd6f9490a1cbaeabdbd2086
                    • Opcode Fuzzy Hash: f45d5ceaf1e5b0f6367cab85ba0a1253f357690d66b4acb8c6414236b1e8fa04
                    • Instruction Fuzzy Hash: A3219DB9D00208FBEB04CFD4D885B9DBBB4FF44304F50C158EA046B345D671AB948B95
                    APIs
                    • RtlAllocateHeap.KERNEL32(00000000,00000008,00000214), ref: 1000601E
                    • CreateThread.KERNEL32(00000000,00000000,Function_00005FD3,?,00000000,00000000), ref: 10006040
                    • WaitForSingleObject.KERNEL32(?,00000064), ref: 1000604F
                    • TerminateThread.KERNEL32(?,00000000), ref: 10006067
                    • CloseHandle.KERNEL32(?), ref: 10006071
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000104,00000000,00000000), ref: 100060A0
                    • HeapFree.KERNEL32(00000000,00000000,?), ref: 100060B3
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: HeapThread$AllocateByteCharCloseCreateFreeHandleMultiObjectSingleTerminateWaitWide
                    • String ID:
                    • API String ID: 4251336913-0
                    • Opcode ID: 7c4b1b83bf59831e45f4423d261fbac2e77e5f9a5ffc5ece3e70e6b213313125
                    • Instruction ID: 97dbfb0626745b3a13ce99f142d6799707a3ad8bdba7c53ac94dcc1e3c2afbb3
                    • Opcode Fuzzy Hash: 7c4b1b83bf59831e45f4423d261fbac2e77e5f9a5ffc5ece3e70e6b213313125
                    • Instruction Fuzzy Hash: 3B21BAB4A40218BFFB04DBD4CC8AF6E7775EB48701F208558FB15AB2D0C671AA51CB54
                    APIs
                    Strings
                    • 3ept4x7um2ql1d9vfa08or5nwcihzbkgsyz6, xrefs: 1000D754
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: rand$CountTicksrand
                    • String ID: 3ept4x7um2ql1d9vfa08or5nwcihzbkgsyz6
                    • API String ID: 3923125369-3761970555
                    • Opcode ID: 89df79a13d55d1c13e4613ecbe5ccd4efd4d3428256a0b84ea665a0490cafec1
                    • Instruction ID: 5baca46d6ec9984475ff302e343ac5961955fe47c9a6e1e459158899833a3c7c
                    • Opcode Fuzzy Hash: 89df79a13d55d1c13e4613ecbe5ccd4efd4d3428256a0b84ea665a0490cafec1
                    • Instruction Fuzzy Hash: 3E11B830815108EFDB00EFA8D894A9EBBB6FF44320F30419AE909E7345D331AA51DB60
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Sleepmemsetstrstr
                    • String ID: found~!
                    • API String ID: 2489989216-3563639675
                    • Opcode ID: 7143e2e7ad882e3708efaeca46576da121ed463c27487f09a7516927d49d91bc
                    • Instruction ID: 8119cc500c20e04b94a5d0cf1617a111049eef5a0b8ea3278fea11a9d42b8372
                    • Opcode Fuzzy Hash: 7143e2e7ad882e3708efaeca46576da121ed463c27487f09a7516927d49d91bc
                    • Instruction Fuzzy Hash: F0F068B6E00108EBEB14CBD4DD86F9FB378EB98201F1045D4FA09A7241EA71AF559F51
                    APIs
                    • CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 100067C8
                    • strlen.MSVCRT ref: 100067DB
                    • WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100067EC
                    • CloseHandle.KERNEL32(656C6261), ref: 100067F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleWritestrlen
                    • String ID: d=TRUE
                    • API String ID: 1350020999-2436624125
                    • Opcode ID: fceca9798fc01192b2dcacfd83b9fc19f9e747afa2fa14385b2acdc7239c0ac7
                    • Instruction ID: 9091ae99ca244d77819b183989e1c27e630e4a4cabccf0d25adc0486f95204c4
                    • Opcode Fuzzy Hash: fceca9798fc01192b2dcacfd83b9fc19f9e747afa2fa14385b2acdc7239c0ac7
                    • Instruction Fuzzy Hash: C5F082B9640208BBE710DBE4DCC6F9A777CAB48700F108144FF09A7280DA70A944CBA4
                    APIs
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001), ref: 1001ED93
                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 1001EDF5
                    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 1001EE7C
                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 1001EEAC
                    • CloseHandle.KERNEL32(00000000), ref: 1001EEC8
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$Create$CloseHandleMappingPointerView
                    • String ID:
                    • API String ID: 1737989552-0
                    • Opcode ID: 0358ff90798f16207cc0b2d9917ece2de8aef665082186868d1e4a743e807b98
                    • Instruction ID: 743c727af9f4ebea276fef19f0abd475d21ef0e9be5fc3ab0a1b21c44a59574f
                    • Opcode Fuzzy Hash: 0358ff90798f16207cc0b2d9917ece2de8aef665082186868d1e4a743e807b98
                    • Instruction Fuzzy Hash: 0561C874A0024ADFEB14CF54C545BAEB7F1FB48715F208659E8156B382C771DE81CBA1
                    APIs
                    • 6D0A2C70.MFC42(?,?,1001FADC,?,000000FF,?,00004000), ref: 1001EFB3
                    • 6D0A2DD0.MFC42(000000FF,?,1001FADC,?,000000FF,?,00004000), ref: 1001EFD4
                    • memcpy.MSVCRT(00000000,?,000000FF,?,1001FADC,?,000000FF,?,00004000), ref: 1001F000
                    • memcpy.MSVCRT(1002B35C,00004000,000000FF,?,1001FADC,?,000000FF,?,00004000), ref: 1001F092
                    • WriteFile.KERNEL32(00000000,00004000,000000FF,000000FF,00000000,?,1001FADC,?,000000FF,?,00004000), ref: 1001F0CC
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: memcpy$FileWrite
                    • String ID:
                    • API String ID: 3457131274-0
                    • Opcode ID: 8ae963d78527c6283b40dd429c2f167bcce8adaf93e6389cfdc28131677695c7
                    • Instruction ID: 4bd6022a4a2ec37f9ae3b9a4e2ff67f1137577e8ba2bc2d6a42e4c9f344f74e1
                    • Opcode Fuzzy Hash: 8ae963d78527c6283b40dd429c2f167bcce8adaf93e6389cfdc28131677695c7
                    • Instruction Fuzzy Hash: 4651BAB8E00109DFCB44CF98D491AAEBBB6FF98314F508559E9099B346D771E981CF90
                    APIs
                    • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 1000A556
                    • memset.MSVCRT ref: 1000A597
                    • ReadFile.KERNEL32(?,?,00001000,?,00000000), ref: 1000A5BB
                    • CloseHandle.KERNEL32(?), ref: 1000A607
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleReadmemset
                    • String ID:
                    • API String ID: 1934991721-0
                    • Opcode ID: 05b567c9856d8dc71aa1cd1537ca95858c2db371d4679b3c43396c213425bc9f
                    • Instruction ID: 6a49061c0ed4d4591c571688064297fdf5beefa6cff065268dfcbfb052794fb4
                    • Opcode Fuzzy Hash: 05b567c9856d8dc71aa1cd1537ca95858c2db371d4679b3c43396c213425bc9f
                    • Instruction Fuzzy Hash: F2216275A00255ABEB21CB54CC81FDA7374FB4C382F1045A5FB49A7284D6B0AAC48F54
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000F64F
                    • Process32First.KERNEL32(00000000,00000128), ref: 1000F672
                    • Process32Next.KERNEL32(00000000,00000128), ref: 1000F687
                    • lstrcmpiA.KERNEL32(00000000,?), ref: 1000F6A0
                    • CloseHandle.KERNEL32(00000000,00000000,00000128,00000002,00000000), ref: 1000F6B9
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                    • String ID:
                    • API String ID: 868014591-0
                    • Opcode ID: 1038135582eb3e37ab3ad8b6535064ad8d133c26625a9f4578617d57f1eb2694
                    • Instruction ID: 6a087116852af621f6414e876448160d89c161c3e2a286ec7096f0195759277d
                    • Opcode Fuzzy Hash: 1038135582eb3e37ab3ad8b6535064ad8d133c26625a9f4578617d57f1eb2694
                    • Instruction Fuzzy Hash: AA014CB5D00208EBEB10EFE0CC85BEDB7B8EB08384F50848CA509A7254D7756B84DF50
                    APIs
                      • Part of subcall function 10005EBA: GetCurrentProcess.KERNEL32(00000028,?), ref: 10005EC6
                      • Part of subcall function 10005EBA: OpenProcessToken.ADVAPI32(00000000), ref: 10005ECD
                      • Part of subcall function 100055B0: OpenProcess.KERNEL32(?,?,?), ref: 100055BF
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMTD ref: 1000F8A3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Process$OpenTimer$Concurrency::details::platform::__CreateCurrentQueueToken
                    • String ID: SeDebugPrivilege
                    • API String ID: 3835064167-2896544425
                    • Opcode ID: 55189b5de16f3dbe4dcc7aac7187496ce3e63eb901566924b5465bcc2ab1bb6a
                    • Instruction ID: fc672c7b5ca9b149f1a5e930f45fef3a2c969a6d647dd8d1ed25485d67561eb1
                    • Opcode Fuzzy Hash: 55189b5de16f3dbe4dcc7aac7187496ce3e63eb901566924b5465bcc2ab1bb6a
                    • Instruction Fuzzy Hash: 381182B5E40305BBFB10DBA08C46FDE7674EB04741F104568FB04BA2C5EA7166508755
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100), ref: 1000E4DB
                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 1000E525
                    • DeviceIoControl.KERNEL32(000000FF,00222000,00000000,00000400,00000000,00000000,?,00000000), ref: 1000E55F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ByteCharControlCreateDeviceFileMultiWide
                    • String ID: \\.\moon
                    • API String ID: 1446495253-2167628891
                    • Opcode ID: 9dce533a4f7932ddd941590fedf0fa382a3659c265b8dca9cabde0e0e6ffcda3
                    • Instruction ID: 23935ab2004618820c7cb13d6f81c44a57c65e4e46a841ae29926b98e247d94e
                    • Opcode Fuzzy Hash: 9dce533a4f7932ddd941590fedf0fa382a3659c265b8dca9cabde0e0e6ffcda3
                    • Instruction Fuzzy Hash: D71136B4550228BAE720DB54CC85FD57778EB44710F1086A9F708B72D0E7B02B86CF99
                    APIs
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMTD ref: 100092DB
                      • Part of subcall function 1000584F: CreateFileA.KERNEL32(00000080,00000003,00000000,00000000,80000000,00000000,10008E9B,?,10008E9B,00000000,80000000,00000000,00000000,00000003,00000080,00000000), ref: 1000586E
                    • strlen.MSVCRT ref: 10009303
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CreateTimer$Concurrency::details::platform::__FileQueuestrlen
                    • String ID: %s\lang.ini$C:\Users\user\Desktop
                    • API String ID: 3442345488-3536697808
                    • Opcode ID: e823f6641858293d945c9e7909958a6a4b2b0520b96349cccdf13bb565fdb5a4
                    • Instruction ID: 5c2cb0c0f0112b76a52748a175c0b0866aa9ac7b40e06f3532cdc33e9dc0b8a8
                    • Opcode Fuzzy Hash: e823f6641858293d945c9e7909958a6a4b2b0520b96349cccdf13bb565fdb5a4
                    • Instruction Fuzzy Hash: C40148F9D0021867EB20DB64DC46FCA7378DB14740F4086A4BA88671C5EAB5BBC48FD5
                    APIs
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 100167A3
                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000001), ref: 100167D0
                    • 6D0A2DD0.MFC42(00000020), ref: 100167E7
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001), ref: 1001684C
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: File$Pointer$Create
                    • String ID:
                    • API String ID: 250661774-0
                    • Opcode ID: c8b9e6afe0eb01d39fb7278265fc3bf30148558719591d39af9ad320be4d1573
                    • Instruction ID: f591f9a745d53ad3dfe22ef2f77011fbbab233b3b6c88462e3b6b178e94e5e56
                    • Opcode Fuzzy Hash: c8b9e6afe0eb01d39fb7278265fc3bf30148558719591d39af9ad320be4d1573
                    • Instruction Fuzzy Hash: C4510B74E0424AEFDB11CF54C895B9EBBB1FB09304F108699EC216B381C7B5DA85CB91
                    APIs
                    • 6D0A2DD0.MFC42(?), ref: 10008909
                    • memcpy.MSVCRT(?,?,?), ref: 10008926
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMTD ref: 1000899A
                    • 6D0A2C70.MFC42(?), ref: 100089DA
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Timer$Concurrency::details::platform::__CreateQueuememcpy
                    • String ID:
                    • API String ID: 290272092-0
                    • Opcode ID: 5b048e3800083471e31b87855b071020d7c780d89cdf57527aade222a943a7f6
                    • Instruction ID: 48faa35ba49733c278f9528cd1fa272fbef8b4e165372624ad9d635f7decea62
                    • Opcode Fuzzy Hash: 5b048e3800083471e31b87855b071020d7c780d89cdf57527aade222a943a7f6
                    • Instruction Fuzzy Hash: D8318EB4D00249FBDF04DFA8C891BAEB774FF44304F248598E945AB385D671AB40CB91
                    APIs
                    • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 100184FF
                    • strlen.MSVCRT ref: 1001850E
                    • _mbscat.MSVCRT ref: 10018544
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 1001855C
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CurrentDirectoryFilePointer_mbscatstrlen
                    • String ID:
                    • API String ID: 345282596-0
                    • Opcode ID: 11613a86f7ef6ccb1823d9a6ffd8c8377e3c6033db4f259f26be16f8b67c7ce5
                    • Instruction ID: d652d1c918226deb8dbb541e2e319e9dea9985361b2032265780a00324afeef0
                    • Opcode Fuzzy Hash: 11613a86f7ef6ccb1823d9a6ffd8c8377e3c6033db4f259f26be16f8b67c7ce5
                    • Instruction Fuzzy Hash: 5C318275D0064ADBDB00CF94C881BAE7BB6EF45300F144569F515AB281D330EBD1CB91
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: strlen$malloctolowertoupper
                    • String ID:
                    • API String ID: 1610385915-0
                    • Opcode ID: 3031cbe58d1370803702243996a180456ff070ffe73ccb5f96b58183e148b611
                    • Instruction ID: 7a5db7ae6677982574b2aec189b42e08800268808c8d6061b8b5cfc946dd9c0f
                    • Opcode Fuzzy Hash: 3031cbe58d1370803702243996a180456ff070ffe73ccb5f96b58183e148b611
                    • Instruction Fuzzy Hash: 45317C75D0428CEBDB04CFA8C8D0AAEBBB5EF42245F2441D9D841AB306C635AB90DB45
                    APIs
                    • SafeArrayGetVartype.OLEAUT32(10010E30,?), ref: 10011190
                    • SafeArrayAccessData.OLEAUT32(10010E30,00000000), ref: 100111AD
                    • SafeArrayUnaccessData.OLEAUT32(10010E30), ref: 10011217
                    • refcount_ptr.LIBCPMTD ref: 10011227
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: ArraySafe$Data$AccessUnaccessVartyperefcount_ptr
                    • String ID:
                    • API String ID: 643252218-0
                    • Opcode ID: 3b3fe23d2f5eb5c6268ffe4ceadee3182b40b81b390c65d7c874f3fb6bc5dae2
                    • Instruction ID: 2d86a0b6451a645c637edffcb08906b081acf8c9fc1e69a33f2e972db292452b
                    • Opcode Fuzzy Hash: 3b3fe23d2f5eb5c6268ffe4ceadee3182b40b81b390c65d7c874f3fb6bc5dae2
                    • Instruction Fuzzy Hash: 7231ED75D00109EFCB08CF94C995BEEBBB5FF48310F208159E525AB281DB35AA45CBA1
                    APIs
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000B74E,?,00000000,00000000), ref: 1000BDAC
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000BDBB
                    • CloseHandle.KERNEL32(?), ref: 1000BDC5
                    • Sleep.KERNEL32(00000064), ref: 1000BDCD
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateHandleObjectSingleSleepThreadWait
                    • String ID:
                    • API String ID: 422747524-0
                    • Opcode ID: 10cae54d753047885dafb503133400631415932ed754353f801354fb98f1c1ee
                    • Instruction ID: b9f77b51fdc0ce5c79c26bcc87bcad786e5d67b6ada7f4622830d9e7383a6a42
                    • Opcode Fuzzy Hash: 10cae54d753047885dafb503133400631415932ed754353f801354fb98f1c1ee
                    • Instruction Fuzzy Hash: A8F03074A40208BBF704DFE4CD8AF9D7B75EB54711F208154FB059A2C4D7715A518B61
                    APIs
                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,10006283,?), ref: 100061E6
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 100061FF
                    • CloseHandle.KERNEL32(00000000), ref: 1000620D
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: Process$CloseHandleOpenTerminate
                    • String ID:
                    • API String ID: 2026632969-0
                    • Opcode ID: 3346a770a5624940685d264461f88c5fe553c2350b940db3d8f2111e499f6289
                    • Instruction ID: c3b055f7a518f1452caa67d907e4e45609d189d3ebd99e836d77498bd3e4c8c9
                    • Opcode Fuzzy Hash: 3346a770a5624940685d264461f88c5fe553c2350b940db3d8f2111e499f6289
                    • Instruction Fuzzy Hash: 6AF05875A44218FBE710DBE4DD88B5E7BA8EB0C381F308958FA05D7240D6309A819B50
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1000D39D
                    • sprintf.MSVCRT ref: 1000D3B6
                      • Part of subcall function 10004775: 6D1D1DA0.KERNEL32(?,?), ref: 10004780
                    Strings
                    • cmd /c ping 127.0.0.1 -n 3&del "%s", xrefs: 1000D3AA
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: FileModuleNamesprintf
                    • String ID: cmd /c ping 127.0.0.1 -n 3&del "%s"
                    • API String ID: 1461247384-535577241
                    • Opcode ID: 620f4682e5601b0232d7558068d39c4614f5703bc50ed6a87eb18a28d36fc5f0
                    • Instruction ID: a6b8e271a6fb293dd042ad0264e0da81425d7f8170d8075a503821407d4c08d6
                    • Opcode Fuzzy Hash: 620f4682e5601b0232d7558068d39c4614f5703bc50ed6a87eb18a28d36fc5f0
                    • Instruction Fuzzy Hash: A8F0C27291021C7BEB11C7A8CCA5BD6B7BCAB54300F4001E5E70CA6181EFB52B9C8F91
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2912566238.0000000010001000.00000080.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000003.00000002.2912550626.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912589486.0000000010022000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912602945.0000000010023000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912644668.000000001002B000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010033000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912659603.0000000010047000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912692486.000000001004A000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.2912705807.000000001004C000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                    Similarity
                    • API ID: LocalTime
                    • String ID: -
                    • API String ID: 481472006-2547889144
                    • Opcode ID: 826a066efadd576a896ad869d34b41f6dda7a69dcbf37a7f77cb9f4679c72261
                    • Instruction ID: 54c5f6dbd1dfb4096c870d722f7c1ff444cf4a43efea41441fbe41cbc9c571be
                    • Opcode Fuzzy Hash: 826a066efadd576a896ad869d34b41f6dda7a69dcbf37a7f77cb9f4679c72261
                    • Instruction Fuzzy Hash: 47F04471D0120AEBEB14DFA4C6856FDB7B4EF40740F20C1ADD801AB648DA34AB09FB52